System Event Analyzer User Guide
System Event Analyzer User Guide
To access the latest revision of this document containing updated information, please
visit the WEBES Web site:
http://www.hp.com/services/webes
Hewlett-Packard Company
Technical Publications
305 Rockrimmon Boulevard South
Colorado Springs, Colorado 80919 • U.S.A.
Copyright Statement
December 2005
Microsoft, Windows, and Windows NT are US registered trademarks of Microsoft Corporation. Intel is a
US registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Java is
a US trademark of Sun Microsystems, Inc.
Confidential computer software. Valid license from Hewlett-Packard required for possession, use or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor’s standard commercial license.
Hewlett-Packard shall not be liable for technical or editorial errors or omissions contained herein. The
information is provided “as is” without warranty of any kind and is subject to change without notice. The
warranties for Hewlett-Packard products are set forth in the express limited warranty statements
accompanying such products. Nothing herein should be construed as constituting an additional warranty.
This service tool software is the property of, and contains confidential technology of Hewlett-Packard
Company or its affiliates. Possession and use of this software is authorized only pursuant to the
Proprietary Service Tool Software License contained in the software or documentation accompanying
this software.
Hewlett-Packard service tool software, including associated documentation, is the property of and
contains confidential technology of Hewlett-Packard Company or its affiliates. Service customer is
hereby licensed to use the software only for activities directly relating to the delivery of, and only during
the term of, the applicable services delivered by Hewlett-Packard or its authorized service provider.
Customer may not modify or reverse engineer, remove or transfer the software or make the software or
any resultant diagnosis or system management data available to other parties without Hewlett-Packard’s
or its authorized service provider’s consent. Upon termination of the services, customer will, at
Hewlett-Packard’s or its service provider’s option, destroy or return the software and associated
documentation in its possession.
Examples used throughout this document are fictitious. Any resemblance to actual companies, persons, or
events is purely coincidental.
Change Summary
Revision Description
Title Page i
Copyright Statement ii
List of Tables xv
1 Introduction 1–1
9 Configuration 9–1
B Performance B–1
Glossary
SEA provides background automatic analysis by monitoring the active binary error log and
processing events as they occur. The events in the binary error log file are checked against the
analysis rules, and if one or more of the events in the binary error log file meets the conditions
specified in the rules, the analysis engine collects the error data and creates a problem report
containing a description of the problem and any corrective actions required. Once the problem
report is created, it is distributed in accordance with the customer’s notification preferences.
SEA supplies a web-based user interface that connects to a continuously running process
called the Director, and can perform a variety of tasks from a remotely connected web
browser. In addition, a set of command line interface (CLI) tools enable diagnosis of binary
event logs without connecting to the Director.
1.2 WEBES
HP has implemented a common application programming interface (API) for many of its
service tools called Web-Based Enterprise Services (WEBES). The tools included in the
current WEBES release are:
SEA uses the common components of WEBES and adds its own functionality. The other
WEBES service tools can be installed along with SEA and use the same common components.
• 32-bit Intel® based systems manufactured by HP, such as the ProLiant or the HP
OpenView Storage Management Appliance
Note that WEBES usually will operate on any industry standard, 32-bit Intel-based
system. However, because HP does not qualify WEBES on third-party products,
functionality on such systems is provided on an as-is basis only.
Note that WEBES may operate on other non-HP Itanium-based systems. However,
because HP does not qualify WEBES on third-party products, functionality on such
systems is provided on an as-is basis only.
• HP AlphaServer systems
• HP 9000 series systems
See the next section "Operating Systems Requirements" for the operating systems that
WEBES can be installed upon. Although WEBES can be installed on any of these hardware
and operating system combinations, SEA only supports event bit-to-text translation and event
analysis on a certain set of HP products.
See Section 1.5 “Supported Products” for the list of products that SEA supports.
Note
WEBES v4.4.3 will install and function on OpenVMS Alpha v7.3-1 and above. The
next version of WEBES will only install and function on v7.3-2 and above.
You can install and run SEA on HP-UX and Linux, but currently it does not analyze
native error logs for events occurring on those platforms.
You can, however, copy an error log from another system (Windows, Tru64 UNIX, or
OpenVMS) to an HP-UX or Linux system for manual analysis there.
HP maintains a schedule of support for the Tru64 UNIX, HP-UX, and OpenVMS operating
systems at the following URL. HP does not commit to supporting WEBES when installed on
an operating system version that has exceeded its end-of-support date.
http://www.hp.com/hps/os/os_pvs_amap.html
See the previous section "Hardware Requirements" for the types of hardware that WEBES can
be installed upon. Although WEBES can be installed on any of these hardware and operating
system combinations, SEA only supports event bit-to-text translation and event analysis on a
certain set of HP product.
See Section 1.5 “Supported Products” for the list of products that SEA supports.
This list also is available in the WEBES Release Notes. In the event of any discrepancy
between this list and the WEBES Release Notes, the release notes take precedence.
Note
Do not confuse the supported products with the systems where WEBES can be
installed as explained in the Chapter1 “Introduction”.
See Also
Bold Used for entries, commands, and GUI tasks where information is
typed at the keyboard as it appears in the document
Italics Used for information that will vary depending on your system and
user profile
Fixed-width Used to recreate the input and output of a terminal session such as
font when using the CLI
CAPITALIZATION Used for special keyboard characters such as the CTRL key
1.6.3 Nomenclature
There are certain terms that are applied somewhat interchangeably throughout WEBES, so
you need to become aware of some subtle differences in meaning.
“Configuration”
“Log file”
• The system includes an error or event log file containing binary events written by the
system event logger, such as /var/adm/binary.errlog, written by the binlogd daemon on
Tru64 UNIX and translated and analyzed by SEA.
“Supported”
• WEBES can be installed and run on certain operating systems, and is often said to
“support” the operating systems even when SEA may not analyze events on those
operating systems. See Section 1.4.
• For informational and troubleshooting purposes, the release notes may specify the exact
platforms used for WEBES testing. In spite of that, you always can install and run SEA
on supported hardware and operating systems even when a particular one was not
formally included in the test environment.
• There is a defined list of supported products that SEA can analyze, regardless of where
SEA may be installed. See Section 1.5.
Kits, updates, and documentation for WEBES are available at the following URL:
http://www.hp.com/services/webes
2
Getting Started
This chapter describes the permissions, processes, and log files used by SEA. Some key
features of SEA are briefly described, and pointers to detailed information are provided.
2.1 Installation
Always install SEA as part of the process of installing the WEBES suite of tools, even if SEA
is the only tool that you choose to install at the time. There is no standalone kit for installing
only SEA, and SEA depends on WEBES common components for proper operation.
See the WEBES Installation Guide for complete installation requirements and instructions.
• Running any WEBES or SEA commands (desta, wccproxy, or wsea commands from the
command prompt).
• Viewing the WEBES directory tree on a system.
Only the root user can perform these actions. The /usr/opt/hp/svctools directory is owned by
root, and has rwx (read, write, and execute) permissions for root (owner), and no permissions
for any other user (group or world).
• Running any WEBES or SEA commands (desta, wccproxy, or wsea commands from the
command prompt).
• Viewing the WEBES directory tree on a system.
Only the root user can perform these actions. The /opt/hp/svctools directory is owned by root,
and has rwx (read, write, and execute) permissions for root (owner), and no permissions for
any other user (group or world).
• Running any WEBES or SEA commands (desta, wccproxy, or wsea commands from the
command prompt).
• Viewing the WEBES directory tree on a system.
Only the root user can perform these actions. The /usr/opt/hp/svctools directory is owned by
root, and has rwx (read, write, and execute) permissions for root (owner), and no permissions
for any other user (group or world).
Files—File access is restricted in the WEBES installed directory tree pointed to by the
SVCTOOLS_HOME logical (SYS$COMMON:[HP] by default). To view these files, you
must be a member of the System group, your user ID must have all privileges, or you must
issue the SET PROCESS /PRIV=ALL command.
All directories and files in the SVCTOOLS_HOME tree are owned by the System user, and
have System, Owner, and Group permissions of RWED (read, write, execute, and delete).
There are no permissions for World.
To perform restricted actions, your user ID must be at least one of the following:
For example, if your user ID is a member of the Domain Admin group, and you add
Domain Admins to the Administrators group on the local system, you will have the
necessary permissions. See your Windows documentation if you need help with
configuring groups.
2.3 Processes
There are WEBES processes that must run all the time and are essential to SEA operation: the
Director and the WCCProxy.
The Director automatically starts along with the system and normally does not require
additional user interaction. Some operations may require that you stop and restart it, however
(see Sections 3.8 and 3.7).
The WCCProxy also is packaged with the ISEE Client kit and is necessary for proper sending
of notifications through ISEE.
The WCCProxy automatically starts along with the system and normally does not require
additional user interaction. See Chapter 4 for more information about the WCCProxy.
desta status
Code Description
9 The Director’s status file indicates it is running, but the process ID was not
found, so the Director process in fact is not running and has terminated
abnormally.
WCCProxy—Monitor the WCCProxy using the following command (see Table 2–2):
wccproxy status
Code 1 Description
1. In WEBES 4.3.2, the values apply only to Windows. The values will be changed in a future release
to values more like the desta status values shown in Table 2–1.
On all UNIX platforms, the return code is always zero. This will be corrected in a future release.
On OpenVMS, the return code is always %X10010001 (hexadecimal). This will be corrected in a future
release.
In UNIX variants and Windows, some WEBES processes are listed under the “Java” name. Be
aware, however, that other applications also might use the Java name. Be careful to make sure
that the processes you are monitoring really are WEBES processes, as shown in the following
examples.
Some WEBES processes are Java-based, using the Java runtime environment (JRE) bundled
with WEBES. These WEBES processes run under the java executable. Other processes are
C++ based and run under their own image name. The processes currently running can be
displayed with the command:
This searches for the path containing all WEBES executable image names, including the
“java” image in the JRE embedded in WEBES.
In this example:
• Process 146989 is the WCCProxy process, a C++ based launcher for WEBES processes,
that communicates to the main Director process.
• Process 147095 is the main Java-based Director process, started with the
DESTAController Java class.
• Process 147114 is a subprocess of the Director (subprocesses start with the
DESTAProcessWrapper Java class), which only runs when needed.
• Process 147145 is a CAAgents process, a SEA C++-based process launched by
WCCProxy to read the native binary event log and send events to the main Director
process. There may be more than one CAAgents process running at a time, or none.
• Process 147148 is a WCCAgents process, a C++-based process launched by WCCProxy
to send notifications. There may be more than one WCCAgents process running at a time,
or none.
• Process 147172, its child process 147180, and its child process 147207 are all running a
CLI command issued by the “jones” user, analyzing an example event log.
2.4.2.2 OpenVMS
Use the following command to show the processes running on an OpenVMS system:
$ show system
In the above example, the DESTA Director parent process is shown. That process also has
spawned a subprocess named SMITH_2, which only runs when needed, so named because the
user SMITH started the Director, but the relation is not apparent from the output. Other
WEBES processes, such as SEA CLI commands, appear named after the user that started
them, such as JONES_1 and its subprocess JONES_2 in this example, although it is not
apparent that they are WEBES processes. The WCCProxy process is a C++ based launcher for
WEBES processes that communicates to the main Director process. The CA.A.nn.nnnn and
WCC.A.nn.nnnn processes are C++ based processes launched by WCCProxy to send
notifications, read the native binary event log, and send events to the main Director process.
There may be more than one CA.A.nn.nnnn or WCC.A.nn.nnnn process running at a time, or
none.
2.4.2.3 Windows
On Windows, press CTRL+ALT+DEL, open the Task Manager, and click the Processes tab to
view running processes. WEBES Director processes consist of the following image names:
The main parent Java-based Director process is the DESTAService process, which runs as a
Windows service. It spawns a subprocess when needed, which runs under the process name
java.exe. The WCCProxy process is a launcher for C++ based WEBES processes that
communicates to the main Director process. The CAAgents.exe and WCCAgents.exe
processes are C++ based processes launched by WCCProxy to send notifications, read the
native binary event log, and send events to the main Director process. There may be more than
one CAAgent or WCCAgent process running at any time, or none.
All CLI commands run under the process name java.exe. However, not all java.exe processes
are guaranteed to be WEBES processes. Java-based applications other than WEBES also may
appear as java.exe.
You may be able to distinguish the Director set of processes from other WEBES and
non-WEBES Java processes by looking at the base priority of the java.exe processes. The
Director processes always run at low priority, while all other WEBES processes run at normal
priority. However, other Java processes, not associated with WEBES, also may run at low
priority.
If the Base Priority column is not shown in the Task Manager list:
If SEA is not responding as expected, check the log files for messages that may help you
restart or recover. You also can copy the files to new filenames so that they are not overwritten,
and you can send files to your service provider for review.
For commonly-encountered log messages, see Appendix D or the WEBES Release Notes. The
format of each message is the same for all platforms; however, the file locations differ
depending on operating system.
/usr/opt/hp/svctools/specific/webes/logs/desta_dir.log
WEBES and the WEBES installer write additional log files containing information that might
be useful to WEBES product support personnel when diagnosing a problem with WEBES or
any of its component tools. These log files are stored in the following directories:
/usr/opt/hp/svctools/specific/ca/logs
/usr/opt/hp/svctools/specific/wccproxy/logs
/usr/opt/hp/svctools/specific/webes/logs
2.5.2 HP-UX
The Director and web interface log standard output and error messages to:
/opt/hp/svctools/specific/webes/logs/desta_dir.log
WEBES and the WEBES installer write additional log files containing information that might
be useful to WEBES product support personnel when diagnosing a problem with WEBES or
any of its component tools. These log files are stored in the following directories:
/opt/hp/svctools/specific/ca/logs
/opt/hp/svctools/specific/wccproxy/logs
/opt/hp/svctools/specific/webes/logs
2.5.3 Linux
The Director and web interface log standard output and error messages to:
/usr/opt/hp/svctools/specific/webes/logs/desta_dir.log
WEBES and the WEBES installer write additional log files containing information that might
be useful to WEBES product support personnel when diagnosing a problem with WEBES or
any of its component tools. These log files are stored in the following directories:
/usr/opt/hp/svctools/specific/ca/logs
/usr/opt/hp/svctools/specific/wccproxy/logs
/usr/opt/hp/svctools/specific/webes/logs
2.5.4 OpenVMS
The Director and web interface log standard output and error messages to:
SVCTOOLS_HOME:[SPECIFIC.WEBES.LOGS]DESTA_DIR.LOG
The Director creates a new log file each time it is started. The previous log file is saved as:
DESTA_DIR.LOG;n
WEBES and the WEBES installer write additional log files containing information that might
be useful to WEBES product support personnel when diagnosing a problem with WEBES or
any of its component tools. These log files are stored in the following directories:
SVCTOOLS_HOME:[SPECIFIC.CA.LOGS]
SVCTOOLS_HOME:[SPECIFIC.WCCPROXY.LOGS]
SVCTOOLS_HOME:[SPECIFIC.WEBES.LOGS]
2.5.5 Windows
These locations assume that SEA was installed to the default directory; if this is not the case,
the path will match the chosen install directory.
The Director and web interface log standard output messages to:
C:\Program Files\hp\svctools\specific\webes\logs\director_out.txt
C:\Program Files\hp\svctools\specific\webes\logs\director_err.txt
The Director creates new log files each time it is started. The previous log files are renamed to
director_err.txt.bck and director_out.txt.bck, overwriting any previous versions of those files.
WEBES and the WEBES installer write additional log files containing information that might
be useful to WEBES product support personnel when diagnosing a problem with WEBES or
any of its component tools. These log files are stored in the following directories:
C:\Program Files\hp\svctools\specific\ca\logs
C:\Program Files\hp\svctools\specific\desta\logs
C:\Program Files\hp\svctools\specific\wccproxy\logs
C:\Program Files\hp\svctools\specific\webes\logs
Although SEA continues to function without a valid service obligation, local notification and
reporting are disabled. In addition, the web interface does not operate if the service obligation
has expired.
Sections 3.12 and 6.12 explain how to view your service obligation.
Note that SEA may not be the managing the software of the device or system. Other software
may manage it or it may be managed by SEA in conjunction with the other software. SEA’s
role may be limited to monitoring or processing data, while the other software performs other
management tasks.
In the future, SEA may be able to monitor and process other types of managed entities besides
storage cells.
As of the current release, SEA only supports EVA Storage Cells on Windows 2000, Windows
XP, and Windows 2003 on the Intel Pentium platform. SEA is intended to support managed
entities on other operating systems and platforms in the future.
SEA can monitor and process events logged by the EVAs to the system’s binary event log via
CommandView EVA. SEA displays the information in the web interface by automatically
analyzing events from such entities and by sending notifications when appropriate, much like
the functioning of SEA with a node’s binary events. SEA can gather configuration information
about the EVAs from the CommandView. With the configuration data supplied by the user,
SEA can fill in the appropriate information to be sent in problem report notification.
The CommandView EVA software must be installed for SEA to process EVA events.
Note
WEBES v4.4 and later requires CommandView EVA (CV EVA) v3.2 to be installed
on systems that manage HP StorageWorks Enterprise Virtual Arrays (EVAs). In
addition, WEBES v4.4.3 now supports the gathering of status and error data from the
fiber ports associated with EVA storage subsystems. For this feature to work
correctly CV EVA v4.1 is required. If you connect to CV EVA of a version earlier
than v4.1, WEBES will work but it will not collect fiber port status data. Regardless
of this new feature, WEBES recommends installing the latest version of CV EVA to
take advantage of the latest improvements and features in CV EVA.
During the WEBES installation process, you are prompted to enter configuration information
for any managed entities detected on the node where you are installing WEBES. This
information is included with the results of SEA analysis. If an entity is not fully configured
during WEBES installation or a new entity is detected later, the Web interface prompts for the
entity configuration information, when the user logs in.
Refer to Section 3.13 “Managed Entities (EVAs) Commands” for more information on
Managed Entity Command and Section 6.13 “Managed Device Entitlement” for more
information on Web-based management interface.
WEBES V4.4.3 now supports the gathering of status and error data from the fiber ports
associated with HP StorageWorks Enterprise Virtual Array (EVA) storage subsystems.
The EVA status and error data is reported to the EM-Client, which is part of the HP
StorageWorks Command View storage management application.
By default, WEBES V4.4.3 polls the EM-Client for fiber port status every 12 hours.
This new EVA fiber port support allows HP StorageWorks Serviceability Engineering to write
rules that present status information and error callouts in the Command View application.
These rules will support the following assets:
• Physical loop map of the fiber port, which changes whenever one of the following occurs:
• A disk is removed, inserted, or replaced.
• The physical configuration of the loop changes
• Port stat counters, which become invalid whenever one of the following occurs:
• An array is powered up.
• A loop circuit is re-synchronized
• A link is lost
• A LIP command is invoked.
• The disk firmware does not meet the minimum revision
The current port status is kept in memory for 24 hours, after which it is removed
These new EVA fiber port rules will be available as future rules updates to WEBES v4.4.3.
In addition, SEA can automatically notify a customer support center, provided that the system
is configured to work with HP Instant Support Enterprise Edition (ISEE), which uses the ISEE
Client installed on the system.
CLI commands typically support many options for specifying input files, output files, and
filtering criteria. Each command starts a process. Some CLI processes connect to the Director
on the local system, while others perform tasks by themselves without connecting to a
Director.
See Chapter 3, 4, or 5, respectively, for details about the desta, wccproxy, or wsea commands.
• Directly to the URL of the Director on the same system as the browser
• Directly to the URL of the Director on a remote system
• Indirectly to a remote WCCProxy, by first opening a direct connection to the Director on
the local or a remote system
The web interface can monitor multiple nodes by communicating with the WCCProxys on
multiple systems. You can establish a direct connection to the Director on any system
reachable by its TCP/IP socket port, and, through that connection, view the SEA processes on
other nodes via Director-to-WCCProxy communication.
You do not need to have WEBES installed or running on the same system as the web browser
in order to connect to the Director on a remote system.
See Chapter 6 for more details about the web interface and Appendix C for a list of supported
web browsers.
This chapter describes the WEBES Director and the DESTA CLI command.
SEA includes a web browser interface that interacts with the Director. Although only one
Director can run on a system at any time, many web browser connections can be active
simultaneously, all connected to a single Director.
• Web interface #1 is a web browser running on the UNIX system, directly connected to the
local Director on the same system (http://localhost:7902). It also can communicate with
the WCCProxy on the Windows system through the UNIX Director. This enables you to
view the output produced by either system, such as analysis results, using the same web
interface.
• Web interface #2 also is running in a browser on the UNIX system, but it has directly
connected to the Director on the Windows system (http://win.sys.name.here:7902). Using
this web interface you can, if desired, connect back to the UNIX WCCProxy as well, but
the UNIX Director need not be running at all.
• A telnet session initiated from the Windows system has logged on to the UNIX system,
and the user has issued the wsea report command to view the results of automatic
analysis. The CLI process connects to the UNIX system’s Director, which returns the
current report data to the CLI process. The report text is then displayed to the user. Note
that it is not necessary to have the Director running on the Windows system for this type
of remote connection.
• A user wants to perform manual analysis on the “thisBinary.errlog” file that was
transferred from a UNIX system to the Windows system via FTP. The user issues the
wsea analyze input thisBinary.errlog command from the Windows system. The
Director is not needed for manual analysis, so there is no interaction with the local
Director.
• Web interface #3 is a web browser running on the Windows system. This interface is
directly connected to the local Director on the same system (http://localhost:7902) the
same way that web interface #1 connects to its local UNIX Director.
You interact with the Director by sending it commands from the command prompt of the
system where WEBES is installed. These commands impact all of WEBES and are not limited
to only the SEA tool. The Director commands perform WEBES-level tasks such as
configuring port settings, activating automatic notification, or viewing your service obligation.
• 3.4.1 Permissions
• 3.4.2 Clusters
• 3.4.3 DESTA
3.4.1 Permissions
To run any of the commands described in this chapter, you must be a privileged user as
described in Section 2.2.
3.4.2 Clusters
Even if SEA is installed on a cluster, commands only impact the local node. If you want to
modify an entire cluster you must perform the desired operation on each node.
3.4.3 DESTA
Distributed Enterprise Service Tools Architecture (DESTA) is the engineering code name for
the WEBES software suite architecture, central to which is the Director. DESTA has become
the name of the command that affects the Director.
• 3.5.1 Windows
• 3.5.2 Tru64 UNIX
• 3.5.3 HP-UX
• 3.5.4 Linux
• 3.5.5 OpenVMS
3.5.1 Windows
Stop the Director either from the Start | Programs menu, or by issuing the command: net stop
desta_service. Check the Windows Task Manager for the following WEBES processes:
• CAAgents.exe (may be more than one of these, but they are all part of WEBES)
• WCCAgents.exe (may be more than one of these, but they are all part of WEBES)
• DESTAService.ex or DESTAService.exe
• java.exe (there may be other Java™ processes on the systems, see below)
• WCCProxy.exe
If they end within 2 minutes, the Director can be restarted either from the Start | Programs
menu, or by issuing the command: net start desta_service and then waiting approximately one
minute for WEBES to set up its processes before running a WEBES tool.
If the Director does not stop in approximately two minutes the processes may be hung. Select
any suspect WEBES process from the list above and press the End Process button, which
should remove the entry. Do not end java.exe processes that are not associated with the
WEBES Director. To identify likely WEBES java.exe processes, look for a “Low” base
priority in the Task Manager’s Process list. If you do not see the Base Priority column, choose
View | Select Columns from the Task Manager pulldown menu and check the box for Base
Priority.
If you are presented with an error message that you do not have privileges to end a process,
you must restart the Windows system. Before restarting, follow the post-installation steps in
the WEBES Installation Guide to assign yourself the privileges necessary to kill WEBES
processes in the future. The Director will be restarted automatically during the restart phase.
Processes containing any of the following strings may appear, all of which are WEBES
processes:
Then, issue kill commands to stop them. Finally, as the root user, issue the command: desta
start and wait approximately one minute for WEBES to set up its processes before running a
WEBES component.
3.5.3 HP-UX
Issue the command: desta stop. If the Director does not stop in approximately two minutes the
process may be hung. Look for the WEBES java processes in the ps list:
Processes containing any of the following strings may appear, all of which are WEBES
processes:
Then, issue kill commands to stop them. Finally, as the root user, issue the command: desta
start and wait approximately one minute for WEBES to set up its processes before running a
WEBES component.
3.5.4 Linux
Issue the command: desta stop. If the Director does not stop in approximately two minutes the
process may be hung. Look for the WEBES java processes in the ps list:
Processes containing any of the following strings may appear, all of which are WEBES
processes:
Then, issue kill commands to stop them. Finally, as the root user, issue the command: desta
start and wait approximately one minute for WEBES to set up its processes before running a
WEBES component.
3.5.5 OpenVMS
Issue the command: desta stop. If the Director does not stop in approximately two minutes the
process may be hung. Look in the SHOW SYSTEM output for any of the following WEBES
processes:
Issue the STOP PROC /ID= command to kill the process ID associated with those processes.
Then issue the command: desta start and wait approximately one minute for WEBES to set up
its processes before running a WEBES component.
desta command_verb
Where command_verb indicates the action you want to perform (see Table 3–1).
Verb Description
dri Controls DESTA registry entries including the amount of memory used by the
Director process and subprocesses. See Section 9.7.4.
help Displays an overview of the desta command. Entering no command verb also
shows the help file. See Section 3.14.
Verb Description
entity Manages the list of managed entities monitored by SEA. See Section 3.13 for more
details on managed entity commands.
smtp Turns Simple Mail Transfer Protocol (smtp) notifications via email to the user of
WEBES on or off . See section 3.10.2 for more details.
msg Changes the SEA port configuration settings. See Section 3.9 for more details on
port settings.
priority (UNIX variants and OpenVMS only) Changes the priority of the Director process.
Possible priorities are normal (compete with other processes) and low (allow normal
processes to use more CPU than the Director). The default is low. See
Section 3.11.
servob Displays the current status of the service obligation. See Section 3.12 for more
details.
sicl Turns System Initiated Call Logging (SICL) automatic notifications to HP on or off if
DSNLink is installed on the system. See Section 3.10.4 for syntax information and
Section 10.4 for more details.
start Starts the WEBES Director. Normally this is not necessary, since the Director
automatically is started with the system. It may be necessary to run this command if
the Director was stopped using the stop command. See Section 3.7.
status Displays the current status of the Director process. See Section 2.4.1.
stop Shuts down the WEBES Director process and all DESTA-connected processes. Be
aware that this impacts all WEBES users connected to the system. See Section 3.8.
After a “desta stop” or “net stop desta_service” command completes, the operating
system sometimes requires a few more seconds to stop all WEBES-related processes
and release resources (such as sockets). On rare occasions, restarting the Director too
soon after stopping it can can result in errors in the Director log file, and the Director
also may fail to restart.
To avoid this issue, wait 10 more seconds before restarting the Director, once the
“desta stop” or “net stop desta_service” command completes.
Tru64 UNIX
# /usr/sbin/desta start
On TruClusters, you can run the /usr/sbin/webes_install_update program and choose the Start
WEBES Director option to start the Director on either all the nodes in the cluster or a selected
group of nodes that you choose.
HP-UX
# /usr/sbin/desta start
Linux
# /usr/sbin/desta start
OpenVMS
$ desta start
On OpenVMS clusters, you can uses the SYSMAN utility to issue the do desta start
command on either all the nodes in the cluster or a specific group of nodes that you choose.
Windows
To start the Director, start the DESTA_Service using one of the following methods:
• Start the DESTA_Service using the Windows Services Manager utility available within
the operating system.
Caution
The desta start command on Windows is unsupported.The command may start the
Director, but it also may cause errors.
If you close the command prompt window used to issue the command, or log out of
Windows, you forcibly but incompletely stop the Director and leave running
processes behind (see the WEBES Release Notes if this situation occurs).
Furthermore, any open files may not be saved correctly and may have their data
corrupted.
At a minimum, text log output from the Director process is only displayed on the
screen and will eventually scroll past the buffer.
On Windows, the desta start/stop commands are used only for troubleshooting, and if
the Director is started with desta start, it must be stopped with desta stop.
After a “desta stop” or “net stop desta_service” command completes, the operating
system sometimes requires a few more seconds to stop all WEBES-related processes
and release resources (such as sockets). On rare occasions, restarting the Director too
soon after stopping it can can result in errors in the Director log file, and the Director
also may fail to restart.
To avoid this issue, wait 10 more seconds before restarting the Director, once the
“desta stop” or “net stop desta_service” command completes.
Tru64 UNIX
# /usr/sbin/desta stop
On TruClusters, you can run the /usr/sbin/webes_install_update program and choose the Stop
WEBES Director option to stop the Director on either all the nodes in the cluster or a selected
group of nodes that you choose.
HP-UX
# /usr/sbin/desta stop
Linux
# /usr/sbin/desta stop
OpenVMS
$ desta stop
On OpenVMS clusters, you can uses the SYSMAN utility to issue the do desta stop command
on either all the nodes in the cluster or a specific group of nodes that you choose.
Windows
To stop the Director, stop the DESTA_Service using one of the following methods:
A Stop Director icon appears in the Task Bar, then disappears when the Director
shutdown has completed.
• Stop the DESTA_Service using the Windows Services Manager utility available within
the operating system.
Caution
The desta stop command on Windows is unsupported. The command may eventually
stop the Director, but it also may cause errors.
The Director may not stop completely, leaving running processes behind.
Error messages may appear in either the logs for the Director process or in the desta
stop output.
The Director may take longer to stop than it normally would using one of the
recommended methods, and it may continue to run for a time even after the desta stop
process has finished.
On Windows, the desta start/stop commands are used only for troubleshooting, and if
the Director is started with desta start, it must be stopped with desta stop.
You can use the web interface to modify additional configuration settings as explained in
Chapter 9.
desta isee on
desta isee off
See Section 10.4.3 “Instant Support Enterprise Edition” for more information.
method to notify HP Services. The desta smtp command enables or disables notifications via
SMTP email.
desta smtp on
desta smtp off
See Section 10.3 “Sending Notifications to Email Addresses” for more information.
The desta qsap command enables or disables OSEM notifications. The command name is still
qsap even though the product has changed. WEBES sends notifications to OSEM using the
same protocol it sent to CSG/QSAP.
desta qsap on
desta qsap off
See Section 10.5.1 “Open Service Event Manager” for more information.
The WEBES Automated Call Handling System (ACHS), also known as System-Initiated Call
Logging (SICL), uses HP DSNlink software to securely transmit problem reports to HP
Services (before DSNlink’s retirement). The desta sicl command enables or disables SICL
notifications.
desta sicl on
desta sicl off
See Section 10.4.1 “System Initiated Call Logging” for more information.
Note
The SICL command is changed from wsea sicl to desta sicl in an earlier
release. Both commands are not supported in WEBES now and may be removed in a
future release.
desta snmp on
desta snmp off
See Section 10.5.2 “Simple Network Management Protocol (SNMP) to HP SIM or OVO” for
more information.
DTCS requests a heart beat every minute to verify the connectivity status.
desta dtcs on
desta dtcs off
See Section 10.5.3 “Disaster Tolerant Computing Service (DTCS)” for more information.
desta vmsmail on
desta vmsmail off
See Section 10.3.5 “Open VMS Mail Notification” for more information.
3.11 Priority
By default the Director process runs at low priority. On UNIX variants and OpenVMS
systems, you can change the priority while the Director is running by entering the desta
priority command:
Where compete assigns the Director a normal priority, or low assigns the Director a low
priority.
On OpenVMS systems, this command issues the SET PROCESS /PRIORITY command. The
operating system may change the priority of any process at any time, and may not change the
priority when the SET PROCESS /PRIORITY command is issued. Therefore, the desta
command may not change the priority of the DESTA Director process. It functions more like a
suggestion to the operating system rather than a command.
Your service obligation describes the details of your service agreement. You can view an
existing service obligation from the command line. See Section 2.6 for more information
about service obligations.
WEBES V4.4.3 now interviews the user for the service obligation data as shown in the
following example . As with the earlier versions of WEBES, the default response that is shown
in square brackets is chosen if you press ‘Enter’. Otherwise, the text entered by you is
captured.
If the you enter ‘N’ when asked if the Service Obligation number is the same as the serial
number, you will be prompted for the new Service Obligation number, and that number
replaces the default number.
To view the service obligation for a system, enter the following command:
You can add, modify, or remove managed entities with the following commands:
You will be presented with a series of prompts where you can enter the entity name, type,
product and serial numbers, and other configuration information. If you make a mistake while
entering the data, do not enter data for the remaining prompts, and answer “N” to the last
prompt as shown below:
The command has been implemented to support managed entities in general, including but not
limited to EVAs, for all future releases. As of WEBES 4.4 release, you need not issue this
command as EVAs are detected automatically by the CommandView EVA software. WEBES
retrieves the list of EVAs from CommandView EVA every 12 hours. Any entity that you add
with this command will not appear in the list of SEA Web interface - Storage Cells unless it
exists as an EVA detected by the CommandView EVA. See Sections 6.13 “Managed Device
Entitlement” and 6.7 “Creating Storage Cell Spreadsheets” for more information on the SEA
Web interface relating to Managed Entities and Storage Cells.
After installing a new EVA, refer to the WEBES Install Guide section 2.3.6 “Adding an EVA
After Installing WEBES” for the steps to configure the EVA information for SEA and to allow
the WEBES Director and SEA to recognize the new EVA immediately. If you do not perform
these steps, WEBES will recognize the new EVA within 12 hours, and send an email using the
settings in NotifyCA.txt, (see Section 10.3.1 “Settings”) asking you to configure the new
EVA for SEA.
This command allows you to change the configuration data for a previously entered or
detected entity (EVA).
You will be presented with a series of prompts where you can change the entity name, type,
product and serial numbers, and other configuration information. If you do not enter any data,
the value remains unchanged. If you make a mistake, do not enter data for the remaining
prompts and answer “N” to last prompt as shown below:
The above command allows you to remove the configuration data for a previously entered or
detected entity (EVA).
You will be presented with a prompt to select from the list of managed entities that you wish to
delete.
The command has been implemented to support managed entities in general, including but not
limited to EVAs, for all future releases. As of WEBES 4.4 release, you need not issue this
command for EVAs unless you are removing the EVA hardware. SEA detects new
unconfigured EVAs every 12 hours, and at Director startup and other situations. If you remove
an EVA from CommandView EVA with this command, but do not remove the hardware, SEA
will re-detect the EVA within 12 hours or on the next Director startup. SEA will re-send emails
asking you to configure the EVA. SEA will also prompt you for configuration data on your
next CLI command or Web interface login.
This chapter describes the WEBES WCCProxy process and the WCCProxy CLI command.
The WCCProxy also is packaged with the ISEE Client kit and is necessary for proper sending
of notifications through ISEE.
Refer to the WEBES Install Guide section 1.1.3, “The WCCProxy”, for more information on
the interaction between ISEE, WEBES, and the WCCProxy.
Refer to the WEBES Release Notes for any current issues regarding the WCCProxy; how it is
shared by WEBES and ISEE, and how WEBES and ISEE should be installed or removed for
proper functioning of WCCProxy.
The WCCProxy process spawns other CAAgent and WCCAgent processes as needed. Refer to
section 3.5 “Troubleshooting an Unresponsive Director” for more operating system specific
information on these processes.
You interact with the WCCProxy by sending it commands from the command prompt of the
system where WEBES is installed. These commands impact all of WEBES and are not limited
to only the SEA tool. The WCCProxy commands only affect the WCCProxy process and are
not useful for activities such as system configuration, automatic notification, and so on.
• 4.2.1 Permissions
• 4.2.2 Clusters
4.2.1 Permissions
To run any of the commands described in this chapter, you must be a privileged user as
described in Section 2.2.
4.2.2 Clusters
Even if SEA is installed on a cluster, commands only impact the local node. If you want to
modify an entire cluster you must perform the desired operation on each node.
wccproxy command_verb
Where command_verb indicates the action you want to perform (see Table 4–1).
Verb Description
help Displays an overview of the wccproxy command. Entering no command verb also
shows the help file. See Section 4.8.
priority (UNIX variants and OpenVMS only) Changes the priority of the WCCProxy process.
Possible priorities are normal (compete with other processes) and low (allow normal
processes to use more CPU than the WCCProxy). The default is low. See
Section 4.7.
start Starts the WEBES WCCProxy. Normally this is not necessary, since the WCCProxy
automatically is started with the system. It may be necessary to run this command if
the WCCProxy was stopped using the stop command. See Section 4.4.
status Displays the current status of the WCCProxy process. See Section 2.4.1.
stop Shuts down the WEBES WCCProxy process and all WCCProxy-connected
processes. Be aware that this impacts all WEBES users connected to the system.
See Section 4.5.
Tru64 UNIX
# /usr/sbin/wccproxy start
HP-UX
# /usr/sbin/wccproxy start
Linux
# /usr/sbin/wccproxy start
OpenVMS
$ wccproxy start
On OpenVMS clusters, you can uses the SYSMAN utility to issue the command
do wccproxy start on either all the nodes in the cluster or a specific group of nodes that you
choose.
Windows
To start the WCCProxy, start the WCCProxy service using one of the following methods:
C:\>wccproxy start
• Start the WCCProxy service using the Windows Services Manager utility available
within the operating system.
Tru64 UNIX
# /usr/sbin/wccproxy stop
HP-UX
# /usr/sbin/wccproxy stop
Linux
# /usr/sbin/wccproxy stop
OpenVMS
At a prompt, enter:
$ wccproxy stop
On OpenVMS clusters, you can uses the SYSMAN utility to issue the command
do wccproxy stop on either all the nodes in the cluster or a specific group of nodes that you
choose.
Windows
Stop the WCCProxy by stopping the WCCProxy Windows service. You can use any of the
following methods:
C:\>wccproxy stop
• Stop the WCCProxy service using the Windows Services Manager utility available within
the operating system.
If any of the processes associated with WCCProxy (see Section 2.4 Process Monitoring) do
not stop using any of the methods listed above, you can kill them with the following
command:
wccproxy kill
4.7 Priority
By default the WCCProxy process runs at low priority. On UNIX variants and OpenVMS
systems, you can change the priority while the Director is running by entering the following
command:
Where compete assigns the Director a normal priority and low assigns the Director a low
priority.
On OpenVMS systems, this command issues the SET PROCESS /PRIORITY command. The
operating system may change the priority of any process at any time, and may not change the
priority when the SET PROCESS /PRIORITY command is issued. Therefore, the wccproxy
command may not change the priority of the WCCProxy process. It functions more like a
suggestion to the operating system rather than a command.
5.1 Overview
The WEBES SEA (wsea) CLI command provides a terminal-based interface for interacting
with SEA by issuing commands from the command prompt.
• 5.1.1 Permissions
• 5.1.2 Clusters
• 5.1.3 The CLI and the Director
5.1.1 Permissions
To run any of the commands described in this chapter, you must be a privileged user as
described in Section 2.2.
5.1.2 Clusters
Even if SEA is installed on a cluster, commands only impact the local node. If you want to
modify an entire cluster you must perform the desired operation on each node.
• Manual Analysis
• Translation
• Summary Report
• Create New Binary Log File
• List Registered Rule Sets
• Register/Unregister Rule Sets
• Change or View Syntax
• Reset the Automatic Analysis Database
• View the Status Information
Since these operations do not use the Director, messages that would otherwise be written to the
Director’s log files are included in the output for the command. The messages shown remain
subject to the logging level. See Section 2.5 for more information on log messages.
5.2 Conventions
The CLI commands in this manual follow these conventions:
Bold Used for entries and commands where information is typed at the keyboard as
it appears in the document
Italics Information that varies depending on your requirements. For example, inputfile
indicates that you should enter the actual name of the file you want to process.
[] Optional entries. Values in square brackets are not required and in most cases
pertain to input files, output files, and filtering options.
| Mutually exclusive entries. A vertical bar separates entries where you only can
choose one.
This chapter describes the new common syntax, which supports all SEA functions and is the
default after installation. For reference, the older syntaxes are detailed in Appendix E.
To use a syntax other than the current default, you must include a syntax designator in the
command (see Table 5–1).
1. The new common syntax is the default after install, so the “n” is not required unless the
default is changed.
wsea syntax
To use another syntax without needing a designator, change the default with the following
command plus a designator from Table 5–1:
For example, to make the Tru64 UNIX DECevent emulator the default, enter the following:
wsea syntax u
Afterwards, UNIX DECevent emulator commands no longer need the “u” designator, but new
common syntax commands now require the “n” designator.
Changing the default affects all users logged onto a system, so it can impact your session if
someone else changes the default without telling you.
When there are multiple users logged onto a system, you can play it safe and avoid confusion
by always including the designator whenever a command is available in multiple syntaxes
(regardless of what you think the current default may be).
wsea command_verb
Table 5–2 provides an overview of the wsea command verbs available in the new common
syntax.
If you enter the wsea command without any command verb or parameters, SEA defaults to
translating the system event log and sending the output to the screen.
Verb1 Description
ana Analyzes one or more binary event logs. See Section 5.6.2 for details.
(analyze)
aut Turns automatic analysis on or off. See Section 5.6.1.5 for details.
(autoanalysis)
bin Applies a filter to an existing binary event log and creates a new binary event
(binary) log containing the subset of events returned after filtering. The bin command
verb also can be used to merge existing binary event logs. See Section 5.9 for
details.
lis Lists the registered analysis rule sets. See Section 5.11 for syntax information
(listrk) and Chapter 8 for details on rule sets.
reg Registers one or more analysis rule sets for use during automatic and manual
(regknw) event analysis. See Section 5.11 for syntax information and Chapter 8 for
details on rule sets.
res Resets the automatic analysis database. See Section 5.6.1.4 for syntax
(reset) information and Chapter 7 for details on analysis.
sum Returns a summary of all the events contained in a binary event log. See
(summarize) Section 5.8 for details.
tes Simulates automatic analysis. See Section 5.6.1.3 for syntax information and
(test) Chapter 7 for details on analysis.
tra Translates one or more binary event logs, but does not analyze the events.
(translate) See Section 5.7 for details.
unr Unregisters one or more analysis rule sets so they are no longer considered
(unregknw) during automatic and manual event analysis. See Section 5.11 for syntax
information and Chapter 8 for details on rule sets.
1. The new common syntax allows abbreviations. You only need to enter the minimum number of characters
required to uniquely identify the command (generally, the first three letters of a command verb). The full command verb
is shown in parenthesis.
Table 5–3 describes the commands that are syntax independent and do not take a syntax
designator, regardless of what the default syntax is.
Verb Description
report Displays the active problem reports generated from automatic analysis. See
Section 5.6.1.1 for details.
sicl Toggles on or off the SEA System Initiated Call Logging (SICL) feature, which
automatically log calls with HP Services if DSNLink is installed on the system.
See Section 3.10.1 for syntax information and Section 10.4 for details.
This command is being phased out and replaced by the desta sicl command.
syntax 1 Shows the current default syntax or changes the default syntax for CLI
commands. Once you have changed the default, you no longer need to
include a syntax designator for commands that use the chosen syntax. See
Section 5.3.2 for details.
1. This syntax-independent command sometimes involves a syntax designator, but only because it needs one in
order to set the default. In spite of that, the command is not an embedded part of any of the available syntaxes and
must still be considered syntax independent.
Parameters specify binary log files for processing, designate output files, and create filters. In
most cases, SEA allows you to specify parameters in any order (the new common syntax sum
command is an exception, see Section 5.8 for details). For example, the following commands
using the new common syntax are equivalent:
Notice that even the placement of the command verb (tra in this case) may be changed.
5.6 Analysis
SEA applies rules (see Section 5.11 Knowledge Rule Sets) that interpret error log contents and
create meaningful problem reports—reports containing valuable analysis beyond a simple
translation of log contents into a readable format. (SEA can perform translation as well, as
described in Section 5.7 Translation)
For a detailed description of analysis and the problem reports generated by analysis, see
Chapter 7. In addition, Appendix A shows an example of a report generated by analysis.
The wsea command lets you interact with automatic analysis functions, including viewing the
reports generated by automatic analysis and saving them to a file.
To view the active problem reports generated by automatic analysis, use the report command:
Reports can be viewed on screen or saved to a file. If you do not include any output file
parameter, the reports appear on screen. See Section 5.10.2 for more information about
working with output files.
You can tell SEA to automatically log generated problem reports into a
\specific\ca\logs\prob.log file with the following command:
If a prob.log file already exists, new data from subsequent logging operations gets appended
into the existing file. If you delete the prob.log file, SEA creates a new one as of the next
logging operation.
wsea tes[t]
The command tests automatic analysis and the system’s error logging facilities. See
Section 7.7 for more information on simulating automatic analysis.
Note
The following command clears the automatic analysis database (only available in the new
common syntax):
wsea res
The command removes any currently active callouts and any stored analysis data such as
thresholding information. The FRU configuration data and the marker of the most recently
analyzed event are not removed.
Section 7.3.2 contains additional detail about resetting the automatic analysis results and the
impact that resetting can have on future analysis results.
If the automatic analysis process is busy when you issue the wsea auto off command, the
command will not take effect until the analyzer has finished processing events already in its
queue. If desired, you can force the command to take effect immediately by stopping and
restarting the Director (see Sections 3.8 and 3.7).
Automatic analysis is enabled by default, but you may want to disable it if SEA is running on
a platform such as HP-UX or Linux, where a native error log is not currently analyzed.
You can verify that automatic analysis is enabled by issuing the wsea test command and
observing the Real Time Monitoring display in the web interface (see Section 6.4.4.1).
The wsea ana command performs manual analysis as well as filtered manual analysis on a
binary event log file, which can be the system event log, another log from the same system, or
a log from a different system:
wsea ana
[input inputfile]
[notify [OS | CUSTOMER | PROVIDER | WUI | CLI | AUI | VISIBLE | EVERY]]
[out | outhtml outputfile]
Filtered Manual Analysis—It is possible to create a tailored log file using filters (see
Section 5.9 Creating New Binary Event Log Files) and then manually analyze the new file;
however, be aware that this can result in incomplete or invalid analysis due to missing data
that was filtered out.
Input Files
By default, manual analysis processes the system event log. If you want to process a different
binary log file, you must use the input keyword and specify the input file. See Section 5.10.1
for more information on input files.
Notify
If “notify” is used, one and only one of the above options must be used immediately after it
on the command line.
Notification options may be abbreviated to uniqueness. For example, “O” may be used instead
of “OS”; “CU” may be used instead of “CUSTOMER” etc.,
Notification and analysis mode information is now displayed in all problem reports. See
Appendix A.1 for a sample problem report. The information is positioned above the SEA and
WCC Version sections of the report.
The command line options correspond to the notification information on the problem report as
follows:
• OS - OS
• CUSTOMER - Customer
• PROVIDER - Support
• WUI - Browser
• CLI - Console
• AUI - AllUserInterfaces
• VISIBLE - Visible
• EVERY - All
For the CUSTOMER, PROVIDER, VISIBLE, and EVERY flags, a problem report will ONLY
be sent to the customer or provider notification types (SMTP, ISEE, QSAP (PRS), and SICL
(DSNlink)) that are enabled for automatic analysis. In other words, if the customer has enabled
SMTP and ISEE notification, but not QSAP or SICL notification, then CUSTOMER sends
notification to SMTP only, PROVIDER sends notfication to ISEE only, and VISIBLE and
EVERY sends both SMTP and ISEE notifications (among other types of notifications). If the
user disables SMTP notifications with the "desta smtp off" command, then the
CUSTOMER option will have no effect, and email will not be sent using the VISIBLE or
EVERY options either. If the user has no provider notifications enabled (ISEE, QSAP, or
SICL), then the PROVIDER option will have no effect, and HP Services will not be notified
using the VISIBLE or EVERY options either.
Output Files
By default, output from manual analysis is displayed on the screen. To save output to a file,
use either the out or the outhtml keyword and provide a file name. See Section 5.10.2 for more
information on output files.
5.7 Translation
You can translate, or decompose, the events in a binary event log into a readable format using
the translate command. Translation operates in manual mode, meaning you must enter the
command every time you want to perform translation:
Input Files
By default, translation processes the system event log. If you want to process a different binary
log file, you must use the input keyword and specify the input file. See Section 5.10.1 for more
information on input files.
Output Files
By default, output from translation is displayed on the screen. To save output to a file, use
either the out or the outhtml keyword and provide a file name. See Section 5.10.2 for more
information on output files.
You can identify a subset of the events from a binary event log file that you want to translate
by defining a filter. For more information on filtering, see Section 5.10.3.
Report Type
You can specify either brief or full output for translation. See Section 7.2.3 for more
information on the report types. The examples in Appendix A show the difference between
full and brief output.
Correctable events are not shown. Section 7.8 tells how to interpret the summary and describes
circumstances that can cause unexpected summary output.
Indexed Output
By default, SEA creates a tallied list of all the events in the binary event log files. However,
you can generate an indexed list by adding the index parameter.
If you want indexed output, the index parameter must immediately follow the sum command
verb. Otherwise, SEA assumes you are using an “index” filter keyword instead.
Input Files
By default, the summary command processes the system event log. If you want to process a
different binary log file, you must use the input keyword and specify the input file. See
Section 5.10.1 for more information on input files.
Output Files
By default, output from the summary command is displayed on the screen. To save output to a
file, use either the out or the outhtml keyword and provide a file name. See Section 5.10.2 for
more information on output files.
You can identify a subset of the events from a binary event log file that you want to view a
summary report for by defining a filter. For more information on filtering see Section 5.10.3.
Examples
== /usr/opt/hp/svctools/common/ca/examples/gs320-unix-dir-620.errlog ==
Qty Type Description
----- ------ --------------------------------------------------------
2 301 Tru64 UNIX Shutdown ASCII Message
2 300 Tru64 UNIX Start-up ASCII Message
1 310 Tru64 UNIX Time Stamp Message
2 199 Tru64 UNIX CAM Event
3 110 Configuration Event
Total Entry Count: 14
First Entry Date: Mar 21, 2000 8:12:25 AM GMT-05:00
Last Entry Date: Mar 21, 2000 9:15:44 AM GMT-05:00
Indexed output:
== /usr/opt/hp/svctools/common/ca/examples/gs320-unix-dir-620.errlog ==
Index Type Description Date/Time
----- ---- ------------------------------------------ -------------------
1 110 Configuration Event 03/21/00 08:12:25 AM
2 310 Tru64 UNIX Time Stamp Message 03/21/00 08:22:25 AM
3 301 Tru64 UNIX Shutdown ASCII Message 03/21/00 08:31:21 AM
4 110 Configuration Event 03/21/00 09:07:15 AM
5 300 Tru64 UNIX Start-up ASCII Message 03/21/00 09:07:16 AM
7 199 Tru64 UNIX CAM Event 03/21/00 09:07:42 AM
8 301 Tru64 UNIX Shutdown ASCII Message 03/21/00 09:08:41 AM
9 110 Configuration Event 03/21/00 09:11:16 AM
10 300 Tru64 UNIX Start-up ASCII Message 03/21/00 09:11:17 AM
12 199 Tru64 UNIX CAM Event 03/21/00 09:11:43 AM
The newly created binary event log file can be used for analysis, translation, or any other SEA
operation; however, be aware that analysis may produce incomplete or invalid results due to
missing data that was filtered out.
To create a new binary event log file with another syntax, see Appendix E.
Input Files
By default, the system event log is used as the input file. If you want to process a different
binary log file or files, you must specify the input file location and name. See Section 5.10.1
for more information on working with input files.
Multiple Input Files—You can specify multiple input files to merge into a single binary log (in
which case filtering occurs for each input file before the events are written to the new file). If
you merge files, however, be aware that SEA does not remove duplicate events.
Output Files
You must specify a file name and location where the new binary output file will be saved. The
output file parameter is mandatory when you are creating a new binary event log file.
You can identify a subset of the events from a binary event log file that you want to include in
the new log file by defining a filter. If you do not define a filter, the new log file will contain all
the events in the existing log file. For more information on filtering see Section 5.10.3.
If you are using the new common syntax, you can keep configuration entries from being
automatically inserted by adding the skipconfig parameter to your command. This parameter
prevents configuration entries from the original log files that are needed for analysis from
being inserted into the new log file if they would normally be filtered out.
You can change the defaults in order to process other binary log files or to save the results to a
file. When performing translation, summary, analysis, or creating a new binary log file, you
can further restrict the events that are processed by filtering the binary log file used for input.
input filename
Where filename indicates the path and name of the input file. The following guidelines apply:
• Specifying an input file is optional. If you do not specify either a directory or a file, SEA
processes the binary system event log, for example:
wsea ana
• If you specify a directory but no file name, SEA processes all files with .errlog, .sys, .zpd,
or .evt extensions in that directory:
wsea analyze input examples
• Wildcards are allowed. For example, here all files in the samples directory with a name
that starts with “ds” and the .errlog extension are analyzed:
wsea ana input samples\ds*.errlog
To send the output of an operation to a file, use one of the following parameters:
out filename
outhtml filename
The out parameter creates a text output file and the outhtml parameter creates a HTML output
file. The filename indicates the path and name where you want to save the output:
5.10.3 Filtering
The tra, sum, bin, and ana commands enable you to filter a binary event log file and only
process a subset of the events. The following general rules apply when you use filters:
• Multiple filter statements are allowed when separated by a comma and space.
• Abbreviations are allowed for filter parameters. You only need the minimum number of
letters to uniquely identify a parameter. For example, index could be abbreviated as ind.
• On Windows systems, any argument that includes a comma must be enclosed in
quotation marks. This includes arguments that contain a date.
Table 5–4 lists the filtering statements available with the new common syntax.
begin=”date” Filters based on the time the event occurred. No events that
since=”date” occurred before the given start time or after the given end time are
end=”date” processed.
The date can be entered in any format supported by Java (for
example, dd-mmm-yyyy,hh:mm:ss). You do not need to include the
time (hh:mm:ss) with the date.
Be aware of the following additional guidelines:
• The begin and since statements are equivalent.
• You can use the keywords YESTERDAY and TODAY.
• With the begin and since keywords, you can enter a negative
integer value to process based on a relative date. For example,
entering -3 processes events from the last three days.
include=keyword Filters based on the numeric entry type. You must enter a keyword
exclude=keyword rather than the actual entry type. See Table 5–5 for supported
keywords.
node=name Filters based on the node responsible for generating the event. The
name argument is case sensitive.
index=nn Filters based on the event’s position in the event log. The first event
index=”start:nn, end:nn” in the file is event index 1.
reverse Processes the events in reverse order according to the event index
number.
Keyword Description
control_entries System startup entries or new error log creation entries (32, 35,
300).
operating_system=value Events with a specific operating system type. The value parameter
os=value indicates the numeric code for the desired operating system.
panic Crash restart, system panic, or user panic entries (37, 302).
Keyword Description
Examples
Only process events that occurred before 8:33:57 PM on January 31, 2000:
Only process CPU machine check and system machine check events (the translation command
presents the output in reverse chronological order):
Only processes events beginning with the fifteenth event in the log file:
wsea lis
wsea reg
Registers the rule sets used by analysis (see Section 8.3.2 for more information).
wsea unr
Unregisters the rule sets used by analysis (see Section 8.3.2 for more information).
To manage rule sets using the old common syntax, See Appendix E.
wsea sta
SEA for Tru64 UNIX V4.3.2 (Build 417)
Service Tools Home: /usr/opt/hp/svctools
Service Obligation Start Date: Fri Oct 04 00:00:00 MDT 2002
Service Obligation End Date: Sat Oct 04 00:00:00 MDT 2003
SICL/DSNLink notification: disabled.
CSG/QSAP notification: enabled.
Help also is available through this user guide, which is installed in HTML, Adobe Acrobat
PDF, and text formats available from the following directory:
• Tru64 UNIX—/usr/opt/hp/svctools/common/ca/docs
• HP-UX—/opt/hp/svctools/common/ca/docs
• Linux—/usr/opt/hp/svctools/common/ca/docs
• OpenVMS—SVCTOOLS_HOME:[COMMON.CA.DOCS]
• Windows—C:\Program Files\hp\svctools\common\ca\docs
(or Start | Programs | Hewlett-Packard Service Tools | System Event Analyzer | SEA User
Guide)
SEA Command Line Interface
5.13 Getting Help
The text version does not include graphics and formatting available in the other formats, and
usually is used only when the other formats cannot easily by viewed, such as at a terminal
prompt.
The SEA web interface also includes a link to the HTML version of this user guide as
described in Section 6.10.
This chapter describes how to access and use the SEA web interface.
• See Section 6.5 for more information on how the web interface presents translation
information.
• See Chapter 7 for more information on translation, interpreting translated events, and
default translation settings.
As the system writes events to the binary event log file, SEA processes each event according
to the registered rule sets. The rule sets contain the information necessary to interpret events.
Then, when an event matches the conditions described in the rule sets, SEA creates a problem
report containing information about the event and proposed resolutions.
The web interface can perform both automatic and manual analysis.
• See Section 6.5 for more information on how the web interface presents analysis
information.
• See Chapter 7 for more information on analysis and its results.
When the Director is started, SEA initiates automatic analysis. In automatic mode, SEA
continuously monitors the binary system event log and processes events as they arrive.
Problem reports are generated as necessary.
For more information about automatic analysis operations and output, see Chapter 7.
Manual analysis also compares the events from log files to the registered rule sets and
generates problem reports. However, unlike automatic analysis, you must manually select each
binary event log file you want to process.
For more information about manual analysis operations and output, see Chapter 7.
For more information on using the web interface to create a new binary event log file, see
Section 6.6.
For additional information about supported browsers and configuring your browser for SEA,
see Appendix C.
1. Start the Director on the system you want to connect to, if it has not been started already
(see Section 3.7).
2. Start your web browser.
3. Enter the URL of the target system to connect to it.
• If you are connecting to a remote host, enter:
http://target.sys.name.here:7902
In some network configurations, the name localhost may not be recognized. Enter the
system’s hostname or its IP address (such as http://12.34.56.78:7902) instead.
4. Enter the profile name you want to use in the Logon window (Figure 6–1) and click the
Logon button or press Enter. See Section 9.5 for more information on profiles.
Although you must log on to SEA, the logout process is automatic. See Section 6.11 for a
description of the automatic logout process.
Note that the value of the URL field includes the hostname for the system you logged into, as
well as your username, indicating the current profile.
http://hostname:7902/?profile=username
Tip
If you need to change profiles while using SEA, you can edit your browser’s URL
field by replacing the current profile username with a different one.
The components of the web interface display are described in Table 6–1.
Component Description
Title Bar Shows the software version, active profile, and operating system.
Navigation Tree Lists the available groups, nodes, storage cells, categories, and log files.
Display Frame Displays interactive screens and system information. When SEA loads, the
display frame shows product information.
Information Bar Displays messages from the browser and usage tips. See Section 6.10.1 for
more information on the web interface’s usage tips.
Note
SEA allows you to work in multiple browser windows. If you are using the same
profile, the navigation trees in all the windows will automatically synchronize.
6.3.1 Toolbar
Figure 6–3 shows the default web interface toolbar.
The toolbar buttons update dynamically depending on what you are doing. Table 6–2 describes
the toolbar commands that are always available:
Component Description
Help Button Opens a new browser window containing the on-line user guide. See
Section 6.10 for more information on getting help.
Settings Button Opens the settings screen. See Section 6.9 for more information on changing
the settings.
Progress Opens a new browser window that reports the processing status of log files.
Window Button See Section 6.5.2 for more information on processing status.
New Binary Log Opens the New Binary Log screen in the display frame. See Section 6.6 for
Button more information on creating a new binary log file.
The following buttons also may appear in the toolbar, depending on the feature being used:
Component Description
Clear Results Button Available when viewing automatic analysis details. See Figure 6–19, Clear
Results Button for more information.
Reprocess File Button Available when viewing manual analysis details. See Figure 6–19,
Reprocess File Button for more information.
Analyze File Button Available when viewing manual translation details. See Figure 6–19,
Analyze File Button for more information.
Analyze Filtered Events Button Available after processing a file with a filter applied. See Figure 6–19,
Analyze Filtered Events Button for more information.
Generate Storage Spreadsheet Button Available when viewing Real-Time Monitoring of a Storage Cell. See
Figure 6–19, Generate Storage Spreadsheet Button for more information.
6.3.2 Navigation
Using SEA, it is possible to monitor the binary event log files generated by a wide variety of
computers all from a single web interface. In order to simplify the process of monitoring these
diverse information sources, the web interface uses a hierarchical navigation tree composed of
groups, nodes, storage cells, categories and binary event log files.
Folder Description
Groups Multiple computers that are logically associated. Groups contain one or
more nodes.
Nodes Individual computers. Each node contains two types of log files: System Log
and Other Logs.
System Log The binary system event log where the computer writes system information.
By default, the System log contains Real Time Monitoring and Full View.
Full View Manual analysis results for the system event log.
Other Logs Any other binary event log files saved on the computer. These can include
old files, files from other systems, and examples. Optionally, the other logs
can be further divided by categories (See Section 6.9.1 for information on
modifying SEA to use categories).
Note: Other logs may not appear with the tree when connecting to
older versions of WCCProxy.
Storage Cells Refreshes tree with current list of storage cells detected by CommandView
EVA when clicked. The list is also refreshed when a Storage Configuration
Event (type 910) is logged to the system’s binary event log and processed
by SEA automatic analysis.
Figures 6–5 and 6–6 describe the features and functions of the navigation tree.
Feature Description
Current In most browsers, the currently selected entry in the Navigation Tree is
Selection is highlighted (Figure 6–5).
Highlighted
Collapsing The tree structure can be collapsed to the group level (Figure 6–5).
Navigation
Expanding Click on the expansion symbol for an entry to view its contents. Once an
Navigation entry is expanded, the expansion symbol changes to a collapse symbol. To
hide the contents again, click the collapse symbol.
Icons Each entry in the tree has a name and an icon that indicates its type. For
example, in Figure 6–6 you can tell that the jarjar.cxo.dec.com node is
inactive because of its icon.
Feature Description
Customizing You can customize the navigation tree by adding and removing groups,
the Navigation nodes, categories, and binary event log files (see Section 6.4).
Tree Note: Storage cells are generated automatically and cannot be
customized by the user.
Viewing You can view the results of automatic analysis and initiate manual analysis
Results from the navigation tree (see Section 6.5).
Refreshing If you modify the entries in the navigation tree, you may need to refresh the
Navigation display so your changes appear. To refresh the navigation tree, click the
Refresh Tree button.
You can customize the navigation tree display by creating new groups, adding nodes to
groups, and selecting log files.
After you submit changes to the navigation tree, SEA refreshes the display. The refresh
process may take a few seconds.
6.4.1 Groups
From the navigation tree, you can create new groups and remove existing groups.
1. Click the “System Event Analyzer” link at the top of the navigation tree.
The “Group Maintenance For System Event Analyzer” screen appears in the display
frame (Figure 6–7). The Add Groups tab is already selected.
The location and placement options determine where you would like the new group to
appear in the navigation tree relative to existing groups. By default, new groups are added
after the selected group.
Removing a group removes all the nodes and files contained in the group as well as all of the
lower level groups nested under it.
1. Click the System Event Analyzer link at the top to the navigation tree.
2. Select the Remove Groups tab at the bottom of the “Group Maintenance...” screen
(Figure 6–8).
3. Select the group name or names you want to remove from the list.
To select multiple groups, press CTRL and click on each group. If the groups are
consecutive, press SHIFT and click on the first and last group names.
6.4.2 Nodes
Expanding a group in the navigation tree displays the nodes contained in that group. Nodes
can be expanded by clicking on the expansion symbol next to their name to reveal the log file
types or storage cells included in that node. You can add and remove nodes from the groups in
the navigation tree.
Any computer where the WCCProxy is running can be added to your web interface navigation
tree as a node. To add additional nodes follow these steps:
1. Select the group you want to add nodes to from the navigation tree.
The “Node Maintenance” screen appears in the display frame (Figure 6–9). The Add
Nodes tab is already selected.
The location and placement options determine where you would like the new node to
appear in the navigation tree relative to existing nodes. By default, new nodes are added
after the selected node.
• Node names should be unique. Entering the name of a node you are already
connected to will overwrite the existing node and any data associated with it. The
overwritten data includes filters, other logs, categories, callouts, and storage cell
information.
5. Click the Add New Node button.
The new node appears under its group in the navigation tree.
Removing a node removes all the additional data contained in the node from the navigation
tree.
1. Select the group you want to remove nodes from in the navigation tree.
2. Select the Remove Nodes tab at the bottom of the screen (Figure 6–10).
To select multiple nodes, press CTRL and click on each node. If the nodes are
consecutive, press SHIFT and click on the first and last node names.
The nodes disappear from the navigation tree. If the selected node is contained in
multiple groups, removing it from one group will not affect its presence in other groups.
A new animated icon is displayed when node activation is in progress. Nodes are either active
or inactive and by default when you connect to a node or load a profile that connects to other
nodes, all the nodes are active. A node is only classified as inactive if SEA cannot connect to
it. Inactive nodes appear in the navigation tree with a red “X” through their icon.
However, while activating the node, the icon will animate in several stages as shown in the
following figure when the connection and handshaking is in progress:
If the Director on the remote node is accessible, a message appears in the display frame
(Figure 6–12) and the navigation tree is updated to show the new status.
If the Director is not accessible, a message appears in the display frame (Figure 6–13) and
the navigation tree is not changed.
6.4.3 Categories
Categories are an optional feature that is disabled by default. If you want to use categories, you
must enable the feature using the User Settings tab on the Settings screen (see Section 6.9).
Categories provide a method for grouping the log files listed under the Other Logs folder. If
you use categories, SEA provides another layer of folders under the Other Logs folder. This
feature may be useful if you monitor numerous log files.
1. Select the Other Logs folder for the node you want to have new categories.
The Category Maintenance screen appears in the display frame (Figure 6–14). The Add
Categories tab is already selected.
The location and placement options determine where you would like the new category to
appear in the navigation tree relative to existing categories. By default, new categories are
added after the selected category.
Removing a category removes all the binary event log files contained in the category from the
navigation tree.
1. Select the Other Logs folder for the node you want to remove categories from in the
navigation tree.
2. Select the Remove Category tab at the bottom of the screen (Figure 6–15).
3. Select the category name or names you want to remove from the list.
To select multiple categories, press CTRL and click on each category. If the categories
are consecutive, press SHIFT and click on the first and last category names.
The categories disappear from the navigation tree. If a log file is contained in multiple
categories, removing it from one of the categories will not affect its presence in the
others.
The system log is the binary event log file where system events are written. You cannot change
this log file. Click the expansion symbol to view the analysis options for the system log in the
navigation tree.
• Real Time Monitoring—shows the results of automatic analysis in the display frame, for
the subset of events from the node’s system log file that apply to the storage cell.
• Full View—manually analyzes the system event log and processes the subset of events
from the node’s system log file that apply to the storage cell.
• Storage Cells - shows the list of all the managed entities like EVAs. Each EVA shows the
results of automatic and manual analysis (Real Time Monitoring and Full View) of that
particular EVA
Note
On Windows, the system log file is the Windows Application Event Log, located at
%SystemRoot%\system32\config\AppEvent.Evt. The terminology “system”
log file should not be confused with the Windows System Event Log, located at
%SystemRoot%\system32\config\SysEvent.Evt, which SEA does NOT read
as of this release.
If the node contains storage cells, another pair of icons are listed under each storage cell. Click
the expansion symbol to view the analysis options for the storage cell’s system log in the
navigation tree.
• Real Time Monitoring - shows the results of automatic analysis in the display frame, for
the subset of events from the node's system log file that apply to the storage cell.
• Full View - manually analyzes the system event log and processes the subset of events
from the node's system log file that apply to the storage cell.
If you are using categories, the Other Logs entry contains the categories you have created and
the category folders contain entries for binary event log files.
In order to add saved log files to the navigation tree, they must be viewable in the Add Log
Files list. For a file to be viewable, it must meet both of these criteria:
• The log file must have a .sys, .evt, .zpd, or .errlog extension. If you wish to add a file
with a different extension, you will need to rename the file so it uses an acceptable file
extension.
• The log file must be saved in the svctools directory (created during installation), one of
its subdirectories, or one of the directories you configured in the CA.WUI.OLDirs key in
the DESTA registry. Files that are stored in these locations are automatically displayed in
the list. For more information, see Section 9.7.2.
The best place to store log files (as well as other user data) is in one of the userdata
subdirectories:
svctools\specific\ca\userdata
svctools\common\ca\userdata
Files stored in these subdirectories are automatically backed up and saved if you uninstall,
reinstall, or upgrade WEBES. For more information on storing user data, see the WEBES
Installation Guide.
If you want to store files elsewhere, you can configure WEBES by adding a comma separated
list of file paths to the CA.WUI.OLDirs key in the DESTA registry. For more information, see
Section 9.7.2.
You also can enable a text entry field for specific users. The text field allows users to add log
files to the Other Logs list by entering the path and filename of an event log located anywhere
in the file system. For more information, see Section 9.7.3.
If you are using categories, click on the category name for the node. Otherwise, click on
the Other Logs link for the node.
The Other Logs screen opens in the display frame (Figure 6–16). The Add Files tab is
already selected.
The binary event log file is added to the navigation tree under the Other Logs entry or
appropriate category for the node.
To remove binary event log files from the navigation tree, follow these steps:
If you are using categories, click on the category name for the node. Otherwise, click on
the Other Logs link for the node.
2. Select the Remove Files tab from the bottom of the screen (Figure 6–17).
3. Select the log file name you want to remove from the list.
To select multiple files, press CTRL and click on each file name. If the files are
consecutive, press SHIFT and click on the first and last file names.
• Selecting System Log or Real Time Monitoring runs automatic analysis on a node.
• Clicking Full View manually analyzes a node’s system event log and display the results.
• Clicking a Log File name under Other Logs runs manual analysis on the file and displays
the results.
• Clicking a Storage Cell - Real Time Monitoring runs automatic analysis on the selected
EVA. Clicking a Storage Cell - Full View manually analyzes the selected EVA’s system
event log and displays the results.
Note
The problem reports, events, and configuration entries shown in the Real-Time
Monitoring and Full View listings apply only to the given storage cell.
The IPF configuration reports have been updated to include information from cell based
systems. In particular, Field Replaceable Units (FRU) are reported by the Logical Unit
Number (LUN) to which they belong, in addition to the existing information. Information
about memory dimm sizes is accessible when it is present in the configuration entry.
Information about partitions and the cells that belong to those partitions is provided when it is
present in the configuration entry. The number of the partition that logged the configuration
entry is accessible when it is present in the configuration entry.
Event: 1
Description: Configuration SDR FRU at Thu 24 Mar 2005 17:01:18 GMT-05:00
from FPAR2
File: 8620_par0_config.sys@bagend
========================================================================
OpenVMS IPMI configuration report
Hostname: BILBO
TimeStamp: Thu 24 Mar 2005 15:01:18 GMT-07:00
DSR Type: HP rx8620 (1.30GHz/3.0MB)
Serial #: 1111111111
When analysis is successfully started, the log file’s icon is animated. Once the file is
processed, the icon in the toolbar changes to reflect the status of the log file (see Section 6.5.2)
and the results of processing are shown in the display frame.
Viewing Results
Both automatic and manual analysis results are shown in the display frame. The information is
organized under the following tabs:
Note
If you have configured the User Settings so SEA only performs manual translation,
rather than translation and analysis, the Problem Reports tab is empty. See
Section 6.9.1 for more information on User Settings.
Analysis Failed
If the file cannot be processed for any reason, a message similar to the one in Figure 6–18 is
shown.
When Does It
Button Name Appear in the Description
Toolbar?
Clear Results When you are The Clear button removes all the
Button performing or entries (problem reports and events)
viewing from the display tabs.
Automatic
Analysis.
Reprocess File When you are The Reprocess button forces SEA to
Button performing discard the previous analysis results
Manual and reprocess the selected binary log
Analysis. file.
Analyze File When the User Clicking the Analyze button will
Button Settings are perform analysis for the current log
configured to file. Thus, if you need to perform
perform only analysis, it is not necessary to
manual change the User Settings and
translation by reprocess the file.
default.
Analyze Filtered When you use a Clicking the Analyze Filtered event
Events Button filter for button allows you to repeat the
processing a log analysis using only the events that
file. met the filter criteria.
You can quickly determine the status of automatic or manual analysis by looking at the icons
in the navigation tree. Figure 6–20 shows the icons used to indicate analysis results.
When automatic analysis generates a problem report, exclamation points are added to the
icons for the node, system log, and real time monitoring. The icon remains changed until
problem report details are viewed and the tree is refreshed. If another problem report is
generated after the tree is refreshed, exclamation points are added to the icons again.
You also can determine the results of manual analysis on a binary event log file by checking
the icons. SEA uses a animated yellow icon when a binary log file is being read and an
animated green icon during analysis. If processing has completed and problem reports were
generated, an exclamation point is added to the icon. Otherwise a check mark is added to the
icon. Unlike the icon changes associated with automatic analysis, the manual analysis icon
changes remain visible until you close the web interface session.
Note
If you are only performing translation, when processing completes the icon will
appear with a dash. See Section 6.9.1 for more information on configuring the web
interface to only perform translation.
You can open the Progress window by clicking on the Progress Window button in the toolbar
(see Figure 6–3).
The Progress window provides statistics for all the log files that are currently being analyzed
by SEA, including automatic and manual analysis jobs. The information in the Progress
window includes:
The position of each job in the queue is displayed, and information is dynamically updated as
the processing changes. When a job finishes processing, it is removed from the window.
When monitoring the progress of a job, you can refresh the display manually by clicking the
refresh icon in the upper left hand corner. To stop processing an active manual job, click on the
Stop icon.
When there are many entries, you can use the navigation options to page through the results.
• Use the Previous and Next links to move between entry screens.
• Enter a number in the entry field and click Go to display a specific entry.
Note
You can control the number of entries shown in a tab with the options in the User
Settings window. See Section 6.9.1 for more details.
The Problem Reports tab displays a list of the reports that were generated by analysis. An
example of the problem report list is shown in Figure 6–23.
The filters used when generating the problem reports are listed at the top of the screen.
However, the display only shows the filters that apply to problem reports and may not list all
the filters you selected.
• To sort the entries in the report list select the column headers. See Section 6.5.3.5 for
more details on sorting.
• To view the contents of a report, click on its entry in the list of available problem reports.
See Section 6.5.3.6 for information on viewing reports.
The problem reports generated by the web interface are the same as those generated by the
CLI.
6.5.3.2 Summary
The Summary tab is only available when you perform manual analysis. If you select Real
Time Monitoring from the Navigation Tree, for example, the Summary tab is not displayed.
When performing manual analysis, the Summary tab describes the event types contained in the
binary event log file (Figure 6–24).
Each event type is listed along with the number of occurrences. The time stamps for the first
and last events are listed under the summary information.
The filters that were applied are listed at the top of the screen. Be aware that the screen only
shows the filters that apply to the summary report and may not list all the filters you selected.
The Sub Type Tallied Summaries screen shows you the list of Sub Type events. The events
have been classified based on the nature of the event. As of WEBES 4.4 release, there is no
color classification for the Sub Type events of event type 199 (CAM events). All the Sub Type
events of event type 199 will appear in grey color. The colors of the event description signify
the following about their nature.
To view the Sub Type event summary information, select the summary tab in the Web
interface for any binary event log. This will show you the classification of the event types. If
the event summary has event type 14009 or 199, Click 14009 link or 199 link to view the Sub
Type event summary.
To view the the Sub Type listing information, Click Sub-Type Listing link shown in the above
screen. The following screen shows the listing of all the Sub Type events of event type 14009:
6.5.3.4 Events
The Events tab shows a list of the events contained in the binary event log file. Depending on
the filtering options that were applied during processing, all the events in the log file may or
may not be shown (Figure 6–27).
Note
You can control the fields that are shown on the events tab from the User Settings
window. See Section 6.9.1 for more details.
The filters that affected the output are listed at the top of the screen. Be aware that the screen
only shows the filters that apply to events and may not list all the filters you applied.
• To sort the events list, use the column headers. See Section 6.5.3.5 for more details on
sorting.
• To view the translation of an event, click on its entry in the list. See Section 6.5.3.6 for
information on viewing translation details.
The translated events shown by the Web interface are the same as those shown by the CLI.
You can sort the results of analysis using either the column headings on the tabs in the display
frame, or by using a filter.
• Sorting with the column headings only impacts the entries currently shown. Therefore, if
there are too many entries to be listed on a tab, the column headings will only sort the
entries that are displayed rather than all the output produced by processing the log file. In
most cases, this limitation only impacts the Events tab.
• You can sort the results shown on any tab using the field names that appear in blue (i.e.,
as hypertext links). Simply click on the field name to sort based on that field. An arrow
appears next to the field to indicate the direction of the sorting. The sorting options are
applied to all the tabs, regardless of which tab was used to specify the sorting criteria.
• Entries can be sorted in either ascending or descending order. To change the sort order,
click on the field name a second time. The arrow next to the field changes direction to
indicate the new sort order. When the arrow is pointing up, it indicates an ascending sort.
When the arrow is pointing down, it indicates a descending sort.
• If you are working in multiple windows, sorting only applies to the current window.
• Using a filter to sort entries impacts all the output generated by processing a log file,
regardless of how many screens are required to show all the entries.
• For more information on using a filter to sort output, see the information on applying
filters in Section 6.8.
The Problem Reports tab lists the reports generated by analysis and the Events tab lists the
events in the binary log. You can view the details of a problem report or the translated text of
an event by clicking on an entry in the list. Depending on the User Settings selected (see
Section 6.9.1), the details will either be shown in the display window or in a new browser
window.
In order to make viewing details easier, navigation buttons are available at the top of each
detailed entry. The navigation buttons for the Problem Reports tab and Events Tab are shown
in Figures 6–28 and 6–29.
• You can view the details for other events in the list using the Previous and Next buttons.
When paging between entries, the column heading sort order always reverts back to the
Index column in ascending order. Filter sorts, however, still apply.
If you select “Put Event Details In A New Window” in your User Settings, the Index
button is not available. Clicking the Previous and Next buttons displays all entries in the
new window. See Section 6.9.1 for more information on user settings.
• The Event Details tab includes a drop down list that can be used to change the report type.
See Chapter 7 for more information on translation report types.
1. Click the New Binary Log File button in the toolbar (see Figure 6–3).
The New Binary Log Screen appears in the display area (Figure 6–30).
2. Enter the input file name, including its path, in the Input File text box.
3. Click the Add Input file Button.
4. Repeat steps 2 and 3 until all the desired input files are added.
Note
If you want to remove one of the input files you added, click on the filename in the
Currently Selected Input Files list and click the Remove Selected Input Files button.
You can select multiple files by holding the Ctrl key while you click on the filenames.
5. Specify the desired filtering options by either creating a new filter or applying an existing
template.
• To specify filtering criteria, click the Adjust Filter button at the top of the screen
and use the Adjust Filter screen to select filtering options (see Section ).
• To apply an existing filter template, select the desired template from the drop
down list at the top of the screen.
6. Enter the output file name in the Output File text box.
Note
7. If you have established a filter that excludes configuration entries and you want to
preserve that filtering in the output file, select the “Do not reinsert config entries needed
for analysis” check box.
8. If the output file name already exists and you want to replace the existing file, select the
“Overwrite file if exists” check box.
If you do not select this check box, and enter a filename that already exists, you will
receive an error message.
9. Click the Create New Log File button to process the input files and create the new binary
log file.
Note
It is possible to construct a filter that prevents any events from being added to the new
log file. If this is the case, no log file will be created. However, even if this is the case,
when the Overwrite option is selected any file with the same name as the output file
will be lost.
• Select the storage cell name from the navigation tree for which you want to generate a
spreadsheet of events.
• From the toolbar, click the following icon:
If you have previously created filter templates, they will be listed in the drop-down list. You
can either:
• Select an existing filter from the drop down list and if necessary modify it by clicking the
Adjust Filter button and changing the filtering options.
• Click the Adjust Filter button and define a new filter.
Note
Modifying or defining a filter from the Filter Templates bar does not change an
existing filter or save a new filter. Your changes are only used with the current
operation. Use the Filters option under User Settings to create new templates (see
Section 6.9.1.2).
When you use filters in conjunction with analysis and translation the filter description will be
shown with the results. However, the filtering options you select are only applied to the
appropriate output. Thus, if you select a filter that only affects event translation, rather than
problem reports and translation, the filter will be listed with the event details but not with the
problem reports details. Figure 6–34 depicts a filter description from the event details.
See Section 6.9.1.2 for more information on creating and modifying filters.
Use the tabs located at the left side of the screen to navigate the User settings (Figure 6–35).
Option Description
Filters Opens the Filter Preferences screen which is used to define filter templates
and set a default filter. See Section 6.9.1.2 for more information.
Event Specifies the translation information you want to view. See Section 6.9.1.3
Columns for more details.
The general options screen is shown in Figure 6–35.The General User Settings screen presents
the following options:
Option Description
Save File Lists in Other Logs Select this option if you want the navigation tree to save a
record of all the log files listed under Other Logs when you
log off SEA. If this option is selected, the log files will
remain in the navigation tree until you manually remove
them. If this option is not selected, the Other Logs section
of the tree will be empty when you log on.
Use Categories With Other Logs Select this option to use categories with log files. See
Section 6.4.3 for more on categories.
Put Event Details In A New Window Opens a new browser window for the details of a problem
report or event selected from the list of entries. The list of
entries will remain open in the original window.
Manually Translate Files Only (Skip Prevents SEA from performing manual analysis for log
Manual Analysis) files. This affects the output when you select an entry from
the Other Logs area and when you perform manual
analysis on the system event log.
Event Reporting Level Specifies the default level of reporting for translated
events. The available report types are brief and full. See
Section 7.2.3 for more information on report types.
Tree Selected Color Enables you to specify the color used to highlight selected
entries in the navigation tree.
Entries per screen Specifies the number of entries displayed at one time on
the output tabs. See Section 6.5.3 for more information.
Log Off Time By default, SEA logs your profile off ten minutes after you
close your connection with the Director. You can change
the amount of time by entering a new value in the text
box. All values are in minutes. See Section 6.11 for more
information on logging off. (Setting the Log Off time to
zero is not recommended. See Section 6.11 for more
details.)
6.9.1.2 Filters
Filtering is used to reduce the number of events processed when you perform translation or
create a new log file. With large log files, using only a subset of the events can improve
processing time and enhance output by displaying only the most pertinent information.
Within the web interface, filtering is performed using templates. Templates contain
pre-defined filtering functions that can be applied to SEA functions.
The Filtering Preferences screen allows you to create new filter templates, modify existing
filter templates, or select default filtering options. To access the Filtering Preferences screen,
click the Filters button in the User Settings navigation bar.
To modify a filter template or create a new filter, use the following procedure:
1. Select the filter you want to modify from the drop-down list in the Filter Templates bar.
If you want to create a new filter from scratch, you do not need to select an existing
template.
2. Click the Adjust Filter button located in the Filter Templates bar.
The Adjust Filter screen appears (Figure 6–37). If you are modifying an existing
template, the contents of that filter are listed in the Currently Applied Filters list.
3. Ensure that all the filter information in the Currently Applied Filters list is correct.
Initially, this field will display the contents of the filter template you selected. You can
delete any filter by selecting it and clicking the Remove Selected Filters button. If you are
creating a new filter the list is blank.
Once you have selected a filter type, the Filtering screen is dynamically updated to
include the valid operators (Figure 6–38). Be aware that all the operators are not valid for
all filter types.
Once you have selected an operator, the screen is updated to include a drop-down list of
values or a text entry field (Figure 6–39).
The filter is added to the list of Currently Applied Filters (Figure 6–40).
8. Repeat steps 3 to 7 until all the necessary filters have been added.
9. Click the Adjust Filter button again to close the Adjust Filter screen and return to the
Filtering Preferences screen (Figure 6–36).
The Filtering Preferences screen describes the contents of the new filter.
10. Save the new filter as a template by entering a filter name in the Name text box and click
the Add New Template button.
SEA will update the Filter Templates list and add the new filter to the drop-down list in
the Filter Templates bar.
If you are creating a new filter from one of the details tabs rather than the User Settings
window, the filter is saved for that file or automatic node, but not as a template that can be
applied elsewhere. Otherwise the process is the same.
Default Filters
You can apply default filtering options to all the analysis and translation operations performed
from the web interface using the Filter Preferences screen (Figure 6–36).
1. Select the desired templates from the drop-down list in the Filter Templates bar.
It is not necessary to select a template if you do not want to use an existing template.
2. If necessary, click the Adjust Filter button and modify the filter template or create a new
template.
3. Click the Save Current Filter As Default button.
It is not necessary to save the default filter as a template. If you want to, you can use the Adjust
Filter screen to create a filter and then save it as the default filter without saving it as a
template.
Deleting Templates
You can delete a filter template from the Filter Preferences screen (Figure 6–36), using the
following procedure.
1. Click on the name of the filter you want to delete in the Filter Templates list.
You can select multiple filters by holding the CTRL key while you click the filter names.
The Event Columns screen is used to specify the information displayed by translation on the
Events tab (see Section 6.5.3.4 for more information on translation details).
The Event Columns screen lists the field headings for event translation. You can designate
which translation information is shown on the Events tab using the following procedures.
Adding Fields
To add fields, determine which additional translation fields need to be shown. The first list
displays all the available translation fields and the second list indicates the fields that are
currently shown.
1. Select the desired field from the first list by clicking on its name.
You can select multiple entries by holding the Ctrl key while you select their names.
The selected fields are added to the end of the second list and shown under the Events tab.
Rearranging Fields
The order of the fields in the second list indicates the order of the information on the Events
tab. To rearrange the fields:
1. Select the field that needs to be moved by clicking on its name in the second list.
2. Move the field to its new location.
• Click the Move Up button to move the field up in the list.
• Click the Move Down button to move the field down in the list.
Removing Fields
To remove a field:
1. Select the field from the second list by clicking on its name.
You can select multiple fields by holding the Ctrl key while you select their names.
Use the buttons located at the right side of the window to navigate the Director settings.
Option Description
Settings Displays the configuration settings for the Director. See Chapter 9 for
information on changing the Director settings.
Register Displays the knowledge rule sets that can be installed. See Chapter 8 for
Knowledge more information on rule sets and analysis.
Managed Device Displays the list of Managed Entities (Storage Cells, EVAs) allowing you to
Entitlement change their configuration data.
You can close your connection by exiting your browser or navigating to a web site outside of
the SEA web interface. SEA continues to process requests and stores your data after you have
closed your connection (as a result, SEA continues to consume memory resources). If you
restore your connection to the Director before the log off time elapses, your data will remain
intact. This enables you to browse other web sites without losing your SEA data. However, if
the connection with the Director is closed, once the log off time elapses, all the data associated
with your SEA session is lost and the memory resources used by SEA are released. Thus, if
you return to SEA after the log off time has elapsed, you will not be able to view the results of
processing.
For example, if your log off time is set to 120 minutes and you start processing a log file
before switching to another web site, you have two hours during which SEA will continue to
process the log file and maintain your data. If you return to SEA before the two hours elapses,
processing will continue and all your data will be maintained. If you do not return to SEA
within the two hours, processing is terminated and your data will be lost as memory resources
are cleaned up.
Note
If you set the log off time to zero, you will be logged off and lose your data if you
click the refresh button in your browser or if you click a link that opens a page outside
SEA.
The following list shows some possible log off times and the time frame they represent:
• 180 = 3 hours
• 1440 = 24 hours
• 10080 = 1 week
• 44640 = 31 days
Lost Connection
If your connection to the Director is lost for any reason, the message in Figure 6–43 appears in
the toolbar.
http://hostname:7902/obligation
History of changes:
1. Sat May 13 15:46:22 MDT 2000: Installer (unknown) of Hewlett-Packard
Installation settings changed to start Sat May 13 00:00:00 MDT 2000 to Sun May
13 00:00:00 MDT 2001 (1 years, 0 days, 0 hours, 0 minutes, 0 seconds)
2. Sat May 13 15:46:11 MDT 2000: WEBES (Web-based Enterprise Services
Common Components V3.0 (Build 12), member of WEBES V3.0 (Build 12)) of
Hewlett-Packard
Set initial obligation: 0 years, 5 days, 0 hours, 0 minutes, 0 seconds ending
Thu May 18 15:46:10 MDT 2000
Notifications to be sent
1. 0 years, 60 days, 0 hours, 0 minutes, 0 seconds
2. 0 years, 30 days, 0 hours, 0 minutes, 0 seconds
3. 0 years, 15 days, 0 hours, 0 minutes, 0 seconds
4. 0 years, 5 days, 0 hours, 0 minutes, 0 seconds
5. 0 years, 4 days, 0 hours, 0 minutes, 0 seconds
6. 0 years, 3 days, 0 hours, 0 minutes, 0 seconds
7. 0 years, 2 days, 0 hours, 0 minutes, 0 seconds
8. 0 years, 1 days, 0 hours, 0 minutes, 0 seconds
To view the details of a managed entity, click on the particular managed entity name (for
example, EVA 2) which lists out the managed entity details as shown in the following figure:
If the node is not managing any entity, managed device entitlement does not show any
information on this. The following screen is an example of a node that is not managing any
entity.
You can modify or remove an existing EVA from the SEA Web Interface as explained below:
To modify an existing EVA configuration information, enter the required details of an EVA to
be modified in the Web interface and Click Apply Changes button (see Figure 6–45). If you
want to cancel the modifications, Click Undo Changes button.
To remove or delete an existing EVA, select the EVA to be removed or deleted by checking the
respective EVA entry and then Click Delete button (see Figure 6–44). If you want to delete all
the existing EVAs, Click Delete All button.
You can add an EVA only from the Command Line Interface (CLI) Refer to section 3.13
“Managed Entities (EVAs) Commands” for more information on how to add an EVA from the
CLI.
• Windows:
c:\Program Files\hp\svctools\specific\desta\config\
ConfigDefaultsDESTA.txt
ConfigDefaultsDESTA.txt
#
# DESTA Core Configuration Default Components
#
# Default components to enroll the first time the DESTA Director
# process is executed, as fully qualified Java class names.
# After DESTA runs the first time, the file Configuration.dat will be
# created, and it will be read on startup instead of ConfigDefaults*.txt.
#
com.compaq.svctools.desta.services.web.component.DefaultWebInterfaceServ
er
4. Delete the configuration.dat file from the following directories (assuming you used the
default install directory):
Tru64 UNIX—/usr/opt/hp/svctools/specific/desta/config
HP-UX—/opt/hp/svctools/specific/desta/config
Linux—/usr/opt/hp/svctools/specific/desta/config
OpenVMS—SVCTOOLS_HOME:[SPECIFIC.DESTA.CONFIG]
Windows—C:\Program Files\hp\svctools\specific\desta\config
5. Restart the Director to create new configuration.dat file to reflect the changes mentioned
in step 3
6. .
This chapter describes event translation and explains how to view and interpret translation
information. It also describes log file analysis, including automatic and manual analysis and
how to view and interpret analysis information. Procedures for simulating automatic analysis
are described as well. Exceptions that impact the results produced by summary operations
also are detailed.
On supported platforms, SEA can read and translate error logs produced by any of the
supported operating systems. For example, you can use the web interface running on your PC
to connect to a Director running on a Tru64 UNIX system to read, translate, and analyze an
event file produced previously on an OpenVMS system.
• CLI—Chapter 5
• Web Interface—Chapter 6
Note
A translated binary event consists of three layers of information: overall, frame, and field.
7.2.4.1 Overall
The overall binary event contains one or more translated frames of information. There are
several types of binary events, each identified by its class name. In addition to the frames,
some other information is stored at the overall layer, such as:
• The class name of the binary event (passed to Event Analysis but not displayed in the
translated output in the CLI or web interface)
• The “match keys” for the event, a set of strings used in identifying analysis rules that may
fire for this event (not displayed in the translated output in the CLI or web interface)
7.2.4.2 Frame
A frame within an event consists of one or more translated fields of information. There are
many types of frames, each identified by its label. Each frame type contains a defined set of
fields. In addition to the fields, some other information is stored at the frame layer, such as:
7.2.4.3 Field
This frame contains 17 fields. Each field has a single value, such as 947 (decimal) or x10
(hexadecimal, 16 decimal). Some fields are represented as both a Register
(HPM_Event_Info_Block_1) containing the complete hexadecimal value, and again as a
series of subfields such as HPM_System_Event_Code[7:0]. The [7:0] indicates that bits 0
through 7 of this register comprise this subfield, bit 0 being the least significant bit.
Some of the events logged by a system or device are not used by SEA to diagnose hardware
failures. The CLI translate command and the event listing in the web interface translate events
with many different entry types, including some not used for analysis. However, there are
some cases where SEA cannot translate an event:
• If the system or device logged incorrect data for a supported entry type, causing it to be
unrecognized.
Note
Each subsequent release of SEA supports the translation of new event types and
incorporates better handling of incorrect input data. Events that currently result in a
unsupported entry dump may be correctly translated in a future release.
The following example shows the translated output for an event that was logged incorrectly.
The event should have been logged with major class 250 and minor class 0, which SEA would
have correctly translated. However, the minor class was 18 and the event was unrecognized.
As a result, an unsupported entry dump was generated.
com.compaq.svctools.desta.services.decomposers.DecompDataException:
EXCEPTION: Entry_Type_Support.java, DUNIX_Entry_Type(), No support for this
DUNIX Entry Type... Major_Class is: 250 Minor_Class is: 18
0000: FE FF FF FF 0C 01 00 00 ?yyy....
0008: 48 01 00 00 02 00 00 00 H.......
0010: 01 00 04 00 EC 0D 00 00 ....i...
0018: 23 00 00 00 00 00 00 00 ........
0020: 00 00 00 00 18 00 00 00 ........
0028: FA 00 12 00 B1 07 00 00 u.......
0030: FF 00 05 00 02 18 00 00 y.......
0038: 01 00 00 00 0B 00 00 00 ........
0040: 00 00 00 00 00 00 00 00 ........
0048: 00 00 00 00 03 00 F0 2B ......?.
0050: 00 00 00 00 00 00 00 00 ........
0058: 00 00 00 00 00 00 00 00 ........
0060: 00 00 00 00 00 00 00 00 ........
0068: 00 00 00 00 00 00 00 00 ........
0070: 00 00 00 00 00 00 00 00 ........
0078: 05 00 00 00 61 00 1F 00 ....a...
0080: 43 6F 6D 70 61 71 20 41 Compaq.A
0088: 6C 70 68 61 53 65 72 76 lphaServ
0090: 65 72 20 47 53 33 32 30 er.GS320
0098: 20 36 2F 37 33 31 00 00 .6.731..
00a0: 81 00 22 00 43 6F 6D 70 ....Comp
00a8: 61 71 20 54 72 75 36 34 aq.Tru64
00b0: 20 55 4E 49 58 20 56 35 .UNIX.V5
00b8: 2E 31 20 28 52 65 76 2E .1..Rev.
00c0: 20 37 33 32 29 00 00 00 .732....
00c8: C1 00 0B 00 51 42 42 37 A...QBB7
00d0: 2E 49 4F 52 30 31 00 00 .AJK01..
00d8: 41 00 18 00 32 30 30 31 A...2001
00e0: 30 38 31 33 31 38 33 30 08131830
00e8: 33 36 2C 30 30 30 30 32 36.00002
00f0: 30 30 00 00 21 01 14 00 00......
00f8: 68 73 31 31 30 31 61 00 abcd101.
0100: 00 00 00 00 00 00 00 00 ........
0108: 00 00 00 00 FA 00 00 00 ....u...
0110: 20 00 00 00 6D 63 68 61 ....mcha
0118: 6E 31 3A 20 20 6E 6F 64 n1...nod
0120: 65 20 32 20 68 61 73 20 e.2.has.
0128: 63 6F 6D 65 20 6F 6E 6C come.onl
0130: 69 6E 65 0A 00 00 00 00 ine.....
0138: 00 00 00 00 E8 00 00 00 ....e...
0140: 48 01 00 00 25 7E 3C 5E H.......
Problem reports resulting from automatic analysis are sent to all interfaces and to all recipients
that are set up to be notified.
7.3.1 Scavenge
Automatic analysis processes events as they occur. However, when the Director is stopped,
SEA indicates the last event from the binary log file that was processed in the analysis
database. When the system is restarted, SEA checks the database to see which events have
been processed and processes all the events that occurred after that point. This operation is
referred to as scavenging. The scavenge operation finds events that are still pending
processing and ensures that no events are missed, even when the system is restarted. The first
time scavenge occurs, it processes the entire event log. Once this is complete, new events are
processed as they occur. The scavenge operation occurs four minutes after the Director is
started. If the Director is started and stopped within four minutes, no scavenge occurs.
Initially, the entire system event log is read to find any events that can be analyzed. A filter is
then applied to the analyzable events. All analyzable events that occurred within a week of the
current time are processed.
If there are no analyzable events, the scavenge feature becomes dormant and a marker
representing an unsupported system is stored in the automatic analysis database. As long as the
unsupported system marker is present on the system, no scavenging occurs. If there is at least
one recognized event, scavenging occurs every time the Director is stopped and started
If you connect to the Web Interface before scavenging begins, events that arrive while the Web
Interface is running will appear in the Real-Time Monitoring view. All the events that arrive
before scavenging starts are processed once scavenging begins and any problem reports that
result from scavenging also appear in the Real-Time Monitoring view. However, any events
that were added to the event log before the Web Interface was started will not appear in the
Real-Time Monitoring view.
7.3.2 Reset
Caution
Resetting the automatic analysis database can significantly impact the results seen
from future analysis.
In rare cases, you may by asked to reset the automatic analysis database as part of
troubleshooting an operational problem with SEA. Be aware that resetting the database erases
all active callouts and stored analysis data. After resetting, the database only retains the
following:
Follow these steps to reset the automatic analysis database. For the procedure to work, the
database must be uncorrupted and functioning properly:
A reset clears all active problem reports and storage units. Storage units are records of past
events that some rules use for thresholding and multiple event analysis. After a reset, the lack
of these records can significantly change analysis results.
For example, SEA can accumulate storage units that count toward satisfaction of a threshold
filter. When a reset erases the units, problem reports that occur at the threshold may be delayed
(because the count started over) or even completely suppressed.
The scenario usually involves correctable events. SEA generally reports uncorrectable faults
when they occur, but correctable events such as intermittent disk read errors may be subject to
threshold filtering. In other words, SEA only sends a problem report when enough correctable
events occur within a specified time frame. This allows SEA to signal that a device is suspect
even though a hard fault has not happened yet.
To reduce the impact of resetting, first review recent events (the minimum recommendation is
to review the past 24 hours). During the review, look for recurring events, typically correctable
errors, that involve any device that has not already been called out in problem reports. These
events can indicate suspect devices.
7.3.3 Disable
If necessary, automatic analysis can be disabled from the CLI as described in Chapter 5. You
may want to disable automatic analysis if SEA is running on a platform such as HP-UX or
Linux, where a native error log is not currently analyzed.
Manual analysis can be performed from all the interfaces. See the following chapters for
information on manual analysis:
• CLI—Chapter 5
• Web Interface—Chapter 6
Regardless of the platform where it is installed, SEA can read and analyze binary event logs
produced by any of the supported operating systems.
SEA always relinquishes processor cycles to other programs whenever they need them. In
other words, the program uses whatever resources are available.
At startup SEA needs the available capacity for the scavenge process. Depending on the
system, and the size and content of the log, the initial startup pass can take many minutes or
even hours to complete. After completing the scavenge process, SEA drops into idle mode,
where resource usage hovers at only a few percent.
If you run SEA in manual mode, large amounts of system resources and processor cycles also
might get used. As in the case of startup in automatic mode, the condition is directly related to
the size and content of the log being processed. Once again by design, SEA uses as many
resources as are available until processing is completed.
You can speed processing by managing the system error log so that it does not grow
indefinitely. One way to accomplish this is to periodically archive and reset the current error
log by following the guidelines in the WEBES Installation Guide. When you are using manual
analysis, it may be beneficial to filter large log files in order to improve processing times.
Note
A report consists of a set of String and Value Pairs (SVP). A SVP can be short, for example:
Severity:
2
An SVP also can be extensive, such as the Full Description or Evidence SVPs, which can
contain many lines of information (see Appendix A for an output example). A problem report
resulting from event analysis typically contains the following Strings, with Values describing
the analysis results.
7.5.5 Callout ID
The Callout ID designator provides information about the analysis rule set. Most characters
within this designator are used for HP-specific reserved purposes.
7.5.6 Severity
The Severity designator provides the service relevance of the occurrence of the problem
found. The current severity hierarchy is shown in Table 7–1.
Severity Service
Comments
Level Relevance
1 Critical This level is not currently used due to system operation required for
SEA diagnosis.
4 Information System service event such as enclosure PCI or Fan door is open
and only requires system door closure.
7.5.10 Evidence
The Evidence designator provides the error event information that triggered the indictment.
The evidence shown depends on the system that generated the error log and the registered
rules. As a result the contents of the evidence field may vary.
7.5.11 Versions
The SEA Version and WCC Version designators provide the versions of SEA and WEBES that
created the problem report.
In addition, when you translate an event that includes a SEH or CEH header in addition to a
Windows NT header, both time stamps are shown in the translation results. However, unless
the system responsible for logging the event is located in the GMT time zone, the time stamps
will be different.
The event time also is displayed in the event description (located at the top of a translated
event). Depending on the contents of the event and the SEA interface used to translate it, the
translated output may include different information:
• If the event includes a SEH or CEH header, the time stamp information from that header
is included in the event description. If the header has invalid date information the current
date is shown along with an error message.
• If you are using the web interface and the event only has a Windows header, no date
information is shown in the event description.
• If you are using the CLI to send the translation to the screen or a text file and the event
only has a Windows header, the date information from the header is included in the event
description.
• If you are using the CLI to send the translation to a HTML file and the event only has a
Windows header, no date information is shown in the event description.
SEH and CEH time stamps are stored as strings and reported in the TLV_Time_as_Local field
of a translated event. This field has the following format:
This indicates the time the event was logged, in the time zone where the system responsible for
logging the event is located. The time zone is shown as an offset, in hours, from GMT.
Windows Headers
The Windows NT header stores time stamp information as an integer indicating the number of
seconds that have elapsed since epoch (January, 1 1970 00:00:00 AM GMT). These integers
are translated into a date and time and reported in the WNT_GMT_Time_Generated and
WNT_GMT_Time_Written fields of a translated event using the following format:
Since the Windows NT header does not include any information about the time zone where the
logging system is located, the GMT time zone is used. This does not mean the logging system
is located in the GMT time zone.
Note
Problem reports created by simulated automatic analysis are identified as test callouts
so that no action is taken by the customer service center. Translation results also
indicate that the output was generated by the test command.
The wsea tes[t] no longer accepts the "inp[ut]" argument. Hence the following command that
existed in WEBES versions prior to 4.4 has been replaced with a new command.
This command is now replaced with wsea ana inp[ut] command. See section 5.6.2 Manual
Analysis for the new syntax. Use the following command to test SEA, from event detection to
analysis and notification:
wsea test
This command sends an event with header fields but no further content to the system’s error
logging API. The action taken with this event is dependent on the system:
If the command was run on a supported platform, the system’s error logging service takes the
event content and wraps it with a Common Event Header (CEH). This is necessary because
SEA only recognizes events with a CEH or a Storage Event Header (SEH). After the CEH is
created and all its fields are populated, the event is written to the error log where it can be
processed by automatic analysis, generate a problem report, and trigger notification.
Note
The event generated by the test command will be logged with a CEH on the following
operating systems and platforms:
Tru64 UNIX 4.0E and above on all EV6 and above platforms
OpenVMS 7.1–2 and 7.2 and above on all platforms
Windows
The error logging service on Windows does not wrap event content with a CEH since that is
usually done by the device drivers themselves. So, like a device driver, the test command
creates a mock CEH which is used as the event content and passed to the system error logging
API. The command does not provide values for all the fields in the mock CEH. Only the fields
critical to translation, analysis, and human identification (including time, computer name, OS
type and event ID) are given valid values. Most other fields are set to 0 or NULL values and
do not affect translation or analysis. After Windows receives the event, it adds a Windows NT
header and the event is appended to the system error log. Once in the error log the event is
processed by automatic analysis, generates a problem report, and triggers notification.
The Director must be running in order to use the test nosystem command.
The nosystem option sends an event directly to the SEA event reader, bypassing the system
altogether. This command is used to facilitate troubleshooting of a problem and determine if it
is caused by SEA.
Regardless of the platform, the command creates a mock CEH for the event so that it can be
recognized. Since SEA also requires an NT event header when running on Windows
platforms, a mock NT header also is created when the command is executed on an Windows
system. Only the NT header fields necessary for translation, analysis, and human identification
are populated with valid values. Fields set to 0 or NULL do not affect translation or analysis.
Since the event created by the nosystem option has a CEH (and for Windows, a NT header as
well), it should always be recognized by SEA. However, since the event is never appended to
the system error log, it cannot be seen when manually translating or analyzing the system error
log. In addition, the problem report immediately expires and, as a result, it will not appear if
you subsequently run the wsea report command. The only ways to view the problem report
generated by analysis is by using the “Real Time Monitoring” view in the web interface, or the
problem report logging functionality (see Section 5.6.1.2). The wsea report command will
not show the problem report because it is designed to expire immediately.
Note
The nosystem option creates an event that can be translated and analyzed for all the
supported operating systems, regardless of whether or not the hardware platform is
supported.
• If the final event in a log file contains invalid data, SEA cannot determine the date
information for the Last Entry Time field. In this case, the current date and time are
shown in the Last Entry Time field.
• If an event does not include a recognized header, the event type is reported as 0. In this
case the summary command indicates that the event is Unrecognized/Unsupported.
This applies to events that only contain a Windows header even if they are translated
correctly.
The new command to simulate automatic analysis using a saved error log file is:
This chapter describes the rule sets and instance files used by SEA. Information on managing
rule sets also is given.
Depending on the circumstances, a event may or may not fire any rules. Alternately, a single
event can fire multiple rules. When a rule fires, it may or may not produce reports. In the case
where reports are generated, a rule can create one or multiple reports. A report may be
generated immediately, or may be generated after a gestation time period defined by the rule.
Each report is stored in a instance file. After the report’s expiration time period, as defined by
the rules, the report is removed from the instance file.
Rules also are responsible for determining the output presented for a translated event.
Note
It is possible to run SEA without any rule sets registered (if the rule sets have been
unregistered or deleted). However, if there are no registered rule sets, analysis will not
generate meaningful results. The problem report generated by analysis indicates if
there are no registered rule sets or no applicable rule sets.
You can clear this state data using the wsea reset command described in Chapter 7.
• View the rule sets that are currently registered (see Section 8.3.1).
• If you receive or create new analysis rule files, you can register the new rule sets as
needed (see Section 8.3.2).
• Unregister rule sets that are no longer needed (see Section 8.3.2).
• Re-register all the default rule sets (see Section 8.3.2).
Note
This section describes how to manage rule sets using the new common syntax. For the
equivalent old common syntax commands, see Appendix E.
8.3.1.1 CLI
The new common syntax lis command provides a list of the paths and versions of the
knowledge files registered with DeCOR. The syntax for the command is shown here:
wsea lis
Output
Ruleset Version
==================== ===================================
CATEST Rules_v1_1
DS10 Rev_030509
DS20 Rev_030320
DS25 Rev_030509
ES40 Rev_030512
ES45 Rev_030509
GS1280_EV7 V4_2
GS1280_IO7 V4_2
GS1280_RBOX V4_2
GS1280_SM V4_2
GS1280_ZBOX V4_2
GS320_CE V53_0953
GS320_SE V53_0953
GS320_STARTUP V53_0953
GS320_UCE V53_0953
MCII Rev_1
Storage Rev_2.20
Storage_HSV_DRM Rev_X1_00
Storage_HSV_EMU Rev_X1_00
Storage_HSV_EXEC Rev_X1_00
Storage_HSV_FCS Rev_X1_00
Storage_HSV_FM Rev_X1_00
Storage_HSV_SCMI Rev_X1_00
TS202c Rev_4_1_A0
Vstor Rev_1.00
All the available rule sets are listed with a check box. Rule sets with a selected check box are
registered.
8.3.2.1 CLI
The syntax for registering and unregistering rule sets is shown here (the first command shown
is used to register rule sets and the second command is used to unregister rule sets).
Where ruleSet represents the name or names of the desired knowledge files. If you do not enter
any rule set names, all the default rule sets are registered.
Wildcards cannot be used to specify multiple rule set names. To register or unregister all rules
supplied with WEBES, do not specify any rule set names, as in:
wsea reg
wsea unr
Note
If you are running analysis in the CLI, you will see the changes take effect
immediately. However, to run analysis in the web interface, you must stop and restart
the Director first (see Sections 3.8 and 3.7).
To register or unregister a set of rules using the web interface, do the following:
All the available rule sets are listed with a check box. If the check box is selected the rule
set is registered, otherwise it is not registered.
Note
Changes will not take effect in the web interface for automatic analysis until the
analyzer is restarted. This is done by stopping and restarting the Director. These
changes will not affect manual analysis jobs already in progress.
6. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
This chapter describes configuration, including getting and changing the configuration,
global and component configuration attributes, and creating and resetting the configuration.
The Director Settings window is shown in the display frame (see Figure 9–1). By default
the Settings button is selected.
3. Select the service whose attributes you want to view from the drop-down list.
By default, Global Attributes are shown; however, the drop-down list contains all the
services currently enrolled in the system. The SEAWebService was selected in
Figure 9–2.
4. To view the current value of an attribute, click on its name on the left side of the window
(see Figure 9–2).
The attribute’s full name and current and default values, are displayed on the right side of
the window along with a description of the attribute.
Common Attributes
Attributes that each component contains by default are known as common attributes. They are
still owned by their component, so the autoStart attribute for one component is independent
from the autoStart attribute of another component.
Extended Attributes
Attributes specific to a particular component are known as extended attributes. For example,
the “HTTPServerPort” attribute of the “SEAWebService” component does not exist in any
other components, since it only applies to the web service.
Normally, it is not necessary to change the attribute settings. The following list describes the
attributes that most often need changed and the location of the attribute in the web interface.
9.3.1 CLI
The CLI has limited configuration abilities.
Socket Ports
The socket ports can only be modified from the command line. See Section 9.4.2 for details on
changing the ports.
To change the value of an attribute, enter the new value in the New Setting field. Depending
on the attribute that you want to change, you may be able to select the new attribute value from
a drop-down list or change a check-box setting. After changing attributes you have several
choices.
• Click the Change button to apply the changes to the current attribute.
• Click the Reset button to change the values of the current attribute back to their last
applied value.
• Click the Default button to change the values of the current attribute to their default
values.
If you leave the Configuration Settings window without clicking the Change button, your
modifications will be lost.
Changes to the Communications and Controller attributes (prefaced with “comm” and “ctrlr,”
respectively) take effect only when a new SEA process is started (such as the Director or
another process that connects to the Director).
7902 Director’s Web Interface listener port used by the web Yes
browser (e.g., http://target.sys.name.here:7902)
2069/8941 CSG/QSAP—the port number for CSG v4.5 and v5.0 is Yes
2069. For v3.1 and v3.1B it is 8941. (See Section 10.4.2
for more details on CSG/QSAP.)
If a port is configurable, you can change the port number used. Most ports are configured
using the web interface; however, the commSocketListenerPort, which is used for connections
to the Director, can only be modified from the CLI.
The commSocketListenerPort defines the TCP/IP socket port used by the Director to
communicate with other processes on the same system or on other systems on the network
(Port 7901, by default).
Note
Do not change the commSocketListenerPort attribute with the web interface. If you
do, the Director cannot be stopped from that point on. After the socket port is
changed, only a service that is already connected can stop the Director running on the
old port.
To change the TCP/IP socket port attribute on all operating systems use the following
command from the command prompt.
This command changes the port number and then stops the Director and all connected
processes. After the Director has finished shutting down, you can safely restart it on the new
port.
Note
If the process hangs unexpectedly under Windows, kill the command and stop the
Director manually. Press CTRL-C to exit the CLI command, and then enter net
stop desta_service.
The Director can only communicate with Directors on other systems that have the same
TCP/IP socket port number defined in their configuration. You can restrict access to your
Director by changing the ports to nonstandard numbers and only disclosing the new port
numbers to people who need access.
9.5 Profiles
When you are using the web interface, your changes to the configuration are saved in a profile.
The profile for the current session is saved using the logon name you entered (see Section 6.2).
To restore your previous configuration settings when you restart the web interface, simply
enter the same logon name.
Your profile is saved on the system where you logged on. If you log on to a different system,
then it will use the default settings. To customize the settings for the new system, you will
again need to create a new profile and change the configuration settings. This is true for each
new system you log onto.
Note
Profile names are case sensitive. Changing between upper case and lower case letters
will create additional profiles. To access a profile, you must enter the profile name
exactly as it was created.
___.
WARNING on February 1, 2001 11:23:35 AM MST (0.023 sec elapsed)
Configuration file /usr/opt/hp/svctools/desta/config/Configuration.dat
not found, creating it.
Current Thread[main,5,main]
This warning is expected and correct. The Configuration.dat file is created based on the
contents of the ConfigDefaults*.txt file in the svctools/specific/desta/config
directory. (The warning example shown is for a Tru64 UNIX system.) The classes named in
those files will enroll themselves into the configuration, which is then saved as
Configuration.dat, a binary file that should not be edited directly. Changes made from the
web interface are saved in this file by the Director. This warning should not appear on
subsequent starts of the Director.
If the configuration becomes damaged, or you wish to return to the default configuration state
(the configuration when SEA was first started), make sure no SEA or WEBES processes are
running (including the Director process), and delete the Configuration.dat file. When you
restart SEA, the file will be recreated with the standard defaults, using ConfigDefaults*.txt
the same way it was first time SEA was started.
Note
In Windows, the WEBES registry is stored in the DESTA.REG file in the svctools
installed directory tree, and should not be confused with the Windows Registry.
The desta dri commands allow you to add, view, edit, and remove registry keys.
Note
In OpenVMS, key names and parameters are always put in quotes in order to preserve
mixed-case names and values. For example:
desta dri get “KeyName”
The desta dri add command creates the key within the registry. This command does not
assign any values to the key, but you must create it before you can edit it. To add a key to the
registry, enter the following:
The desta dri get command displays the current value assigned to a key. If the key returns a
value of “null” (for example, CA.WUI.OLMsgWait=null) it does not exist, and you will need to
add it before attempting to make any changes. To view a key, use the get command:
The desta dri set command allows you to enter one or more values for an existing registry
key. Multiple values can be assigned by entering a comma-separated list in quotation marks.
To edit a key, use the set command:
The desta dri del command deletes all of the assigned values, and removes the key from the
registry. To remove a key, use the del command:
CA.WUI.OLMsgWait=90
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
OpenVMS
CA.WUI.OLMsgWait=90
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To add log files which are saved in directories outside of the svctools path, you must first add
the full path of each directory to the CA.WUI.OLDirs key. Multiple directories are added using
a comma separated list.
2. Set the new value for the key using the full path of each directory:
desta dri set CA.WUI.OLDirs “directory1,directory2,...”
CA.WUI.OLDirs=c:\morelogs,d:\evenmorelogs
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To delete the key and remove all directories from the search list, enter:
OpenVMS
2. Set the new value for the key using the full path of each directory:
desta dri set “CA.WUI.OLDirs” “directory1,directory2,...”
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To delete the key and remove all directories from the search list, enter:
Figure 9–3 Add Log Files Tab with Text Entry Field Enabled
When entering a file name into the text entry field (Figure 9–4), the log file must have a .sys,
.evt, .zpd, or .errlog extension. If you wish to add a file with a different extension, you will
need to rename the file so it uses an acceptable file extension.
The text field can only be enabled for users you specify in the CA.WUI.OLText key. It cannot
be enabled for all users unless you list each user individually.
Note
The list of usernames assigned to the CA.WUI.OLText key corresponds to the user
profile entered by the user at the SEA Logon screen (see Section 6.2). SEA profiles
and usernames are not related to the ID a user enters to log on to a system, and they
are not authenticated by SEA during the log on process. It is therefore the
responsibility of those with knowledge of text entry enabled user profiles to protect
them from unauthorized use (i.e., not allowing open access to event logs anywhere on
the system).
2. Set the values for the key by entering a single username, or a comma-separated list of
usernames:
desta dri set CA.WUI.OLText “username1,username2,...”
CA.WUI.OLText=bill,ted
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To delete the key and remove the text field for all users, enter the following:
OpenVMS
2. Set the values for the key by entering a single username, or a comma-separated list of
usernames:
desta dri set “CA.WUI.OLText” “username1,username2,...”
4. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To delete the key and remove the text field for all users, enter the following:
WEBES controls the memory usage by setting the following two DESTA registry entries:
In Java, the heap is the main block of memory that is allocated by the process. Setting the
maximum size of the heap controls how much memory the process can allocate.
The following examples show the registry entries with values set:
Note
WEBES is installed with default heap settings. It is only necessary to adjust the
values if you are having problems with out-of-memory errors.
• The Director process has reached its Java memory limits. These limits are set during
WEBES installation, but may be overridden by setting the values on the registry entries
described in this section.
If the Java memory limits are responsible for the problem, you can raise the memory limits
applied to the Director process and its subprocesses. After the limits have been increased, you
can restart the Director and perform the actions that caused the out of memory error. The limits
can be set as high as necessary, and are only constrained by the memory and paging space
available on the system.
To determine which registry entry to change, find the “out of memory” message in the
Director log file. All messages from the subprocesses start with a “>” character at the
beginning of the line. If the “out of memory” messages begin with “>” characters, as in the
following example, then the subprocess heap limit needs to be raised.
> java.lang.OutOfMemoryError
> at sun.misc.Resource.getBytes(Resource.java, Compiled Code)
> at java.net.URLClassLoader.defineClass(URLClassLoader.java, Compiled Code)
...
The contents of the error message can vary widely. The important element is the
OutOfMemoryError, which can be claimed by Java or other parts of the runtime system.
If the messages do not contain “>” characters at the beginning of the line, as in the following
example, then the Director heap limit needs to be raised.
EXCEPTION java.lang.OutOfMemoryError
at com.compaq.svctools.ca.services.eventreaders.ReaderContext.readEvent
(ReaderContext.java, Compiled Code)
at com.compaq.svctools.ca.services.eventreaders.ReaderContext.getEvent
(ReaderContext.java, Compiled Code)
You can view the current values for the Director heap registry entry with the following
commands:
You can view the current values for the subprocess heap registry entry with the following
commands:
Once you have established a baseline value, you can modify the memory settings using the
procedure for setting the heap size. The procedure varies slightly depending on your operating
system.
Tru64 UNIX
To designate the maximum heap size for the Director set the value of the registry key:
1. Set the value of the registry key by entering the following command at the command
prompt:
# desta dri set desta.director.maxHeapSize XXm
2. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To set the maximum heap size for subprocesses, use the following procedure:
1. Set the value of the registry key by entering the following command at the command
prompt:
# desta dri set desta.subprocess.maxHeapSize XXm
2. Reset the subprocess command line in the desta registry by entering the following
command at the command prompt:
# desta setsub
3. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
OpenVMS
Java on Windows and Tru64 UNIX uses more memory as needed up to the imposed limits.
However, on OpenVMS, Java allocates the entire maximum heap size at startup for the
lifetime of the process. Besides using the following commands to raise the heap sizes, you also
can use them to reduce the heap sizes if the defaults are too resource-intensive for your system.
Be aware that reducing the values limits the event processing that the Director can perform,
and reducing them too much can cause the Director to fail during normal operation.
To designate the maximum heap size for the Director set the value of the registry key:
1. Set the value of the registry key by entering the following command at the command
prompt:
$ desta dri set “desta.director.maxHeapSize” “XXm”
2. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To set the maximum heap size for subprocesses, use the following procedure:
1. Set the value of the registry key by entering the following command at the command
prompt:
$ desta dri set “desta.subprocess.maxHeapSize” “XXm”
2. Delete the subprocess command line registry key by entering the following command at
the command prompt:
$ desta dri del “desta.Subprocess.CommandLine”
3. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
Windows
To set the maximum heap size for the Director process, adjust the value of the registry entry:
1. Set the value of the DESTA registry key with the following command:
C:\> desta dri set desta.director.maxHeapSize XXm
2. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
To set the maximum heap size for subprocesses, use the following procedure:
1. Set the value of the registry key by entering the following command at the command
prompt:
C:\> desta dri set desta.subprocess.maxHeapSize XXm
2. Stop and restart the Director to apply the changes (see Sections 3.8 and 3.7).
9.8.1 Drape
Drape is supported on systems running Tru64 UNIX v5.0 and newer. It provides event
translation support for the Event Management (EVM) event viewer. The event viewer
provides a graphical view of historical events through the common system management
interface. The viewer can be launched through the SysMan Menu or through the SysMan
Station. See the sysman(8) reference page for more information.
If you upgrade your Tru64 UNIX system to a version that supports Drape, use the following
procedure to configure the service:
The next time WEBES is started, the Drape service will be activated.
9.8.2 Indictment
The Indictment service is supported on both Tru64 UNIX and OpenVMS systems. It enables
the system to automatically detect and shut down failing CPUs and certain PCI boards in order
to avoid system crashes. See the operating system documentation for more information on
component indictment. The following sections describe how to configure Indictment on Tru64
UNIX and OpenVMS systems.
Note
You can use the sizer -v command to check the operating system version and
revision number.
The next time WEBES is started, the Indictment service will be activated.
9.8.2.2 OpenVMS
The next time WEBES is started, the Indictment service will be activated.
This chapter describes how SEA can automatically notify you or HP Services whenever
automatic analysis has detected an event.
Problem reports generated by manual analysis do not trigger any kind of automatic
notification.
Provided that you have both types of notification enabled, SEA always sends service event
problem reports both as emails to you (see Section 10.3 Sending Notifications to Email
Addresses) and as secure transmissions to HP Services (see Section 10.4 Sending
Notifications to HP Services).
SEA sends info event reports only to you (see Section 10.3 Sending Notifications to Email
Addresses). HP Services is not notified, even if you have a notification service offering
enabled.
Even though SEA does not log a call to HP Services, you may decide to place your own
customer-initiated call if you want help with system info events.
For email notifications to work, the system must have connectivity to an SMTP server on the
TCP/IP network, or it must be an SMTP server itself. Describing how to configure different
systems as SMTP servers is beyond the scope of this manual, so see the given operating
system documentation if you need help in this area.
• 10.3.1 Settings
• 10.3.2 Disabling Email Notifications
• 10.3.3 Re-enabling Email Notifications
• 10.3.4 Firewall Telnet Checking May Inhibit SMTP Email
• 10.3.5 Open VMS Mail Notification
10.3.1 Settings
During installation, WEBES asks for an SMTP server address, and for the email addresses that
you want to send reports to. Without valid addresses, SEA cannot send email notifications.
After installation, you can change these settings by editing the NotifyCA.txt file in a text
editor. The NotifyCA.txt file is stored at the following location, depending on your operating
system:
• Tru64 UNIX—/usr/opt/hp/svctools/specific/desta/config
• HP-UX—/opt/hp/svctools/specific/desta/config
• Linux—/usr/opt/hp/svctools/specific/desta/config
• OpenVMS—SVCTOOLS_HOME:[SPECIFIC.DESTA.CONFIG]
• Windows—install_directory\specific\desta\config
where install_directory is the directory where SEA was installed
SERVER=smtp.server.xyzcompany.com
[email protected]
[email protected]; [email protected]
[email protected]
• FROM—The domain (the part of an email address following the @ symbol) must be a
real, registered one. Some SMTP servers do not deliver email for fake domain names. For
sendername, you might choose the system name so that recipients see what node sent the
problem report.
• TO—SEA automatically sends copies of problem reports to all users in the TO field. Use
a semicolon to separate additional recipient addresses. Extra spaces are ignored.
• CC (optional)—SEA automatically sends copies of problem reports to all users in the CC
field. Use a semicolon to separate additional recipient addresses. Extra spaces are
ignored.
For changes to the NotifyCA.txt file to take effect, save the file, and stop and restart the
Director (see Sections 3.8 and 3.7).
If your UNIX environment does not allow for SMTP forwarding using the normal protocol,
add the following line to the NotifyCA.txt file:
CMD=mailx -s '%s' %t
You are free to substitute a different mail-sending command for mailx, if desired. SEA
transparently replaces %s with the subject line of the problem report, and %t with all “TO”
addresses, when forming the email message.
As of this release, using the "mailx" feature may result in multiple duplicate problem reports
being sent.Ignore the duplicates.This will be corrected in a future WEBES release.
Caution
Events may continue to occur even though you have chosen not to notify anyone.
Email notifications are enabled by default, and perform correctly provided that you entered
valid SMTP server and email addresses during installation (or when editing NotifyCA.txt after
installation).
desta smtp on
See Section 2.5 "Log Files" for the location of the Director log
Workaround
$ desta vmsmail on
Enter the distribution list as a comma-separated list of VMS mail addresses.
For example, system,node1::m_smith
Addresses without a nodename assumes the local host.
Distribution list[System]
Press “ENTER” to receive the notification mails to the “SYSTEM” account. If you want to
receive the notifications tin your account on node <node1>, then specify the nodename and the
username in the following format.
<node1>::<uname>
To receive notifications in both “SYSTEM” and <uname> accounts specify both “SYSTEM”
and <node1>::<uname> separating them with commas.
To change the list of addresses, execute the command "desta vmsmail off" followed by
"desta vmsmail on" and re-supply the addresses when prompted. The previously entered
addresses will be shown as the default.
SEA does not send “INFO” notifications to your service provider even if you have one of the
service provider notification options enabled (see Section 10.2 Service Events vs. Info
Events).
Note
The HP DSNlink product has retired and is no longer supported by HP. The following
information is obsolete. Although the commands still exist in WEBES, notifications
are not likely to arrive at any HP Services call center. See Section 3.10.4
“SICL/ACHS/DSNlink Notification” for more information.
System Initiated Call Logging (SICL) uses HP DSNLink software to securely transmit
problem reports to HP Services. You must have DSNLink installed on the same system as
SEA before you can enable SICL notifications.
The desta sicl [on | off] command (see Chapter 3) enables or disables SICL notifications.
Note
The SICL command is changed from wsea sicl to desta sicl in an earlier
release. Both commands are not supported in WEBES now and may be removed in a
future release.
When you enable SICL, SEA prompts for an email address so that DSNLink can notify you
whenever it logs a call.
ACHS—Some people also refer to SICL as Automated Call Handling Services (ACHS),
although ACHS more correctly refers to the back-end, receiving systems that handle incoming
SICL problem reports at HP.
Note
The PRS product has now retired. OSEM provides local support similar to the remote
support previously provided by PRS CSG/QSAP,see section 10.5.1 Open Service
Event Manager. The same commands still exist in WEBES to route notifications to
either PRS or OSEM, but WEBES only supports routing to OSEM, not PRS anymore.
See Section 3.10.3 “OSEM Notification (formerly PRS CSG/QSAP)” for more
information. .
Proactive Remote Service (PRS) does not require that its own software be installed on the
same system as SEA. Instead, PRS gets installed on a designated customer service gateway or
CSG. SEA sends problem reports to the customer service gateway for forwarding on to HP.
You must have a customer service gateway configured before you can enable PRS
notifications. See the PRS documentation for details.
QSAP—The customer service gateway was formerly known as the Qualified Service Access
Point (QSAP).
The desta qsap [on | off] command (see Chapter 3) enables or disables PRS
notifications.
When you enable PRS, SEA prompts for the customer service gateway address and the port
number that it listens on:
For ISEE automatic reports, you must install ISEE Client A.03.95 or later on the same system
as SEA. See the ISEE documentation for details.
The desta isee [on | off] command (see Chapter 3) enables or disables ISEE notifications.
The desta qsap command enables or disables OSEM notifications. The command name is
still qsap even though the product has changed. WEBES sends notifications to OSEM using
the same protocol it sent to CSG/QSAP.
To enable notification to OSEM, issue the command and answer the prompts:
desta qsap on
What is the name of the Open Service Event Manager (OSEM, formerly CSG/QSAP)
node [localhost]: mynode.company.com
The name of the OSEM node can be any system running OSEM that is accessible by a "ping",
i.e. a fully qualified hostname with dotted domain, or a simple hostname, or an IP address. All
supported versions of OSEM use the same default port, 2069.
To disable notification to OSEM, issue the command and answer the prompt:
HP SIM runs on Port 280 and uses the SNMP service provided by the operating system for
monitoring SNMP traps.
The desta snmp [on | off] command (see Chapter 3) enables or disables SNMP Notification.
The HP Services analysis tools, WEBES and OSEM, generate service notifications to HP SIM
via a specific SNMP trap type if analysis has determined there are serviceable events.
This is supported in Web-Based Enterprise Services (WEBES) v4.4.1 or greater and Open
Service Event Manager (OSEM) v1.3 or greater. This capability has been a part of HP SIM
since v4.0.
http://www.hp.com/go/hpsim
Upon receipt of service trap notifications from WEBES, HP SIM handles them in much the
same way as any other management event.
There are several ways to view these events. One way is to view them under All Events as this
will always be done by default. Another way is to view them under Event Lists using the
Advanced Search capability. For HP SIM 4.x, the user must use Advanced Search and do the
following:
Search for events where event category name is HP Service Events and type name is any. In
HP SIM 5.0, this is done by default by showing HP Service Events under Event Lists, Events
by Severity list.
The System Name and Event Time refer to the failing system or subsystem and the time the
error was reported.
The Severity is shown as Major since the service notification is only sent if analysis has
determined that a maintenance action should be performed and also since the service trap
contains information in addition to what may be found in the original events such as SNMP
traps sent by Insight Management agents.
In the case of WEBES, notification is sent based on the operating system event log analysis so
there may or may not be other traps sent by management agents.
HP SIM 5.0 ships with a newer version of the service MIB to support enhanced service traps
sent by WEBES v4.4.3.
The new MIB can be compiled into older versions of HP SIM 4.x and will recognize both the
old and new versions of service traps. To obtain the latest Service MIB, visit the following
link:
http://h18023.www1.hp.com/support/svctools/
Select download service MIB under WEBES or OSEM. To register the new service MIB with
HP SIM perform the following procedure on the system running HP SIM:
6. Run "mcompile cpqservice.mib" to compile the new service MIB into the ,cfg format.
RECOVERED FROM ERROR on May 3, 2005 7:28:17 AM MDT (2888.161 sec elapsed)
Error formatting problem report for SNMP
Current Thread[Thread-79,5,main]
EXCEPTION java.net.UnknownHostException: *SEATEST*: *SEATEST*
at java.net.InetAddress.getAllByName0(InetAddress.java:1011)
...causes the following error in the Director log, where "Computer Name Here" will be the
contents of the "Reporting Node" field of the SEA Problem Report:
RECOVERED FROM ERROR on May 3, 2005 8:15:54 PM PDT (990.047 sec elapsed)
Error formatting problem report for SNMP
Current Thread[Thread-91,5,main]
EXCEPTION java.net.UnknownHostException: Computer Name Here
at java.net.InetAddress.getAllByName0(Unknown Source)
desta dtcs on
hostname is prompted for the DTCS server (default value is localhost).
Port number is prompted for the DTCS server (default is 6085).
The desta dtcs on command enables the DTCS notification for the hostname provided (or
the default value). An XML report via HTTP is sent to the port number that is provided (or the
default value).
There should be a file for each heartbeat and each problem report that was sent. The problem
report should contain all of the data of the callout.
The desta dtcs [on | off] command (see Chapter 3) enables or disables DTCS notification.
Provided that you reference the correct file path (see Section 10.6.3 Calling the Profile File),
there is no reason you cannot edit, update, and maintain a profile file in a different location
than the suggested default.
• Tru64 UNIX—/usr/opt/hp/svctools/specific/desta/config/profile.txt
• OpenVMS—SVCTOOLS_HOME:[SPECIFIC.DESTA.CONFIG]PROFILE.TXT
• Windows—{WEBES installed
directory}\svctools\specific\desta\config\profile.txt
By default, WEBES is installed to C:\Program Files\Hewlett-Packard.
You can, however, locate and name the profile file as desired, provided that the system always
has access to it.
• Tru64 UNIX—/usr/opt/hp/svctools/specific/desta/config/desta.reg
Automatic Notifications
10.6 The Customer Profile File
• OpenVMS—SVCTOOLS_HOME:[SPECIFIC.DESTA.CONFIG]DESTA.REG
• Windows—\hp\svctools\specific\desta\config\desta.reg
If you move the profile file from its default location, update the following line in the desta.reg
file. You can edit desta.reg with any text editor.
CA.ACHSProfile=filename
In Windows, backslash characters must be doubled for the path be interpreted correctly. For
example:
CA.ACHSProfile=C:\\Program
Files\\hp\\svctools\\specific\\desta\\config\\profile.txt
Adding storage configuration information to the profile file is very important. For example,
when your storage is part of a storage area network (SAN), event detection occurs within the
SAN itself, but the event information gets logged to all the hosts attached to the SAN
environment. As such, multiple systems may in fact receive event information indicating the
same potential failure because of the shared/redundant resource nature of the SAN.
Ultimately, this one event may be reported as multiple events. With accompanying
configuration information, however, your administrator is able to build a true picture of where
the fault is and more accurately direct resources to the physical location of the problem.
If your system is well bounded (i.e. all storage is direcly attached to SmartArray Controllers
on the servers), simpler configuration information usually is enough.
• ProLiant server
• No attached ESA12000/RA8000 Storage Array Subsystem
Customer: Acme Stonecutting, Inc.
System Type: ProLiant Model 5500
System S/N: V907-BY43-1972 System Name: ARGOSS
System IP address: 123.4.567.89 Fixed(X) DHCP Served ( )
Primary Contact: Fred Flintstone
Secondary Contact: Barney Rubble
Phone number: (xxx) 555-5555
Special Instructions:
Check with customer prior to dispatching services. Prior notification to
security is necessary for service access to site.
Remote call back to system permissible w/prior notification to customer so
that account may be enabled.
CONFIGURATION INFORMATION:
Qty 2 - KZPAC array controllers on PCI bus #1 attached to qty 6 StorageWorks
I shelves w/disks.
• 2 ProLiant servers
• Attached to ESA12000/RA8000 Storage Array Subsystem
• The servers are in an MSCS configuration.
CONFIGURATION INFORMATION:
MS Cluster Systems
SYSTEM: ProLiant Model: 5500
System S/N: V907-BY43-1972 System Name: SNOBAL
System IP address: 192.7.100.99 Fixed(X) DHCP Served ( )
SYSTEM: ProLiant Model: 5500
System S/N: V903-BW43-1972 System Name: QUEBAL
System IP address: 192.7.100.98 Fixed(X) DHCP Served ( )
Compaq FC Switch 16 Serial # 3G944001233
TCPIP 192.7.100.100
Compaq FCSwitch 16 Serial # 3G944001235
TCPIP 192.7.100.101
ESA12000 Array Controller
Subsystem Name: Joiner
joiner-Top >> HSG80 ZG91416110 Software S056P-0, Hardware E06
joiner-Bottom>> HSG80 ZG83502157 Software S056P-0, Hardware E03
ESA12000 Array Controller
Subsystem Name: Partnr
partnr-Top >> HSG80 ZG91516230 Software S056P-0, Hardware E06
partnr-Bottom>> HSG80 ZG91516231 Software S056P-0, Hardware E03
In instances where the system includes attached Enterprise Array Controllers or SAN storage,
the profile file becomes very important in indicating storage configuration, exact FRUs, and
physical location of any failing component.
This appendix provides examples of translated event output and analysis output.
Managed Entity:
Computer Name : Computer Name Here
Brief Description:
S.M.A.R.T. Predictive Failure - ASC x5D ASCQ x00
Callout ID:
FF5D000100010207
Severity:
2
Reporting Node:
Computer Name Here
Full Description :
This drive has S.M.A.R.T. (Self-Monitoring Analysis and
Reporting Technology) designed into the drive.
This particular end-SCSI Disk Device had a ASCQ code of x00, which
is a Generic S.M.A.R.T. Failure Prediction Threshold Exceeded.
FRU List:
Probability : High
Device Type : SCSI Disk
Physical ID : Computer Name Here
Port: x03 Target: x05 LUN: x00
SCSI Inquiry String: DEC RZ29B (C) DEC.RZ29B
Evidence:
Last Time Stamp: Fri 31 Jul 1998 22:33:57 GMT-04:00
Storage Analysis Rule Rev: V2.21
Unique ID: Prefix: 15 Count: 14
Sense_Key: x0000000000000001
ASC: x000000000000005D
ASCQ: x0000000000000000
Device Revision: Not Available
Notifications:
All
Analysis Mode:
Manual
SEA Version:
System Event Analyzer for Windows X4.4 (Build 244)
WCC Version:
Web-Based Enterprise Services Common Components for
Windows X4.4 (Build 244)
A.2.1 Full
Event: 2
Description: VMS Asychronous Device Attention at Mar 1, 2001 9:59:34 AM
GMT-0500 from SABL15
File: ./ca/examples/rx_data.zpd
===============================================================
ucb_name_len 10
ucb_name SABL15$MCA
ucb_dtname_len 0
ucb_dtname
Revision_Information x0000 0001
Family_ID x0000 0016
Member_MC_ID x0000 0007
MC_PCI_Bus_Number x0000 003D
MC_PCI_Slot_Number x0000 0003
MC_PCI_Frame_Size x0000 00A4
Vendor_ID x1011
Device_ID_MC x0018
Bus_Cmd x0146
Bus_Status x0400
Rev_ID 176
RegProg x00
Sub_Class x80
Base_Class x02
Cache_Line_Size x00
Latency_Timer x10
Header_Type x00
BIST x00
Window_Cntl x08
PCITbar x78 0000
Base_Addr_1 x7800 0008
Base_Addr_2 x0000 0000
Base_Addr_3 x0000 0000
Base_Addr_4 x0000 0000
Base_Addr_5 x7800 0008
Cardbus_CIS x0000 0000
Sys_Vendor_ID x0000
Subsystem_ID x0000
Expansion_ROM_Base_Addrx07C0 0000
Interrupt_Line 12
Interrupt_Pin 1
Min_Gnt 0
Max_Lat 0
PCT_Data x0000 0000
MCLcsr x0000 C07A
RPE[1] x1
Rx_Err_Ena[3] x1
Tx_Err_Ena[4] x1
MC_Int_Ena[5] x1
Port_Change_Ena[6] x1
Port_Change_Int[14] x1
INT_Summary[15] x1
A.2.2 Brief
Event: 2
Description: VMS Asychronous Device Attention at Mon Mar 01 20:59:59 MST 2001
from SABL15
File: ./ca/examples/rx_data.zpd
===============================================================
CEH_Device 54
CEH_Device_ID_0 x0000 03FF
CEH_Device_ID_1 x0000 0007
CEH_Device_ID_2 x0000 0007
Unique_ID_Count 0
Unique_ID_Prefix 32,640
Configuration Entry
NOTE
- CONFIGURATION ENTRY encountered in Event Log File.
- A Decomposed Configuration Tree Report is available
for this event, and may be selected seperately for
display in certain user modes.
This appendix describes the factors that may impact the performance of SEA and provides
suggestions for optimizing it.
SEA always relinquishes processor cycles to other programs whenever they need them. In
other words, the program uses whatever resources are available.
At startup SEA needs the available capacity for the scavenge process. Depending on the
system, and the size and content of the log, the initial startup pass can take many minutes or
even hours to complete. The initial analysis occurs only once, four minutes after the Director
has been started. Subsequent restarts of the Director should not result in significant CPU usage
except for the normal startup tasks, which may take from 10 to 30 seconds. After completing
the scavenge process, SEA drops into idle mode, where resource usage hovers at only a few
percent.
If you run SEA in manual mode, large amounts of system resources and processor cycles also
might get used. As in the case of startup in automatic mode, the condition is directly related to
the size and content of the log being processed. Once again, by design, SEA uses as many
resources as are available until processing is completed.
For more information on controlling SEA’s memory usage, see Section 9.7.4.
The DESTA Director process may be too busy scavenging to respond to other requests
from the web interface or the CLI before their time-outs expire, thus, causing the request
to fail. Manual translation or analysis of large binary event logs also may cause the
Director to become too busy to respond to other requests in a timely manner.
The Director will shutdown and record errors in the log. To correct for this problem,
increase the ctrlrStartupTimeout value in the Director Settings (see the WEBES Release
Notes).
• In most cases, performance issues can be resolved by controlling the size of the error logs
you process.
Use filtering to create a smaller error log containing a subset of the events in the original
log. Smaller error log files can speed processing and address performance issues
associated with manual analysis and translation. Filtering may be performed using either
the CLI or the web interface and information on filtering log files is available in
Sections 5.9 and 6.6.
Manage the system error log so that it does not grow indefinitely. One way to accomplish
this is to periodically archive and reset the current error log by following the guidelines in
the WEBES Installation Guide.
Try increasing the total swap space allocation on your system. See the WEBES Installation
Guide for more information on swap space requirements.
On multiprocessor systems, if you have already tried creating a new log file and still receive
processing errors, you may be able to eliminate those errors by forcing the DESTA Director to
run on only one processor. When the DESTA Director runs on only one processor it is less
susceptible to internal synchronization problems, and as a side benefit, it uses less memory.
However, throughput is reduced.
desta.CPUAffinity=t
Another workaround is to remove the swap space limitation that the Director imposes on itself
to prevent it from using too much of the system’s swap space. Normally, swap space usage is
limited to half of the total swap space allocated by the system. Be aware that this workaround
can potentially allow the Director to hang or crash the system if it uses all the available system
swap space. The Director process and the available swap space must be monitored during the
time this workaround is in place (See Section 2.4 for details on monitoring the Director).
To:
ulimit -v $ulimitvOLD
The change only affects the Director process, not any other WEBES processes such as
command-line analysis processes.
B.3.2 OpenVMS
If an OpenVMS system continues to abort when you attempt to process a log file and other
remedies have not solved the problem, copy the error log file to a platform running another
operating system such as Windows or Tru64 UNIX, and analyze the OpenVMS error log from
there instead.
This appendix describes how to configure your browser for SEA and provides troubleshooting
tips for using browsers with the web interface.
• Supported—fully tested
• As-is—not officially tested but may work reasonably well
• Unsupported—known not to work
Supported • Netscape 4.78 or 4.79 • Netscape 4.78 or 4.79 • Netscape 7.1 1 with:
• Mozilla 1.4 or later • Mozilla 1.4 or later the plug-in for Java
applications installed,
and security notifications
disabled
• Netscape 4.8 or 4.9
• Mozilla 1.4 or later
As-Is • Netscape earlier than • Netscape earlier than • Netscape earlier than 4.8
4.78 4.78 • Mozilla earlier than 1.4
• Mozilla earlier than 1.4 • Mozilla earlier than 1.4
1. If you run Netscape 7.1 and have multiple browser windows open, Netscape overwrites its own windows with
new pages when you follow links.
Java Requirements
Web browsers can use different JREs, but the SEA web interface requires certain versions of
Java for each web browser. The following affect all operating systems except OpenVMS
which has special notes described later.
• Internet Explorer (IE) — either the Microsoft Java VM version 1.1.4, or a Sun JRE
version 1.2 or higher.
Internet Explorer on Windows 2000 includes its own Java VM 1.1.4, but no Java is
included in IE on Windows XP, Windows 2003 and Microsoft no longer supplies a Java
VM. You must download and install a Sun JRE instead.
• Netscape — either the Netscape Java VM which is always included with Netscape, or a
Sun JRE version 1.2 or higher.
• Mozilla — Sun JRE version 1.3.1 or higher.
Mozilla does not include any Java VM. You must download and install a Sun JRE. You
can check the version by selecting Tools | Web Development | Java Console. The Java
version is given on the first line of the Java Console window.
http://java.sun.com/j2se/downloads.html
You must have the desired web browser(s) installed before installing the Sun JRE. The JRE
installation program will find and update any installed web browsers so they can use the Sun
JRE.
Tru64 UNIX
Web browsers for Tru64 UNIX can be downloaded from the following web site:
http://h30097.www3.hp.com/internet/download.htm
Not all browsers on this site are supported by WEBES. See the previous table.
OpenVMS
http://h71000.www7.hp.com/openvms/products/ips/cswb/cswb.html
Be sure to read the install documentation and release notes before using SWB for the SEA web
interface.
http://h71000.www7.hp.com/openvms/products/ips/register_mozilla.html
Note
These are Mozilla builds later than the one upon which the Secure Web Browser
(SWB) is based. They are offered on an “as-is” basis by HP, and are supported as-is
by WEBES. The SWB is the preferred and fully supported browser for OpenVMS.
Be sure to read the install documentation and release notes before using Mozilla for the SEA
web interface.
All web browsers for OpenVMS require a JRE to use the SEA web interface or to access any
web site that uses Java. You can either:
• Use the Java JRE embedded in WEBES (preferred when using the SEA web interface
from an OpenVMS Web browser)
Or
• Install and use the Software Development Kit (SDK) v 1.3.1-6 or later for OpenVMS,
downloadable from the following web site:
http://h18012.www1.hp.com/java/alpha/
Special notes apply depending on which option above you choose for accessing the SEA web
interface:
1. Initialize Java as described in the SDK Release Notes. For example, for the SDK v1.4.0,
use either of the following two commands: (The command syntax will differ for different
SDK versions.)
$ @SYS$COMMON:[JAVA$140.COM]JAVA$140_SETUP FAST ! Use the Fast VM
$ @SYS$COMMON:[JAVA$140.COM]JAVA$140_SETUP ! Use the Classic VM
Java functionality within the Web browser should be identical for either initialization
command above, but performance and memory usage may differ.
• Configure your browser to bypass your proxy server when you connect to the Director on
any system.
• Internet Explorer — The “Use HTTP 1.1” option must be enabled for the web interface to
function properly.
To enable the option, select Internet Options from the Tools menu. From the Options
window, select the Advanced tab and make sure the check box next to “Use HTTP 1.1” is
selected.
• Internet Explorer—The “Check for newer versions of stored pages” option should be set
to “Every visit to the page”.
To change the setting, select Internet Options from the Tools menu. On the General tab,
click the “Settings...” button under “Temporary Internet files”. Select “Every visit to the
page” and click OK.
• All Browsers—Java must be enabled for the web interface to function properly. To verify
that Java is enabled, use the procedure for your browser:
Internet Explorer — select Internet Options from the Tools menu. Make sure that the
check box next to Java Console Enabled is selected. Be aware that some versions of
Windows XP do not include Java. If this is the case on your system, follow the
instructions for installing the Sun JRE in Section C.1. (Microsoft no longer supports
downloading the Microsoft VM.)
Netscape — select Preferences from the Edit menu. Click on the Advanced entry and
make sure that the check box next to Java is selected.
• If a screen does not automatically refresh itself, click the link that opened the screen again
to manually refresh it.
• If the web interface is not functioning correctly, click the refresh button. This will reset
the display and open the about screen in the display frame. (If you are using Mozilla, log
in again to the web interface; see Section C.4.3)
• Do not bookmark the web interface after logging on under a username. For example,
bookmarking a URL such as to http://target.sys.name.here:7902/?profile=user
may result in errors. To bookmark the web interface, bookmark the Logon screen
(http://target.sys.name.here:7902). This is true for all browsers.
• If you leave an active web interface session to visit a different web page and the logout
time expires, clicking on the back button to return to your web interface session will
result in multiple errors. In order to log on again, return to the root address of the node
(http://target.sys.name.here:7902) and repeat the log on procedure.
• Under normal operation, the color of hyper-text links changes after the link is visited.
SEA presents dynamic data that is frequently updated; however, the links used to access
the information do not change. As a result of this presentation, the color of links in the
navigation tree may be erratic or incorrect. In most cases, the color of visited links will
not change.
• Because the web pages that make up the interface are generated and refreshed
dynamically, do not use the browser’s back or forward buttons.
You can determine when loading has finished by watching the upper right corner of the
web interface. The text “Loading New Page” appears while the page is loading and
disappears once loading is completed.
If Netscape is using all of the CPU, the browser will appear to wait for SEA. Check your
system’s CPU usage and determine if Netscape is consuming the majority of the
processing time.
Wait twenty to thirty seconds and click the Stop button in the browser’s toolbar. Any
necessary updates are shown in the navigation tree, and you can continue to use SEA
normally. If necessary, you can refresh the display frame by right-clicking on it and
selecting Reload Frame from the pop-up menu. Do not use the Reload button located in
the Netscape toolbar.
• Netscape may not display the contents of the navigation tree correctly. The entries in the
tree may not collapse properly and as a result entries may appear to be overlapping and
blank lines appear in the tree. To fix the navigation tree, click the Refresh Tree button in
the navigation frame.
• Netscape for Windows inserts extra blank lines in saved problem reports. If you use the
Save As option to save SEA problem reports in HTML format, the new HTML file will
contain an extra blank line between every line of text. As a result, the new file appears
double-spaced while the original appears single-spaced. When Netscape’s Save As
operation encounters the <PRE> tag in the original HTML file, it inserts extra lines into the
source of the new file. Thus, regardless of the browser you use to open the new HTML
file, the extra lines are present. Since this problem only affects text formatted with the
<PRE> tag, it does not affect most translated events.
To eliminate the extra spaces, right-click the Frame containing the HTML report and
select View Frame Source from the pop-up menu. A text window containing the HTML
source opens. In that window, press CTRL-A to select all the text and then press CTRL-C
to copy it to the Clipboard. Paste the contents of the clipboard into an editor and save it to
a file.
Some Windows systems may not have this problem, but you should test your system
before assuming that the Refresh button is safe to use.
• Avoid opening the web interface in multiple windows using Netscape 7 and Mozilla. A
frame update in one window can adversely affect the same named frame in another
window. Instead, use tabs to run multiple sessions.
This appendix describes the return codes generated by CLI commands and known messages
sent by SEA to its message logs (see Section 2.5 of this guide for more information on the
message logs). Though the messages may appear to indicate problems, they are known and
expected.
All Commands
• 0 – No error
wsea log, wsea report, wsea sicl, wsea listrk, wsea regknw, wsea msg, desta msg, desta
qsap, desta servob, desta sicl
wsea trans, wsea analyze, wsea filterlog, wsea fru, wsea summ
desta status
• 602 – VM error
• 610 – Unknown argument
• 618 – Unknown class
• 626 – Unknown method
• 634 – Missing environment
• 386 – Insufficient arguments
Note
Current Thread[main,5,main]
This warning is expected and correct the first time the WEBES Director is executed on a
system. See Chapter 9 of this guide for more information.
> WARNING on December 19, 2005 11:24:10 AM MST (3.185 sec elapsed)
> Tracker adding active auto analysis job. Entry_Type_null
This appendix describes the old common syntax and DECevent emulator syntaxes available
with some CLI commands.
See Chapter 5 for more information on syntax designators and the default syntax.
The output generated by a command does not vary depending on syntax. Thus, manually
analyzing a log file with the old common syntax will produce the same output as manually
analyzing the same log file with the new common syntax.
Note
This appendix assumes that you have a working understanding of the SEA
functionality. The other syntaxes described here provide the same output as their
namesakes in the new common syntax. As a result, only command entry information
is given here. For a more detailed description of a particular function see Chapter 5.
E.2 Conventions
Table E–1 describes the conventions used to show CLI commands in this manual.
Convention Meaning
Bold Command text. Bold is used for information that must be typed as it appears.
For example, command verbs are shown in bold.
Italic Variables. Italics are used for information that varies depending on your
requirements. For example, inputfile indicates that you should enter the name
of the file you want to process.
wsea x command_verb
Table E–2 describes the commands supported by the old common syntax:
analyze Performs manual analysis one or more binary event logs. See Section E.3.1 for more
details.
trans Translates one or more binary event logs, but does not analyze the events. See
Section E.3.2 for more details.
summ Returns a summary of all the events contained in a binary event log. See Section E.3.3
for more details.
filterlog Applies a filter to an existing binary event log and creates a new binary event log
containing the subset of events returned after filtering. See Section E.3.4 for more
details.
listrk Lists the registered analysis rule sets. See Section E.3.6 for syntax information and
Chapter 8 for more details on rule sets.
regknw r Registers one or more analysis rule sets for use during automatic and manual event
analysis. See Section E.3.6 for syntax information and Chapter 8 for more details on rule
sets.
regknw u Unregisters one or more analysis rule sets so they are no longer considered during
automatic and manual event analysis. See Section E.3.6 for syntax information and
Chapter 8 for more details on rule sets.
help Displays a text-based help file. The text-file describes the new common syntax.
inputfile—enter the path and name of a binary log file. See Section E.3.5.1 for more
details.
outputfile—enter the path and name where you want the output saved. See
Section E.3.5.2 for more details.
E.3.2 Translation
To perform translation with the old common syntax, use the following command:
inputfile—specify the path and name of a binary log file. See Section E.3.5.1 for more
details.
outputfile—specify the path and name where you want the output saved. See
Section E.3.5.2 for more details.
Select the desired report type using the brief or full modifier.
Create indexed output (instead of tallied output) by using the index modifier.
inputfile—provide the path and name of a binary log file. See Section E.3.5.1 for more
details.
inputfile—provide the path and name of the binary log file you want to filter to create a
new log file. You must provide a input file; however, you cannot use multiple files. See
Section E.3.5.1 for more details.
filterstatement—specify a filter to restrict the events added to the new log file. See
Section E.3.5.3 for more information.
Skip the configuration entries in the input file by using the skipconfig keyword.
To change the binary log file used as input by a command, append the directory and file name
of the desired file to the end of the command. For example:
When you are specifying an input file, the following guidelines apply:
• Specifying an input file is optional. If you do not specify either a directory or a file, SEA
processes the binary system event log.
The old common syntax filterlog command is the exception to this rule and requires an
input file. See Section E.3.4 for more information.
• You can use the relative directory structure to specify input files.
• If you specify a directory but no file name, SEA processes all the files with a .errlog,
.sys, .zpd, or .evt extension located in the provided directory.
• Multiple filenames can be specified by separating them with spaces.
• You can use wildcards to specify multiple files.
Note
These output file guidelines do not apply when you are creating a new binary event
log. See Section E.3.4 for more details.
outtext filename
outhtml filename
The outtext modifier creates a text output file and the outhtml modifier creates a HTML
output file. The filename indicates the path and name where you want to save the output.
E.3.5.3 Filtering
The trans and filterlog commands enable you to filter a binary event log file and only
process a subset of the events. The general rules that apply to filtering in the old common
syntax are:
• Use the filter keyword before the filter statement when filtering with the trans
command.
• Filter statements must be enclosed in quotation marks.
• You can join multiple filter statements by using an ampersand (&) between them.
dtb=date Filters based on the time the event occurred. No events that
(date_time_begin) occurred before the given start time or after the given end time are
dte=date processed. The date can be entered in any format supported by
(date_time_end) Java (for example, dd-mmm-yyyy,hh:mm:ss). You do not need to
include the time (hh:mm:ss) with the date.
rtdb=days Filters based on the time the event occurred relative to the time the
(rel_time_days_begin) first or last event in the log file occurred. Filtering based on days and
rtde=days hours is supported. For example, using the filter rtdb=3 will
(rel_time_days_end) processes all the events that occurred within three days of the first
rthb=hours event in the file.
(rel_time_hours_begin)
rthe=hours
(rel_time_hours_end)
et=nn Filters based on the numeric event type. Be aware of the following
et!=nn guidelines:
et<nn • With the = and != operators you can enter multiple entry types by
et>nn separating them with commas.
(entry_type) • Instead of entering entry type numbers, you can use one of the
supported keywords. See Table E–4 for the supported keywords.
•
cn=name Filters based on the node responsible for generating the event.
cn!=name • Using the = and != operators you can enter multiple entry types by
(computer_name) separating them with commas.
• The name argument is case sensitive.
ost=n Filters based on the operating system type, using the numeric
ost!=n representation for each operating system. With the = and !=
(os_type) operators you can enter multiple entry types by separating them with
commas.
idx=nn Filters based on the event’s position in the event log. The first event
idx!=nn in the file is event index 1. With the = and != operators you can enter
idx<nn multiple entry types by separating them with commas.
idx>nn
(event_index)
sort=keyword Used with a keyword to organize the output. The following keywords
are supported:
• entry—sorts based on entry type from highest entry type number
to lowest
• reventry—sorts based on entry type from lowest entry type number
to highest
• time—sorts based on entry time from most recent to oldest
• revtime—sorts based on entry time from oldest to most recent
• idx—sorts based on the entry index number from highest to lowest
• revidx—sorts based on the entry index number from lowest to
highest
Keyword Description
Processes events that did not occur on the system described by ComputerName that occurred
after January 11, 2000:
Processes events that occurred no more than four days after the first event in the log file:
Processes events that occurred no more than 35 hours before the last event in the log file:
Processes all events, except those of type 610, 620, and 630. Only the common syntax
supports filtering based on specific entry types the other syntaxes must use keywords:
Processes all events with a type less than 300 and an operating system of type 3:
Processes all events without an operating system type of 1 or 2. The translation command
presents the output in reverse chronological order:
Processes all the events after the fifteenth event in the log file:
wsea x listrk
Lists the registered rule sets used by analysis (see Section 8.3.1 for more information).
Registers the rule sets used by analysis (see Section 8.3 for more information).
Unregisters the rule sets used by analysis (see Section 8.3 for more information).
wsea u command_verb
Table E–5 describes the commands supported by the DECevent UNIX syntax:
ana Performs manual analysis one or more binary event logs. See Section E.4.1 for more
details.
-a Translates one or more binary event logs, but does not analyze the events. See
Section E.4.2 for more details.
-o sum Returns a summary of all the events contained in a binary event log. See Section E.4.3
for more details.
-b Applies a filter to an existing binary event log and creates a new binary event log
containing the subset of events returned after filtering. See Section E.4.4 for more
details.
hlp Displays a text-based help file. The text-file describes the new common syntax.
inputfile—enter the path and name of a binary log file. See Section E.4.5.1 for more
details.
outputfile—enter the path and name where you want the output saved. See
Section E.4.5.2 for more details.
E.4.2 Translation
To perform translation with the DECevent UNIX syntax use the following command:
inputfile—specify the path and name of a binary log file. See Section E.4.5.1 for more
details.
Select the desired report type using the brief or full modifier.
filter flags—enter filter flags to limit the events translated. See Section E.4.5.3 for more
details.
outputfile—specify the path and name where you want the output saved. See
Section E.4.5.2 for more details.
inputfile—provide the path and name of a binary log file. See Section E.4.5.1 for more
details.
filter flags—enter filter flags to limit the events translated. See Section E.4.5.3 for more
details.
inputfile—provide the path and name of the binary log file you want to filter to create a
new log file. See Section E.4.5.1 for more details.
filter flags—specify a filter to restrict the events added to the new log file. See
Section E.4.5.3 for more information.
To change the input file used by a command, use the following modifier:
-f filename
Where filename indicates the path and name of the desired binary log file.
For example:
When you are specifying an input file, the following guidelines apply:
• Specifying an input file is optional. If you do not specify either a directory or a file, SEA
processes the binary system event log.
• You can use the relative directory structure to specify input files.
• If you specify a directory but no file name, SEA processes all the files with a .errlog,
.sys, .zpd, or .evt extension located in the provided directory.
• Multiple filenames can be specified by separating them with spaces.
• You can use wildcards to specify multiple files.
Note
These output file guidelines do not apply when you are creating a new binary event
log. See Section E.4.4 for more details.
To specify an output file, add the following modifier to the end of a command:
> filename
The modifier creates a text output file. The filename indicates the path and name where
you want to save the output.
E.4.5.3 Filtering
The -a, -o sum, and -b commands enable you to filter a binary event log file and only process
a subset of the events. You can include multiple filter statements by using more than one
filtering flag in a command. In this case, separate each flag with a space.
-t “s:date e:date” Filters based on the time the event occurred. No events that
occurred before the given start time or after the given end time are
processed. The date can be entered in any format supported by
Java (for example, dd-mmm-yyyy,hh:mm:ss). You do not need to
include the time (hh:mm:ss) with the date. Be aware of the following
guidelines:
• The DECevent UNIX syntax combines the start and end times are
in a single filter statement.
• You can use the keywords YESTERDAY and TODAY.
-i keyword Filters based on the numeric entry type. You must enter a keyword
-x keyword rather than the actual entry type. See Table E–7 for information on
supported keywords.
-H name Filters based on the node responsible for generating the event. The
name argument is case sensitive.
-e s:nn e:nn Filters based on the event’s position in the event log. The first event
in the file is event index 1.
Keyword Description
control_entries System startup entries or new error log creation entries (32, 35, 300).
operating_system= Events with a specific operating system type. The value parameter indicates
value the numeric code for the desired operating system.
os=value
panic Crash re-start, system panic, or user panic entries (37, 302).
Examples—DECevent UNIX
wsea u -a -H ComputerName
wsea u -o sum -H ComputerName
wsea u -b outputfile.bin -f inputfile.zpd -H ComputerName
wsea u -a -t “e:31-Jan-2000,20:33:57”
wsea u -o sum -t “e:31-Jan-2000,20:33:57”
wsea u -b outputfile.bin -f inputfile.zpd -t “e:31-Jan-2000,20:33:57”
wsea u -a -i cpu
wsea u -o sum -i cpu
wsea u -b outputfile.bin -f inputfile.zpd -i cpu
Processes all events without an operating system type of 1. The translation command presents
the output in reverse chronological order:
wsea u -a -x operating_system=1 -R
wsea u -o sum -x operating_system=1
wsea u -b outputfile.bin -f inputfile.zpd -x operating_system=1
Processes all the events after the fifteenth event in the log file:
wsea u -a -e s:15
wsea u -o sum -e s:15
wsea u -b outputfile.bin -f inputfile.zpd -e s:15
wsea v command_verb
Table E–8 describes the commands supported by the DECevent OpenVMS syntax:
/ana Performs manual analysis one or more binary event logs. See Section E.5.1 for more
details.
/tra Translates one or more binary event logs, but does not analyze the events. See
Section E.5.2 for more details.
/sum Returns a summary of all the events contained in a binary event log. See Section E.5.3
for more details.
/bin Applies a filter to an existing binary event log and creates a new binary event log
containing the subset of events returned after filtering. See Section E.5.4 for more
details.
/help Displays a text-based help file. The text-file describes the new common syntax.
outputfile—enter the path and name where you want the output saved. See
Section E.5.5.2 for more details.
inputfile—enter the path and name of a binary log file. See Section E.5.5.1 for more
details.
E.5.2 Translation
To perform translation with the DECevent OpenVMS syntax, use the following command:
outputfile—specify the path and name where you want the output saved. See
Section E.5.5.2 for more details.
Select the desired report type using the /brief or /full modifier.
filter flags—enter filter flags to limit the events translated. See Section E.5.5.3 for more
details.
inputfile—specify the path and name of a binary log file. See Section E.5.5.1 for more
details.
filter flags—enter filter flags to limit the events translated. See Section E.5.5.3 for more
details.
inputfile—provide the path and name of a binary log file. See Section E.5.5.1 for more
details.
filter flags—specify a filter to restrict the events added to the new log file. See
Section E.5.5.3 for more information.
inputfile—provide the path and name of the binary log file you want to filter to create a
new log file. See Section E.5.5.1 for more details.
To change the input file used by a command, add the path and file name of the desired file to
the end of the command.
For example:
When you are specifying an input file, the following guidelines apply:
• Specifying an input file is optional. If you do not specify either a directory or a file, SEA
processes the binary system event log.
• You can use the relative directory structure to specify input files.
• If you specify a directory but no file name, SEA processes all the files with a .errlog,
.sys, .zpd, or .evt extension located in the provided directory.
• Multiple filenames can be specified by separating them with spaces.
• You can use wildcards to specify multiple files.
Note
These output file guidelines do not apply when you are creating a new binary event
log. See Section E.5.4 for more details.
/out=filename
The modifier creates a text output file. The filename indicates the path and name where
you want to save the output.
wsea v /ana/out=results.txt
E.5.5.3 Filtering
The /tra, /sum, and /bin commands enable you to filter a binary event log file and only
process a subset of the events. You can include multiple filter statements by using more than
one filtering flag in a command.
/SIN=”date” Filters based on the time the event occurred. No events that
/BEF=”date” occurred before the given start time or after the given end time are
processed. The date can be entered in any format supported by
Java (for example, dd-mmm-yyyy,hh:mm:ss). You do not need to
include the time (hh:mm:ss) with the date. You can use the
keywords YESTERDAY and TODAY.
/INC(keyword) Filters based on the numeric entry type. You must enter a keyword
/EXC(keyword) rather than the actual entry type. See Table E–10 for information on
supported keywords.
/NOD=name Filters based on the node responsible for generating the event. The
name argument is case sensitive.
/ENT=(S:nn,E:nn) Filters based on the event’s position in the event log. The first event
in the file is event index 1.
/REV Processes the events in reverse order according to the event index
number.
Keyword Description
control_entries System startup entries or new error log creation entries (32, 35, 300).
operating_system= Events with a specific operating system type. The value parameter indicates
value the numeric code for the desired operating system.
os=value
panic Crash re-start, system panic, or user panic entries (37, 302).
Examples—DECevent OpenVMS
wsea v /tra/nod=ComputerName
wsea v /sum/nod=ComputerName
wsea v /bin=outputfile.bin/nod=ComputerName inputfile.zpd
wsea v /tra/bef=”31-Jan-2000,20:33:57”
wsea v /sum/bef=”31-Jan-2000,20:33:57”
wsea v /bin/bef=”31-Jan-2000,20:33:57”
wsea v /tra/inc(cpu)
wsea v /sum/inc(cpu)
wsea v /bin=outputfile.bin/inc(cpu) inputfile.zpd
Processes all events without an operating system type of 1. The translation command presents
the output in reverse chronological order:
wsea v /tra/EXC(operating_system=1)/rev
wsea v /sum/EXC(operating_system=1)
wsea v /bin=outputfile.bin/EXC(operating_system=1) inputfile.zpd
Processes all the events after the fifteenth event in the log file:
wsea v /tra/ent=(s:15)
wsea v /sum/ent=(s:15)
wsea v /bin=outputfile.bin/ent=(s:15) inputfile.zpd
A|B|C|D|E|F| |H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z
A
access ID
An alphanumeric string that identifies a customer. Enterprise customers probably will have more
than one ID. (They may be assigned one per site, for example.) Other systems may refer to this
alphanumeric string as the service ID.
ACHS
Automatic Call Handling System. Within the service provider’s customer service center, ACHS
accepts incoming event analysis messages that were initiated by SICL.
analysis
The process of interpreting events from a binary event log and generating problem reports that
describe any problems and possible corrective actions. SEA supports two modes of analysis:
automatic and manual.
attribute
A component of a service. Some attributes can be configured by the user to modify how SEA
services operate.
automatic
One of the analysis modes supported by SEA. In automatic mode, SEA monitors the binary system
event log, analyzes events, and generates reports without user intervention. See also manual.
See ACHS.
B
binary event log
A log file containing system data saved in binary format. Binary error logs are processed by SEA,
and the results of this analysis are presented in problem reports.
Bit to text
See BTT.
BTT
Bit to text. The BTT process translates events contained in the binary log file into text output. See
also translation.
C
CADC
Crash Analysis Data Collector. On Windows systems, CADC is required before the system can
collect operating system failure information and format it into a footprint that CCAT can then
analyze. The Tru64 UNIX and OpenVMS operating systems come with built-in utilities that create
such footprints.
CCAT
Computer Crash Analysis Tool. CCAT is a remote operating system failure analysis tool and is a
WEBES component.
CEH
CLI
Command line interface. The SEA CLI uses the command prompt to interact with the system. The
CLI processes commands entered at the command prompt and returns information and results as
text, either to the terminal window or to designated output files.
See CLI.
common attributes
See CEH.
See CCAT.
See CADC.
The PRS system that connects customer managed systems with the outside world. Events from the
managed systems are accumulated to a single customer service gateway platform on the customer
premises for transmission to the service provider.
D
DESTA
Distributed Enterprise Service Tools Architecture. DESTA is the engineering code name for the
WEBES software suite architecture. Consider any references to DESTA to be roughly synonymous
with WEBES itself.
See DESTA.
DHCP
Dynamic Host Configuration Protocol. DHCP is a protocol for automatic TCP/IP configuration that
provides dynamic and static address allocation and management.
Director
The continuously-running WEBES process responsible for managing a system and communicating
with other systems.
DSNLink
A service tool that allows two-way SICL communications between a customer system and a service
provider system.
See DHCP.
E
event
extended attributes
F
field
See FRU.
frame
FRU
G
global attribute
group
I
Instant Support Enterprise Edition
See ISEE.
ISEE
Instant Support Enterprise Edition. HP ISEE automates remote support over the Internet by using
electronic notifications similar to those from SICL or PRS. ISEE service providers can use remote
diagnostic scripts to analyze supported systems and devices.
J
Java
See JDK.
See JRE.
See JVM.
JDK
Java Development Kit. The JDK is a set of development tools used for creating Java applications.
such as SEA.
JRE
Java Runtime Environment. JRE is runtime code that enables Java applications to be distributed
freely.
JVM
Java Virtual Machine (or Java VM). The JVM is an abstract computing machine with an instruction
set and various memory areas. The JVM understands the Java class file, which contains its
instructions. The JVM is part of the JDK, and part of better versions of various browsers.
L
log file
Either a binary file containing system events or a text file containing error and informational
messages written by WEBES processes.
M
manual
One of the modes of operation supported by SEA. In manual mode, the user specifies the binary log
files and events to be analyzed by SEA. See also automatic.
N
node
notification
The automatic sending of analysis information to interested parties. SEA supports automatic
notification to email addresses, and also can notify service provider support centers via SICL or
PRS.
P
PCSI
POLYCENTER Software Installation. PCSI is a software installation and management tool for
OpenVMS systems. PCSI can package, install, remove, and manage software products.
See PCSI.
See PRS.
problem report
The output generated by analysis. Problem reports contain information about errors and suggested
corrective actions.
profile
Configuration information associated with a log on name. The profile contains information about
Director settings and navigation frame appearance that can be preserved for future sessions.
PRS
Proactive Remote Service. PRS lets customer systems self-monitor and securely report problems
and events to a service provider. In addition, service representatives can securely connect back to a
remote customer system for non-disruptive repair and maintenance. PRS uses WorldWire and is the
next evolution from the original SICL service offering.
Q
QSAP
Qualified Service Access Point. QSAP is an older name for the customer service gateway.
See QSAP.
R
RCM
Revision and Configuration Management. In versions prior to 4.2, RCM was a WEBES component
that collected configuration, revision, and patch data from supported systems.
register
See RCM.
Files that define what conditions must be met in order to trigger automatic analysis.
S
SEA
System Event Analyzer. SEA is a remote system event monitoring tool and is a WEBES component.
service
service ID
An alphanumeric string that identifies a customer. Enterprise customers probably will have more
than one ID. (They may be assigned one per site, for example.) Other systems may refer to this
alphanumeric string as the access ID.
service obligation
An agreement with HP for use of the WEBES tools. The service obligation defines the terms of your
support agreement with HP.
SICL
System Initiated Call Logging. SICL uses DSNLink to send fault and failure messages to the service
provider’s customer service center. The messages are then received by ACHS, analyzed, and acted
upon as appropriate. The follow-up service offering to SICL is PRS.
See SMTP.
SMTP
Simple Mail Transfer Protocol. SMTP is a TCP/IP protocol governing email transmission and
reception.
See SVP.
SVP
String and value pairs. SVP is the format used to present information in generated reports. The
string describes the type of information presented and the value indicates the system specific
information.
system configuration
The software settings for SEA. The system configuration can be changed using any of the
interfaces.
See SEA.
See SICL.
T
TCP/IP
translation
The process of converting binary event logs into readable output. See also BTT.
See TCP/IP.
U
UniCensus
unregister
W
WBEM
WCC
WEBES Common Components. The WCC are required portions of WEBES that allow the tool suite
to function as an integrated installation. The WCC are separate from the individual tools in the
WEBES suite (SEA and CCAT) and are almost always transparent to the user. See also WCCProxy.
WCCProxy
Like the WCC, the WCCProxy is another required part of WEBES. After WEBES installation, the
WCCProxy appears as a separately installed kit and represents WEBES functionality not developed
in the Java environment. The WCCProxy contains functions that allow WEBES to interact properly
with the operating system.
See WBEM.
See WEBES.
WEBES
Web-Based Enterprise Services. WEBES is an integrated set of web-enabled service tools that
includes the System Event Analyzer (SEA) and Computer Crash Analysis Tool (CCAT), as well as
the required components WCC and WCCProxy. See also DESTA.
See WCC.
web interface
The SEA interface accessed through a web browser. The web interface uses graphical displays to
present information and relies on a combination of mouse and keyboard actions to interact with the
system.
WorldWire
A service tool that allows for secure two-way PRS communication between a customer system and
a service provider system.