Professional Documents
Culture Documents
User Guide
Supporting
PATROL Configuration Manager 1.6
November 2006
Contacting BMC Software
You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
about the company, its products, corporate offices, special events, and career opportunities.
United States and Canada
Address BMC SOFTWARE INC Telephone 713 918 8800 or Fax 713 918 8000
2101 CITYWEST BLVD 800 841 2031
HOUSTON TX 77042-2827
USA
Outside United States and Canada
Telephone (01) 713 918 8800 Fax (01) 713 918 8000
Copyright 2006 BMC Software, Inc., as an unpublished work. All rights reserved.
BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks
or trademarks of BMC Software, Inc.
IBM is a registered trademark of International Business Machines Corporation.
DB2 is a registered trademark of International Business Machines Corporation.
Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle
Corporation.
All other trademarks belong to their respective companies.
BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this
information is subject to the terms and conditions of the applicable End User License Agreement for the product and the
proprietary and restricted rights notices included in this documentation.
Support website
You can obtain technical support from BMC 24 hours a day, 7 days a week at http://www.bmc.com/support_home.
From this website, you can
■ read overviews about support services and programs that BMC offers
■ find the most current information about BMC products
■ search a database for issues similar to yours and possible solutions
■ order or download product documentation
■ report an issue or ask a question
■ subscribe to receive proactive e-mail alerts when new product notices are released
■ find worldwide BMC support center locations and contact information, including e-mail addresses, fax numbers, and
telephone numbers
3
4 PATROL Configuration Manager User Guide
Contents
Chapter 1 Introduction 15
About PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Concepts and Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
RuleSet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Statically Linked RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Rule Alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Configuration Variable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Interactions Among PATROL Agent, PATROL Configuration Database, and
PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
PATROL Knowledge Module for Event Management . . . . . . . . . . . . . . . . . . . . . . 19
Agent Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Rules Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Knowledge Module Plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Graphical User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
GUI Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Job Status Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Contents 5
Specify the Location of the Error File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Specify the Location of Localized Agent RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Retaining Backups and Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Select Backup Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Select Transaction Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Select Virtual Backup Folder Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Managing Advanced Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Set Default for Reporting Localized Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Determine Whether Agent Authentication Is Used or Ignored . . . . . . . . . . . . . . . 59
Set the Number of Backup Files Retained . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Activate Autosave for Group and Agent Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Changing Graphic User Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Customize the PATROL Configuration Manager GUI . . . . . . . . . . . . . . . . . . . . . . 63
Sharing a Configuration among Multiple Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Supporting Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Overview of the Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Sample Failover Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Contents 7
Purging All Configuration Changes from an Agent. . . . . . . . . . . . . . . . . . . . . . . . 146
Restoring All Configuration Changes to an Agent . . . . . . . . . . . . . . . . . . . . . . . . . 147
Automating Updates to RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Types of Automated RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Precedence. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Change to the Source Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Activating/Deactivating Statically Linked RuleSets . . . . . . . . . . . . . . . . . . . . . . . 151
Designating RuleSets to Be Applied to New Agents (ApplyOnNew). . . . . . . . . 152
Designating RuleSets to Be Applied After Any RuleSet is Applied
(ApplyOnApply) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Designating Rules to be Updated Automatically (LinkedRuleSets) . . . . . . . . . . 156
Identifying Linked RuleSets Associated with an Agent. . . . . . . . . . . . . . . . . . . . . 161
Accommodating Computer-Specific Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Operation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Predefined Rule Aliases (System Variables) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Defining a Rule Alias. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Viewing and Adding Missing Rule Alias. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Contents 9
Converting Parameter Overrides to RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Turning Off Alarm Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Import PATROL Console Configuration Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Conversion Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Converting PATROL Console Desktop Settings to .ini Files. . . . . . . . . . . . . . . . . 257
Importing the Converted Data into PATROL Configuration Manager. . . . . . . . 258
Figures 11
Alert Settings Dialog Box–Alert Action Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Alert Settings Dialog Box – Alert Resend Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Alert Settings Dialog Box – Send Reset On Init Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Alert Settings Dialog Box – Custom Identifiers Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Alert Settings Dialog Box – Class Active State Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
Alert Settings Dialog Box – Recovery Action Command Type Tab . . . . . . . . . . . . . . 211
Alert Settings Dialog Box – Recovery Action Commands Tab . . . . . . . . . . . . . . . . . . 214
Alert Settings Dialog Box – Notification Targets Tab . . . . . . . . . . . . . . . . . . . . . . . . . 217
Alert Settings Dialog Box – Notification Command Tab . . . . . . . . . . . . . . . . . . . . . . . 220
Alert Settings Dialog Box – Notification System Tab . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Alert Settings Dialog Box – Alert Messages Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Alert Settings Dialog Box – Notification Blackouts Tab . . . . . . . . . . . . . . . . . . . . . . . 233
Blackout Period Selection Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
What If RuleSet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
What If Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
What If Results Dialog Box – Results Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
What If Results Dialog Box – Report Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
AS_CHANGESPRING Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
RuleSet File Name Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Select the Knowledge Modules Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Create List Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
Get File Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Example of pmc_cli_allow_unattended_login.cmd . . . . . . . . . . . . . . . . . . . . . . . . . . . 262
Example of pcmcli Interacting with a Policy in Running Attended Mode . . . . . . . . 262
PATROL Configuration Manager CLI Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
PATROL Configuration Manager CLI Script File Syntax . . . . . . . . . . . . . . . . . . . . . . 264
Generate a Report by Using PATROL Configuration Manager CLI on Solaris . . . . 268
Schedule a Report on UNIX – crontab Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Generate a Report by Using PATROL Configuration Manager CLI on Windows . 269
Rule Value Length Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Tables 13
Alert Action Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Alert Resend Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
Custom Identifier Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Class Active State Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Recovery Action Command Type Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Recovery Action Command Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Notification Targets Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Notification Command Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Notification System Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Notification Subject Line and Message Length Limits by Platform . . . . . . . . . . . . . . 226
Alert Message Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Alert Message Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Types of Notification Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Notification Blackout Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Blackout Period Selection Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
What If Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
PATROL Configuration Manager CLI Path and File Name . . . . . . . . . . . . . . . . . . . . 260
Location of the pcm_cli_allow_unattended_login Script . . . . . . . . . . . . . . . . . . . . . . 261
pcm_cli_allow_unattended_login Script per Platform . . . . . . . . . . . . . . . . . . . . . . . . 261
PATROL Configuration Manager CLI Options and Arguments . . . . . . . . . . . . . . . . 263
PATROL Configuration Manager CLI File Options . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
PATROL Configuration Manager Configuration Variables . . . . . . . . . . . . . . . . . . . . 273
Supported Regular Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
1
1 Introduction
This chapter introduces PATROL Configuration Manager. The following topics are
discussed:
Chapter 1 Introduction 15
About PATROL Configuration Manager
Rule
A rule is an instruction to the PATROL Agent on how to update a configuration
variable (historically referred to as a pconfig variable) in the PATROL Configuration
Database (pconfig) of a PATROL Agent. Each rule consists of a variable to be changed
(also referred to as a key), the value, and the operation to be performed on that
variable with that value.
When the constituent parts of a rule need to be emphasized, a rule may also be
referred to as key/value or key/value/operation.
RuleSet
A RuleSet is a collection of rules that are associated by the user based on user-defined
organizing principles. Many of the actions that can be performed on rules, such as
Applying, can also be performed on RuleSets. This capability allows a user to apply a
large number of rules to an agent or agents efficiently and consistently.
Rule Alias
A Rule Alias is a variable that enables you to insert in a rule a placeholder that is
replaced by a computer-specific value when the rule is applied.
Configuration Variable
In the PATROL Agent, configuration variables control some aspect of agent behavior
in which more than one option exist. This behavior includes but is not limited to the
agent's interaction with PATROL Knowledge Modules® (KM) and other PATROL
components. Historically, a configuration variable has also been referred to as a
pconfig variable.
Configuration
A Configuration is a set of configuration variables and their values. At installation,
the PATROL Agent starts out with a default configuration. As users customize the
behavior of their agent, they change the configuration of the agent. The default
configuration is stored in a configuration database file entitled config.default.
Changes to these defaults are stored in delta (change files), which contain only those
configuration variables that have changed and their updated values.
Many Knowledge Modules add and change configuration variables when you install
and/or load them into PATROL. The changes are made by other means than
PATROL Configuration Manager.
Chapter 1 Introduction 17
Interactions Among PATROL Agent, PATROL Configuration Database, and PATROL Configuration Manager
Components
This section describes the components of PATROL Configuration Manager:
■ user interface
■ PATROL KM for Event Management
■ agent repository
■ rules repository
■ managed systems (agents)
User Interface
The PATROL Configuration Manager user interface, shown in “Graphical User
Interface” on page 22, configures managed agents and administers rules. The user
interface provides features similar to the Windows Explorer interface such as drag
and drop and cut and paste.
See the PATROL Knowledge Module for Event Management User Guide for more
information.
Chapter 1 Introduction 19
Agent Repository
Agent Repository
The agent repository contains communication settings and grouping information for
each agent. The agent repository information is stored in the following files:
■ agents.ini
■ groups.ini
Rules Repository
The rules repository contains the following information:
The rules repository contains rules that are installed with the PATROL Configuration
Manager and user-defined rules.
Rules are logically grouped to form RuleSets. For example, rules could be grouped
according to their related action or object:
■ notification type—all rules that apply to e-mail notifications could be grouped into
a RuleSet
RuleSets can be grouped together into folders. While you usually manage your
RuleSets and folders with PATROL Configuration Manager, the RuleSets are stored
in text files and can be managed using standard system utilities such as text editors
and file management utilities. The RuleSets are in the same format as standard
PATROL Agent configuration files (.cfg).
For example, configuring the PATROL Knowledge Module for UNIX to monitor log
files requires the creation of 4 or 5 rules that are interdependent. Thus, the PATROL
for UNIX product provides a plug-in that enables a user to create these rules
simultaneously. The plug-in coordinates the rule creation, preventing conflicts
between rules and checking for error.
These utilities interact with the PATROL Configuration Manager, but are loaded and
accessed through one of the PATROL Consoles.
Chapter 1 Introduction 21
Graphical User Interface
GUI Controls
Figure 1 provides a sample of the PATROL Configuration Manager Graphical User
Interface (GUI). Table 1 describes the various GUI controls built into the interface.
Agents tree view pane message pane RuleSet tree view pane
Table 1 PATROL Configuration Manager Graphical User Interface (GUI) Properties (part 1 of 5)
GUI Control Description
The menu bar contains commands to manage configuration items and to
Menu bar manipulate the GUI.
File The File menu contains commands to modify and open PATROL Configuration
Manager configurations as well as exiting the configuration manager. The File
menu contains the following menu commands:
The actions performed by these commands can also be performed with the
mouse.
Chapter 1 Introduction 23
GUI Controls
Table 1 PATROL Configuration Manager Graphical User Interface (GUI) Properties (part 2 of 5)
GUI Control Description
View The View menu contains commands for navigating and managing the tree view
panes. These commands are used in conjunction with the Edit and Focus
commands. The View menu contains the following commands:
The actions performed by these commands can also be performed with the
mouse.
Queue The Queue menu contains commands for applying agent rules. The Queue menu
contains the following commands:
Table 1 PATROL Configuration Manager Graphical User Interface (GUI) Properties (part 3 of 5)
GUI Control Description
Tools The Tools menu contains commands for manipulating PATROL Agents. The
Tools menu contains the following commands:
■ View Job Status—displays the Job Status Information dialog box, which
shows the status of the last completed task. A permanent status summary can
be obtained from the PATROL Configuration Manager log file that is
specified in the PATROL Configuration Manager initialization file. The
default log file is PCM.log located in the installation directory.
Chapter 1 Introduction 25
GUI Controls
Table 1 PATROL Configuration Manager Graphical User Interface (GUI) Properties (part 4 of 5)
GUI Control Description
Help The Help menu command provides information about PATROL Configuration
Manager with the About command.
Changes are also saved by selecting File => Save from the Menu bar.
Get creates copies of agent configurations in the PATROL Configuration Manager
backup folder that is displayed in the RuleSet tree view
The agent configuration is timestamped with the date and time that the get was
performed. To get copies of agent configurations, select one or more agents in the
Agent tree view and click the Get Configuration button. Agent configurations can
also be retrieved by right-clicking on an agent and choosing
Configuration => Get.
Apply transfers all rules applied to agents to the PATROL Configuration Manager
queue for processing
This action can also be performed by selecting Queue => Apply from the Menu
bar.
Search searches folders or RuleSets for rule items
RuleSets
A folder or RuleSet must be selected in order to perform a search. This action can
also be performed by selecting Queue => Apply from the Menu bar.
Expand All expand the tree in the tree view pane that has focus
Expand expand the selected portion of the tree in the tree view pane that has focus
Collapse All collapse the tree in the tree view pane that has focus
Collapse collapse the selected portion of the tree in the tree view pane that has focus
Table 1 PATROL Configuration Manager Graphical User Interface (GUI) Properties (part 5 of 5)
GUI Control Description
TreeView displays the rule name of a rule in hierarchical mode or slash (/) path mode
■ hierarchical mode
Agents tree view pane displays the agents to be managed by PATROL Configuration Manager
acts as the base container for all agent and group information
Message pane displays system messages and the status of requested operations
Chapter 1 Introduction 27
Job Status Information
The Job Status Information dialog box reports the progress and ultimate status of
each operation on a per agent basis.
Access
When you perform a configuration operation, PATROL Configuration Manager
automatically displays the Job Status Information dialog box. You can also access the
dialog box from the Menu bar.
From the Menu bar, choose Other => View Job Status. PATROL Configuration
Manager displays Job Status Information dialog box, which lists the last operation
that it performed.
NOTE
Select the Redisplay when updated check box to have PATROL Configuration Manager
automatically open the Job Status Information dialog box whenever the job status information
is updated. If do not select, this option the Job Status Information dialog box is not opened
automatically.
Viewer
PATROL Configuration Manager presents job status information in a dialog box.
Figure 2 on page 29 provides a sample of the Job Status dialog box.
Table 2 describes the information provided by the Job Status Information dialog box.
STOPPED—a user has intervened and manually stopped the job (color = yellow)
Chapter 1 Introduction 29
Log File
Diagnostics
If an operation fails, the PATROL Configuration Manager records the failure in its log
file. You can view the log messages for an operation through the Job Status
Information dialog box.
1 Open the Job Status Dialog box. For instructions for opening the dialog box, see
“To view job status information” on page 28.
2 Place the cursor on the operation whose log entries you want to view.
3 Right-click.
The Job Status Information dialog box displays the Job Log File Viewer dialog box
as shown in Figure 3.
5 Scroll through the text to determine the cause of the result of the operation.
Log File
A permanent job status summary can be obtained from the PATROL Configuration
Manager log file, whose location is specified in the PATROL Configuration Manager
initialization file.
The default log file is PCM.log located in the installation directory. For more
information about the log file, see “Specify the Location of the Log File” on page 46.
2
Setup and Customization of PATROL
2
Configuration Manager
This chapter describes how to designate locations (paths and filenames) for PATROL
Configuration Manager information. It also describes how to customize the user
interface by allowing you to choose fonts, colors, and other graphical user interface
(GUI) attributes. The following topics are discussed:
The Configure dialog box changes are applied to the PATROL Configuration
Manager initialization file that is opened by clicking OK.
You can open other initialization files or create new initialization files.
■ PCM.ini
■ agents.ini
■ groups.ini
■ rulealiases.ini
For information about setting the number of backups, see “Set the Number of Backup
Files Retained” on page 60.
4 Click Save.
The tasks described in this section are all performed using the Folders / Paths tab of the
Configure: Application dialog box shown in Figure 4.
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Ini Folder text box.
■ PCM
■ Shipped
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the RuleSet Folder text box.
../tlog/agent_display_name/datestamp-timestamp.cfg
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Transaction Folder text box.
3 Navigate to the directory in which you want to store transaction log information.
The Backup RuleSets can be used to rollback to a previous agent configuration. You
can also use them to verify which rules have been applied to an agent.
../backup/agent_display_name/datestamp-timestamp.cfg
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Backup Folder text box.
../queue/agent_display_name/datestamp-timestamp.cfg
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Queue Folder text box.
3 Navigate to the directory in which you want to store queue information for rules to
be applied.
../images/graphic_filename.gif
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Images Folder text box.
3 Navigate to the directory in which you want to store images for rules to be applied.
Each comment file is associated with an individual RuleSet. Use them to view
information (explanations, warnings, etc.) added by other users as well as yourself
and descriptions of changes made to the RuleSet.
../comments/1st_directory_name.2nd_directory_name.Nth_directory_name.ruleset_name.txt
EXAMPLE
For a RuleSet stored at ../ruleset/db_servers/finance/EOM_settings.cfg, PATROL
Configuration Manager will create a comment file for that RuleSet with the name
db_servers.finance.EOM_settings.txt.
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Comments Folder text box.
Use the log file to review what actions have been performed, on which agents the
actions were performed, which users performed the actions, and whether or not those
actions were successful.
../PCM.log
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Log File text box.
3 Navigate to the directory in which you want to store log file information.
../PCM.err
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Error File text box.
../PCM/local/agent_display_name.cfg
1 From the Menu Bar, choose File => Configure => Application.
2 Click on the open file icon to the right of the Local Folder text box.
3 Navigate to the directory in which you want to store localized agent ruleset
information.
■ how many sets of backups are retained and the organizational structure in which
they are stored
The tasks described in this section are all performed using the Archives tab of the
Configure: Application dialog box shown in Figure 5.
Scope
These settings apply to all agents.
Options
Table 13 lists the options available for Backup Settings.
1 From the Menu Bar, choose File => Configure => Application.
Scope
These settings apply to all agents.
Option
You can choose to retain as few as 1 or as many as you perform (Unlimited).
1 From the Menu Bar, choose File => Configure => Application.
3 In the Transaction Logs list box, choose a number or the word Unlimited.
Scope
These settings apply to all agents.
Options
Table 14 lists the options available for Virtual Backup Folder Settings.
Results
These values work together to manage the display of the virtual agent backup folders.
For example, if both values are set to five, the first five backups go into one directory.
Then the next five backups go into a new virtual directory. This continues until there
are five directories with five backups each. At this point, the maximum folders and
the minimum agents per folder reach their limits, and as new backups are created,
they are added to each folder in turn.
EXAMPLE
If the Maximum Folder = 5 and the Minimum Agents Per Folder = 5; PATROL Configuration
Manager creates Folder1 and fills it with the minimal number of agents, 5, in this case
Agents1-Agent5. When Folder1 is filled with the minimum number of agents, PATROL
Configuration Manager creates Folder2 and fills it with the minimum number of agents, in
this case Agents6-Agent10. This process continues until the maximum number of folders are
created, 5, and each folder is filled with the minimum number of agents. The result is that
Folder5 contains Agent20-Agent25. After these criteria are met, PATROL Configuration
Manager adds Agent26 to Folder1, Agent27 to Folder2, Agent28 to Folder3, and so on.
1 From the Menu Bar, choose File => Configure => Application.
3 In Maximum Folder text box of the Virtual Backup Folder Settings pane, type the
maximum number of virtual backup folders that you want PATROL Configuration
Manager to create.
4 In Minimum Agents Per Folder text box of the Virtual Backup Folder Settings pane,
type the minimum number agents that you want to store in each virtual backup
folder.
NOTE
If you change the Virtual Backup Folder Settings, you must refresh the RuleSets tree view or
restart PATROL Configuration Manager to view the changes within the interface.
■ set the default for generating a report of localized rules before an apply operation
is performed
■ turn on the autosave feature for group and agent configuration data
The tasks described in this section are all performed using the Advanced tab of the
Configure: Application dialog box shown in Figure 6.
Scope
This setting applies to all apply operations to groups and agents.
Option
You can set the default for all apply operations by selecting or deselecting the check
box.
1 From the menu bar, choose File => Configure => Application.
■ select Report Local Rules Before Apply check box to automatically generate a
report of localized rules before performing an apply
■ deselect Report Local Rules Before Apply check box to perform an apply
operation without first generating a report of localized rules
You would enable the Use Authentication option in conjunction with the rule
/AgentSetup/pconfigRequiresAuthentication to prevent unauthorized users from
having the ability to configure the agent. You would use the Verification of Agent
Identification option to let you know whether the
/AgentSetup/pconfigRequiresAuthentication rule is set on an agent (not set, or set to 0,
results in an ‘ignored’ message), and if it is, whether authentication is successful.
Scope
This setting applies to all agents.
Option
You can set the default for all agents by selecting or deselecting the check box.
1 From the menu bar, choose File => Configure => Application.
■ Verify on each configuration job—use the user name and password stored in the
Secure Key Store for the respective agent to verify the configuration manager’s
identity every time the manager interacts with the agent and prevent
unauthorized users from making configuration changes
■ Verify only when agent added—use the user name and password stored in the
Secure Key Store for the respective agent to verify the configuration manager’s
identity when registering an agent to the configuration manager
Whenever you modify content that is stored in one of the initialization (*.ini) files
listed below and save the configuration by selecting File => Save, PATROL
Configuration Manager creates a backup copy of the .ini file before writing the new
changes to the file. The previous version of the .ini file is renamed to filename.ini~# in
which the most recent backup does not have a number following the tilde (~). The
agent.ini file and three of it’s backup files would be listed as agents.ini, agents.ini~,
agents.ini~1, and agents.ini~2.
Scope
The following initialization files are backed up.
■ PCM.ini
■ agents.ini
■ groups.ini
■ rulealiases.ini
Option
The default number of back up is 2. You can change the number of backups retained.
1 From the menu bar, choose File => Configure => Application.
3 In the File Backup Settings panel, in Maximum .ini file backups to keep enter the
number of backups you want. Zero (0) indicates that no backups will be made or
retained.
PATROL Configuration Manager enables you to save group and agent information
automatically when a change to that information occurs.
Scope
This setting applies to the groups.ini and agents.ini files.
Option
You can enable or disable the automatic saving feature.
To Enable Autosave
1 From the menu bar, choose File => Configure => Application.
The tasks described in this section are all performed using the Fonts / Colors tab of the
Configure: Application dialog box shown in Figure 7.
Scope
These settings apply to the PATROL Configuration Manager GUI only.
Options
Table 15 lists the options available for PATROL Configuration Manager GUI. The
fields and the characteristics that they define do not apply to all GUI objects and
controls.
1 From the Menu Bar, choose File => Configure => Application.
4 From Item list box, choose the object or control that you want to customize.
The bottom portion of the dialog box is the sample pane. It displays the settings. As
you change the settings in step 5—step 9, the sample pane reflects those choices.
8 From the Font Size list box, choose a size ranging from 8 to 56.
9 In the Font Style text boxs, choose the appropriate check box to italicize and/or
bold the text.
Supporting Failover
PATROL Configuration Manager provides failover support from one computer to
another. However, to implement this support, you must perform a few set up tasks.
2 Copy the Secure Key Store (pcm.kdb) from the primary computer to corresponding
location on the secondary computer.
4 Make a copy of PCM.ini for backup purposes and store it outside of the
%BMC_ROOT% directory structure.
5 Open PCM.ini on the primary computer using a text editor and record the values of
the following variables.
■ ess_bin_dir
■ ess_jar_path
■ bin_dir
On the secondary computer, open the PCM.ini and update the variables to
correspond with the failover configuration.
■ %BMC_ROOT%\pconfmgr\rulesets
■ %BMC_ROOT%\pconfmgr\comments
■ %BMC_ROOT%\pconfmgr\ini
4. Paste the directories in the $BMC_ROOT directory on the Solaris computer.
5. Copy the pcm.kdb file from %BMC_ROOT%\pconfmgr\security\sks\ to
$BMC_ROOT/common/security/sks/ on the Solaris computer.
6. Start PATROL Configuration Manager on the Solaris computer. The configuration
manager informs you that all the directories are invalid. Use the Configure:
Application dialog box (File => Configure => Application) to update the
directories.
7. On the Windows computer (primary), make a copy of PCM.ini and store it outside
of the %BMC_ROOT% directory structure.
8. On the Windows computer (primary), using a text editor, open PCM.ini, locate the
following variables and record their value.
■ ess_bin_dir
■ ess_jar_path
■ bin_dir
9. On the UNIX computer (secondary), using a text editor, open PCM.ini, locate the
following variables and change their values to correspond to the failover
configuration.
■ ess_bin_dir
■ ess_jar_path
■ bin_dir
For example,
ess_bin_dir=C:\Program Files\BMC
Software\pconfmgr\common\security\bin_v3.0\Windows-x86
would become
ess_bin_dir=/opt/bmc/pconfmgr/common/security/bin_v3.0/
solaris-2-8-sparc
3
3 Add and Manage Agents and Groups
In PATROL, configurations are managed at the agent level. PATROL Configuration
Manager requires you to identify which PATROL Agents you want it to manage.
Once you have registered or added an agent with the configuration manager, you can
associate it in groups with other agents to more easily manage large numbers of
similar agents. This chapter presents the following topics:
For instructions on how to set the security level and use authentication, see either
“Setting Default Agent Values” on page 73 or “Specifying an Individual PATROL
Agent” on page 74.
Security Levels
When registering an agent with the PATROL Configuration Manager and
establishing how the configuration manager will communicate with an agent (port
number, protocol, and hostname), you can also specify the security level at which
they communicate.
Storage
The security level is defined for each agent. The level is saved in the seclevel variable
in the agents.ini file as shown in Figure 8.
Default
The default security level for all agents being registered to PATROL Configuration
Manager is set in the Configure: Agent Defaults dialog box as shown in Figure 9 on
page 73.
If you do not designate a security level in the agent defaults dialog box or in the
Agent Properties dialog box, PATROL Configuration Manager defaults the security
level to 0. At security level zero, an entry in the agents.ini is not required for PATROL
Configuration Manager to function properly.
Dependencies
Communicating with an agent at a designated security level requires both the
PATROL Agent 3.5.00 or later and the PATROL Configuration Database (also
referred to as the pconfig utility) 3.6.00 or later.
Authentication
PATROL Configuration Manager retrieves the user credentials stored in the Secure
Key Store and uses them to access PATROL components such as agents, which
control access to their individual configuration databases. The components use the
credentials to verify or prove the identity of the user. This process of verifying a
user’s identity is called authentication and it is used in some but not all of the
configuration manager operations.
For information about how to set up and manage user credentials in the Secure Key
Store, see “Managing Unique User Names and Passwords for Individual Agents” on
page 91.
Usage
PATROL Configuration Manager uses the Secure Key Store to authenticate user
credentials during the following operations:
■ retrieving objects from PATROL Agent when using the Event Management plug-
in to manage alert settings and parameter settings
Dependencies
Authentication requires PATROL Agent 3.6.00 or later and PATROL Configuration
Manager must be running PATROL Configuration Database (pconfig utility) 3.6.00 or
later. For secure PATROL Configuration Database (pconfig utility),
■ the Use Authentication check box must be selected in the PATROL Configuration
Manager agent properties for the agent; this option instructs the configuration
manage to attempt to authenticate to the agent, which may or may not require
authentication to establish a connection
Results
To learn the results of authentication, you would use the Verification of Agent
Identification option to let you know whether the
/AgentSetup/pconfigRequiresAuthentication rule is set on an agent (not set, or set to 0,
results in an ‘ignored’ message), and if it is, whether authentication is successful. The
results are reported in the Job Status Information dialog box.
For more information about this feature, see “Determine Whether Agent
Authentication Is Used or Ignored” on page 59.
■ port number
■ communication protocol
■ security level
■ use of authentication during configuration operations
1 From the menu bar, choose File => Configuration => Agent Defaults.
2 In the IP Port text box, type the port number on which a majority of your agents
listen.
NOTE
The default port number for the PATROL Agent is 3181.
3 In the IP Protocol list box, choose the communication protocol used by the agent.
■ TCP
■ UDP
4 In the Security Level list box, choose the security level at which you want to the
PATROL Configuration Manager to connect to PATROL Agents. The security level
that you enter must match the security level at which the agents are running. If you
leave this field blank, it defaults to level 0.
5 In the Use Authentication check box, select this option if you want pconfig to verify
the user credentials stored for the agent in the Secure KeyStore of the configuration
manager.
NOTE
PATROL Agent must be 3.6.00 or later and the PATROL Configuration Database (pconfig
utility) must also be 3.6.00 or later. If this option is not selected the Job Status Information
dialog box reports “Authentication ignored.” If the agent or pconfig is earlier than 3.6.00,
the Job Status Information dialog box reports “Authentication unsupported.”
To Add an Agent
1 In the Agent tree view (the left pane of the PATROL Configuration Manager
interface), right click the Agent folder or the group folder in which you want to
place an agent.
2 From the pop-up menu, choose New => Agent. Configuration manager displays the
New Agent dialog box.
4 In the Display Name text box, type the name that you want to PATROL
Configuration Manager to associate with this agent. Only alphanumeric characters
(A-Z, a-z, 0-9), hyphens (-), and underscores (_) are valid.
5 In the Port text box, type the port number on which this agent is listening.
6 In the Protocol list box, choose the communication protocol used by most of the
agents.
■ TCP
■ UDP
7 In the Security Level list box, choose the security level at which you want to the
PATROL Configuration Manager to connect to PATROL Agents. The security level
that you enter must match the security level at which the agents are running. If you
leave this field blank, the security level defaults to the level specified in the
Configure: Agent defaults dialog box. If the level is not set in that dialog box, the
security level defaults to zero (0).
8 In the Use Authentication check box, select this option if you want pconfig to verify
the user credentials stored for the agent in the Secure KeyStore of the configuration
manager.
NOTE
PATROL Agent must be 3.6.00 or later and the Patrol Configuration Database (pconfig
utility) must also be 3.6.00 or later. If this option is not selected the Job Status Information
dialog box reports “Authentication ignored.” If the agent or pconfig is earlier than 3.6.00,
the Job Status Information dialog box reports “Authentication unsupported.”
9 Click OK.
The configuration manager adds the agent to the Agent tree view.
The discovery method that you choose depends upon what versions of PATROL are
running in your enterprise and which agents you want to manage. The RTserver
method identifies agents that use RTservers and Console Servers to communicate
with consoles, which occurs exclusively in a PATROL 7 installation. The PATROL
Ping method identifies agents in both PATROL 3 and PATROL 7 installations. As
search criteria, the wizard uses the agent properties defaults and supplements them
with the protocol and port number that you provide the wizard.
Results
The results of the discovery do not include the security level of the agent or whether
the agent requires authentication when establishing a connection to it.
2 Review the steps outlined in the wizard and then click Next.
3 On the Discovery Type pane, choose Search a PATROL RT Server cloud and then
click Next.
5 Click Next.
The wizard begins searching for agents based upon the criteria that you specified.
To interrupt the search, click Stop.
6 When the wizard finishes its search, click Next to view the results.
7 In the Discovery Results pane, from the Discovered Agents list box choose the
agents that you want to manage and click Add.
■ To manage all the agents discovered by the wizard, click Add All.
■ To remove agents from management, use the Remove and Remove All.
NOTE
Before you move on to the next pane, you can change the agent display name that PATROL
Configuration Manager will use and the communication protocol with which it will
communicate to the agent.
2 Review the steps outlined in the wizard and then click Next.
3 On the Discovery Type pane, choose Search the network using PATROL Ping and
then click Next.
■ For UDP, the time out is the time that the discovery
process waits for any response after the last packet has
been sent out. Because UDP is connectionless, the process
must wait for the entire length of the timeout period to
ensure that a response does not get lost from a slow
network.
5 Click Next.
The wizard begins searching for agents based upon the criteria that you specified.
To interrupt the search, click Stop.
6 When the wizard finishes its search, click Next to view the results.
7 In the Discovery Results pane, from the Discovered Agents list box choose the
agents that you want to manage and click Add.
■ To manage all the agents discovered by the wizard, click Add All.
■ To remove agents from management, use the Remove and Remove All.
NOTE
Before you move on to the next pane, you can change the agent display name that PATROL
Configuration Manager will use and the communication protocol with which it will
communicate to the agent.
Creating Groups
In the Agent tree view pane, you can create groups at the top of the hierarchy or
within other groups.
To Create a Group
1 In the Agent tree view pane, right-click the Agent folder or Group folder to which
you want to add a group.
3 In the Group Name text box, type the name of the group. Only alphanumeric
characters (A-Z, a-z, 0-9), happens (-), and underscores (_) are valid.
1 Choose the agent that you want to move into a group. If you want to move more
than one agent, press and hold CTRL as you choose multiple agents.
2 Drag the agent to the group folder. If you are moving multiple agents, press and
hold SHIFT as you drag the agents.
To Rename Group
1 In the Agent tree view pane, right-click the group whose name you want to
change.
3 In the Group Name text box, delete the existing name and type a new one. Only
alphanumeric characters (A-Z, a-z, 0-9), happens (-), and underscores (_) are valid.
4 Click OK. PATROL Configuration Manager changes the name of the group and
displays the new name in the Agent tree view pane.
Deleting an Agent
Deleting an agent unregisters the agent from PATROL Configuration Manager. This
task does not remove the agent from the computer on which it is running. Delete an
agent when you no longer want to manage it with the configuration manager.
To Delete an Agent
1 In the Agent tree view pane, right-click the agent that you want to delete.
PATROL Configuration Manager displays the Confirm Delete Items dialog box,
which asks you if you are sure that you want to delete this agent.
3 Click Yes.
4 Click Yes if you want to delete this agent from the configuration manager. Click No
if you just want to delete this instance of the agent.
Deleting a Group
Deleting a group unregisters the agents that belong to that group and any of its
subgroups from PATROL Configuration Manager. This task does not remove the
agents from the respective computers on which they are running.
WARNING
When you delete a group, you also delete all the agents and subgroups that belong to that
group. If an agent is duplicated in another group, that instance of the agent is not deleted.
To Delete a Group
1 In the Agent tree view pane, right-click the group that you want to delete.
2 From the pop-up menu, choose Delete. PATROL Configuration Manager displays
the Confirm Delete Items dialog box.
3 Click Yes. PATROL Configuration Manager removes the group and all its agents
and subgroups.
2 From the pop-up menu, choose Search => Agents. PATROL Configuration Manager
displays the Agent Search dialog box.
3 In the Agent Search dialog box, define your search by filling in the appropriate text
boxes.
Valid values are TCP, UDP, and ANY, which means that an
agent using either TCP or UDP to communicate will qualify
as a match.
4 Click Search.
PATROL Configuration Manager displays the Agent Search Results dialog box.
5 In the list of found agents, choose the one you want to view and then click OK.
PATROL Configuration Manager closes the search dialog box and highlights
(places focus on) and displays the agent in the Agent tree view pane.
■ Process
— stopping an agent
— restarting an agent
■ Configuration
— reloading the configuration of an agent
— resetting the configuration of an agent to the default configuration created at the
time of installation
■ Account
— setting the PATROL default account
— creating unique user names and passwords for individual agents
■ License
— updating the PATROL license file
Stopping an Agent
PATROL Configuration Manager allows you to stop a single agent or a large number
of agents with ease of a single menu command.
To Stop an Agent
1 In the Agent tree view pane, choose the agent that you want to stop.
2 From the menu bar, choose Tools = >Kill Agent. PATROL Configuration Manager
displays the Confirm Kill Agents dialog box.
3 Click Yes. PATROL Configuration Manager displays the Job Status Information
dialog box.
4 If you want to be notified of the stop jobs outcome (success or failure), choose the
Redisplay When Updated check box.
5 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case KILL.
6 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to stop
the agent and informs you of its success or failure.
Reinitializing an Agent
PATROL Configuration Manager allows you to stop and restart, also referred to as
reinitializing, a single agent or a large number of agents with ease of a single menu
command. This procedure can be used to stop and restart an agent.
1 In the Agent tree view pane, choose the agent that you want to stop and restart.
2 From the menu bar, choose Tools = >Reinitialize Agent. PATROL Configuration
Manager displays the Confirm Reinitialize Agents dialog box.
3 Click Yes. PATROL Configuration Manager displays the Job Status Information
dialog box.
5 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case RESTART.
6 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to restart
the agent and informs you of its success or failure.
1 In the Agent tree view pane, choose the agent whose most recent configuration
you want to reload.
2 From the menu bar, choose Tools = >Reload Agent. PATROL Configuration
Manager displays the Confirm Reload dialog box.
3 Click Yes. PATROL Configuration Manager displays the Job Status Information
dialog box.
4 If you want to be notified of the reload job’s outcome (success or failure), select the
Redisplay When Updated check box.
5 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case RELOAD.
6 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to reload
the most recent configuration of the agent and informs you of its success or failure.
Backup the configuration of the agent. Creating a backup RuleSet provides you a
means to restore the configuration of the agent.
1 In the Agent tree view pane, choose the agent whose configuration you want to
reset to the default configuration.
2 From the menu bar, choose Tools = >Purge Agent. PATROL Configuration Manager
displays the Confirm Purge dialog box.
3 Click Yes. PATROL Configuration Manager displays the Job Status Information
dialog box.
4 If you want to be notified of the purge job’s outcome (success or failure), selected
the Redisplay When Updated check box.
5 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case PURGE.
6 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to purge
the configuration of the agent and informs you of its success or failure.
NOTE
If the password for the operating system account that you use as the PATROL Default
Account changes, you must change the password for this account in PATROL.
However, this feature does not change the operating system account. To change the password
for the account at the operating system level, you must use the appropriate operating system
utility.
■ the account that you are using must be granted configuration permissions in the
agent’s ACL, which is stored in the pconfig variable /AgentSetup/accessControlList
1 In the Agent tree view pane, choose the agent whose PATROL default account you
want to change.
2 From the menu bar, choose Tools = >Set Default Account. PATROL Configuration
Manager displays the Set PATROL Agent Default Account dialog box.
3 In Account Name, type the user name of the account that you want to make the
default account.
4 In New Password, type the password for the account and then retype it in Confirm
New Password.
5 Click OK. PATROL Configuration Manager displays the Job Status Information
dialog box.
6 If you want to be notified of the job’s outcome (success or failure), select the
Redisplay When Updated check box.
7 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case APPLY.
8 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to
change the default account of the agent and informs you of its success or failure.
Secure KeyStore
PATROL Configuration Manager uses Secure Key Store database to store and protect
authentication credentials (user names and passwords) for either individual agents,
system-specific credentials, or all agents, default credentials.
WARNING
The Secure Key Store installed with the PATROL Configuration Manager contains trial keys
and certificates that are distributed to and possessed by every user that installs PATROL
Configuration Manager. BMC Software recommends that you acquire and use your own keys
and certificates.
For information about how to configure PATROL Configuration Manager securely in your
environment, see the PATROL Security User Guide.
When retrieving user credentials from the Secure Key Store, PATROL Configuration
Manager searches for a system-specific entry. If no system-specific credentials are
defined, the configuration manager uses the default credentials. If neither set of user
credentials exists, the configuration manager cancels the operation.
The default password for the Secure Key Store installed with PATROL Configuration
Manager is password. To change this password, use the PATROL Security utilities,
sslcmd. This utility is located in BMC_ROOT\common\security\bin_v30.
For more information about how to use the security utility, see the PATROL Security
User Guide.
To Store in the Secure KeyStore Unique User Names and Passwords for
Individual Agents
1 From the menu bar, choose File = >Configure => Security. PATROL Configuration
Manager displays the Enter Secure KeyStore Password dialog box.
If you want to store a default user name and password to be used for all agents
except those with individual credentials, enter default in the Agent text box and
provide a user name and password.
5 Click OK. PATROL Configuration Manager saves information and lists it in the
dialog box.
To Remove Unique User Names and Passwords for Individual Agents from the
Secure KeyStore
1 From the menu bar, choose File = >Configure => Security. PATROL Configuration
Manager displays the Enter Secure KeyStore Password dialog box.
NOTE
The default password is password. To change this password, use the appropriate security
utilities.
3 Choose the agent whose user name and password you want to delete from the
Secure Keystore.
4 Click Remove. PATROL Configuration Manager removes the entry from the dialog
box.
1 In the Agent tree view pane, choose the agent or agents whose license you want to
update.
3 Navigate to the location of the license file with which you want to update the
selected agents, choose the file, and click Open.
PATROL Configuration Manager displays the Confirm Update License dialog box.
4 Click Yes.
PATROL Configuration Manager displays the Job Status Information dialog box.
5 If you want to be notified of the update license job’s outcome (success or failure),
select the Redisplay When Updated check box.
6 Choose the job that you submitted and click OK. You can identify the job by the
time-date stamp, the agent against which the action will be performed, and the
action, in this case LICENSE.
7 If you selected the Redisplay When Updated check box, PATROL Configuration
Manager displays the Job Status Information dialog box when it attempts to
update the license for the agent and informs you of its success or failure.
For information about how to activate the autosave feature, see “Activate Autosave
for Group and Agent Data” on page 61.
Types of Locks
PATROL Configuration Manager uses two types of locks:
■ group lock–A group lock indicates that another user is editing the PATROL
Configuration Manager groups. You cannot edit the groups when a group lock
exists, but you can still edit agents within the groups.
■ agent lock–An agent lock indicates that another user is editing the PATROL
Configuration Manager agents.
NOTE
If another user deletes an agent group, PATROL Configuration Manager locks both the agents
and groups because it does not know what groups are deleted until the other user saves. If the
agents are not locked when a group is deleted by another user, you could add an agent to a
group that no longer exists.
Status of Locks
Locks in PATROL Configuration Manager can have one of two statuses: locked or
unlocked. PATROL Configuration Manager indicates that either agents and/or
groups are locked by placing a red lock icon or unlocked by placing a yellow unlock
icon in the bottom, left corner of the PATROL Configuration Manager main window,
below the Agent tree view.
NOTE
PATROL Configuration Manager supports simultaneous locking of Agents and Groups. If the
agents and groups are locked by a user, PATROL Configuration Manager publishes
information about both locks in the tool tip.
Table 21 lists the types of locks, displays their respective icons, describes what
information is available for them through tool tips, and describes the effects that each
status has upon agents and groups within PATROL Configuration Manager.
For information about how to find rule sets assigned to an individual agent, see
“Identifying Linked RuleSets Associated with an Agent” on page 161.
PATROL Configuration Manager changes focus to the RuleSet tree view, expands
the backup folder, and highlights the rule set folder with the most recent date-time
stamp.
4
4 Report on the PATROL Environment
PATROL Configuration Manager can query agents for information about each
agent’s PATROL installation and the application classes, knowledge modules, and
parameters loaded on the agent. This chapter presents the following topics:
Besides permitting users to choose from which agents to gather information and
determining the type and amount of information gathered, it also allows you to save
the report results to text files.
Source of Information
Depending upon the type of information you want to include in a report, PATROL
Configuration Manager allows you to control the source of the information. You can
instruct the report to gather information from the following two sources:
Output Formats
The reporting feature of PATROL Configuration Manager provides its report in two
formats.
Limitations
The PATROL Configuration Manager has some limitations. You cannot
■ save report requests—each time you generate a report you must choose on which
agents you want to report and what type of information you want to gather
■ view one report online while another report is being generated
■ change the defaults of the report—each time you attempt to generate a report,
PATROL Configuration Manager displays the Reporting: Select Report Criteria
dialog box with the following defaults. You can select criteria other than the
defaults for that report, but you cannot alter the defaults for the dialog box. The
next time you attempt to generate a report, the defaults will be the same.
— Query For
■ Agent and OS Information
— Send Report To
■ Report Viewer
Authentication
Reporting requires authentication (user names and passwords) to be configured for
each agent on which you want to gather data.
For more information, see “Managing Unique User Names and Passwords for
Individual Agents” on page 91.
Memory Usage
By default, PATROL Configuration Manager allocates 256 MB of memory to itself
upon startup. This amount is more than adequate to perform all tasks in PATROL
Configuration Manager. However, if you want to run reports on large numbers of
agents or agents with very large configurations, you might need to increase the
amount of memory allocated to it.
The installation process for PATROL Configuration Manager installs two shortcuts:
PATROL Configuration Manager shortcut and PATROL Configuration Manager
(CMD Window) shortcut. You must edit them both.
Microsoft Windows displays the Taskbar and Start Menu Properties dialog box.
2 Click Advanced.
3 Navigate to Documents and Settings => All Users => Start Menu => Programs => BMC
PATROL.
6 In Target, change the memory heap parameter, -Xm, to the desired size.
Figure 11 Startup Command Line in Targets Text Box of Microsoft Windows Shortcut
"C:\Program Files\BMC Software\pconfmgr\jre\bin\javaw.exe" -
Xmx1024m "-DCS_INI=C:\Program Files\BMC Software\pconfmgr\PCM.ini" -
jar "C:\Program Files\BMC Software\pconfmgr\PCM.jar"
7 Click OK.
Microsoft Windows saves the new setting and closes the dialog box.
Permissions
The account used to perform reporting must have read and write permissions to
PATROL_HOME on the agent where the report is generated. On OpenVMS, this
location is patrol$home:[tmp].
Printing
You cannot print the report from the Report Results dialog box. To print the report,
save it to a file (text, CSV or HTML format) and then print the contents of the file.
1 In the Agent tree view (the left pane of the PATROL Configuration Manager
interface), choose the agents and groups of agents for which you want to generate
a report.
3 In the Query For pane, choose the type of information that you want included in the
report.
■ Host name
■ IP Address
■ Agent version
■ TCP/UDP port used by the agent
■ OS name, version and patch version
Installed Components This option provides information about PATROL
components installed on the selected agents. The information
includes
■ Component name
■ Description
■ Version
Active and Pre-loaded This option provides information about which KMs are pre-
Knowledge Modules loaded on the selected agents. The information includes the
filename of the .KM or .KML file.
Knowledge Module This option provides information about which KMs are
Application Classes (Active loaded on the selected agents. The information includes
and Inactive)
■ Loaded KM list
— Name
— Version
— Static = true\false
■ Application Class properties
— Name
— Active = true\false
— Discovery Cycle for 3.6.00 or higher agent
■ Name
■ Active = true\false
Knowledge Module This option provides information about parameters and their
Parameter and Configuration settings on the selected agents. The information includes the
(Active) following parameter properties
■ Name
■ Active = true/false
■ Type Consumer = Std/Col \Consumer for agents earlier
than 3.6.00 and Standard\ Collector\ Consumer for
agents 3.6.00 or later
■ Interval \ Polling Time
■ Localized via PATROL Configuration
Manager\PATROL KM for Event Management
(__asLocalized__)
■ Parameter Alarm properties
— Name: Border, Alarm1, Alarm2
— Active
— Minimum and maximum
— Trigger
— Occurrences
— RecoveryActions
— State: OK, WARN,ALARM
4 If you want to limit the Knowledge Module information in the report to a single
application class, type the name of the application class in the Filter KM Data By
text box. This filter applies only to the knowledge module selections (application
classes, instances, and parameters) of the Query For pane.
5 In the Use Data From panel, select the source from which the report gathers
information.
6 In the Send Report To panel, select the output format of the report.
6 Using the file browser tool, navigate to the location where you want to save the
report.
7 In the File name text box, type name of the report file.
9 Click OK.
PATROL Configuration Manager saves the files to the specified location and
displays the Reporting: Output Files Created dialog box, which provides the full
path and file names of the saved files.
10 Click OK to close the Output Files Created dialog box and then click Close to exit
the Report Viewer.
1 After selecting Disk, click Select. PATROL Configuration Manager displays the
Save dialog box.
2 Using file browser tool, navigate to location where you want to save the report.
3 In the File name text box, type name of the report file.
5 Click OK.
6 Click Close.
Automated Reports
Some operations in PATROL Configuration Manager provide you with the ability to
generate a report and view the potential results of the operation before the operation
is performed. The apply operation includes the ability to report local rules assigned to
agents before global rules are applied to those agents.
Figure 12 Apply RuleSets Dialog Box – Reporting Localized Rules before Apply
For instructions on how to set the default, see “Set Default for Reporting Localized
Rules” on page 58.
Availability
The report is available after all RuleSets have been processed by PATROL
Configuration Manager and the resulting rules are placed in the queue folder.
Contents
The report lists the localized rule and includes its RuleSet name and path, rule,
operation, and agent display name.
Cancelling
If you cancel the operation, all rules in the queue folder are removed and the apply
operation is not performed.
5
Work with Rules, RuleSets, and
5
Configurations
This chapter describes how to create, edit, and manage rules, RuleSets, and
configurations with the PATROL Configuration Manager. The following topics are
discussed:
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Benefits of Rules and RuleSets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Order of Operations for Applying Rules, RuleSets, and Configurations . . . . . . 115
Creating, Managing, and Deleting RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Dragging and Dropping in PATROL Configuration Manager . . . . . . . . . . . . . . 116
Moving and Copying RuleSets and RuleSet Folders . . . . . . . . . . . . . . . . . . . . . . . 117
Creating a New RuleSet and New RuleSet Folder . . . . . . . . . . . . . . . . . . . . . . . . . 118
Creating a New RuleSet from an Existing RuleSet. . . . . . . . . . . . . . . . . . . . . . . . . 119
Editing RuleSets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Deleting RuleSets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Assigning RuleSets to Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Sharing and Locking RuleSet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Comparing RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Creating, Editing, and Managing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Naming Convention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Creating a Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Copying or Duplicating a Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Editing a Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Deleting a Rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Locating a Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Protecting Rules by Using Local RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Creating Local RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Editing Local RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Overwriting Local RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Listing Localized Rules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Working with Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Automated Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Introduction
PATROL Configuration Manager provides a user-friendly, graphically-based method
of managing configurations. The fundamental element of a configuration is the
configuration variables. Rules are a standardized mechanism for manipulating those
variables. PATROL Configuration Manager provides an easy and powerful way for
you to create, edit, organize, backup, protect for overwriting, delete, and apply these
rules throughout your enterprise.
— email servers
— internet commerce servers
— parts inventory database
— building
— city
— state
— country
— continent
Definitions
This section contains brief definitions for Rules, RuleSets, and configurations. For a
more detailed explanation of these terms, see “Concepts and Definitions” on page 16.
Rule
A rule is an instruction applied to a PATROL Agent that instructs the agent to change
a variable in its agent configuration database. A rule consists of the following parts:
When the constituent parts of a rule need to be emphasized, a rule may also be
referred to as key/value or key/value/operation.
RuleSets
A RuleSet is a collection of rules that are associated by the user based on user-defined
organizing principles. RuleSets are stored as text files with .cfg extension.
Rule Alias
A Rule Alias is a variable that enables you to insert in a rule a placeholder that is
replaced by a computer-specific value when the rule is applied.
Configuration
A Configuration is a set of rules. At installation, the PATROL Agent starts out with a
default configuration, stored in the file config.default. As users customize the
behavior of their agent, they change the configuration of the agent.
WARNING
PATROL Configuration Manager is a very powerful management utility.
Although, PATROL Configuration Manager can save you innumerable hours in managing the
PATROL Agents installed throughout your enterprise, it can also instantaneously replicate
poorly conceived configurations throughout your enterprise.
Rules at the top are processed first. Rules at the bottom are
processed last. If two rules apply to the same variable, the
variable will be set with the value specified by the second
rule, that is the one closest to the bottom of the list. Users can
rearrange rules to ensure which one take precedence.
However, local overrides rules, rules assigned to
ApplyOnNew and ApplyOnApply are processed after all the
rules waiting to be applied and listed in the Agent tree view.
ApplyOnApply RuleSets designated as Activated ApplyOnApply are
processed last
NOTE
Drag and drop in the PATROL Configuration Manager interface is different than the standard
Windows drag and drop. When you are selecting multiple items to drag, you must either
continue to hold the mouse button down after you click the last item, or continue hold Ctrl or
Shift and click off an object after you select the last item, and then drag the items before
releasing the mouse button.
In Windows, you can click the last item and release the mouse button, and then click any
selected item and drag the group. This does not work in the PATROL Configuration Manager
interface.
WARNING
When you copy a rule from one RuleSet or folder to another, you create a separate, identical
rule. If you alter the original rule in anyway, the rule that is a copy of the original does not
change.
NOTE
You cannot move or copy both RuleSets and RuleSet folders at the same time.
To select multiple RuleSets or RuleSet folders, press and hold Ctrl while you click
the RuleSets or RuleSet folders you want to copy, and continue to hold Ctrl for the
next step.
3 Right-click on the folder in which you want to place the copies of the RuleSet or
folder, and choose Paste.
To select multiple RuleSets or RuleSet folders, press and hold Ctrl while you click
the RuleSets or RuleSet folders you want to move, and continue to hold Ctrl for the
next step.
3 Right-click on the folder to which you want to move the item, and choose Paste.
The same RuleSet or RuleSet folder can appear in more than one folder.
The new folder is created in the selected folder in the RuleSet tree view as shown in
Figure 13.
3 Edit the name of the new folder by deleting the NewFolder text and typing a new
folder name.
3 Edit the name of the new RuleSet by deleting the NewRuleSet text and typing a
new RuleSet name. Only alphanumeric characters (A-Z, a-z, 0-9), hyphens (-), and
underscores (_) are valid.
Now you can create rules or copy rules from other RuleSets into the new RuleSet.
See “Creating a Rule” on page 126 for more information about creating rules.
WARNING
When you copy a rule from one RuleSet or folder to another, you create a separate, identical
rule. If you alter the original rule in anyway, the rule that is a copy of the original does not
change.
1 In the RuleSet tree view, choose rules from an existing RuleSet or from an agent
configuration in the backup folder.
To select multiple rules, press and hold Ctrl while you click the rules you want to
include in your new RuleSet. After you have selected the rules, continue to hold
Ctrl and right click one of the selected rules to open the Rule menu.
3 Rename the new RuleSet by right-clicking it, choosing Rename, deleting the
existing text, and typing in a new name.
1 In the RuleSet tree view, right-click the RuleSet that you want to copy. PATROL
Configuration Manager displays the RuleSet menu.
2 Choose Copy.
3 Right-click on the folder in which you want to place the new RuleSet.
4 Choose Paste. PATROL Configuration Manager creates the RuleSet in the selected
folder with the same name as the original RuleSet.
5 Rename the new RuleSet by right-clicking it, choosing Rename, deleting the
existing text, and typing in a new name.
1 In the RuleSet tree view, right-click the folder in which you want to create a new
RuleSet.
3 Rename the new RuleSet by right-clicking it, choosing Rename, deleting the
existing text, and typing in a new name.
4 In the RuleSet tree view, click to expand one of the RuleSet that contains a rule that
you want to copy.
7 Choose Copy.
8 Right-click on the folder in which you want to place the new RuleSet.
9 Choose Paste.
10 Repeat step 4 through step 9 for each set of rules in a separate RuleSet that you
want to combine in the single RuleSet that you created in step 2.
11 Rename the new RuleSet by right-clicking it, choosing Rename, deleting the
existing text, and typing in a new name.
Editing RuleSets
Editing RuleSets consists of adding rules to RuleSets by means of creating and
copying them, and deleting rules from RuleSets.
Deleting RuleSets
Delete RuleSets and RuleSet folders from the RuleSet tree view.
To Remove RuleSets and RuleSet Folders from the RuleSet Tree View
1 In the RuleSets tree view, select the RuleSets and RuleSet folders that you want to
delete.
To select multiple RuleSets and RuleSet folders, press and hold Ctrl while you click
all the RuleSets and RuleSet folders you want to delete.
2 Continue to hold Ctrl and right click one of the selected RuleSets and RuleSet
folders.
PATROL Configuration Manager displays the RuleSets and RuleSet folders menu.
3 Choose Delete.
PATROL Configuration Manager displays the Confirm Delete Items dialog box.
4 Click Yes. PATROL Configuration Manager closes the dialog box and removes the
selected object (RuleSet or folder) and any other subordinate objects such as
folders, RuleSets, and rules.
1 In the RuleSet tree view, choose one or more RuleSets or RuleSet folders.
To select multiple RuleSets and RuleSet folders, press and hold Ctrl while you click
all the RuleSets and RuleSet folders you want to assign to an agent.
2 Drag the selected RuleSets and/or folders to the desired agent or group, and
release the mouse button.
When the cursor is over a group or agent, the cursor changes from a circle with a
diagonal line through it to a folder with a plus.
■ changes the color of the agent icon to which you assigned the rules
■ places the rules under the agent icon so that you can expand the hierarchy and
view the rules that are assigned but not yet applied to each agent
Comparing RuleSets
PATROL Configuration Manager provides a comparison feature that enables you to
determine if two RuleSets contain the same rules. The RuleSets can reside anywhere
within the RuleSet folder hierarchy.
NOTE
You can compare the configurations of two agents by getting their configurations and then
comparing their respective backup RuleSets as described in the following procedure.
1 In the RuleSet tree view, click a RuleSet. This RuleSet will be designated by the
Compare utility as the First RuleSet.
2 In the RuleSet tree view, press and hold Ctrl and click a second RuleSet. This
RuleSet will be designated by the Compare utility as the Second RuleSet.
1 After completing step 1 through step 4 on page 123, choose the rules that you want
to save to a new RuleSet.
To select a range, click on the rule at the top or beginning of your range and then
hold down Shift while clicking on the bottom or end of the range. To select
multiple rules that are not contiguous, hold down Ctrl while you click the
individual rules.
2 Click Save Selections. PATROL Configuration Manager displays the Save Selected
Rules dialog box.
3 In the RuleSet Name field, enter a name for the new RuleSet. Only alphanumeric
characters (A-Z, a-z, 0-9), hyphens (-), and underscores (_) are valid.
PATROL Configuration Manager creates the new RuleSet under the RuleSet folder.
Naming Convention
PATROL Configuration Manager 1.6.00 or later employs the pconfig utility +strict
option, which enforces strict guidelines for naming variables. This option does not
allow empty variable names and checks for the following conditions:
NOTE
While specifying values for variables with the PATROL Configuration Manager (PCM),
ensure that the values of the variables do not contain quotes (“).
Failure
PATROL Agent 3.6.50 or later strictly enforces these guidelines. If a variable name is
invalid, PATROL Configuration Manager either drops the variable name and the
agent places a note in the agent log or fails the operation.
PATROL Configuration Manager supports the pconfig +strict option for apply
operations. If a variable name does not comply with the naming conventions, the Job
Status Information dialog box displays the error message: FAILED – Invalid
Variable Name. The invalid variable name is listed in the job log.
Backward Compatibility
To support versions of PATROL Agent earlier than 3.6.50, which do not employ the
strict option, you can add the pconfig_use_strict variable to PCM.ini. This variable
either enables or disables the strict adherence to the naming convention for rule
variables. The default is true (strict enforcement enabled). The feature will be turned
off if pconfig utility is not at least version 3.6.50.
For more information about valid variable names for the pconfig function, see
PATROL Script Language (PSL) Reference Manual, Volume 2 - PSL Functions.
Creating a Rule
In this task you create a rule by specifying a pconfig variable, its value, and the
relationship between the variable and the value.
■ Use the New Rule command to insert a new rule into the selected RuleSet.
■ Use Rule Aliases to handle unique computer-specific information that is built into
the variable names. For more information about Rule Aliases, see
“Accommodating Computer-Specific Data” on page 163.
To Create a Rule
1 In the RuleSets tree view, right click a RuleSet and choose New Rule. PATROL
Configuration Manager displays the RuleSet dialog box as shown Figure 16.
2 Enter the rules properties by placing the cursor in the field, clicking in the field,
and typing or selecting a value. The rule properties are described in Table 25 on
page 127.
NOTE
DELETE, MERGE, and APPEND operations only work with lists of values when the list is
comma separated. These operations do not work when the list items are separated by new
lines.
If two RuleSets, each containing an identical rule to the other, are applied to an agent,
PATROL Configuration Manager attempts to apply the rule twice.
To Copy a Rule
If you want to copy a rule into the same RuleSet, thus placing two identical rules in
the RuleSet, choose Duplicate. PATROL Configuration Manager does not allow
you to copy and paste a rule into a RuleSet that already contains a rule identical to
it.
To Duplicate a Rule
1 Navigate to the rule that you want to make an identical copy of.
PATROL Configuration Manager places a rule identical to the one that you
selected in the RuleSet.
Editing a Rule
PATROL Configuration Manager provides several methods for editing individual
rules. All the methods allow you edit the rules; however, they vary in the amount of
control they afford you and the number of rules that you can edit at one time.
1 In the RuleSets tree view, right click a RuleSet and choose one of the following
commands:
NOTE
If you right click a rule and choose Edit, you can edit a single rule using the same steps on
page 126 involved in creating a rule.
WARNING
The Edit Configuration Source File dialog box does not provide syntax checking. Typing errors
can cause rules to fail.
2 When you choose Source, PATROL Configuration Manager displays the Edit
Configuration Source File dialog box as shown in Figure 17. This dialog box lists
all the rules within the RuleSet. Each rule is presented as a text string separated
from the next rule by comma and an end of line character.
3 Locate the rule that you want to edit. You can either scroll through the list or use
the Find feature to search for the rule based on a unique aspect of it such as pconfig
variable name, instance name, or value.
B In the Find What field, type the whole or partial name of the variable, instance,
value, or other entity upon which you are basing your search.
C If case sensitivity applies, select the Case Sensitivity Search check box.
D Click Find Next. PATROL Configuration Manager closes the Find dialog box and
highlights the first occurrence that matches.
4 If you want to search for and replace an entity within a rule (such as an instance
name or a common prefix for a configuration variable name), use the Replace
feature.
B In the Find What field, type the whole or partial name of the variable, instance,
value, or other entity upon which you are basing your search.
C In the Replace With field, type the whole or partial name of the variable,
instance, value, or other entity upon which you are basing your search.
D If case sensitivity applies, select the Case Sensitivity Search check box.
E Click Replace to the current match and find the next one or click Replace All to
replace all matches.
5 After you have located the rule that you want to edit, place the cursor in the rule,
and click to insert the cursor.
6 Change the properties of the rule by deleting the characters that you want to
change and replacing them with the desired ones.
To Edit Rules
Assuming you chose Rules in step 1 of “Edit Multiple Rules that Belong to the Same
RuleSet” on page 129, PATROL Configuration Manager displays the RuleSet dialog
box opens as shown in Figure 18. This dialog box lists all the rules within the RuleSet
in a table format. Each rule is presented in a row with each property (variable,
operation, value) in a cell.
1 Edit the values by clicking in the table cell for a property and typing in a new value
or selecting an option (Operator only).
You can also edit the value by selecting a row in the table and clicking Edit Value.
PATROL Configuration Manager displays the Edit Rule/Value dialog box as
shown in Figure 19.
NOTE
Only the value of the rule can be edited for an Event Management rule when the dialog is
accessed by selecting a notification rule and clicking Edit Value. You cannot add or remove
Objects.
2 Edit the rule values and click OK. See Table 25 on page 127 for a description of the
rule properties.
Deleting a Rule
Deleting a rule in PATROL Configuration Manager is final. The configuration
manager does not have an undo or undelete feature. To restore the rule, you must
recreate it or copy it from a backup ruleset, if one exists, or an identical rule in another
RuleSet.
To Delete a Rule
PATROL Configuration Manager displays the Confirm Delete Items dialog box.
3 Click Yes.
Locating a Rule
RuleSets and configurations can contain hundreds and even thousands of rules.
Manually searching for a single rule or a few rules can be time consuming and error
prone. PATROL Configuration Manager provides a search utility that allows you to
search for rules across folders and/or RuleSets. Searches can be conducted by
■ variable
■ operation
■ value
■ any combination of the three
Once the search utility has returned its results, you can either save them to a text file
or write them to a new RuleSet.
1 In the RuleSet tree view, right-click the selected RuleSet folder or a RuleSet.
2 Choose Search.
PATROL Configuration Manager displays the RuleSet Search dialog box as shown
in Figure 21.
3 Use the RuleSet Search dialog box to define the search for a rule or rules. The
criteria are described in Table 26.
4 Click OK. PATROL Configuration Manager displays the Search Results dialog box
which lists all the rules that match the search criteria.
■ Save the rules in a new RuleSet which will appear directly under the RuleSet
folder in the hierarchy
1 After completing step 1 on page 134 through step 4 on page 135, choose the rules
that you want to save to new RuleSet.
To select a range, click on the rule at the top or beginning of your range and then
hold down Shift while clicking on the bottom or end of the range. To select
multiple rules that are not contiguous, hold down Ctrl while you click the
individual rules.
2 Click Save Selections. PATROL Configuration Manager displays the Save Selected
Rules dialog box.
3 In the RuleSet Name field, enter a name for the new RuleSet. Only alphanumeric
characters (A-Z, a-z, 0-9, hyphens (-), and underscores (_) are valid.
PATROL Configuration Manager creates the new RuleSet under the RuleSet folder.
1 After completing step 1 on page 134 through step 4 on page 135, click Save Report.
2 Choose the information to include in the report. Table 27 describes the options.
3 Click OK. PATROL Configuration Manager displays the Save dialog box.
4 Navigate to the location where you want to save the file and type in the name.
5 Click Save.
PATROL Configuration Manager saves the report to the file and displays the
report in the Report Viewer.
6 When you are done viewing the report online, click OK.
Characteristics
Local RuleSets are distinct from other RuleSets based upon the location in which they
are stored, their behavior, and the automated synchronization of their names and the
names of the agents to which they apply.
Location
Local rules are stored in a special RuleSet folder within the PCM folder, which resides
under the RuleSets folder. The local rules folder is called local, which can contain one
RuleSet per agent. The name of each agent-specific RuleSet is the agent display name.
Behavior
The following behaviors are unique to Local RuleSets.
■ Local RuleSet contains localized settings that cannot be overwritten when you
apply configurations globally.
— If the operation is REPLACE, the conflicting global rule is removed from the
apply set.
— If the operation is MERGE or APPEND, the rule is moved to the bottom of the
apply set so that the REPLACE occurs first.
— If the operation is DELETE, the rules are moved to the bottom of the apply list
(the last rules considered by the agent).
Because each agent can have only one Local RuleSet, you must have an agent without
a local RuleSet to perform this task.
1 In the RuleSets tree view, right-click the local folder and choose New => RuleSet.
The New Local RuleSet dialog box opens as shown Figure 23.
The local folder contains RuleSets that have the same display name as the
associated agent. To ensure the RuleSet name matches the agent name, the New
Local RuleSet dialog box only provides a list of agents that do not have local
RuleSets when you create a new local RuleSet.
2 Choose the agent for which you want to create a local RuleSet for and click OK.
PATROL Configuration Manager creates a RuleSet with the agent’s name in the
local folder.
However, you cannot rename a Local RuleSet. The only time a Local RuleSet’s name
changes is when the display name for its associated agent changes.
For instructions on how to edit Local RuleSets, see “Creating, Editing, and Managing
Rules” on page 125 and “Creating, Managing, and Deleting RuleSets” on page 116.
For information about how to overwrite Local RuleSets, see “Applying Changes to
Agent Configurations” on page 143.
■ RuleSet
■ rule/variable
■ operation
■ agent for which the rule is localized
For information about how to generate a report of localized rules, see “Applying
Changes to Agent Configurations” on page 143.
Automated Tasks
When applying a configuration, the configuration manager provides the option to
automate the following configuration tasks:
Manual Methods
PATROL Configuration Manager provides menu-command controls for all its tasks,
including its automated tasks for applying and gathering configurations. These tasks
can be executed from either the menu bar or the tool bar or the Agent tree view pop-
up menus or the Rule tree view pop-up menus.
Getting Configurations
The Get Configuration feature creates copies of agent configurations in the PATROL
Configuration Manager backup folder that is displayed in the RuleSet tree view. The
agent configuration is time stamped with the date and time that the configuration
was retrieved.
The Get With Defaults feature creates a copy of the agent configuration and creates a
rule for every default variable defined in the config.default file at the time of the get
operation. This information is also saved in the backup folder and assigned a date-
time stamp.
RuleSet\PCM\backup\virtual_backup\agent_name\date_time
EXAMPLE
You retrieve the configuration of agent Agent_5__bmc_com at 11:54:50 on August 13,
2004. PATROL Configuration Manager saves the agent configuration as RuleSet
20040813-115450 in the Agent_5__bmc_com folder in the Agent_1__bmc_com -
Agent_5__bmc_com virtual folder.
The configuration manager stores them in the following hierarchy in the RuleSet
tree view.
RuleSet\PCM\backup\virtual_backup\agent_name\date_time
Before you can apply configuration changes to an agent or agents, you must assign
RuleSets to one or more Agents. For instructions on how to assign a RuleSet to either
an agent or a group of agents, see “Assigning RuleSets to Agents” on page 122.
1 In the toolbar, click Apply Configuration or from the menu bar choosing
Queue => Apply.
2 Use the Apply RuleSet dialog box to specify how rules are applied. The properties
are described in Table 28.
3 Click OK.
PATROL Configuration Manager places the rules in the job queue and displays the
Job Status Information dialog box. You can identify the job by the time-date stamp,
the agent against which the action will be performed, and the action, in this case
APPLY. If you have requested that a backup or purge be performed before rules
are applied, jobs with those statuses (GET and PURGE) will appear prior to the
APPLY job.
If you want to be notified of the outcome (success or failure) of the apply jobs,
select the Redisplay When Updated check box.
4 Click OK.
PATROL Configuration Manager closes the Job Status Information dialog box.
RuleSet\PCM\backup\virtual_backup\agent_name\date_time
3 Click Yes.
PATROL Configuration Manager displays the Job Status Information dialog box.
You can identify the job by the time-date stamp, the agent against which the action
will be performed, and the action, in this case PURGE.
If you want to be notified of the outcome (success or failure) of the purge jobs,
select the Redisplay When Updated check box.
4 Click OK.
PATROL Configuration Manager closes the Job Status Information dialog box.
For instructions on how to assign and apply RuleSets to an agent and purge
configurations from an agent, see
NOTE
If you are restoring a previous configuration after making some configuration changes, you
should purge the existing configuration of the agent before attempting to restore a previous
configuration.
ApplyOnNew
The ApplyOnNew feature enables PATROL Configuration Manager to automatically
apply a set of rules to an agent when it is added to a group. This feature ensures that
all agents in a certain group or set of groups starts off with the same standard
configuration.
ApplyOnApply
The ApplyOnApply feature enables PATROL Configuration Manager to
automatically apply a set of rules to an agent after any other set of rules is applied.
This feature allows you to ensure that certain configuration variables are always set
to a specific value.
LinkedRuleSets
The LinkedRuleSets feature enables PATROL Configuration Manager to associate
(through a static link) a rule to various agents. When the rule is changed that is
associated to the to an agent by means of its LinkedRuleSet, the configuration
manager prompts you to assign the modified rule to all the agents to which it is
associated by the LinkedRuleSets container.
Scope
Automatically managed RuleSets can be assigned at the following levels:
Precedence
ApplyOnNew and LinkedRuleSets are applied hierarchically. The last RuleSet to be
applied takes precedence over the earlier ones. The order in which RuleSets are
applied follows.
2. group RuleSets
Storage
The configuration manager stores automated RuleSet information in variables within
the various groups.ini and agents.ini files depending upon the scope of the RuleSet.
Variable
Information about each instance of an automated RuleSet is stored in a unique
variable. Table 29 lists the variable format for each type of automated RuleSet.
Location
Information about each instance of an automated RuleSet is stored in a different
location depending upon its scope. Table 30 lists the location of automated RuleSet
variables based upon their scope, which is the groups or agents to which they are
associated.
Example
Figure 25 shows an example of automated RuleSets referenced in an agent.ini file.
From the menu bar, choose Others => ApplyOnNew and LinkedRuleSets activated. The
control is a toggle. A check mark to the left of the menu command indicates that
statically linked RuleSets are turned on.
1 In the RuleSet tree view, navigate to the RuleSet or folder of RuleSets that you
want applied to every new agent added to a particular group.
2 Click on the RuleSet or folder and drag it to the ApplyOnNew container of the
group to which you want to assign the rules.
PATROL Configuration Manager places the RuleSet or folder and its subsequent
contents in the ApplyOnNew container.
4 Use the Apply RuleSet dialog box to specify how rules are applied. The properties
are described in Table 31.
5 Click OK.
This procedure assumes that you have completed step 1 and step 2 of the task
“Activate ApplyOnNew For Either A RuleSet or Folder of RuleSets” on page 152.
1 In the RuleSet tree view, navigate to the RuleSet that you want to assign to a group.
If you want to assign only certain rules, consider creating a separate RuleSet for
those rules that are good candidates for static linkage.
2 Click on the RuleSet or folder and drag it to the LinkedRuleSet container of the
group to which you want to assign the rules.
3 In the Agent tree view, right-click on the LinkedRuleSet container and choose
Apply Linked RuleSet.
4 Use the Group Apply LinkedRuleSets dialog box to specify how rules are applied.
The properties are described in Table 32.
This option is inactive if the agent or agents do not possess any localized
rules.
This option is inactive if the agent or agents do not possess any localized
rules.
Purge Agents Before Apply remove all previous configuration changes before applying the RuleSets
If you make an error applying RuleSets, you can use backups to restore
an agent to a previous configuration.
5 Click OK.
1 In the RuleSet tree view, navigate to the RuleSet that you want to assign to the
agent. If you want to assign only certain rules, consider creating a separate RuleSet
for those rules that are good candidates for static linkage.
2 Click on the RuleSet or folder and drag it to the LinkedRuleSet container of the
agent to which you want to assign the rules.
3 Use the Apply LinkedRuleSet dialog box to specify how rules are applied. The
properties are described in Table 33.
4 Click OK.
1 In the Agent tree view, choose the groups or agents that you want to search.
To select a range, click on the group or agent at the top or beginning of your range
and then hold down Shift while clicking on the bottom or end of the range. To
select multiple groups or agents that are not contiguous, hold down Ctrl while you
click the individual items.
4 Use the Search LinkedRuleSet dialog box to discover which rules are statically
linked (by means of LinkedRuleSets) to which agents. The properties are described
in Table 34.
5 Click Search.
PATROL Configuration Manager locates the rule sets that meet the search criteria
and displays them in the Searched LinkedRuleSets Results dialog box as shown in
Figure 30, which includes the item type (group or agent), full path in the Agent
tree view, and rule set name.
6 Click OK.
Concept
A Rule Alias is a variable. Rule Aliases enable you to insert a placeholder in a rule.
The placeholder is replaced by a computer-specific value when the rule is applied.
EXAMPLE
To write a rule to set a configuration variable that contains the computer name, you
would write a rule that contains the predefined Rule Alias, %HOSTNAME%.
Operation
When the PATROL Configuration Manager processes a rule that contains a Rule
Alias, the value assigned to the alias replaces the alias name. If an undefined Rule
Alias name is used, PATROL Configuration Manager will fail the Apply for the
related Agent(s).
If the tlog for the agent is empty, the timestamp for the last
applied RuleSet is the current time.
Storage
The configuration manager stores Rule Aliases in the rulealiases.ini file. The file is
structured similarly to the agents.ini in which Rule Aliases that apply to all agents are
stored at the top of the file and computer-specific aliases are listed in their respective
agent section.
1 From the menu bar, choose File => Configure => Rule Alias.
PATROL Configuration Manager displays the Configure: Rule Aliases dialog box.
2 Click Add.
PATROL Configuration Manager displays the Rule Aliases: Add Rule Aliases
dialog box as shown in Figure 31.
3 Use the Rule Aliases: Add Rule Alias dialog box to define the Rule Alias. The
properties are described in Table 36.
4 Click OK.
PATROL Configuration Manager closes the dialog box and displays the Rule Alias
on the Configure: Rule Aliases dialog box.
5 Click Close.
PATROL Configuration Manager saves the Rule Alias to rulealiases.ini and closes
the dialog box.
The configuration manager makes this feature available only after an apply operation
has failed due to a missing Rule Alias. To view or add missing Rule Aliases using this
procedure, an apply operation has to fail due to a missing alias.
1 In the Job Status Information dialog box, right click a job with the status, FAILED
Undefined Aliases: alias_name.
PATROL Configuration Manager displays the Missing Rule Aliases dialog box,
which lists the agent, RuleSet, rule/variable, operation, and value as shown in
Figure 32. The rule/variable contains the missing Rule Alias, denoted by percent
signs (%).
3 Click OK.
PATROL Configuration Manager closes the dialog box and displays the Job Status
Information dialog box.
4 Click Close.
PATROL Configuration Manager closes the Job Status Information dialog box.
1 In the Job Status Information dialog box, right click a job with the status, FAILED
Undefined Aliases: alias_name.
PATROL Configuration Manager displays the Rule Aliases: Add Rule Alias dialog
box, in which the Alias Name and Agent values are displayed in non-editable text
fields as shown in Figure 33.
4 Click OK.
5 Click Close.
PATROL Configuration Manager closes the Job Status Information dialog box.
6
6 Manage Parameters
This chapter describes how to use PATROL Configuration Manager to set up borders
and alarm ranges for parameters. You can also control how frequently information is
gathered for parameters. The following topics are discussed:
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Range Settings for Monitoring Increasing and Decreasing Parameter Values . 172
Poll Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Establishing Thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Accessing Parameters Threshold Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Specifying a Parameter for Which to Establish Thresholds . . . . . . . . . . . . . . . . . 176
Defining Border and Alarm Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179
Setting Poll Times. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Accessing Parameter Poll Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Specifying a Parameter for Which to Set a Poll Time. . . . . . . . . . . . . . . . . . . . . . . 182
Defining Collection Cycles by Setting Poll Time . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Retrieving Customized Parameter Settings and Storing Them as a RuleSet . . . . . . 184
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
Saving Parameter Settings in a RuleSet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Importing a RuleSet into PATROL Configuration Manager . . . . . . . . . . . . . . . . 186
Introduction
Through the graphical interface of the PATROL Configuration Manager, you can
create rules that set parameter thresholds and establish data collection intervals (also
referred to as poll times) for individual parameters. The thresholds are stored in
agent configuration variables, not in the KM files. This feature makes upgrades easier
since your thresholds are stored externally to the KM files. You can apply those
parameter settings, through rules, to PATROL Agents throughout your enterprise.
■ allows you to quickly and easily reapply them when upgrading from one version
of a PATROL product to another
■ allows you to customize parameter settings once and distribute those settings
throughout your enterprise to PATROL Agents monitoring the same applications
Requirements
The PATROL Knowledge Module for Event Management must be installed and
loaded on the PATROL Agent for the agent to process the rules containing the
parameter settings and thresholds. An OK job status in PATROL Configuration
Manager indicates only that rules have been successfully received by the agent.
Thresholds
In PATROL, thresholds are value ranges that can have alert changes (events that
change an object’s state from any one state: OK, WARN, and ALARM, to another)
and recovery actions associated with them. When a parameter value breaches a
threshold, depending upon how you define the settings for that parameter, PATROL
can issue a state change action and/or run a recovery action. The three thresholds are
Border Range, Alarm Range 1, and Alarm Range 2.
NOTE
When you make threshold changes using PATROL Configuration Manager, these changes are
not reflected in the console display because the changes are made at the agent, not in the
console KM files.
Border Range
The Border Range defines the range of acceptable values that a parameter can return.
If the parameter returns a value inside the range limit but outside of the border range
(either less than the minimum or greater than the maximum), PATROL issues an alert
and changes the state of the parameter to the one assigned to the border range.
If it is possible for the parameter to return a value outside the range limits, you can set
a border range for information only or as a third-level alert condition that represents
either a warning state or an alarm state. If you use the border range as a third-level
alert range, you may need to make the maximum range limit lower than you would
without the third-level alert.
Alarm Range 1
The Alarm Range 1 is the first-level alert condition that typically represents a warning
state or an alarm state. It must meet the following criteria:
Alarm Range 2
The Alarm Range 2 is second-level alert condition that typically represents a warning
state or an alarm state. It must meet the following criteria:
■ greater than a set maximum value, as when the amount of used disk space exceeds
95%
or
■ less than a set minimum value, such as when the amount of free memory is less
than 2 MBs.
EXAMPLE
If you are monitoring CPU utilization of a computer and you want PATROL to issue a
warning when utilization drops below 10% and issue a warning and run a backup utility
when utilization goes below 5%, you could choose these settings.
EXAMPLE
If you are monitoring server resource consumption by users and you want PATROL to issue a
warning when resource consumption exceeds 20% and a warning when it exceeds 25%, you
could choose these settings.
Poll Times
The poll time defines the collection cycle interval. Poll times determine how often the
PATROL Agent gathers statistical data reported by parameters.
Differences in Format
PATROL Configuration Manager accepts poll time in minutes. However, the
PATROL Agent’s configuration database stores this information in seconds. When
you view parameter settings using any of the PATROL consoles such as the PATROL
Central Operator – Web Edition, it displays poll times in HH:MM:SS format.
Establishing Thresholds
PATROL Configuration Manager allows you to define these parameter settings
locally on every agent. The configuration manager gives you the power to define
these settings once and distribute these changes to one agent or every agent in your
enterprise.
Using the configuration manager’s interface, you can only specify one parameter at a
time. For information about how to retrieve all the parameter settings for a specified
knowledge module, see “Retrieving Customized Parameter Settings and Storing
Them as a RuleSet” on page 184.
1 Right-click on an agent whose parameters you want to set thresholds and schedule
polling times.
After you have accessed the Thresholds tab, you need to perform the following tasks:
You must complete the procedure, “To Access the Threshold Settings” on page 174.
1 On the Parameter Settings dialog box on the Thresholds tab, click Add Objects.
NOTE
The list of objects is static and does not reflect the real-time, currently loaded objects of the
agent. The PATROL objects displayed in the Object Selection dialog box were available when
PATROL Configuration Manager was released. To update the list of objects, navigate to
BMC_ROOT\pconfmgr\patrol and manually edit *.def, *.prm, *.sid files for each respective
application class.
2 Choose either the Show All Hosts check box or the Get Object from Agent check box.
■ Show All Hosts—the configuration manager lists all agents that are registered
with the manager
NOTE
If you have not accessed the Secure Key Store (SKS) database during your current
PATROL Configuration Manager session, the configuration manager will prompt you
for the password for the SKS database. For more information about accessing and
managing the SKS database, see “Managing Unique User Names and Passwords for
Individual Agents” on page 91.
3 In the Hosts list box, choose the computer for which you want to establish
thresholds.
4 In the Application Class list box, choose the application class for whose parameter
you want to set thresholds.
6 In the Parameter list box, choose the parameter whose thresholds you want to set.
7 Click Add.
If you do not add the selection, PATROL Configuration Manager does not retain it
when you exit the dialog box.
8 Click Close.
PATROL Configuration Manager closes the dialog box and displays the parameter
in the Selected Objects List.
PATROL Configuration Manager activates all the fields on the tab as shown
Figure 36.
2 Choose Enable.
3 In Alert State, choose one of the alert states. When the value of the parameter goes
outside the range, PATROL changes the alert state to the one that you specify.
Select
■ OK—changes the state of the parameter to OK when the result of the range breach
is informational for users or non-critical to the system
■ WARN—changes the state of the parameter to WARN when the value constitutes a
breach of the range, which is undesirable
■ ALARM—changes the state of the parameter to ALARM when the value constitutes a
breach of the range, which is unacceptable
4 In the Range Settings section, define the range using Min and Max.
NOTE
Depending upon the type of range: border or alarm, the definition differs between what
constitutes a breach of the range and thus is cause for generating an alarm.
■ For the Border Range, any value outside the range (less than the minimum or greater than
the maximum) constitutes a breach of the range and thus generates an alarm.
■ For Alarms Range 1 and Alarms Range 2, any value that falls within the range (greater
than or equal to the minimum and less than or equal to the maximum) constitutes a breach
of the range and thus generates an alarm.
5 In Trigger Alarm, select a sensitivity setting that determines how quickly and under
what conditions PATROL issues an alert.
■ After all recovery actions fail—PATROL runs all recovery actions, and if the
parameter value is still within the defined warning or alarm range, then
PATROL issues an alert.
6 If you set Trigger Alarm to After an alarm occurs N times, in N, enter the number of
consecutive times the parameter value must fall within either the Alarm Range 1 or
Alarm Range 2 or without of the Border Range before PATROL issues an alert.
1 Right-click on an agent for whose parameters you want to schedule polling times.
After you have accessed the Polltimes tab, you need to perform the following tasks:
You must complete the procedure, “To Access the Poll Time Settings” on page 181.
1 On the Parameter Settings dialog box on the Polltime tab, click Add Objects.
2 Choose either the Show All Hosts check box or the Get Object from Agent check box.
■ Show All Hosts—the configuration manager lists all agents that are registered
with the manager
NOTE
If you have not accessed the Secure Key Store (SKS) database during your current
PATROL Configuration Manager session, the configuration manager will prompt you
for the password for the SKS database. For more information about accessing and
managing the SKS database, see “Managing Unique User Names and Passwords for
Individual Agents” on page 91.
3 In the Hosts list box, choose the computer for which you want to set the poll time.
4 In Application Class, choose the application class for whose parameter you want to
set the poll time.
6 In Parameter, choose the parameter whose poll time you want to set.
NOTE
Poll times can be set directly only for collector and standard parameters. However, the Object
Selection dialog box of the PATROL Configuration Manager does not distinguish among
parameters types. Therefore, you must know which parameters are consumers and which are
standard or collector parameters.
For information about parameters, see the PATROL Parameter Reference Manual or the
parameter help for the respective PATROL product.
7 Click Add.
If you do not add the selection, PATROL Configuration Manager does not retain it
when you exit the dialog box.
8 Click Close.
PATROL Configuration Manager closes the dialog box and displays the parameter
in the Selected Objects List.
2 Type the amount of time that PATROL waits between data collecting cycles for the
parameter. Use the following format:
3 Click OK to close the dialog box and save the poll time.
NOTE
This procedure does not capture the settings of deactivated parameters. To capture these
settings, you must first activate their respective parameters.
Prerequisites
The process of retrieving parameter settings and saving them as RuleSets requires
that the following components be installed with these products:
or
■ PATROL Console for UNIX or PATROL Console for Microsoft Windows Servers
3 Choose the PATROL Agent that possesses the parameter customizations that you
want to the KMs are loaded with the default configuration.
4 Right-click the PATROL Agent and choose Show System Output Window.
6 Choose KM Commands => Get Global Parameters => Create RuleSets => Select
Knowledge Modules.
7 Choose the KMs for which you want to generate a RuleSet from the list.
8 Click Accept.
The RuleSet is stored in a file with the same name as the RuleSet and the extension
*.cfg. The name and location of the file is displayed in the System Output Window.
The RuleSet creation process creates rules for parameters in the PATROL Agent’s
namespace for the selected Knowledge Module. The following example is what
you would see, if after you imported the RuleSet into PATROL Configuration
Manager, you right-click on the RuleSet and then choose Edit => Source.
EXAMPLE
"/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/NT_CPU/__ANYINST__/CP
UprcrInterruptsPerSec" = { REPLACE = "1,0 0 0 0 0 0,0 0 0 0 0 0,0 0 0 0 0 0"},
"/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/NT_CPU/__ANYINST__/CP
UprcrPrivTimePercent" = { REPLACE = "1,1 0 100 0 0 2,1 90 95 0 0 1,1 95 100 0 0 2"},
"/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/NT_CPU/__ANYINST__/CP
UprcrProcessorTimePercent" = { REPLACE = "1,1 0 100 0 0 2,1 90 95 0 0 1,1 95 100 0 0 2"},
"/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/NT_CPU/__ANYINST__/CP
UprcrUserTimePercent" = { REPLACE = "1,1 0 100 0 0 2,1 90 95 0 0 1,1 95 100 0 0 2"},
"/AS/EVENTSPRING/PARAM_SETTINGS/STATUSFLAGS/paramSettingsStatusFlag" = {
REPLACE = "2" }
7 Expand the RuleSet and review the rules. If your RuleSet is not visible, in the menu
bar choose Other => Refresh RuleSets.
7
Establish Notification and Manage
7
Alerts
This chapter describes how to set up notifications so that a user is automatically
notified by email, pager, or other communication method when some aspect of a
application or system that is being monitored becomes unfavorable. The chapter also
provides information about how to manage the alerts that trigger the notifications.
The following topics are discussed:
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Notification Rules Stored as pconfig Variables. . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Setting Precedence: Rules or KM Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Objects and Overrides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
PATROL Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Difference between Blackouts and Overrides . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Recommended Configuration Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
Alert Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
Adding Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Removing Objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Setting Override Periods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
Alert Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Setting Up Notification for PATROL Objects in Alert . . . . . . . . . . . . . . . . . . . . . . 201
Determining How Many Times Alerts Are Resent . . . . . . . . . . . . . . . . . . . . . . . . 202
Suppressing Alerts upon Agent Restart to Avoid False Alerts . . . . . . . . . . . . . . 204
Assigning Custom Identifiers to PATROL Objects . . . . . . . . . . . . . . . . . . . . . . . . 206
Turning Monitoring On and Off at the Application Class Level . . . . . . . . . . . . . 208
Recovery Action Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Enabling Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Scope of Commands and Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Defining Recovery Action Command Type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Defining Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Notification Configuration and Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Designating Who Receives Notifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Designating Type of Notification Sent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Determining from Where Notifications Are Sent and Managed . . . . . . . . . . . . . 221
Overview
The Event Management menu command in PATROL Configuration Manager
provides an interface with the PATROL KM for Event Management. Use the Event
Management commands to create and test Event Management rules without having
to use the PATROL Console or the New Rule command on the RuleSet shortcut
menu.
The Event Management menu contains that control notifications and alerts are
■ What If—simulates rule lookup behavior; rule lookup includes both the sequence
in which rules are used and the rule lookup order.
After an Event Management rule is created using either the Alert Settings, the rule
appears in the Agent tree view under the selected agent. However, the rule is not
applied until you apply it to the agent. You can save the rule to a RuleSet in the
RuleSet tree view and then apply the rule to agents or groups.
NOTE
You must have the PATROL KM for Event Management installed, loaded, and configured on
the PATROL Agents that use the Event Management rules if you are using Event
Management commands.
1—the values set by the PATROL KM for Event Management rules are used
0—the values stored in the individual KM files are used
Prerequisites
Before you begin establishing notification and setting up event management in
PATROL Configuration Manager, you must
To provide granularity and flexibility, most of the Alert Settings dialog box tabs
provide Add Objects, Remove Objects, and Show Override Periods controls.
You perform these tasks to assign behavior to an object or set of objects. You can also
specify a period of time during which the assigned behavior will not take place.
PATROL Objects
PATROL objects are the computers, application classes, instances, and parameters
that PATROL uses to monitor systems and applications.
Advantages
In the regular PATROL Console, you usually work with one object at a time. The
PATROL Configuration Manager alert settings dialog box enables you to work with
many objects at one time.
Use a blackout period when you do not want notifications sent to anyone, regardless
of the alert status of the specified PATROL objects.
Use the Override Period feature when you do not want certain conditions (defined
within a rule) applied to specific PATROL objects during certain times but you still
want the condition (and thus the rule) applied to a majority of the PATROL objects
during the override period.
NOTE
You can also suppress notifications indefinitely for selected PATROL objects by setting the
Notification System to None.
/AS/EVENTSPRING/ALERT/EMAIL/CPU/CPU__Total/CPUprcrProcessorTime/emailTa
rgetsLocalALARM = john@b.com
On Monday, the Information Support group will take the computer out of production
and run some routine performance tests on it. Set a blackout period from midnight to
8 pm for the CPU usage rule above so that John will not receive notification during
the test period.
/AS/EVENTSPRING/BLACKOUT/
CPU/CPU__Total/CPUprcrProcessorTime/blackoutPeriod = Mon bob@b.com 0 800
/AS/EVENTSPRING/ALERT/EMAIL/CPU/CPU__Total/CPUprcrProcessorTime/emailTarg
etsLocalALARM = bob@b.com,jane@b.com
Set up an override period for the rule so that Jane is not notified during the hours
from midnight to 8 pm.
/AS/EVENTSPRING/OVERRIDE/EMAIL/CPU/CPU__Total/CPUprcrProcessorTime/email
TargetsLocalALARM = Mon 0 2000 = jane@b.com <mailto:jane@b.com>
Alert Settings
The Alert Settings dialog box contains tabs for setting Event Management alert
settings. The tabs of the Alert Settings dialog box correspond to the alert settings
provided by the PATROL Knowledge Module for Event Management.
Normally, you work with one tab at a time when you create alert settings. Each tab is
a separate alert setting for the selected agent.
PATROL Configuration Manager displays the Alert Settings dialog box as shown
in Figure 38.
Adding Objects
Use the Object Selection dialog box to choose the objects for the alert settings tab. The
alert settings on each tab applies to the objects selected on the tab. You can choose any
level of object from all computers (hosts) to a single parameter on an individual
computer.
Ensure that the lists of PATROL objects for the PATROL Agents are up-to-date. The
list of objects used by PATROL Configuration Manager is static, not dynamic, and
must be updated manually. For information about how to update the object lists, see
“Updating PATROL Object Lists” on page 191.
2 Choose either the Show All Hosts check box or the Get Object from Agent check box.
If you want to apply this settings specified in the current tab to computers besides
the current one, choose Show All Hosts. PATROL Configuration Manager lists all
the agents registered with the configuration manager and displayed in the Agent
tree view.
■ Show All Hosts—the configuration manager lists all agents that are registered
with the manager
NOTE
If you have not accessed the Secure Key Store (SKS) database during your current
PATROL Configuration Manager session, the configuration manager will prompt you
for the password for the SKS database. For more information about accessing and
managing the SKS database, see “Managing Unique User Names and Passwords for
Individual Agents” on page 91.
■ To choose the agent on the computer on which you launched the Alert Setting
menu command, select root (/).
■ To select agents on multiple computers, press Ctrl while clicking the individual
computer names.
■ To select a range click on the first agent in the range, move your cursor to the
last agent in the range, and press Shift while clicking on the last agent.
4 (Optional) In Application Classes, choose the application class for whose parameter
you want to set thresholds.
6 (Optional) In Parameters, choose the parameter whose thresholds you want to set.
7 Click Add.
If you do not add the selection, PATROL Configuration Manager does not retain it
when you exit the dialog box.
8 Click Close.
PATROL Configuration Manager closes the dialog box and displays the PATROL
Object in the Selected Objects List.
Removing Objects
Use the Remove Objects feature to removes selected objects displayed in the alert
setting dialog box so that the settings are not applied.
To Remove an Object
1 In Selected Objects List, choose an object. To choose more than one object, press Ctrl
and click on the individual objects one at a time. To select a range, press Shift and
click on the first object in the range and then the last object in the range.
1 In Selected Objects List, choose an object. To select more than one object, press Ctrl
and click on the individual objects one at a time. To select a range, press Shift and
click on the first and last object in the range.
2 Choose Override.
4 Set the override period. The override properties are described in Table 40.
.
5 Click Add.
6 Click Close.
Alert Management
Using PATROL Configuration Manager, you can instruct PATROL KM for Event
Management to run recover actions and issue notifications when a PATROL object
changes to a specific alert status. The aspects of alerts that you can control include
■ issuing notifications
■ running recovery actions
■ resending alerts
■ assigning text descriptions to PATROL objects
■ turning monitoring on or off
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
PATROL Configuration Manager displays the Alert Settings - Alert Action tab
dialog box as shown in Figure 41.
2 Choose the PATROL objects for which you want to set up recovery actions and
send notifications by “Adding Objects” on page 196.
4 Specify the alert status for the PATROL objects and allow PATROL KM for Event
Management to run recovery actions and send notifications when the object alerts.
The Alert Action settings are described in Table 41.
Allow Recovery Actions specifies if the PATROL KM for Event Management recovery
actions are enabled for the selected objects
Trigger NOTIFY_EVENT specifies if the PATROL KM for Event Management
(Perform Notification) performs notification for the selected objects and status
5 Click OK.
PATROL Configuration Manager saves the Alert Action settings and closes the
dialog box.
To resend outstanding alerts for the selected objects as long as the alert is active, set
the Alert resend to -1.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
PATROL Configuration Manager displays the Alert Settings - Alert Resend tab
dialog box as shown in Figure 42.
2 Choose the PATROL objects for which you want to specify how many times an
alert is resent by “Adding Objects” on page 196.
4 Specify resend values for both ALARM and WARNING alerts. The Alert Resend
settings are described in Table 42.
5 Click OK.
PATROL Configuration Manager saves the Alert Resend settings and closes the
dialog box.
The settings for this option are managed by the Send Reset On Init tab and stored in
the rule alertResetOnInit.
This rule does not apply to particular objects, and is not activated by default.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
3 Click OK.
PATROL Configuration Manager saves the Send Reset On Init settings and closes
the dialog box.
EXAMPLE
To help the IT staff of a large online retailer identify which objects serviced which business
application, they add a custom identifier that indicated which application the object belongs
to, such online_catalog, shopping_cart, or online_transaction.
A In the Agent tree view, right-click the agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects for which you want to define custom identifiers by
“Adding Objects” on page 196.
3 Set custom identifiers for the selected objects. The Custom Identifier settings are
described in Table 43.
4 Click OK.
PATROL Configuration Manager saves the Custom Identifier settings and closes
the dialog box.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
PATROL Configuration Manager displays the Alert Settings - Class Active State
tab dialog box as shown in Figure 45.
3 Set Class Active State for the selected objects. The Class Active State settings are
described in Table 44.
4 Click OK.
PATROL Configuration Manager saves the Class Active State settings and closes
the dialog box.
To execute recovery actions, the PATROL KM for Event Management rule arsAction
must be set to 2, 4, 6.
For more information about arsAction, see “arsAction” in Chapter 5, “Rules and
Configuration Variables” in PATROL Knowledge Module for Event Management User
Guide.
To execute a recovery action, you must specify a command type. You can specify the
command type for all PATROL objects or for any individual PATROL application,
instance, or parameter. If all of your recovery actions are of one type, you should
specify that command type for all PATROL objects.
Command Types
PATROL KM for Event Management supports PATROL Script Language commands,
operating system command and shell scripts based upon those commands, and
customer scripts. However, if you want to use custom scripts, they must be defined in
the application class for which they will run. PATROL KM for Event Management
supports the following command types without any customization.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
Figure 46 Alert Settings Dialog Box – Recovery Action Command Type Tab
2 Choose the PATROL objects for which you want to define the recovery action
command type by “Adding Objects” on page 196.
4 Choose the Alert status for which you want to specify the recovery action
command type. The Recovery Action Command Type settings are described in
Table 45.
■ ANY_STATUS
■ WARNING
■ ALARM
Enter Recovery Action enter the command type of the recovery action command
Command
The command type must be defined for objects selected for
the recovery action.
5 Click OK.
NOTE
For PATROL to execute the recovery actions, Allow Recovery Actions check box must be
selected on the Alert Action tab.
Command Types
Recovery actions can be written in PSL, OS, or custom commands. Based upon the
programming language and command type, you must reference the recovery action
program or script in certain ways. To designate the command type, see “Defining
Recovery Action Command Type” on page 210.
PSL
■ If you are specifying a PSL script file, enter the absolute path to the file on the
agent.
■ If you are entering the PSL text, click Edit to enter a multi-line PSL script.
Operating System
■ The command must be in the path, or you must specify the absolute path to the
command. You can use environment variables.
Custom
■ You must specify the absolute path for the recovery command when you are
specifying a custom command type.
Before specifying a recovery action script, you should have completed the following
tasks:
■ Specify the recovery action command type rule arsCmdType. See “Defining
Recovery Action Command Type” on page 210.
■ Create and test a recovery action script. See “Using Notification Scripts” and
“Testing Notification Scripts” in Chapter 3, “Using PATROL KM for Event
Management,” in PATROL Knowledge Module for Event Management User Guide.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects for which you want to define recovery actions by
“Adding Objects” on page 196.
4 Choose the Alert status for which you want the recovery action to run and define
the recovery action. The Recovery Action Command settings are described in
Table 46.
■ ANY_STATUS
■ WARNING
■ ALARM
Enter Recovery Action enter the text of the recovery action command
Command
PSL Commands
Ensure you set the following values if you are using recovery
actions:
5 Click OK.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects for which you want to set up a notification targets by
“Adding Objects” on page 196.
4 Designate who will receive the notification, what type of notifications they will
receive, what type of alert will cause the notification. The Notification Targets
settings are described in Table 47.
■ Email
■ Pager
■ Custom
■ Trouble Ticket
■ ANY_STATUS
■ INFORMATION
■ WARNING
■ ALARM
■ ESCALATED
You can select more than one value by holding CTRL and
clicking multiple selections in the Target Notification Type(s)
list.
Enter Targets specify the notification targets for the selected objects and
notification types
5 Click OK.
PATROL Configuration Manager saves the Notification Targets settings and closes
the dialog box.
EXAMPLE
A system administrator (SA) sets up pager notifications for all CPU-related PATROL objects
because they are mission critical. The SA sets up email notification for all printer-related
PATROL objects because printing is not a mission critical aspect of the business.
Scripts
For more information about the scripts, their locations, any requirements for using
them, and any edits or customizations required, see “Configuration Tasks” in
Chapter 3, “Using the PATROL KM for Event Management,” of PATROL Knowledge
Module for Event Management User Guide.
The PATROL KM for Event management contains sample notification scripts located
in the PATROL PSL directory. The notification command is typically set at the root
(/) object level so that it applies to all PATROL objects, for example, application
classes, instances, and parameters with an ALERT status.
■ You must have edited the platform-specific sample scripts provided with PATROL
KM for Event Management.
■ If you are going to notify individuals by pages, you must install and configure that
software.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL object to which you want to associate a notification script. If
you want to use the same script for all PATROL objects, select the root (/).
When you call a shell script or a batch program you can pass
command-line arguments. However, most operating systems
have command size limitations or there are special characters
that cause the command to fail.
If you are using blat to send e-mail, and you want to send the
e-mail to multiple targets, you must use command-line
arguments.
4 Click OK.
or not send them at all. This setting is stored in the rule alertSystem and can be specific
for each PATROL object.
EXAMPLE
You can set up notifications to be sent locally for one parameter. For a second parameter, you
could setup events to be forwarded to a notification server that sends the notification. For a
third parameter, you could choose to not set up any notification.
NOTE
You should only select a specific host when you are creating a rule for a notification server.
Local
Using the Local option, notification failures have no impact on other systems. Local
notification is potentially more reliable since it requires fewer intermediate
components (for example, the network connection, the remote notification server).
Remote
Send alerts to a notification server. You can specify a primary and a backup
notification server. If the primary notification server is unavailable, fail-over to the
backup notification server is automatically performed.
None
PATROL Configuration Manager does not send for the selected PATROL objects.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects for which you want to set up a notification system by
“Adding Objects” on page 196.
4 Specify the Alert status and notification system from where the notifications are
managed and sent. The Notification System settings are described in Table 49.
5 Click OK.
PATROL Configuration Manager saves the Notification System settings and closes
the dialog box.
For more information, see “Deciding Where to Place Notification Rules” in Chapter 3,
“Using PATROL KM for Event Management,”in PATROL Knowledge Module for Event
Management User Guide.
For information about editing notification scripts, see “Using Notification Scripts”
and “Testing Notification Scripts” in Chapter 3, “Using PATROL KM for Event
Management,”in PATROL Knowledge Module for Event Management User Guide.
This feature allows you to provide precise, detailed notifications that inform the
recipient of the exact system status.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects whose Alert Messages you want to reword by
“Adding Objects” on page 196.
4 Specify the Alert status and construct a new message for the specified Alert status.
The Alert Messages settings are described in Table 51.
For information about how to construct a message using Alert Message variables
and some sample messages, see “Message Variables” on page 228.
■ ANY_STATUS
■ INFORMATION
■ WARNING
■ ALARM
Enter Custom Message Text specify your new message text using a combination of
regular text and variables
The variables are replaced with the actual values from the
associated object that is in the selected state.
Message Variables The message variable text shown in the bottom of the dialog
box is for you to use as a reference when you create your
message. The text in the bottom pane is read only and has
nothing to do with your new message. However, you can
copy variables from the bottom and paste them in the Enter
Custom Message Text field to use in your message.
5 Click OK.
PATROL Configuration Manager saves the Alert Messages settings and closes the
dialog box.
Message Variables
Table 52 describes the message variables available for creating custom alert messages.
Blend them with text to create an easily comprehensible, very detailed notification.
The %LAST10TP% is the difference, in minutes, between the first and last
%LAST10TS% values.
%EVENT_ID% the PATROL Event Manager event ID for the alert
%USERDEFINED% the value of variable
/_my_%APPCLASS%_%APPINSTANCE%_%PARAMETER_NAME%
%EVENT_TYPE% the PATROL Event Manager event type for the alert
%EVENT_STATUS% the PATROL Event Manager event status for the alert
%OS_TYPE% the operating system type
%ALARM_MIN% the lower threshold of the current alarm range
%ALARM_MAX% the upper threshold of the current alarm range
%CUSTOM_ID1% the custom identifier assigned to object
Sample Message
The following combination of variables and text in the Enter Custom Message Text
field
yields the following message, which is sent as an email, page, or other notification.
The Oracle server PROD1 on glamis is consuming 99.55% CPU (Ave CPU=76.54%)
Disabling Notification
You can disable notification in either PATROL KM for Event Management or
PATROL Configuration Manager. The advantage of PATROL KM for Event
Management lies in that it supports disabling notifications with menu commands and
dialog boxes, which provide ease of use and error checking. The advantage of
PATROL Configuration Manager lies in its ability to distribute the rule changes
quickly and uniformly throughout the enterprise. The most efficient method of
disabling notifications involves using both products and thus taking advantage of
both products strengths.
For more information about disabling notifications using PATROL KM for Event
Management, see “Disabling Notification” in Chapter 3, “Using the PATROL KM for
Event Management, “of PATROL Knowledge Module for Event Management User Guide.
To disable notification for certain PATROL objects, such as an application class, set
the arsAction rule to 0 only for that application class.
EXAMPLE
To disable notification for all parameters in the NT_CPU application class, use the
following rule on the remote agent generating events:
/AS/EVENTSPRING/NT_CPU/arsAction =0.
To disable notification at the notification server, you can set the alertSystem rule to
NONE and then set it to LOCAL for those parameters for which you want to receive
notifications.
If you are receiving too many notifications, review your emails (or pages) and begin
adjusting the parameter settings so that the alerts that are not desired stop coming.
To Override Rules
EXAMPLE
If you do not want a remote agent to generate notify events, you can disable the
arsAction rule on that remote agent.
A In the Agent tree view, right-click on an agent for which you want to set up
notifications such as emails or pages.
2 Choose the PATROL objects for which you want to set up a notification blackout
by “Adding Objects” on page 196.
4 Specify the period of time for which notification will not be sent when a selected
PATROL object goes into an alert. The Notification Blackout settings are described
in Table 55.
EXAMPLE
To set a blackout from Friday at 19:00 pm until Sunday at 9:00 requires you to create three
blackout periods within PATROL Configuration Manager and merge them as you create each
one:
1st Period
Blackout Start Time -->19:00:00
Blackout Stop Time --> 23:59:59
Blackout Days-->Fri
2nd Period
Blackout Start Time -->00:00:00
Blackout Stop Time --> 23:59:59
Blackout Days-->Sat
3rd Period
Blackout Start Time -->00:00:00
Blackout Stop Time --> 09:00:00
Blackout Days-->Sun
5 Click OK.
Notification Tests
PATROL Configuration Manager allows you to test the notifications that you have
established without actually having to apply them to an agent. The What If feature
simulates a PATROL installation and reports on the success or failure of the
notifications as you have defined them within PATROL Configuration Manager.
What If RuleSet
Limitations
You can only test the notification properties of one parameter at a time.
Testing Notifications
Use the What If? feature to test or simulate PATROL KM for Event Management
configurations as they pertain to notification rules. The test determines which rules
are triggered when a parameter enters a specified state, such as ALARM or WARN.
With the test results, you can determine if you have configured the notification rules
correctly.
■ Before using the What If feature to test your notification rules, configure the agent
as desired. Then perform a get on the agent to obtain the latest configuration and
store it in backup folder.
■ You must save all agents that you have added. If you add a new agent and attempt
to perform What If before saving the agent, PATROL Configuration Manager
prompts you to save the agent. If you do not, the What If feature will not test
notification set up for any new agents whose configuration has not been saved.
1 In the Agent tree view, right-click an agent for which you want to test notifications
such as emails or pages.
PATROL Configuration Manager displays the What If dialog box as shown Figure 55.
3 Choose the parameter by clicking Browse and using the Object Selection dialog
box. For instructions on how to choose an object by “Adding Objects” on page 196.
4 Specify an Alert status and the time at which you want the test to be performed for
the selected parameter. The What If settings are described in Table 56.
5 Click OK.
PATROL Configuration Manager performs the What If simulation and returns the
results in the WhatIf Results dialog box–Results tab as shown Figure 56.
6 In the Results tab, view the execution of the rules. The Results tab displays each
rule executed during the simulation in the order it was executed.
The What If dialog box–Report tab shows a text version of the What If report as
shown Figure 57.
1 After completing step 1 through step 6 on page 238, click Save Report.
2 Navigate to the location where you want to save the file and type in the name.
3 Click Save.
PATROL Configuration Manager saves the report to the file and displays the
report in the Report Viewer.
4 When you are done viewing the results online, click Close.
8
Move PATROL Information into
8
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
AS_CHANGESPRING KM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Features and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
Loading the AS_CHANGESPRING KM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
Accessing the KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
Retrieve, Convert, and Import Information from the PATROL Agent and KMs. . . 245
KM Migration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246
Naming Convention of RuleSets Created by AS_CHANGESPRING KM . . . . . 246
Location and File Name of RuleSets Created by AS_CHANGESPRING KM . . 246
Make New RuleSets Available to PATROL Configuration Manager . . . . . . . . . 247
Getting All Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Getting Localized Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
Getting Global Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Getting Global Poll Times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250
Creating a Default RuleSet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Updating the PATROL Object List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
Creating RuleSet from Comma-Separated Value Files . . . . . . . . . . . . . . . . . . . . . 253
Converting Parameter Overrides to RuleSets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Turning Off Alarm Ranges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
Import PATROL Console Configuration Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Converting PATROL Console Desktop Settings to .ini Files . . . . . . . . . . . . . . . . 257
Importing the Converted Data into PATROL Configuration Manager . . . . . . . 258
Overview
PATROL Configuration Manager includes tools that help you get your PATROL
environment into PATROL Configuration Manager. These tools help you turn
PATROL Agent configuration information into PATROL Configuration Manager
RuleSets and turn PATROL Console desktop configurations into PATROL
Configuration Manager agent groups.
■ AS_CHANGESPRING KM
■ PATROL Configuration Manager csmi Utility
AS_CHANGESPRING KM
The AS_CHANGESPRING KM helps you convert your PATROL configurations into
PATROL KM for Event Management and PATROL Configuration Manager
configurations.
NOTE
Since the AS_CHANGESPRING KM works with the active PATROL Agent
namespace, the KMs that you use with the AS_CHANGESPRING KM must be
loaded on the PATROL Agent and active.
Requirements
To function properly, the AS_CHANGESPRING KM requires the PATROL
Knowledge Module for Event Management to be installed and loaded on the
PATROL Agent.
Start the PATROL Console in Developer mode and connect to the PATROL Agent
that you want to get configuration information from.
1 From the PATROL Console for Microsoft Windows menu bar, choose File => Load
KM.
The Load KMs dialog box displays a list of available .kml files. Display .km files
instead (equivalent to application classes) by selecting KM Files (*.km) from the
drop-down list box.
NOTE
The AS_CHANGESPRING.km is installed with PATROL Configuration Manager in the
utils subdirectory of the installation directory.
See “Installation” on page 19 for more information.
NOTE
Do not commit the AS_CHANGESPRING.km to the connected agents. You only need to
load the KM in the PATROL Developer Console to use the AS_CHANGESPRING.km.
1 From the PATROL Console for UNIX menu bar, choose File => Load KM.
The Load KMs dialog box displays a list of available .kml files. Display .km files
instead (equivalent to application classes) by changing the filter.
NOTE
The AS_CHANGESPRING.km is installed with PATROL Configuration Manager in the
utils subdirectory of the installation directory.
See “Installation” on page 19 for more information.
NOTE
Do not commit the AS_CHANGESPRING.km to the connected agents. You only need to
load the KM in the PATROL Developer Console to use the AS_CHANGESPRING.km.
KM Migration
The AS_CHANGESPRING KM provides a means by which you can migrate
customizations to KMs. Normally, when you migrate a KM, you must record the
localized settings and reapply them to the new KMs. This KM identifies all the
localized thresholds running on a PATROL Agent and creates a RuleSet equivalent to
the thresholds. You can take this new RuleSet and apply it to a new KM to migrate
your localized thresholds.
Once you have retrieved the thresholds and saved them as rules, you have the
RuleSets to reuse with each new version of the KM.
host_port_localizedParams.cfg
From the PATROL Console, access the KM Command menu for the
AS_CHANGESPRING application instance and choose Get All Parameters => Create
RuleSet.
PATROL creates a PATROL Configuration Manager RuleSet file that you can apply
to many agents. The name and location of the RuleSet are printed to the system
output window.
You can also store the RuleSet information in the PATROL Agent configuration
database on the selected agent instead of creating an external configuration file.
The advantage of creating the RuleSet in the PATROL configuration database on the
agent is that you do not have to move files around. You can save it to the agent and
then perform a Get on an agent and create a RuleSet from the backup folder without
having to move a file from one computer to another.
To Create a RuleSet
From the PATROL Console, access the KM Command popup menu for the
AS_CHANGESPRING application instance and choose Event
Management => Parameter Settings => Thresholds.
PATROL creates a PATROL Configuration Manager RuleSet file that you can apply
to many agents. The name and location of the RuleSet are printed to the system
output window.
You can also store the RuleSet information in the PATROL Agent configuration
database on the selected agent instead of creating an external configuration file.
The advantage of creating the RuleSet in the PATROL configuration database on the
agent is that you do not have to move files around. You can save it to the agent and
then perform a Get on an agent and create a RuleSet from the backup folder without
having to move a file from one computer to another.
Create a RuleSet for all knowledge modules by choosing Get Global Parameters =>
Create a Ruleset => All Knowledge Modules. PATROL creates a PATROL
Configuration Manager RuleSet file that you can apply to many agents. The name
and location of the RuleSet are printed to the system output window as shown in
Figure 59 on page 246.
Create a RuleSet for select knowledge modules by choosing Get Global Parameters =>
Create a Ruleset => Select Knowledge Modules. PATROL displays the Select
Knowledge Module(s) dialog box as shown in Figure 60.
Save the RuleSet information in the PATROL Agent configuration database on the
selected agent instead of creating an external configuration file by choosing Get
Global Parameters => Store in PATROL Configuration DB => All Knowledge Modules.
1 Save the RuleSet information in the PATROL Agent configuration database on the
selected agent instead of creating an external configuration file by choosing Get
Global Parameters => Store in PATROL Configuration DB => Select Knowledge
Modules.
PATROL displays the Select the Knowledge Modules dialog box as shown in
Figure 60 on page 249.
Create a RuleSet for poll times by choosing Get Global Polltimes => Create
Ruleset => All Knowledge Modules. PATROL creates a PATROL Configuration
Manager RuleSet file that you can apply to many agents. The name and location of
the RuleSet are printed to the system output window after you execute the command.
1 Create a RuleSet for selected KMs poll times by choosing Get Global
Polltimes => Create Ruleset => Select Knowledge Modules.
PATROL displays Select the Knowledge Modules dialog box as shown in Figure 60
on page 249.
2 Choose the knowledge module that you want to include and click Accept.
Save the RuleSet information in the PATROL Agent configuration database on the
selected agent instead of creating an external configuration file by choosing Get
Global Polltimes => Store in PATROL Configuration DB => All Knowledge Modules.
1 Save the RuleSet information in the PATROL Agent configuration database on the
selected agent instead of creating an external configuration file by choosing Get
Global Polltimes => Store in PATROL Configuration DB => Select Knowledge
Modules.
PATROL displays Select the Knowledge Modules dialog box as shown in Figure 60
on page 249.
2 Choose the KMs that you want to include and click Accept.
Figure 59 on page 246 shows an example of a RuleSet file name in the PATROL
Console System Output window. This command creates the following file on the
PATROL Agent:
Default_Config_RuleSet.cfg
PATROL Configuration Manager does not have dynamic connections to the PATROL
Agent. When you create Event Management rules using PATROL Configuration
Manager, and you choose the command to add an object, the Add Object list contains
a static list of PATROL objects that is created from files installed with PATROL
Configuration Manager.
The files that create the objects in PATROL Configuration Manager interface are in
the following directory:
<install_dir>\patrol
There are many files in this directory. The key file is called application_classes.def
which defines all the application classes that are available in the PATROL
Configuration Manager event management commands.
For each application class listed in the application_classes.def file, there is a file that
defines the associated parameters and a file that defines the associated instances.
■ NT_CPU.prm (parameters)
■ NT_CPU.sid (instances)
The Create files for patrol_dir command opens the Create List dialog box as shown in
Figure 61 on page 252:
Use the Create List dialog box to specify the output directory for the patrol_dir files.
NOTE
The output directory must exist on the PATROL Agent or the command fails.
The results of the command are printed to the system output window.
After you create the new files, move them to the <install_dir>\patrol directory on the
PATROL Configuration Manager system.
You can merge the new files with the existing object definitions by copying the entries
in the new application_classes.def file to the existing application_classes.def file and
then copying all the new .prm and .sid files to the <install_dir>\patrol directory. When
you copy the files, replace any identical files with the new files because the new files
more accurately reflect your environment.
The PATROL KM for Event Management Reports command saves PATROL KM for
Event Management configurations to a CSV file in the format supported by this
command. You can create a CSV file with the PATROL KM for Event Management,
edit the CSV file using Microsoft Excel or a text editor, and create a RuleSet for the
new settings using the Create Ruleset from CSV File command. The Create Ruleset
from CSV File command opens the Get File dialog box as shown in Figure 62:
Use the Get File dialog box to specify the CSV file that you are using as input. Specify
the location of the CSV file on the PATROL Agent.
NOTE
The Create Ruleset from CSV File command requires input in the same format as the PATROL
KM for Event Management CSV report format.
The configuration file is created in the same directory as the other configuration files,
and it has the following naming convention:
host_port_ThresholdRuleSet.cfg
After you create the RuleSet from the CSV file, you can copy it to the PATROL
Configuration Manager RuleSets directory and apply it to PATROL Agents.
WARNING
The operator overrides are removed from the agent.
With these commands you can create rules for all of your operator overrides and
manage them with PATROL Configuration Manager. The KM provides the following
Convert Overrides to EVS menu commands:
To Create a RuleSet
host_port_overrideParams.cfg
When you create a RuleSet, you must move the new file from the agent where it is
created to the RuleSets directory of PATROL Configuration Manager before you can
apply it to agents.
You can also store the RuleSet information in the PATROL Agent configuration
database on the selected agent instead of creating an external configuration file.
NOTE
After you turn the alarm ranges off, you must adjust and activate each parameter
individually.
The KM provides the following Turn Off Alarm Ranges menu commands:
■ Turn Off Alarm Ranges => Create a Ruleset => All Knowledge Modules
■ Turn Off Alarm Ranges => Create a Ruleset => Select Knowledge Modules
■ Turn Off Alarm Ranges => Create a Ruleset =>Store in PATROL’s Configuration DB =>
All Knowledge Modules
■ Turn Off Alarm Ranges => Create a Ruleset =>Store in PATROL’s Configuration DB =>
Select Knowledge Modules
host_port_GlobalParams.cfg
When you create a RuleSet, you must move the new file from the agent where it is
created to the RuleSets directory of PATROL Configuration Manager before you can
apply it to agents.
This command is the same as the Turn Off Alarm Ranges => Create a Ruleset => All
Knowledge Modules command, but you can choose the KMs you want to include.
Figure 60 on page 249 shows the Select the Knowledge Modules dialog box.
You can also store the RuleSet information in the PATROL Agent configuration
database on the selected agent instead of creating an external configuration file.
This command is the same as the Turn Off Alarm Ranges => Store in PATROL
Configuration DB => All Knowledge Modules command, but you can choose the KMs
you want to include. Figure 60 on page 249 shows the Select the Knowledge Modules
dialog box.
NOTE
The csmi utility converts only PATROL Console desktop files from the PATROL Console for
Windows and the PATROL Console for UNIX. The PATROL Central consoles do not use
desktop files.
Conversion Guidelines
The csmi utility converts the PATROL Console desktops files into PATROL
Configuration Manager .ini files using the following guidelines:
■ Each PATROL Agent in a PATROL Console profile is added to the group created
for the profile.
The following task shows you how to convert your PATROL Console desktop data
and import the data into PATROL Configuration Manager.
Ensure you have access to the PATROL cache directory (PATROL_CACHE) where
your PATROL Console configuration files are saved.
■ (UNIX) – cd /opt/bmc/pconfmgr
■ (Windows) – cd C:\Program Files\BMC Software\pconfmgr\utils
■ (UNIX) – csmi.csh
■ (Windows)– csmi.bat
4 Enter the full path of your PATROL cache directory, or press Enter to accept the
default.
5 Enter the most frequently used Agent port number, or press enter to accept the
default value (3181).
6 Enter the most frequently used protocol (UDP/TCP) for connecting to the
PATROL Agent, or press enter to accept the default value (TCP).
7 The csmi utility converts your PATROL desktop configuration files into the
following files:
■ groups.ini
■ agents.ini
The new agents.ini and groups.ini files are written to the PATROL Configuration
Manager utils directory where you started the csmi utility in step 3 on page 257.
If you have additional PATROL cache directories to convert, move the new
agents.ini and groups.ini files before you run the csmi utility because it overwrites
any agents.ini and groups.ini files that are in the utils directory if you run the utility
again.
Exit PATROL Configuration Manager before you import the converted PATROL
Console desktop settings.
Copy the agents.ini and groups.ini files from the PATROL Configuration Manager
utils directory to the PATROL Configuration Manager ini directory.
If you already have agents.ini and groups.ini files in your ini directory, you should
backup or rename the existing ini files.
If you have desktop settings from several different PATROL Consoles or user
profiles, you can manually merge the .ini files, but you must move the ini files out
of the utils directory each time you convert a profile, or you overwrite the last one
you converted.
9
9 Command Line Interface
This chapter discusses the PATROL Configuration Manager command line interface
(CLI). It describes how to access the CLI, lists and defines CLI options, and provides
some sample scripts. This chapter presents the following topics:
The command line interface provides a subset of the GUI functionality. The tasks
supported by the CLI include
Dependencies
To use the PATROL Configuration Manager CLI, you must
Location
Table 58 lists the path and filename of the CLI on Windows and UNIX platforms.
Authentication
To generate reports and distribute configurations to an agent that requires
authentication, PATROL Configuration Manager must access the Secure Key Store
and retrieve the user name and password for the agent.
For more information about authentication, see the PATROL Security User Guide.
2 Type the script name and press Enter. Table 60 lists the script for each platform.
The script installs the password stanza in the policy. The stanza consists of an
encrypted password and a reference to the key material file required to open the
Secure Key Store. Figure 63 on page 262 provides an example of the command for
computers running the Windows operating system. A similar script is available for
UNIX systems.
NOTE
To prevent unauthorized access of the Secure Key Store, you can restrict the permissions on
the key material file to read only for one user name, under which all batch operations are
performed.
Syntax
Figure 65 displays its basic syntax. The CLI utility’s extension (represented by the
variable .ext) and the policy argument will be platform-specific.
Option
Table 61 describes the options and their arguments.
0–off
1–on
-f filename references the script file that contains the PATROL Configuration
Manager CLI commands
For information about the script file syntax, see “Script File
Options” on page 264.
apply
license
report
add_agent
add_group
config_sec
-v display version information about the utility
Syntax
Figure 66 displays the basic file syntax.
Options
Table 62 describes the commands, their options, and their corresponding arguments.
(Optional)
-auth use authentication for configuration purposes
-ba back up agents before applying rules or RuleSets
-cg apply ApplyOnNew items in the current group
-host Host name host name
-name Display name display name (the default is the host name)
-ol overwrite the current localized settings
-pa purge the agent of all configuration changes before applying
-pg Parent Group parent group
-port Port port (default : 3181)
-proto Protocol protocol (TCP or UDP) (Default: TCP)
-pt apply ApplyOnNew items in the parent tree groups
-sec Security Level security level (0, 1,2 3, or 4) (Default 0)
If the license file is not in the current working path, the License
argument must include the fully qualified path. Either a group
or an agent name must be provided.
-g GroupName apply license to a group or subgroup
-a AgentName apply license to an agent
License fully qualified patha and name of the license file
Error Handling
An error in any of the commands contained within the script causes the entire script
to abort. The CLI returns an error code of 1.
Sample Scripts
This section provides some sample scripts that demonstrate some possible ways in
which the PATROL Configuration Manager CLI can be employed.
NOTE
Everything about these samples is system and/or platform-specific: directory names,
filenames, report data and so forth. The scripts are provided as models from which you
should extrapolate.
Scheduling
To schedule PATROL Configuration Manager reports to run at a designated time
requires creating the script file and then entering the command into an operating
specific job schedule. This sample script addresses the task on both UNIX (Solaris)
and Windows platforms.
UNIX
1 Open a text editor and create a script similar to the one in Figure 67.
Add an entry to the crontab that will run the report at a desired time. The entry
displayed in Figure 68 runs the report every day at 3:15 a.m.
Windows
1 Open a text editor and create a script (*.cmd) similar to the one in Figure 69.
Navigate to the Control Pane, select the Scheduled Tasks applet, and run the Add
Scheduled Task wizard. Add a task that calls the script file (*.cmd) that you created
with the desired frequency.
A
A Configuration Settings
This appendix describes the directories, files, and settings used by the PATROL
Configuration Manager component.
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Configuration Settings Changed Using the File => Configure Command. . . . . 272
Configuration Settings Changed by Editing the PCM.ini File . . . . . . . . . . . . . . . 273
Overview
PATROL Configuration Manager configuration values are stored in the PCM.ini file.
Some configuration values are changed using the File => Configure command, and
some configuration values are changed by editing the PCM.ini file.
NOTE
Prior to performing an upgrade, backup the entire PATROL Configuration Manager
installation directory. All configuration values are stored in the PATROL Configuration
Manager initialization file, defaulted to PCM.ini at installation.
■ backup_before_apply
■ backup_dir
■ backup_folder_groups
■ backup_folder_min
■ backup_identical_configurations
■ backups_saved
■ comments_dir
■ errorfile
■ images_dir
■ ini_dir
■ logfile
■ local_dir
■ PATROL Configuration Manager initialization file
■ queue_dir
■ ruleset_dir
■ tlog_dir
■ transactions_saved
NOTE
Some of the configuration variables will not be in the PCM.ini file, and you need to create the
variable to set the configuration value.
1 = Critical Error
2 = Error
3 = Warning
4 = Info
5 = Detail
6 = Trace
7 = Verbose
debugloglevel setting determines the level of debug 2
messages sent to the error file,
PCM.err; for a range of values,
see debuglevel
debugwindow setting determines whether PATROL false
Configuration Manager
displays a window with debug
information
discovery_max_burst_p setting specifies the number of 254
ackets connection attempts or
PATROL pings the Agent
Discovery wizard sends in a
single burst during discovery
discovery_burst_delay setting specifies the number of 20
milliseconds that the Agent
Discovery wizard waits
between sending connection
attempt or PATROL ping
bursts during discovery
discovery_tcp_ignore_c setting instructs the Agent Discovery false
onnect_timeout wizard to ignore the time out
value until after a TCP/IP
connection is made
errorfile file file that contains PATROL install_dir/PCM.err
Configuration Manager error
messages
ess_bin_dir directory directory containing the
Extended Security System
binaries
ess_jar_path directory directory containing the
Extended Security System JNI
jar file
Adds to or overrides
definitions in the tips_file.
tlog_dir directory directory where the change install_dir/rulesets/PCM/tlog
history for each agent is stored
tooltips_activate setting determines whether PATROL false
Configuration Manager
displays tooltips; true
indicates that tooltips are
displayed
B
B Supported Regular Expressions
This appendix describes the supported regular expressions that you can use for
searching with the PATROL Configuration Manager component.
There are also character class shortcuts, for example, \b (word boundary), \B (non-word
boundary), \w (alpha-numeric), and \W (non-alpha-numeric).
^ Match the following characters at the beginning of a line.
The last example, [?.*], matches any string with either a question mark, a dot, a star, or a
string containing any combination of the three.
Ranges are only valid if the LC_COLLATE category is set to the C locale. If the
LC_COLLATE category is not set to the C locale., the effect of using the range notation is
unspecified.
[^s] Match strings that do not contain the characters in the set.
r* Match zero or more successive occurrences of the regular expression r.
Without an anchor to the right, this regular expression matches a string containing more
than one occurrence, because it contains one occurrence. For example, x? matches x, xx,
and xxxxx
r{m,n} Match any number of m through n successive occurrences of the regular expression r.
The regular expression r{m} matches exactly m occurrences, and r{m,} matches at least m
occurrences.
Since the regular expression looks for one to three occurrences of a at any point in the
string, it also matches four occurrences of a.
Consider anchoring the end of the string to limit the upper-bound match count. for
example, a{1,3}$ or a{1,3}[b-z].
(r) Specifies the regular expression r is used for grouping.
The character n must be a digit between 1 to 9 that defines how many previous sub
expressions are matched. The expression is invalid if less than n sub expressions precede
the \n.
Examples
■ ^(.*)\1$
matches a line consisting of two adjacent appearances of the same string
■ (a)*\1
fails to match a but matches aa
■ (abc)\2
is invalid because there is only one sub expression but two are specified
■ (abc)(efg)\2
is a valid expression
The limit of nine back-references to sub expressions is based on the need to have a single
digit identifier.
| The regular expression OR operator allows for more than one regular expression to
match.
For example, (abc)|(xyz) matches any item with abc or xyz, or both.
Character classes A character class expression represents the set of characters belonging to a character
class, as listed in the LC_CTYPE category in the current locale.
All character classes specified in the current locale are recognized. A character class
expression is expressed as a character class name enclosed within bracket-colon ([: :])
delimiters.
■ [:alnum:]
■ [:cntrl:]
■ [:lower:]
■ [:space:
■ [:alpha:]
■ [:digit:]
■ [:upper:]
■ [:blank:]
■ [:punct:]
C
Troubleshooting and Frequently
C
Asked Questions
This appendix provides common troubleshooting tasks and answers to frequently
asked questions (FAQs) for the PATROL Configuration Manager. The following
topics are discovered:
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
NT_CPU Polltime Changes Are Not Working . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
PATROL Configuration Manager Does Not Start on Windows . . . . . . . . . . . . . 288
PATROL Configuration Manager Does Not Start on UNIX . . . . . . . . . . . . . . . . . 289
KM Parameters Are Not in the Object Selection List . . . . . . . . . . . . . . . . . . . . . . . 290
Rule Value Length Too Long . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
PATROL Configuration Manager Labels Missing . . . . . . . . . . . . . . . . . . . . . . . . . 292
PATROL Configuration Manager Does Not Start on Windows with Abnormal
Termination Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Reporting Generates Infinite Loop Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
How Do I Move PATROL Configuration Manager from UNIX to Windows? . 296
What Is the Purpose of the DELVAR Operation?. . . . . . . . . . . . . . . . . . . . . . . . . . 296
Troubleshooting
The following table lists the troubleshooting topics discussed in this section:
Problem Page
NT_CPU Polltime Changes Are Not Working 287
PATROL Configuration Manager Does Not Start on Windows 288
PATROL Configuration Manager Does Not Start on UNIX 289
KM Parameters Are Not in the Object Selection List 290
Rule Value Length Too Long 291
PATROL Configuration Manager Labels Missing 292
PATROL Configuration Manager Does Not Start on Windows with 293
Abnormal Termination Errors
Problem
The NT_CPU parameter polltimes do not change when the collector polltime or the
polltime for the individual parameter is changed through PATROL Configuration
Manager.
Solution
This problem is related to agents running the NT OS KM. In this version of the
NT_OS KM 3.8.xx. The CPUProcessorColl is no longer associated with NT_CPU; it is
now associated with NT_CPU_CONTAINER.
"/AS/EVENTSPRING/PARAM_SETTINGS/POLLTIMES/NT_CPU/__ANYINST__/CPUProcessorColl/in
terval" = {
REPLACE = "600"
},
"/AS/EVENTSPRING/PARAM_SETTINGS/POLLTIMES/NT_CPU_CONTAINER/NT_CPU_CONTAINER/CPUP
rocessorColl/interval" = {
REPLACE = "600"
},
Problem
PATROL Configuration Manager does not start with the following command:
And when you try to start the PATROL Configuration Manager using the PCM.bat
file you receive the following error:
Solution
This problem is cause by not being authenticated on the network share where the files
are being read from when loading PATROL Configuration Manager. Usually, when
trying to map a shared drive or going directly to the remote computer files with
UNC, Windows asks for a user name/password before it connects to the remote
resource.
■ Access that remote machine with a UNC path so Windows prompts for the user
name/password and connect. After you connect one time, PATROL Configuration
Manager accesses the files since Windows previously authenticated the remote
computer.
Problem
There are several reasons why PATROL Configuration Manager does not start on a
UNIX platform.
Solutions
Explanation Solution
Java is not installed on the system. Install the required version of Java for your operating
system.
Problem
PATROL Configuration Manager does not have a dynamic connection to the
PATROL Agent. So when you are creating Event Management rules using PATROL
Configuration Manager, and you choose the command to add an object, the Add
Object list contains a static list of PATROL objects that created from files installed
with PATROL Configuration Manager.
Solution
You can manually edit the files that create the items in the Add Object list. See
“Updating the PATROL Object List” on page 251 for more information about adding
PATROL objects to the PATROL Configuration Manager object selection dialog
boxes.
Problem
When you create a rule the Rule Value Length dialog box opens as shown in
Figure 70.
Solution
PATROL Configuration Manager opens this dialog box when the agent configuration
variable contains more than 1,020 characters. PATROL Agent 3.4.x and earlier do not
support more than 1,020 characters for an agent configuration variable. However,
PATROL Agent 3.5.00 and later does not have this limitation on the agent
configuration variable.
If the agent configuration variable is for a PATROL Agent version 3.5 or later, click
No.
If the agent configuration variable is for a PATROL Agent earlier than version 3.5.00,
you have the following options:
■ click Yes
This trims the agent configuration variable to 1,020 characters, but you lose all the
information that is trimmed.
■ click Cancel
This cancels the operation and you can edit the rule to fit into the 1,020 length
restriction.
Problem
Labels in PATROL Configuration Manager do not show up on UNIX.
Solution
You may need to change the color preferences in CDE.
1 From the system console, choose the Style Manager icon from the CDE Control
Bar.
3 In the Style Manager - Color dialog box, find the Defaults section.
5 Click Modify.
6 In the Style Manager - Modify Color window, slide the very bottom slide all the
way to the right.
The New square in the top-left corner of the window changes to white.
7 Click OK.
Problem
When starting PATROL Configuration Manager, the following error is returned:
Solution
This is a generic Java error and not specific to PATROL Configuration Manager. This
happens when a bad font is installed in the Windows Fonts directory. This problem
has happened with the following font:
johnny-b.ttf
To see if this font is present, you must view the fonts from a command prompt. If the
font is present delete it.
This problem can also be caused by non-font files in the Fonts folder.
The Fonts folder should only contain regular font files. Shortcuts to font files in other
locations cause problems in the Fonts folder.
If you find a shortcut to a font file in the Fonts folder, locate the font file it is pointing
to and copy that font to the Fonts folder, and delete the shortcut.
Do this for every shortcut you find in Fonts folder, and reboot the computer.
Problem
When generating a report on agents with many instances and parameters, PATROL
may experience an error and write the following message to the PATROL system
output window.
Solution
To solve this problem, you must tune your agent by editing the following agent
tuning variables:
/AgentSetup/AgentTuning/pslInstructionMax
/AgentSetup/AgentTuning/pslInstructionPeriod
Problem Page
How Do I Move PATROL Configuration Manager from UNIX to 296
Windows?
What Is the Purpose of the DELVAR Operation? 296
■ ./ini
■ ./patrol
■ ./rulesets
NOTE
Do not copy any binaries or ini files that contain path information because the format is
different between Windows and UNIX.
For example, you want to delete the agent configuration variable called
/AgentSetup/testvariable on the PATROL Agent using PATROL Configuration
Manager. From PATROL Configuration Manager, you edit the same agent
configuration variable and change the operation to DELVAR and click OK. Apply
that rule to the PATROL Agent and the agent configuration variable is delete from
the agent configuration file.
NOTE
Before performing the above method, ensure there is a backup copy of the agent configuration
variable.
Glossary
Note: In this glossary, the names of all Microsoft Windows products are referred to as Microsoft
Windows or simply Windows. No distinctions are made between Microsoft operating systems
such as Windows Servers, Windows 2000, and Windows NT.
A
access control list
A list that is set up by using a PATROL Agent configuration variable and that restricts PATROL
Console access to a PATROL Agent. A PATROL Console can be assigned access rights to
perform console, agent configuration, or event manager activities. The console server uses
access control lists to restrict access to objects in the COS namespace.
agent namespace
See PATROL Agent namespace.
Agent Query
A PATROL Console feature that constructs SQL-like statements for querying PATROL Agents
connected to the console. Agent Query produces a tabular report that contains information
about requested objects and can be used to perform object management activities, such as
disconnecting and reconnecting computers. Queries can be saved, reissued, added, or changed.
PATROL offers built-in queries in the Quick Query command on the Tools menu from the
PATROL Console main menu bar. See also Quick Query.
alarm
An indication that a parameter for an object has returned a value within the alarm range or that
application discovery has discovered that a file or process is missing since the last application
check. An alarm state for an object can be indicated by a flashing icon, depending on the
configuration of a console preference. See also warning.
alert
A PATROL object changing status. For example, Ok to Alarm. An alert condition is typically
caused by a parameter exceeding a threshold.
alert range
A range of values that serve as thresholds for a warning state or an alarm state. Alert range
values cannot fall outside of set border range values. See also border action, border range, and
recovery action.
Glossary 297
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ALL_COMPUTERS class
The highest-level computer class in PATROL. Attributes assigned to this class will be inherited
by all computer classes known to PATROL. See also class and computer class.
application account
An account that you define at KM setup and that you can change for an application class or
instance. An application account is commonly used to connect to an RDBMS on a server where
the database resides or to run SQL commands.
application class
The object class to which an application instance belongs; also, the representation of the class as
a container (UNIX) or folder (Windows) on the PATROL Console. You can use the developer
functionality of a PATROL Console to add or change application classes. See also class.
application discovery
A PATROL Agent procedure carried out at preset intervals on each monitored computer to
discover application instances. When an instance is discovered, an icon appears on the PATROL
interface. The application class includes rules for discovering processes and files by using
simple process and file matching or PSL commands. Application definition information is
checked against the information in the PATROL Agent process cache, which is periodically
updated. Each time the PATROL Agent process cache is refreshed, application discovery is
triggered. See also application check cycle, application discovery rules, PATROL Agent process
cache, prediscovery, PSL discovery, and simple discovery.
application filter
A feature used from the PATROL Console to hide all instances of selected application classes for
a particular computer. The PATROL Agent continues to monitor the application instances by
running parameter commands and recovery actions.
application instance
A system resource that is discovered by PATROL and that contains the information and
attributes of the application class that it belongs to. See also application class and instance.
application state
The condition of an application class or an application instance. The most common application
states are OK, warning, and alarm. An application class or instance icon can also show
additional conditions. See also computer state and parameter state.
attribute
A characteristic that is assigned to a PATROL object (computer class, computer instance,
application class, application instance, or parameter) and that you can use to monitor and
manage that object. Computers and applications can have attributes such as command type,
parameter, menu command, InfoBox command, PATROL setup command, state change action,
or environment variable. Parameters can have attributes such as scheduling, command type,
and thresholds.
An attribute can be defined globally for all instances of a class or locally for a particular
computer or application instance. An instance inherits attributes from a class; however, an
attribute defined at the instance level overrides inherited attributes. See also global level and
local level.
B
border action
A command or recovery action associated with a parameter border range and initiated when
that range has been breached. Border actions can be initiated immediately when the parameter
returns a value outside the border range, after a warning or alarm has occurred a specified
number of times, or after all other recovery actions have failed. See also border range.
border range
A range of values that serve as thresholds for a third-level alert condition when it is possible for
a parameter to return a value outside of the alarm range limits. When a border range is
breached, border actions can be initiated. See also border action.
built-in command
An internal command available from the PATROL Agent that monitors and manages functions
such as resetting the state of an object, refreshing parameters, and echoing text. The command is
identified by the naming convention %command_name. See also built-in macro variable.
Glossary 299
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
C
chart
A plot of parameter data values made by the PATROL Console Charting Server. See also multigraph
container and PATROL Console Charting Server.
charting server
See PATROL Console Charting Server.
class
The object classification in PATROL where global attributes can be defined; the attributes are
then inherited by instances of the class. An instance belongs to a computer class or an
application class. See also application class, computer class, and event class.
collector parameter
A type of parameter that contains instructions for gathering values for consumer parameters to
display. A collector parameter does not display any value, issue alarms, or launch recovery
actions. See also consumer parameter, parameter, and standard parameter.
command type
The designation assigned to a command according to its manner of execution. This attribute
must be defined for a parameter command, a parameter recovery action, a menu command, an
InfoBox command, a setup command, or a state change action. The PATROL Agent provides
two command types: operating system (OS) and PSL. PATROL KMs provide additional
command types. The developer functionality of a PATROL Console can be used to add or
change command types.
commit
The process of saving to PATROL Agent computers the changes that have been made to a KM
by using a PATROL Console. A PATROL user can disable a PATROL Console’s ability to
commit KM changes.
computer class
The basic object class to which computer instances of the same type belong. Examples include
Solaris, OSF1, HP, and RS6000. PATROL provides computer classes for all supported computers
and operating systems; a PATROL Console with developer functionality can add or change
computer classes.
computer instance
A computer that is running in an environment managed by PATROL and that is represented by
an icon on the PATROL interface. A computer instance contains the information and attributes
of the computer class that it belongs to. See also instance.
computer state
The condition of a computer. The main computer states are OK, warning, and alarm. A
computer icon can show additional conditions that include no output messages pending, output
messages pending, void because a connection cannot be established, and void because a
connection was previously established but now is broken. See also state.
configuration file, KM
See KM configuration file.
connection mode
The mode in which the PATROL Console is connected to the PATROL Agent. The mode can be
developer or operator and is a property of the Add Host dialog box (PATROL 3.x and earlier),
an Add Managed System wizard, or other connecting method. The connection mode is a global
(console-wide) property that can be overridden for a computer instance. See also PATROL
Console.
console module
A program that extends the functionality of PATROL Central or PATROL Web Central. Console
modules can collect data, subscribe to events, access Knowledge Module functions, authenticate
users, and perform security-related functions.
console server
A server through which PATROL Central and PATROL Web Central communicate with
managed systems. A console server handles requests, events, data, communications, views,
customizations, and security.
Glossary 301
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
consumer parameter
A type of parameter that displays a value that was gathered by a collector parameter. A
consumer parameter never issues commands and is not scheduled for execution; however, it
has alarm definitions and can run recovery actions. See also collector parameter, parameter, and
standard parameter.
container
A custom object that you can create to hold any other objects that you select—such as
computers, applications, and parameters—in a distributed environment. In Windows, a
container is referred to as a folder. You can drag and drop an object into and out of a container
icon. However, objects from one computer cannot be dropped inside another computer. Once a
container is defined, the object hierarchy applies at each level of the container. That is, a
container icon found within a container icon assumes the variable settings of the container in
which it is displayed. See also object hierarchy and PATROL Console Charting Server.
customize a KM
To modify properties or attributes locally or globally. See also global level and local level.
customize a parameter
See override a parameter.
custom view
A grid-like view that can be created in PATROL Central or PATROL Web Central to show user-
selected information.
D
deactivate a parameter
To stop running a parameter for selected computer or application instances. In PATROL
Consoles for Microsoft Windows environments, deactivating a parameter stops parameter
commands and recovery actions and deletes the parameter icon from the application instance
window without deleting the parameter definition in the KM tree. A deactivated parameter can
be reactivated at any time. See also snooze an alarm and suspend a parameter.
desktop file
In PATROL 3.x and earlier, a file that stores your desktop layout, the computers that you
monitor, the KMs that you loaded, and your PATROL Console user accounts for monitored
objects. You can create multiple desktop files for any number of PATROL Consoles. By default,
desktop files always have a .dt extension. Desktop files are replaced by management profiles in
PATROL 7.x. See also desktop template file.
Desktop tree
A feature of PATROL for Microsoft Windows only. One of the views of folders available with
PATROL for Microsoft Windows environments, the Desktop tree displays the object hierarchy.
See also KM tree.
developer mode
An operational mode of the PATROL Console that can be used to monitor and manage
computer instances and application instances and to customize, create, and delete locally loaded
Knowledge Modules and commit these changes to selected PATROL Agent computers. See also
PATROL Console.
discovery
See application discovery.
distribution CD or tape
A CD or tape that contains a copy of one or more BMC Software products and includes software
and documentation (user guides and online help systems).
E
environment variable
A variable used to specify settings, such as the program search path for the environment in
which PATROL runs. You can set environment variables for computer classes, computer
instances, application classes, application instances, and parameters.
event
The occurrence of a change, such as the appearance of a task icon, the launch of a recovery
action, the connection of a console to an agent, or a state change in a monitored object (computer
class, computer instance, application class, application instance, or parameter). Events are
captured by the PATROL Agent, stored in an event repository file, and forwarded to an event
manager (PEM) if an event manager is connected. The types of events forwarded by the agent
are governed by a persistent filter for each event manager connected to a PATROL Agent.
Glossary 303
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
event catalog
A collection of event classes associated with a particular application. PATROL provides a
Standard Event Catalog that contains predefined Standard Event Classes for all computer
classes and application classes. You can add, customize, and delete an application event catalog
only from a PATROL Console in the developer mode. See also event class and Standard Event
Catalog.
event class
A category of events that you can create according to how you want the events to be handled by
an event manager and what actions you want to be taken when the event occurs. Event classes
are stored in event catalogs and can be added, modified, or deleted only from a PATROL
Console in the developer mode. PATROL provides a number of event classes in the Standard
Event Catalog, such as worst application and registered application. See also event catalog and
Standard Event Catalog.
Event Diary
The part of an event manager (PEM) where you can store or change comments about any event
in the event log. You can enter commands at any time from the PATROL Event Manager Details
window.
event manager
A graphical user interface for monitoring and managing events. The event manager can be used
with or without the PATROL Console. See also PATROL Event Manager (PEM).
event type
The PATROL-provided category for an event according to a filtering mechanism in an event
manager. Event types include information, state change, error, warning, alarm, and response.
event-driven scheduling
A kind of scheduling that starts a parameter when certain conditions are met. See also periodic
scheduling.
expert advice
Comments about or instructions for dealing with PATROL events as reported by the agent.
Expert advice is defined in the Event Properties dialog box in a PATROL Console in the
developer mode. PATROL Consoles in an operator mode view expert advice in the PATROL
Event Manager.
F
filter, application
See application filter.
filter, persistent
See persistent filter.
G
global channel
A single dedicated connection through which PATROL monitors and manages a specific
program or operating system. The PATROL Agent maintains this connection to minimize the
consumption of program or operating system resources.
global level
In PATROL hierarchy, the level at which object properties and attributes are defined for all
instances of an object or class. An object at the local level inherits characteristics (properties) and
attributes from the global level. See also local level.
Glossary 305
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H
heartbeat
A periodic message sent between communicating objects to inform each object that the other is
still “alive.” For example, the PATROL Console checks to see whether the PATROL Agent is still
running.
heartbeat interval
The interval (in seconds) at which heartbeat messages are sent. The longer the interval, the
lower the network traffic. See also message retries, message time-out, and reconnect polling.
history
Parameter and event values that are collected and stored on each monitored computer.
Parameter values are stored in binary files for a specified period of time; events are stored in
circular log files until the maximum size is reached. The size and location of parameter history
files are specified through either the PATROL Console or the PATROL Agent; size and location
of event history files are specified through an event manager, such as the PEM, or the PATROL
Agent.
history repository
A binary file in which parameter values (except those that are displayed as text) are stored by
the PATROL Agent and accessed by the PATROL Console for a specified number of days (the
default is one day). When the number of storage days is reached, those values are removed in a
cyclical fashion.
history span
The combined settings for a parameter’s history retention level and history retention period. See
also history retention level and history retention period.
I
InfoBox
A dialog box that contains a static list of fields and displays current information about an object,
such as the version number of an RDBMS and whether the object is online or offline. Commands
are run when the InfoBox is opened. Information can be manually updated if the InfoBox
remains open for a period of time. PATROL provides a number of commands for obtaining and
displaying object information in an InfoBox. Only a PATROL Console in the developer mode
can be used to add or change commands.
information event
Any event that is not a state change or an error. Typical information events occur when a
parameter is activated or deactivated, a parameter is suspended or resumed, or application
discovery is run. The default setting for PATROL is to prevent this type of event from being
stored in the event repository. To store and display this type of event, you must modify the
persistent filter setting in the PATROL Agent configuration file.
instance
A computer or discovered application that is running in an environment managed by PATROL.
An instance has all the attributes of the class that it belongs to. A computer instance is a
monitored computer that has been added to the PATROL Console. An application instance is
discovered by PATROL. See also application discovery, application instance, and computer
instance.
K
KM
See Knowledge Module (KM).
KM configuration file
A file in which the characteristics of a KM are defined through KM menu commands during KM
installation and setup (if setup is required). See also Knowledge Module (KM) and PATROL
Agent configuration file.
KM list
A list of KMs used by a PATROL Agent or PATROL Console. See also Knowledge Module (KM).
KM Migrator
See PATROL KM Migrator. See also Knowledge Module (KM).
KM package
See Knowledge Module package.
Glossary 307
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
KM tree
A feature of PATROL for Microsoft Windows only. One of two views of folders available in
Windows. The KM tree displays computer classes, application classes, and their customized
instances in the knowledge hierarchy and also displays the Standard Event Catalog. A PATROL
Console in operator mode can only view the KM tree; only a PATROL Console in the developer
mode can change KM properties and attributes. See also Desktop tree and Knowledge Module
(KM).
knowledge hierarchy
The rules by which objects inherit or are assigned attributes. (In PATROL Consoles for
Microsoft Windows environments, classes of objects are represented in the Computer Classes
and Application Classes sets of folders on the KM tree.) Properties and attributes of a
customized instance override those defined for the class to which the instance belongs.
KMs provide information for the way monitored computers are represented in the PATROL
interface, for the discovery of application instances and the way they are represented, for
parameters that are run under those applications, and for the options available on object pop-up
menus. A PATROL Console in the developer mode can change KM knowledge for its current
session, save knowledge for all of its future sessions, and commit KM changes to specified
PATROL Agent computers. See also commit, KM configuration file, KM list, KM Migrator, KM
tree, load KMs, and version arbitration.
L
load applications
Same as load KMs. Most KMs are composed of application files with a .km extension.
load KMs
To place KM files into memory for execution. After configuration and during startup, the
PATROL Agent loads the KM files that are listed in its configuration file and that reside on the
PATROL Agent computer. When a PATROL Console connects to the PATROL Agent, the KM
versions that the agent executes depend on whether the console has developer or operator
functionality. See also Knowledge Module (KM) and version arbitration.
local history
The history (stored parameter values) for an object or instance. See also global level and local
level.
local level
In PATROL hierarchy, the level of a computer instance or an application instance. An object
(instance) at the local level inherits properties and attributes that are defined globally. When
properties and attributes are customized locally for an individual instance, they override
inherited attributes. See also global level.
M
managed object
Any object that PATROL manages. See object.
managed system
A system—usually a computer on which a PATROL Agent is running—that is added
(connected) to a PATROL Console to be monitored and managed by PATROL and that is
represented by an icon on the PATROL interface.
management profile
A user profile for PATROL Central and PATROL Web Central that is stored by the console
server. A management profile is similar to a session file and contains information about custom
views, your current view of the PATROL environment, information about systems that you are
currently managing, Knowledge Module information, and console layout information for
PATROL Central. Management profiles replace desktop files and session files that were used in
PATROL 3.x and earlier.
master agent
See PATROL SNMP Master Agent.
message retries
A feature of UDP only. The number of times that the PATROL Console will resend a message to
the PATROL Agent. The greater the number of message retries, the more time the PATROL
Console will give the PATROL Agent to respond before deciding that the agent connection is
down and timing out. The number of message retries multiplied by message time-out (in
seconds) is the approximate time allowed for a connection verification. See also heartbeat,
heartbeat interval, message time-out, and reconnect polling.
message time-out
A feature of UDP only. The time interval (in seconds) that the PATROL Console will give the
PATROL Agent to respond to a connection verification before deciding that the agent
connection is down. The number of message retries multiplied by message time-out is the
Glossary 309
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
approximate time allowed for a connection verification. See also heartbeat, heartbeat interval,
message retries, and reconnect polling.
message window
A window that displays command output and error messages from the PATROL Console
graphical user interface. See also response window, system output window, and task output
window.
multigraph container
A custom object into which you can drop parameter objects to be plotted as charts. See also
PATROL Console Charting Server.
N
notification
An action in response to a PATROL event. Notifications can include pages, emails, trouble
tickets, and pop-up windows.
O
object
A computer class, computer instance, application class, application instance, parameter, or
container (folder) in an environment managed by PATROL. Objects have properties and are
assigned attributes (command types, parameters, menu commands, InfoBox commands, setup
commands, state change actions, and environment variables). Parameter objects use data
collection commands to obtain values from classes and instances. See also object class, object
hierarchy, object icon, and object window.
object class
A computer class or application class. See also class, object, and object hierarchy.
object hierarchy
The structure of object levels in PATROL. On the PATROL interface, computers contain
application folders (containers) representing a loaded KM, application folders contain one or
more application instances, and application instances contain parameters.
object icon
A graphic that represents a computer instance, application class, application instance,
parameter, or container (folder) in an environment managed by PATROL. See also object, object
hierarchy, and object window.
object window
An open object container (folder) that may contain application class icons, application instance
icons, parameter icons, custom containers (folders), and shortcuts. The object window is
displayed when you double-click the object icon. See also application instance, computer instance,
object, and object icon.
operator mode
An operational mode of the PATROL Console that can be used to monitor and manage
computer instances and application instances but not to customize or create KMs, commands,
and parameters. See also PATROL Console.
override a parameter
To disable or change the behavior of a local PATROL application parameter. The changes to the
parameter are local to the managed system running the parameter and are stored in the agent
configuration database. You must be granted specific permissions by a PATROL Administrator
through the PATROL User Roles file in order to override parameters. Override a parameter is
replaced by customize a parameter in PATROL 7.x. See also PATROL roles.
P
parameter
The monitoring element of PATROL. Parameters are run by the PATROL Agent; they
periodically use data collection commands to obtain data on a system resource and then parse,
process, and store that data on the computer that is running the PATROL Agent. Parameters can
display data in various formats, such as numeric, text, stoplight, and Boolean. Parameter data
can be accessed from a PATROL Console, PATROLVIEW, or an SNMP console. Parameters
have thresholds and can trigger warnings and alarms. If the value returned by the parameter
triggers a warning or an alarm, the PATROL Agent notifies the PATROL Console and runs any
recovery actions associated with the parameter. See also parameter history repository and
parameter state.
parameter cache
The memory location where current parameter data is kept. In the PATROL Agent's
configuration file, you can set the size of the cache, the maximum number of data points that can
be stored, and the interval (in seconds) for emptying the cache.
parameter override
See override a parameter.
parameter state
The condition of a parameter. The most common parameter states are OK, warning, and alarm.
In PATROL 3.x and earlier, a parameter icon can show additional conditions that include no
history, offline, and suspended. In PATROL 7.x, the suspended state is shown in the label—for
Glossary 311
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
example, MyParam (suspended)—rather than in the icon. A parameter can also be deactivated;
when a parameter is deactivated, no icon is displayed. See also state.
PATROL Agent
The core component of PATROL architecture. The agent is used to monitor and manage host
computers and can communicate with the PATROL Console, a stand-alone event manager
(PEM), PATROLVIEW, and SNMP consoles. From the command line, the PATROL Agent is
configured by the pconfig utility; from a graphical user interface, it is configured by the
xpconfig utility for UNIX or the wpconfig utility for Windows. See also PATROL SNMP Master
Agent.
PATROL Console
The graphical user interface from which you launch commands and manage the environment
monitored by PATROL. The PATROL Console displays all of the monitored computer instances
and application instances as icons. It also interacts with the PATROL Agent and runs
commands and tasks on each monitored computer. The dialog is event-driven so that messages
reach the PATROL Console only when a specific event causes a state change on the monitored
computer.
A PATROL Console with developer functionality can monitor and manage computer instances,
application instances, and parameters; customize, create, and delete locally loaded Knowledge
Modules and commit these changes to selected PATROL Agent computers; add, modify, or
delete event classes and commands in the Standard Event Catalog; and define expert advice. A
PATROL Console with operator functionality can monitor and manage computer instances,
application instances, and parameters and can view expert advice but not customize or create
KMs, commands, and parameters. See also developer mode and operator mode.
Glossary 313
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
PATROLVIEW
Formerly PATROLVIEW or PATROLINK. Products that can be used to view events and to
monitor and display all the parameters provided by the PATROL Agents and KMs in a network
or enterprise management console.
PATROL KMDS
See PATROL Knowledge Module Deployment Server (PATROL KMDS).
PATROL KM Migrator
A PATROL utility used to propagate KM user customizations to newly released versions of
PATROL Knowledge Modules.
PATROL roles
In PATROL 3.x and earlier, a set of permissions that grant or remove the ability of a PATROL
Console or PATROL Agent to perform certain functions. PATROL roles are defined in the
PATROL User Roles file, which is read when the console starts.
patroldev
In PATROL 3.x and earlier, a domain group that can be set up by a Windows system
administrator to restrict user access to a PATROL Developer Console. When a user tries to start
a PATROL Console with developer functionality, PATROL checks whether the user is in the
patroldev group. If the user is not in the group, a PATROL Console with operator functionality
is started instead. See also ptrldev.
pconfig
The command line utility for setting PATROL Agent configuration variables. See also PATROL
Agent configuration file, PATROL Agent configuration variable, wpconfig, and xpconfig.
PEM
See PATROL Event Manager (PEM).
periodic scheduling
A kind of scheduling that starts a parameter at a certain time and reruns the parameter at certain
intervals. See also event-driven scheduling.
persistent filter
A filter maintained by the PATROL Agent for each PATROL Console or event manager that
connects to it. The filter is used to minimize network traffic by limiting the number and types of
events that are forwarded from a PATROL Agent to a PATROL Console or an event manager
(PEM).
polling cycle
The schedule on which a parameter starts running and the intervals at which it reruns; the cycle
is expressed in seconds. See also event-driven scheduling and periodic scheduling.
pop-up menu
The menu of commands for a monitored object; the menu is accessed by right-clicking the
object.
prediscovery
A quick one-time test written in PSL to determine whether a resource that you want to monitor
is installed or running on a monitored computer. If the results are affirmative, the PATROL
Agent runs the discovery script. Prediscovery helps reduce PATROL Agent processing
requirements.
preloaded KM
A KM that is loaded by the PATROL Agent at startup and run as long as the agent runs. See also
disable an application, disable a KM and static KM.
property
A characteristic or attribute of an object, such as its icon.
PSL
See PATROL Script Language (PSL).
PSL Compiler
A PATROL utility that compiles PSL scripts into a binary byte code that can be executed by the
PSL virtual machine. The PSL Compiler can also be used to check a PSL script for syntax errors.
Glossary 315
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The compiler is embedded in the PATROL Agent and PATROL Console (PATROL 3.x and
earlier) and can also be run as a command-line utility.
PSL Debugger
A PATROL Console utility that is used to debug PSL scripts. The PSL debugger is accessed
through a computer's pop-up menu.
PSL discovery
A type of application discovery in which the discovery rules are defined by using PSL. PSL
discovery can consist of prediscovery and discovery PSL scripts.
PSL Profiler
A PATROL utility that is used to tune the CPU usage and minimize child processes or file
operations of a newly created KM. When the PSL Profiler is enabled, the PATROL Agent starts
accumulating and recording profile statistics.
ptrldev
In PATROL 3.x and earlier, a form of patroldev that can be used in environments that support
domain names no larger than eight characters. See also patroldev.
Q
Quick Query
In PATROL 3.x and earlier, a command on the Tools menu from the PATROL Console main
menu bar that contains built-in predefined commands that you can use to query the agent for
frequently needed information. For example, you can query the agent regularly about all
computer instances, application instances, and parameters that are in a warning or alarm state.
See also Agent Query.
R
reconnect polling
The time interval (in seconds) at which the PATROL Console will try to reconnect to a PATROL
Agent that has dropped the previous connection. The longer the interval, the lower the network
traffic. See also heartbeat, heartbeat interval, message retries, message time-out.
recovery action
A procedure that attempts to fix a problem that caused a warning or alarm condition. A
recovery action is defined within a parameter by a user or by PATROL and triggered when the
returned parameter value falls within a defined alarm range.
refresh parameter
An action that forces the PATROL Agent to run one or more parameters immediately,
regardless of their polling cycle. Refreshing does not reset the polling cycle but gathers a new
data point between polling cycles. Refresh parameter is also called “update” in PATROL 7.x.
reporting filter
The filter used by the PATROL Agent when transmitting events to consoles (event cache) from
the event repository (located at the agent) for statistical reports.
response window
An input and output display for many KM menu commands that provides a customizable
layout of the information (for example, the sort method for outputting system process IDs). See
also system output window and task output window.
rule
An individual configuration item or variable.
RuleSet
A collection of rules or configuration items.
run queue
See PATROL Agent run queue.
S
self-polling parameter
A standard parameter that starts a process that runs indefinitely. The started process
periodically polls the resource that it is monitoring and emits a value that is captured by the
PATROL Agent and published as the parameter value. Self-polling avoids the overhead of
frequently starting external processes to collect a monitored value. A self-polling parameter
differs from most other parameters that run scripts for a short time and then terminate until the
next poll time.
session file
In PATROL 3.x and earlier, any of the files that are saved when changes are made and saved
during the current PATROL Console session. A session file includes the session-1.km file, which
contains changes to KMs loaded on your console, and the session-1.prefs file, which contains
user preferences. Session files are replaced by management profiles in PATROL 7.x.
setup command
A command that is initiated by the PATROL Console and run by the PATROL Agent when the
PATROL Console connects or reconnects to the agent. For example, a setup command can
initialize an application log file to prepare it for monitoring. PATROL provides some setup
commands for computer classes. Only a PATROL Console with developer functionality can add
or change setup commands.
Glossary 317
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
shortcut
An alias or copy of an object icon in the PATROL hierarchy.
simple discovery
A type of application discovery that uses simple pattern matching for identifying and
monitoring files and processes.
SNMP
See Simple Network Management Protocol (SNMP).
SNMP trap
A condition which, when satisfied, results in an SNMP agent issuing a trap message to other
SNMP agents and clients. Within the PATROL Agent, all events can be translated to SNMP
traps and forwarded to SNMP managers.
snooze an alarm
To temporarily suspend an alarm so that a parameter does not exhibit an alarm state. During the
user-set snooze period, the parameter continues to run commands and recovery actions, and the
parameter icon appears to be in an OK state. See also deactivate a parameter and suspend a
parameter.
standard parameter
A type of parameter that collects and displays data and can also execute commands. A standard
parameter is like a collector parameter and consumer parameter combined. See also collector
parameter, consumer parameter, and parameter.
startup command
See setup command.
state
The condition of an object (computer instance, application instance, or parameter) monitored by
PATROL. The most common states are OK, warning, and alarm. Object icons can show
additional conditions. See also application state, computer state, parameter state, and state
change action.
state Boolean
A parameter output style that represents the on or yes state of a monitored object as a check
mark and the off or no state as the letter x. Parameters with this output style can have alerts
(warning and alarm) and recovery actions. Numeric data output for the monitored object can be
displayed as a graph. See also stoplight.
static KM
A KM that is not loaded by the PATROL Agent before a PATROL Console with a loaded KM of
the same name connects to the agent. Once loaded by the agent, a static KM is never unloaded
but continues to run as long as the agent runs, even if all PATROL Consoles with a registered
interest disconnect from the PATROL Agent. If the PATROL Agent stops, static KMs will not be
reloaded. See also disable an application, disable a KM and preloaded KM.
stoplight
A parameter output style that displays OK, warning, and alarm states as green, yellow, and red
lights, respectively, on a traffic light. Parameters with this output style can have alerts (warning
and alarm) and recovery actions. Numeric data output for the monitored object can be
displayed as a graph. See also state Boolean.
suspend a parameter
To stop running a parameter for selected computers or application instances. Suspending a
parameter stops parameter commands and recovery actions but does not delete the parameter
icon from the application instance window and does not delete the parameter definition from
the KM tree in PATROL Consoles for Microsoft Windows environments. A suspended
parameter can be resumed at any time. You can suspend a parameter from its pop-up menu. See
also deactivate a parameter and snooze an alarm.
T
task
A command or group of commands that can execute on one object or several objects
simultaneously. A task runs in the background and is not part of the PATROL Agent run queue;
a task icon is displayed for each running task.
Glossary 319
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
threshold
A point or points that define a range of values, outside of which a parameter is considered to be
in a warning or alarm range.
U
unload a KM
To delete a KM from a PATROL Console session in order to stop monitoring the KM-defined
objects on all computers. The KM files are not deleted from the directories on the PATROL
Console or the PATROL Agent computers, and the PATROL Agent will continue to run the KM,
collect parameter data, and run recovery actions until no connected console has the KM loaded.
To prevent the PATROL Agent computer from collecting parameter data and running recovery
actions for a KM, disable the KM. If a KM has been flagged as static, then it will not be
unloaded. See also disable an application, disable a KM, preloaded KM, and static KM.
user preferences
The PATROL Console settings that designate the account that you want to use to connect to
monitored host computers, prevent a console with developer functionality from downloading
its version of a KM to a PATROL Agent upon connection, disable the commit process for a
console with developer functionality, determine certain window and icon display
characteristics, specify the event cache size, and indicate whether startup and shutdown
commands are enabled. A PATROL Console with either developer or operator functionality can
change user preferences.
V
version arbitration
In PATROL 3.x and earlier, the KM version comparison that PATROL makes when a PATROL
Console connects to a PATROL Agent. By default, KM versions from PATROL Consoles with
developer functionality are loaded rather than PATROL Agent KM versions, and PATROL
Agent KM versions are loaded rather than KM versions from PATROL Consoles with operator
functionality.
view filter
A filter that can be created in an event manager (PEM) and that screens events forwarded from
PATROL Agents. Views can be created, stored, and reapplied to host computers.
W
warning
An indication that a parameter has returned a value that falls within the warning range. See also
alarm.
wpconfig
A feature of PATROL for Microsoft Windows only. The graphical user interface utility for setting
PATROL Agent configuration variables. The wpconfig utility can be accessed from a computer
pop-up menu on a computer running a PATROL Agent or a computer running a PATROL
Console with developer functionality. See also PATROL Agent configuration file and PATROL
Agent configuration variable.
X
xpconfig
A feature of PATROL for UNIX only. The graphical user interface utility for setting PATROL
Agent configuration variables. You can access the xpconfig utility from an xterm session
command line on a computer running a PATROL Agent or from a pop-up menu or an xterm
session command line on a PATROL Console with developer functionality. See also PATROL
Agent configuration file and PATROL Agent configuration variable.
Glossary 321
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Symbols
/AgentSetup/pconfigRequiresAuthentication 59
/AS/EVENTSPRING/PARAM_SETTINGS/STATUSFLA
GS/paramSettingsStatusFlag 190
323
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
325
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H
help_dir 276
hostname 229
L
LinkedRuleSet
precedence 149
I scope 149
LinkedRuleSets 148
image files activate 151
definition 43 assign 156
format 43 deactivate 151
location of 43 finding associations with agents 161
naming convention 43 storage 149
path 43 listening port 229
images_dir 43, 276 Load 243
import load
PATROL Console configuration file 256 AS_CHANGESPRING 243
RuleSet into PATROL Configuration Manager 186 local 140
InfoBoxes 244 local notification 226
ini file local_dir 49, 276
backup 33 localization file
default 33 definition 49
ini files format 49
convert PATROL Console Desktop settings to 257 naming convention 49
ini_dir 36, 276 path 49
init 206 localized rules
initialization file reporting, default 58
backup 33 localized RuleSet files
default 33 location of 49
327
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
329
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Q agent 86
restore
queue file configuration 147
definition 42 retrieve
format 42 parameter settings to save as RuleSets 184
naming convention 42 reword 229
path 42 notification message 226
queue files RT server
location of 42 discovery method 76
queue_dir 42, 279 locator string 77
rt_servers 279
rule
R benefits 115
copy 128
recover action create 126
define command 213 definition 16, 114
recovery action 216 delete 133
define type 211 duplicate 128
enable 210 edit 129
scope of command and types 211 locate in PATROL Configuration Manager 133
recovery actions 203 notification, stored as pconfig variables 189
register order of operation 115
agent 74 precedence over KM values 190
multiple agents using PATROL ping 78 protect using local RuleSets 137
multiple agents using RT Server 76 search for in PATROL Configuration Manager 134
reinitialize Rule Alias
agent 86 add missing 167
reload defining 164
agent configuration 87 definition 114
remote notification 226 missing 166
remove predefined 164
agent See delete, agent storage 164
group See delete, group view missing 166
PATROL object 198 rules 131
report rules and RuleSets 20
authentication 102 rules repository 19, 20
define 104
format 101
generate 104
limitations 101
memory usage 102
permissions 103
printing 104
save to file 108
source of information 100
view online 107
report_local_overwrite 279
reporting localized rules
setting default 58
reports_dir 279
requirement
PATROL KM for Event Management 19
requirements
AS_CHANGESPRING 242
resend 203, 205
alert 203
restart
331
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
U
update
PATROL license 93
PATROL object list 191, 251
user credentials 91
user interface 19
username
remove from Secure KeyStore 93
store in Secure KeyStore 92
utility
security 91, 92
utils_dir 281
V
values 127
variable
configuration, definition 17
name format 127
paramSettingStatusFlag 190
This product includes the Apache software product found at (http://www.apache.org/), and the Apache software product is distributed to us pursuant to
the following terms and conditions:
Copyright (c) 1999 – 2003 The Apache Software Foundation. All rights reserved.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
3. The end-user documentation included with the redistribution if any, must include the following acknowledgement: "This product includes software
developed by the Apache Software Foundation (http://www.apache.org/)." Alternately, this acknowlegement may appear in the software itself, if and
wherever such third-party acknowlegements normally appear.
4. The names "Xerces", and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written
permission. For written permission, please contact apache@apache.org.
5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name without prior written permission of the Apache
Group.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE
SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Copyright (c) 2000-2004 The Apache Software Foundation. All rights reserved.
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity.
For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract
or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and
configuration files.
"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object
code, generated documentation, and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is
included in or attached to the work (an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial
revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative
Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or
Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity
authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written
communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding
communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently
incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-
exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and
distribute the Work and such Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive,
no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer
the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone
or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity
(including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory
patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in
Source or Object form, provided that You meet the following conditions:
(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the
Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the
attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the
following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the
Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the
NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You
distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as
modifying the License.
You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use,
reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the
Work otherwise complies with the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the
Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall
supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as
required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its
Contributions) on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE,
NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the
appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable
law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect,
special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not
limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such
Contributor has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for,
acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations,
You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and
hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or
additional liability.
Definitions
"Package" refers to the collection of files distributed by the Copyright Holder, and derivatives of that collection of files created through textual modification.
"Standard Version" refers to such a Package if it has not been modified, or has been modified in accordance with the wishes of the Copyright Holder as
specified below.
"Copyright Holder" is whoever is named in the copyright or copyrights for the package.
"Reasonable copying fee" is whatever you can justify on the basis of media cost, duplication charges, time of people involved, and so on. (You will not be
required to justify it to the Copyright Holder, but only to the computing community at large as a market that must bear the fee.)
"Freely Available" means that no fee is charged for the item itself, though there may be fees involved in handling the item. It also means that recipients of the
item may redistribute it under the same conditions they received it.
1. You may make and give away verbatim copies of the source form of the Standard Version of this Package without restriction, provided that you duplicate
all of the original copyright notices and associated disclaimers.
2. You may apply bug fixes, portability fixes and other modifications derived from the Public Domain or from the Copyright Holder. A Package modified in
such a way shall still be considered the Standard Version.
3. You may otherwise modify your copy of this Package in any way, provided that you insert a prominent notice in each changed file stating how and when
you changed that file, and provided that you do at least ONE of the following:
a. place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an
equivalent medium, or placing the modifications on a major archive site such as uunet.uu.net, or by allowing the Copyright Holder to include your
modifications in the Standard Version of the Package.
c. rename any non-standard executables so the names do not conflict with standard executables, which must also be provided, and provide a separate
manual page for each non-standard executable that clearly documents how it differs from the Standard Version.
4. You may distribute the programs of this Package in object code or executable form, provided that you do at least ONE of the following:
a. distribute a Standard Version of the executables and library files, together with instructions (in the manual page or equivalent) on where to get the
Standard Version.
b. accompany the distribution with the machine-readable source of the Package with your modifications.
c. give non-standard executables non-standard names, and clearly document the differences in manual pages (or equivalent), together with instructions
on where to get the Standard Version.
5. You may charge a reasonable copying fee for any distribution of this Package. You may charge any fee you choose for support of this Package. You may not
charge a fee for this Package itself. However, you may distribute this Package in aggregate with other (possibly commercial) programs as part of a larger
(possibly commercial) software distribution provided that you do not advertise this Package as a product of your own. You may embed this Package's
interpreter within an executable of yours (by linking); this shall be construed as a mere form of aggregation, provided that the complete Standard Version of
the interpreter is so embedded.
6. The scripts and library files supplied as input to or produced as output from the programs of this Package do not automatically fall under the copyright of
this Package, but belong to whomever generated them, and may be sold commercially, and may be aggregated with this Package. If such scripts or library files
are aggregated with this Package via the so-called "undump" or "unexec" methods of producing a binary executable image, then distribution of such an image
shall neither be construed as a distribution of this Package nor shall it fall under the restrictions of Paragraphs 3 and 4, provided that you do not represent
such an executable image as a Standard Version of this Package.
7. C subroutines (or comparably compiled subroutines in other languages) supplied by you and linked into this Package in order to emulate subroutines and
variables of the language defined by this Package shall not be considered part of this Package, but are the equivalent of input as in Paragraph 6, provided
these subroutines do not change the language in any way that would cause it to fail the regression tests for the language.
8. Aggregation of this Package with a commercial distribution is always permitted provided that the use of this Package is embedded; that is, when no overt
attempt is made to make this Package's interfaces visible to the end user of the commercial distribution. Such use shall not be construed as a distribution of
this Package.
9. The name of the Copyright Holder may not be used to endorse or promote products derived from this software without specific prior written permission.
10. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE
IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Bzip2 License
Copyright (C) 1996-2002 Julian R Seward. All rights reserved.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an
acknowledgment in the product documentation would be appreciated but is not required.
3. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Sun Microsystems, Inc. Binary Code License Agreement
1. LICENSE TO USE. Sun grants you a non-exclusive and non-transferable license for the internal use only of the accompanying software and documentation
and any error corrections provided by Sun (collectively "Software"), by the number of users and the class of computer hardware for which the corresponding
fee has been paid.
2. RESTRICTIONS. Software is confidential and copyrighted. Title to Software and all associated intellectual property rights is retained by Sun and/or its
licensors. Except as specifically authorized in any Supplemental License Terms, you may not make copies of Software, other than a single copy of Software for
archival purposes. Unless enforcement is prohibited by applicable law, you may not modify, decompile, or reverse engineer Software. Licensee
acknowledges that Licensed Software is not designed or intended for use in the design, construction, operation or maintenance of any nuclear facility. Sun
Microsystems, Inc. disclaims any express or implied warranty of fitness for such uses. No right, title or interest in or to any trademark, service mark, logo or
trade name of Sun or its licensors is granted under this Agreement.
3. LIMITED WARRANTY. Sun warrants to you that for a period of ninety (90) days from the date of purchase, as evidenced by a copy of the receipt, the
media on which Software is furnished (if any) will be free of defects in materials and workmanship under normal use. Except for the foregoing, Software is
provided "AS IS". Your exclusive remedy and Sun's entire liability under this limited warranty will be at Sun's option to replace Software media or refund the
fee paid for Software.
4. DISCLAIMER OF WARRANTY. UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-
INFRINGEMENT ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT THESE DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
5. LIMITATION OF LIABILITY. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY
LOST REVENUE, PROFIT OR DATA, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED
REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE SOFTWARE, EVEN IF SUN
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no event will Sun's liability to you, whether in contract, tort (including negligence), or
otherwise, exceed the amount paid by you for Software under this Agreement. The foregoing limitations will apply even if the above stated warranty fails of
its essential purpose.
6. Termination. This Agreement is effective until terminated. You may terminate this Agreement at any time by destroying all copies of Software. This
Agreement will terminate immediately without notice from Sun if you fail to comply with any provision of this Agreement. Upon Termination, you must
destroy all copies of Software.
7. Export Regulations. All Software and technical data delivered under this Agreement are subject to US export control laws and may be subject to export or
import regulations in other countries. You agree to comply strictly with all such laws and regulations and acknowledge that you have the responsibility to
obtain such licenses to export, re-export, or import as may be required after delivery to you.
8. U.S. Government Restricted Rights. If Software is being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or
subcontractor (at any tier), then the Government's rights in Software and accompanying documentation will be only as set forth in this Agreement; this is in
accordance with 48 CFR 227.7201 through 227.7202-4 (for Department of Defense (DOD) acquisitions) and with 48 CFR 2.101 and 12.212 (for non-DOD
acquisitions).
9. Governing Law. Any action related to this Agreement will be governed by California law and controlling U.S. federal law. No choice of law rules of any
jurisdiction will apply.
10. Severability. If any provision of this Agreement is held to be unenforceable, this Agreement will remain in effect with the provision omitted, unless
omission would frustrate the intent of the parties, in which case this Agreement will immediately terminate.
11. Integration. This Agreement is the entire agreement between you and Sun relating to its subject matter. It supersedes all prior or contemporaneous oral
or written communications, proposals, representations and warranties and prevails over any conflicting or additional terms of any quote, order,
acknowledgment, or other communication between the parties relating to its subject matter during the term of this Agreement. No modification of this
Agreement will be binding, unless in writing and signed by an authorized representative of each party.
These supplemental license terms ("Supplemental Terms") add to or modify the terms of the Binary Code License Agreement (collectively, the "Agreement").
Capitalized terms not defined in these Supplemental Terms shall have the same meanings ascribed to them in the Agreement. These Supplemental Terms
shall supersede any inconsistent or conflicting terms in the Agreement, or in any license contained within the Software.
Subject to the terms and conditions of this Agreement, including, but not limited to Section 3 (Java(TM) Technology Restrictions) of these Supplemental
Terms, Sun grants you a non-exclusive, non-transferable, limited license to reproduce internally and use internally the binary form of the Software, complete
and unmodified, for the sole purpose of designing, developing and testing your Java applets and applications ("Programs").
2. License to Distribute Software. In addition to the license granted in Section 1 (Software Internal Use and Development License Grant) of these
Supplemental Terms, subject to the terms and conditions of this Agreement, including but not limited to Section 3 (Java Technology Restrictions), Sun grants
you a non-exclusive, non-transferable, limited license to reproduce and distribute the Software in binary form only, provided that you (i) distribute the
Software complete and unmodified and only bundled as part of your Programs, (ii) do not distribute additional software intended to replace any
component(s) of the Software, (iii) do not remove or alter any proprietary legends or notices contained in the Software, (iv) only distribute the Software subject
to a license agreement that protects Sun's interests consistent with the terms contained in this Agreement, and (v) agree to defend and indemnify Sun and its
licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses
3. Java Technology Restrictions. You may not modify the Java Platform Interface ("JPI", identified as classes contained within the "java" package or any
subpackages of the "java" package), by creating additional classes within the JPI or otherwise causing the addition to or modification of the classes in the JPI.
In the event that you create an additional class and associated API(s) which (i) extends the functionality of the Java Platform, and (ii) is exposed to third party
software developers for the purpose of developing additional software which invokes such additional API, you must promptly publish broadly an accurate
specification for such API for free use by all developers. You may not create, or authorize your licensees to create additional classes, interfaces, or subpackages
that are in any way identified as "java", "javax", "sun" or similar convention as specified by Sun in any naming convention designation.
4. Trademarks and Logos. You acknowledge and agree as between you and Sun that Sun owns the SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET
trademarks and all SUN, SOLARIS, JAVA, JINI, FORTE, and iPLANET-related trademarks, service marks, logos and other brand designations ("Sun Marks"),
and you agree to comply with the Sun Trademark and Logo Usage Requirements currently located at http://www.sun.com/policies/trademarks. Any use
you make of the Sun Marks inures to Sun's benefit.
5. Source Code. Software may contain source code that is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may
not be redistributed unless expressly provided for in this Agreement.
6. Termination for Infringement. Either party may terminate this Agreement immediately should any Software become, or in either party's opinion be likely
to become, the subject of a claim of infringement of any intellectual property right.
Notes
*65068*
*65068*
*65068*
*65068*
*65068*