IBM AIX Enterprise Edition System Administration Guide
IBM AIX Enterprise Edition System Administration Guide
ibm.com/redbooks
International Technical Support Organization IBM AIX Enterprise Edition System Administration Guide May 2009
SG24-7738-00
Note: Before using this information and the product it supports, read the information in Notices on page xvii.
First Edition (May 2009) This edition applies to IBM AIX Enterprise Edition 6.1 (product number 5765-AEZ).
Copyright International Business Machines Corporation 2009. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Chapter 1. Introduction and overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 AIX Enterprise Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Comparing AIX offerings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 IBM Service Management (ISM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.5 Integration of the components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.6 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.7 Hardware prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.8 Lab overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Chapter 2. Planning and sizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.1 Planning and sizing virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.1.1 Virtualization advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 Planning and sizing logical partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3 Planning and sizing Workload Partition Manager . . . . . . . . . . . . . . . . . . . 11 2.3.1 Additional resources for virtualization . . . . . . . . . . . . . . . . . . . . . . . . 12 2.4 Planning and sizing DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.4.1 DB2 installation requirements for DB2 server . . . . . . . . . . . . . . . . . . 12 2.4.2 DB2 file systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.4.3 DB2 users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.5 Planning and sizing IBM Tivoli Monitoring V6.2 . . . . . . . . . . . . . . . . . . . . 14 2.5.1 IBM Tivoli Monitoring processor considerations . . . . . . . . . . . . . . . . 15 2.5.2 IBM Tivoli Monitoring memory and disk sizing requirements . . . . . . 15 2.5.3 IBM Tivoli Monitoring database estimation . . . . . . . . . . . . . . . . . . . . 16 2.5.4 IBM Tivoli Monitoring server protocols and values . . . . . . . . . . . . . . 18
iii
2.5.5 IBM Tivoli Monitoring additional considerations . . . . . . . . . . . . . . . . 18 2.6 Planning and sizing TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2.6.1 TADDM terminology and architecture . . . . . . . . . . . . . . . . . . . . . . . . 19 2.6.2 TADDM hardware sizing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.7 Planning and sizing IBM Tivoli Usage and Accounting Manager . . . . . . . 23 2.7.1 IBM Tivoli Usage and Accounting Manager architecture . . . . . . . . . 24 2.7.2 IBM Tivoli Usage and Accounting Manager requirements . . . . . . . . 25 2.7.3 Estimating IBM Tivoli Usage and Accounting Manager database size . 26 Chapter 3. Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3.1 Launchpad. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.2 Installing and configuring DB2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 3.3 Installing and configuring IBM Tivoli Monitoring V6.2 . . . . . . . . . . . . . . . . 50 3.3.1 Pre-installation preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 3.3.2 Installing IBM Tivoli Monitoring from the Launchpad . . . . . . . . . . . . 52 3.3.3 Installing the Tivoli Enterprise Monitoring Server . . . . . . . . . . . . . . . 53 3.3.4 Installing the Tivoli Enterprise Portal Server . . . . . . . . . . . . . . . . . . . 66 3.3.5 Install and configure the Base agents . . . . . . . . . . . . . . . . . . . . . . . . 77 3.3.6 Install and configure System p agents . . . . . . . . . . . . . . . . . . . . . . . 82 3.3.7 Installing the Warehouse Proxy agent . . . . . . . . . . . . . . . . . . . . . . . 87 3.3.8 Installing the Summarization and Pruning agent. . . . . . . . . . . . . . . . 91 3.3.9 Configuring and starting the Virtual I/O Server agent . . . . . . . . . . . . 94 3.3.10 Viewing the Tivoli Enterprise Console. . . . . . . . . . . . . . . . . . . . . . . 96 3.4 Installing and configuring TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 3.4.1 Preparing AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 3.4.2 Install DB2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 3.4.3 Create DB2 database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 3.4.4 Install TADDM 7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 3.4.5 DNSLookup configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 3.5 Installing and configuring IBM Tivoli Usage and Accounting Manager . . 117 3.5.1 Our lab environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 3.5.2 Installation process overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 3.5.3 Installing the Application server . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 3.5.4 Database configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 3.5.5 Set up the processing directories . . . . . . . . . . . . . . . . . . . . . . . . . . 139 3.5.6 Run sample jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 3.5.7 AIX and Virtual I/O Server data collectors. . . . . . . . . . . . . . . . . . . . 143 3.5.8 AIX Advanced Accounting overview . . . . . . . . . . . . . . . . . . . . . . . . 144 3.5.9 AIX data collector installation and configuration . . . . . . . . . . . . . . . 145 3.6 Installing and configuring WPAR manager . . . . . . . . . . . . . . . . . . . . . . . 150 3.6.1 WPAR concept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 3.6.2 WPAR Manager components and functions . . . . . . . . . . . . . . . . . . 152
iv
Chapter 4. Operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 4.1 Live Application Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 4.2 Operating TM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 4.2.1 Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 4.2.2 Views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 4.2.3 Managing Tivoli Monitoring Services . . . . . . . . . . . . . . . . . . . . . . . 168 4.2.4 Historical data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 4.2.5 Understanding situation events. . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 4.2.6 IBM Tivoli Monitoring command line . . . . . . . . . . . . . . . . . . . . . . . . 175 4.2.7 The cinfo command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 4.2.8 The SetPerm command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 4.2.9 Best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 4.3 Operating TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 4.3.1 Starting and stopping the TADDM server . . . . . . . . . . . . . . . . . . . . 185 4.3.2 Discover components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186 4.3.3 Customizing TADDM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 4.3.4 Analytics and reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 4.3.5 Performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 4.4 Operating IBM Tivoli Usage and Accounting Manager . . . . . . . . . . . . . . 237 4.4.1 IBM Tivoli Usage and Accounting Manager collectors . . . . . . . . . . 237 4.4.2 Collecting AIX and VIOS accounting data. . . . . . . . . . . . . . . . . . . . 241 4.4.3 Loading AIX accounting data into the database . . . . . . . . . . . . . . . 242 4.4.4 Installing Business Intelligence and Reporting Tools (BIRT) . . . . . 250 4.4.5 Troubleshooting IBM Tivoli Usage and Accounting Manager . . . . . 266 Abbreviations and acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 How to get IBM Redbooks publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Contents
vi
Figures
1-1 ITSO project infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2-1 Tivoli data warehouse database size estimation worksheet . . . . . . . . . . . 17 2-2 Multiple Domain Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2-3 IBM Tivoli Usage and Accounting Manager architecture . . . . . . . . . . . . . 25 3-1 License agreement for ME for AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 3-2 The main page of the Launchpad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 3-3 License agreement for ME for AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 3-4 Installing DB2 through Launchpad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3-5 Selecting DB2 setup directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3-6 Installing a product panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 3-7 Welcome to the DB2 Setup wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3-8 Software License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3-9 Selecting the installation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3-10 Selecting install, response file creation, or both panel . . . . . . . . . . . . . . 42 3-11 Select the installation directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3-12 Set user information for the DB2 Administration Server . . . . . . . . . . . . . 44 3-13 Set up a DB2 instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 3-14 Set up notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 3-15 Start copying files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3-16 installation progress panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3-17 Setup has completed successfully . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 3-18 Lab environment self-monitoring topology . . . . . . . . . . . . . . . . . . . . . . . 50 3-19 Launchpad Initial window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3-20 Installing Tivoli Monitoring options from the Launchpad . . . . . . . . . . . . . 54 3-21 Installing the Tivoli Enterprise Monitoring Server . . . . . . . . . . . . . . . . . . 55 3-22 Installing the Tivoli Enterprise Monitoring Server . . . . . . . . . . . . . . . . . . 56 3-23 Installation progress information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3-24 Tivoli Enterprise Monitoring Server Installation . . . . . . . . . . . . . . . . . . . . 58 3-25 Tivoli Enterprise Monitoring Server Installation completion . . . . . . . . . . 59 3-26 Additional configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 3-27 Installing the application support for the agents . . . . . . . . . . . . . . . . . . . 65 3-28 Tivoli Enterprise Portal Server installation window . . . . . . . . . . . . . . . . . 67 3-29 Installation setup directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3-30 Tivoli Enterprise Portal Server installation progress window . . . . . . . . . 69 3-31 Tivoli Enterprise Portal Server installation success window . . . . . . . . . . 70 3-32 Installing the TEPS support for monitoring agents . . . . . . . . . . . . . . . . . 71 3-33 Select installation path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 3-34 Configuring the Tivoli Enterprise Portal. . . . . . . . . . . . . . . . . . . . . . . . . . 75
vii
3-35 3-36 3-37 3-38 3-39 3-40 3-41 3-42 3-43 3-44 3-45 3-46 3-47 3-48 3-49 3-50 3-51 3-52 3-53 3-54 3-55 3-56 3-57 3-58 3-59 3-60 3-61 3-62 3-63 3-64 3-65 3-66 3-67 3-68 3-69 3-70 3-71 3-72 3-73 3-74 3-75 3-76
Installing the Base agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Installing Base agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Base agents successfully installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Configuration options for the Base agents . . . . . . . . . . . . . . . . . . . . . . . 81 Agent configuration shell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Starting the Base agents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Installation options window for System p agents . . . . . . . . . . . . . . . . . . 83 System p agents installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Configure System p agents window . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Installation parameters for System p agents . . . . . . . . . . . . . . . . . . . . . . 86 Starting the System p agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Installing the Warehouse Proxy agent . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Installation information window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Configuring the Warehouse Proxy agent . . . . . . . . . . . . . . . . . . . . . . . . 90 Installing the Summarization and Pruning agent. . . . . . . . . . . . . . . . . . . 91 Tivoli Enterprise Console login window. . . . . . . . . . . . . . . . . . . . . . . . . . 96 Enterprise view of the environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Launchpad to install TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Prompt for database and TADDM on a separate server . . . . . . . . . . . . 102 Selecting TADDM setup directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 InstallShield Wizard Welcome panel. . . . . . . . . . . . . . . . . . . . . . . . . . . 103 License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Selecting the installation directory for TADDM . . . . . . . . . . . . . . . . . . . 105 Defining a TADDM user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Choose the installation type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Selecting server type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Port information for TADDM Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Port information for domain manager server. . . . . . . . . . . . . . . . . . . . . 110 Specifying RMI information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Optional CCMDB host name and port. . . . . . . . . . . . . . . . . . . . . . . . . . 112 Select database type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Database configuration information . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Select user registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Completion of TADDM installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 TUAM lab set up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Create database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Successful database completion message . . . . . . . . . . . . . . . . . . . . . . 121 IBM Tivoli Usage and Accounting Manager Launchpad Installation . . 122 CD prompt. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 InstallShield Wizard for Usage and Accounting Manager . . . . . . . . . . . 123 IBM Tivoli Usage and Accounting Manager Virtualization Edition License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
viii
3-77 IBM Tivoli Usage and Accounting Manager Virtualization Edition summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 3-78 IBM Tivoli Usage and Accounting Manager Virtualization Edition InstallShield status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 3-79 IBM Tivoli Usage and Accounting Manager Virtualization Edition installation completion message. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 3-80 Integrated Solutions Console Welcome page . . . . . . . . . . . . . . . . . . . . 129 3-81 Adding JDBC driver db2jcc.jar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 3-82 Adding JDBC driver db2jcc_license_cu.jar . . . . . . . . . . . . . . . . . . . . . . 133 3-83 Adding or editing a data source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 3-84 Setting the Default Admin, Processing, and Reporting data source . . . 135 3-85 Data Source ISC window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 3-86 Initialize database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 3-87 Confirmation window for database initialization . . . . . . . . . . . . . . . . . . 138 3-88 Results of database initialization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 3-89 ISC Configuration Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 3-90 ISC Configuration tab Reporting page . . . . . . . . . . . . . . . . . . . . . . . . . 141 3-91 Sample log output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 3-92 Load tracking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 3-93 IBM Tivoli Usage and Accounting Manager data flow. . . . . . . . . . . . . . 144 3-94 WPARs reduce LPARs but still provide workload isolation . . . . . . . . . . 151 3-95 Components of WPAR Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 4-1 Table view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 4-2 Pie chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 4-3 Bar chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 4-4 Plot chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 4-5 Circular gauge. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 4-6 Linear gauge . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167 4-7 Manage Tivoli Enterprise Monitoring Services . . . . . . . . . . . . . . . . . . . . 169 4-8 History Collection Configuration window . . . . . . . . . . . . . . . . . . . . . . . . . 170 4-9 Situation Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 4-10 Attributes of a situation formula. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 4-11 Situation event indicators (states) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 4-12 TADDM console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 4-13 Open or save the configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 4-14 Login panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 4-15 Scope Set Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 4-16 Adding scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 4-17 Adding a computer system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 4-18 Adding a database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 4-19 The list of computer systems and the database . . . . . . . . . . . . . . . . . . 194 4-20 Running discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 4-21 Discovery Log Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Figures
ix
4-22 4-23 4-24 4-25 4-26 4-27 4-28 4-29 4-30 4-31 4-32 4-33 4-34 4-35 4-36 4-37 4-38 4-39 4-40 4-41 4-42 4-43 4-44 4-45 4-46 4-47 4-48 4-49 4-50 4-51 4-52 4-53 4-54 4-55 4-56 4-57 4-58 4-59 4-60 4-61 4-62 4-63 4-64
Reload the view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 List search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Selecting IBM AIX Computer System . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Show Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Details of a computer system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Selecting a DB2 instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Details of a database instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Topology for Application Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . 205 Zooming in on topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Physical Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Showing the details of a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Schedule discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Defining the scope in the discovery schedule . . . . . . . . . . . . . . . . . . . . 210 History of discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Creating a version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 Collecting unknown servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Identifying unknown server patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Creating a custom server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 Selecting config files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 Repositioning a custom server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Sendmail custom server discovered . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Creating a Business Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Assigning components for the Business Application. . . . . . . . . . . . . . . 220 Administrative information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Creating a second Business Application . . . . . . . . . . . . . . . . . . . . . . . . 221 Assigning components for the second Business Application . . . . . . . . 222 Showing Business Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Creating a Business Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Creating Business Service Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Assigning Business Applications to the Business Service . . . . . . . . . . 225 Showing the Business Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Selecting Physical Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Showing the physical topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Change History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 Results of Change History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Editing Computer Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Adding Config Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Selecting component type for Inventory report . . . . . . . . . . . . . . . . . . . 233 Inventory report by component type . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 File name and type for the inventory report . . . . . . . . . . . . . . . . . . . . . 235 Sample output of inventory report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Creating a new job by using the ISC. . . . . . . . . . . . . . . . . . . . . . . . . . . 243 SampleAIXAA.xml. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
4-65 IBM Tivoli Usage and Accounting Manager Job Runner . . . . . . . . . . . 248 4-66 IBM Tivoli Usage and Accounting Manager Job Runner complete message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 4-67 Log files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 4-68 Eclipse folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 4-69 Eclipse security warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 4-70 BIRT Workspace Launcher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 4-71 New project window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 4-72 New Report Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 4-73 BIRT main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 4-74 Edit data Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 4-75 Manage JDBC Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 4-76 Manage JDBC Drivers completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 4-77 Database connection test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 4-78 Edit Data Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 4-79 Edit SQL Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 4-80 Setting report parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 4-81 Run Total Invoice BIRT report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 4-82 BIRT Run Total Invoice report PDF . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 4-83 BIRT Invoice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 4-84 BIRT Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
Figures
xi
xii
Tables
1-1 2-1 2-2 2-3 2-4 2-5 2-6 2-7 2-8 3-1 3-2 3-3 3-4 3-5 4-1 4-2 4-3 4-4 4-5 4-6 AIX offerings and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Installation requirements for DB2 Server . . . . . . . . . . . . . . . . . . . . . . . . . 13 Default DB2 user IDs and groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Memory and disk requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Tivoli Monitoring server protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Entities discovered by TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Minimum software requirements for IBM Tivoli Usage and Accounting Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Core requisite file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Table estimation and mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 The list of media that is included in EE for AIX . . . . . . . . . . . . . . . . . . . . . 30 DB2 database users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 IBM Tivoli Monitoring product codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 AIX Advanced Accounting record types . . . . . . . . . . . . . . . . . . . . . . . . . 145 Tivoli Usage and Accounting Manager AIX collector installation files . . . 146 Chart types and their best uses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Discovery profiles by default in TADDM . . . . . . . . . . . . . . . . . . . . . . . . . 195 IBM Tivoli Usage and Accounting Manager processing scripts . . . . . . . 237 IBM Tivoli Usage and Accounting Manager cron job descriptions . . . . . 240 IBM Tivoli Usage and Accounting Manager cron job log files . . . . . . . . . 240 Tivoli Usage and Accounting Manager trace and log file information . . . 270
Tables
xiii
xiv
Examples
2-1 Custom DB2 user ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3-1 Installing Firefox on AIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 3-2 File systems created for DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3-3 Creating users for db2 instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3-4 Creating DB2 instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3-5 Tivoli Enterprise Manager Installation Output . . . . . . . . . . . . . . . . . . . . . . 61 3-6 Installation of the Tivoli Enterprise Monitoring Server . . . . . . . . . . . . . . . . 62 3-7 Installation completion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 3-8 The cinfo command displaying running processes . . . . . . . . . . . . . . . . . . 64 3-9 Starting the Tivoli Enterprise Monitoring Server from the command line . 66 3-10 The itmcmd multi agent start. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 3-11 IBM Tivoli Monitoring application Group ID and user ID . . . . . . . . . . . . . 92 3-12 User and Group ownership in the $CANDLEHOME directory . . . . . . . . 93 3-13 Showing itm1 running agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 3-14 Installing and configuring sudo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 3-15 Creating database for TADDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 3-16 TUAM embedded WAS server restart. . . . . . . . . . . . . . . . . . . . . . . . . . 128 3-17 Connecting to database and listing buffer pool . . . . . . . . . . . . . . . . . . . 130 3-18 Creation of larger buffer pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3-19 Creation of a regular table space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3-20 Creation of temporary table space . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3-21 Restarting the database manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 3-22 Installation script: install-tuam.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 3-23 The install-tuam.sh output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 3-24 Configuration and start of data collector on Virtual I/O Server . . . . . . . 150 4-1 The cinfo command. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 4-2 The cinfo product details for the TEMS. . . . . . . . . . . . . . . . . . . . . . . . . . 183 4-3 Running Tivoli Enterprise Monitoring processes . . . . . . . . . . . . . . . . . . . 184 4-4 Start or stop TADDM server as a TADDM admin user . . . . . . . . . . . . . . 186 4-5 Editing /etc/hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 4-6 IBM Tivoli Usage and Accounting Manager processing script: tuam-getdata.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 4-7 IBM Tivoli Usage and Accounting Manager cron jobs . . . . . . . . . . . . . . 239 4-8 Data collection: tuam-getdata.sh. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 4-9 AIXAA.xml . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 4-10 Increasing UDB Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 4-11 File system sizes in AIX and file system full condition . . . . . . . . . . . . . 268
xv
xvi
Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurement may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrate programming
xvii
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: AIX 5L AIX BladeCenter DB2 Enterprise Storage Server Everyplace GPFS IBM Power Systems POWER4 POWER5 POWER6 PowerHA PowerPC PowerVM POWER pSeries Redbooks Redbooks (logo) RS/6000 System p System x Tivoli Enterprise Console Tivoli TotalStorage WebSphere Workload Partitions Manager z/OS
The following terms are trademarks of other companies: Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporation and/or its affiliates. Red Hat, and the Shadowman logo are trademarks or registered trademarks of Red Hat, Inc. in the U.S. and other countries. EJB, J2EE, J2SE, Java, JDBC, JVM, and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Excel, Internet Explorer, Microsoft, PowerPoint, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others.
xviii
Preface
This IBM Redbooks publication will help you install, tailor, and configure AIX Enterprise Edition 6.1 (5765-AEZ) and its incorporated IBM Tivoli systems management tools. This publication provides AIX Systems Administrators a broad understanding of the new features and products that make up the AIX Enterprise Edition offering. It will help you design or create a solution to maximize efficiencies and help organizations get the most from their Power Systems platform. AIX Enterprise Edition includes all the features of AIX with additional management software that is designed to complement the features of AIX V6.1. AIX Enterprise Edition is available only with AIX V6.1. AIX Enterprise Edition is designed to improve the manageability of a virtualized AIX environment. Potential benefits include: Improved service availability through access to relevant, real-time information about IT resources Enhanced operational efficiency through visualization of the relationships of IT resources and applications Improved operational efficiency by centralizing monitoring and automating the response to service issues Better utilization of IT resources through consolidated views of virtualized resource usage Improved service availability through Live Application Mobility Simplified ordering of AIX and essential service management tools at an attractive price
xix
provisionng, Network Installation Management (NIM), Security, and PowerHA. He also co-authored Workload Partition Management in IBM AIX Version 6.1, SG24-7656. Erin Fitzgerald is a Senior System Administrator at IBM United States. She has 14 years of experience in AIX and Linux systems on Power Systems and System x hardware. She has worked at IBM for 13 years. Erin is an AIX Certified Advanced Technical Expert. Her areas of expertise include NIM, Cluster Systems Management (CSM), and security. SeongLul Son is a Senior IT specialist working at IBM Korea. He has 13 years of experience in the IT industry and is a Certified Advanced Technical Expert for System p. His areas of expertise include networking, Power Systems virtualization, NIM, PowerHA, and General Parallel File System (GPFS). He also co-authored the Deploying Oracle 10g RAC on AIX 5L with GPFS, SG24-7541, AIX 5L Version 5.3 Differences Guide, SG24-7463, and AIX 5L and Windows 2000: Solutions for Interoperability, SG24-6225. Scott Vetter, PMP, managed the project that produced this publication. Thanks to the following people for their contributions to this project: Anirban Chatterjee, Jay Kruemcke, Jennifer Kuvlesky, Yoichiro Ishii IBM, Austin Bob Pitt and Mark Matthews IBM, Australia JinHyung Cho, SeHee Kim, JungJun Lim, HyunKuk Moon, and RaeSung Park IBM Korea Prince Ravindran IBM India Alex Abderrazag IBM, UK Henning Gammelmark Bankdata, Denmark David Bennin, Don Brennan, Rich Conway, Ann Lund, and Emma Jacobs International Technical Support Organization, Poughkeepsie Center A special thanks to Budi Darmawan of International Technical Support Organization, Austin Center. Budis expertise and product knowledge along with his willingness to assist the team significantly contributed to and greatly aided in developing the depth and quality of this book.
xx
Comments welcome
Your comments are important to us. We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks publications in one of the following ways: Use the online Contact us review IBM Redbooks publications form found at: ibm.com/redbooks Send your comments in an e-mail to: [email protected] Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400
Preface
xxi
xxii
sponsorship promotion
Breakthrough Data Recovery for AIX Environments THIS PAGE INTENTIONALLY LEFT BLANK
Disaster Recovery.
Download our free white paper and learn how to ensure you have a cost-effective disaster recovery solution that works for you... not against you. Click to download: visionsolutions.com/breakthroughRB2
the above is a paid promotion. it does not constitute an endorsement of any of the above company's products, services or websites by ibm. nor does it reflect the opinion of ibm, ibm management, shareholders or officers. ibm disclaims any and all warrantees for goods or services received through or promoted by the above company.
Chapter 1.
Table 1-1 AIX offerings and tools Offering AIX Enterprise Edition (EE) Description AIX 6 including the Workload Partition Manager, Tivoli Monitoring, Tivoli Application Dependency Discovery Manager, and Tivoli Usage and Accounting Manager Virtualization Edition Tivoli Monitoring, Tivoli Application Dependency Discovery Manager, and Tivoli Usage and Accounting Manager Virtualization Edition The AIX operating system OS support AIX 6.1 OS included Yes
No
AIX 6.1, AIX 5.3, and AIX 5.2 AIX 6.1, AIX 5.3, and IBM i AIX 6.1
Yes
Performance Management for Power Systems PowerVM Workload Partitions Manager for AIX (Workload Partition Manager) IBM Systems Director
No
Cross-systems management for Workload Partitions and enablement for Live Application Mobility Cross-system platform management
No
No
When these areas are isolated, there can be penalties for noncompliance and service level violations. Enter IBM Service Management, a way to align your organization and all its related functions with your business. IBM Service Management encompasses the management processes, tactics, and best practices needed to deliver business services. IBM Service Management is about developing, deploying, and managing services, helping to reduce IT and operations costs by automating processes, and helping to more effectively manage compliance. It is about increasing flexibility and getting products, solutions, and services to market more quickly. It is about helping to respond to changes more efficiently and effectively than ever before. IBM Service Management is designed with one thing in mind: to help you manage your business. Because IBM understands that IT and operations are very much a part of your business, we offer powerful tools to help you align the four primary components of your business: People Processes Information Technology IBM Service Management lets you pull these critical components together with an array of tightly integrated solutions that can be viewed as three interconnected layers: IBM Process Management IBM Operational Management IBM Service Management Platform
1.4 Components
The AIX Enterprise Edition offering consists of a number of individual tools that combine to give an overall package designed to meet all the management and monitoring needs of the Power systems servers within the environment. The AIX Enterprise Edition package bundle consists of: AIX Version 6.1 PowerVM Workload Partitions Manager for AIX (WPAR Manager) IBM Tivoli Monitoring IBM Tivoli Application Dependency Discovery Manager (TADDM)
IBM Tivoli Usage Accounting Manager Virtualization Edition for Power Systems An embedded version of DB2 Enterprise Server Edition (ESE) Note that this component is only offered for use with the Tivoli components
1.6 Advantages
The enterprise service management tools that make up the AIX Enterprise Edition offering have been designed make the manageability of AIX virtualized environments more efficient and to allow organizations to maximize the performance and utilization of their Power Systems environments. The AIX Enterprise Edition provides visualization of system resources and application utilization and their behavior either in a historical view or in real time. It provides for a single central interface for monitoring and automation of all aspects of the environment and the ability to manipulate systems within the environment as well as to monitor the usage and accounting from all AIX hosts in the environment. Live Application Mobility and the centralization function of the Workload Partition Manager provide for a single point of control in the environment for managing Workload Partitions (WPARs). Workload Partition Manager for AIX provides for improved system utilization and application performance by enabling more efficient load balancing throughout the operating system and enterprise environment. It improves application availability by giving the systems administrator the flexibility to seamlessly relocate workloads from one host to another host without disruption to the application, thus, increasing availability by reducing the need for planned outages due to system maintenance.
POWER6 570 lpar01 aix lpar02 itm lpar03 taddm lpar04 tuam
Syst e m St or age
D S4200
4 GB / s
2 GB / s
POWER6 570 lpar01 aix10 lpar02 itm10 lpar03 taddm10 lpar04 tuam10
ThinkV ision
570
570
550
Chapter 2.
10
Disaster recovery Using the rapid provisioning features, additional instances of the application can be deployed quickly. An image copy of the instance can also be kept in order to speed up recovery. Reduced power and cooling requirements By virtualizing your resources, you can consolidate the load on fewer machines and reduce the overall power usage and cooling requirements.
11
When building a WPAR from the command line, you can configure and start it within a few minutes: Network File System (NFS) is a prerequisite to the WPAR mobility functionality. At least 256 MB of main memory is required. At least one disk to store the operating system (for AIX, the rootvg) is required. At least one disk adapter or integrated adapter to access the disk is required. At least one LAN adapter per partition to connect to the HMC is required.
12
Table 2-1 Installation requirements for DB2 Server AIX Version 6.1 Operating system 64-bit AIX kernel xlC.rte 9.0.0.0 xlC.aix61.rte 9.0.0.0 Hardware All processors that are capable of running the supported AIX 6.1 operating system: Power 4 or above
13
Table 2-2 Default DB2 user IDs and groups User ID dasusr1 db2fenc1 db2inst1 Group dasadm1 db2fgrp1 db2grp
These IDs can be used to create your database instance and install your Tivoli application, or you can create a custom DB2 user ID and group to help identify the instance with which the db2 user ID is associated. Example 2-1 shows how to create a DB2 user ID and group specifically for Tivoli Usage and Accounting Manager.
Example 2-1 Custom DB2 user ID
TUAM10:]mkgroup -A uamdbgrp TUAM10:]mkuser -a pgrp=uamdbgrp ituamdb TUAM10:]mkgroup -A uamdbadm TUAM10:]mkuser -a pgrp=uamdbadm dbadmusr TUAM10:]mkgroup -A uamfgrp TUAM10:]mkuser -a pgrp=uamfgrp uamfusr
14
15
Table 2-3 Memory and disk requirements Component Memory requirementsa Small environmentc Hub Monitoring Server Remote Monitoring Server Portal Server Portal Client (Browser or Desktop) Tivoli Data Warehouse 70 MB 100 MB 100 MBf 150 MB 2-4 GB depending on database configuration paramenters Large environmentd 100 MB 300 MB 300 MBf 300 MB 2-8 GB depending on database configuration paramenters Disk storage requirementsb
650 MBe 250 MBe 800 MB 150 MB Follow the IBM Tivoli Monitoring Version 6.2.0 Installation and Setup Guide, GC32-9407 to estimate the database size.g 150 MB 150 MB
50 MB 100 MB
100 MB 300 MB
a. The memory and disk sizings shown in this table are the amounts required for the individual component beyond the needs of the operating system and any concurrently running applications. b. The disk storage estimates apply to any size monitoring environment and are considered high estimates. The size of log files affects the amount of storage that is required. c. A small environment is considered to be a monitoring environment with 500 to 1000 agents, with 100 to 200 monitored agents per remote monitoring server. d. A large environment is considered to be a monitoring environment with 3000 or more monitored agents, with 500 to 1000 monitored agents per remote monitoring server. e. The storage requirements for the hub and remote monitoring servers do not include storage for the agent depot, which can require an additional 1 GB or more. f. The memory requirement for the portal server does not include database processes for the portal server database, which require up to 400 MB of additional memory, depending on configuration settings. g. One of the factors to consider when planning the size of the database that you need is the amount and type of information that you will collect for agent history data collection. Refer to the Planning Considerations for the Tivoli Data Warehouse chapter in the IBM Tivoli Monitoring Version 6.2.0 Installation and Setup Guide, GC32-9407, to estimate database size.
16
a system administrator calculate the amount of disk space that is required of the data for each attribute group. This information can then be used to complete the following calculations that will determine how large the database needs to be: Determine the number of detailed records per day for each attribute group Determine the storage footprint for each attribute group Determine the amount of detailed data for the attribute group Calculate the amount of aggregate data for the attribute groups Note: IBM Tivoli Monitoring is capable of recording large amounts of data if the recording interval is short, and if the scope of the recording is large. Validate your estimates with testing when your installation is complete. The system administrator might prefer to use the planning speadsheet available in the IBM Tivoli Monitoring information center that is shown in Figure 2-1. Alternatively, you might prefer to use the Warehouse Load Projection tool that is available at the IBM Tivoli Open Process Automation Library at the following URL: http://www.ibm.com/software/tivoli/opal This tool does all the calculations for you and includes data for the monitoring agents.
17
SNA
Log mode IP.PIPE IP.SPIPE IP.PIPE port number. Default is 1918. IP.SPIPE port number. Default is 3660.
18
19
Discovery sensors reside on the TADDM server and collect configuration attributes and dependencies. TADDM offers a wide variety of discovery sensors to enable immediate discovery of virtually all components that are found in the typical data center, across the application software, host, and network tiers.
20
Table 2-5 Entities discovered by TADDM Entity Network tier Description TADDM discovers the following devices at the network tier, along with the MIB2 (RFC 1213) parameter values for each device: Routers Switches Load balancers Firewalls Generic IP devices TADDM discovers the following devices at the system tier: Server hosts and disks Host IP interfaces Database servers Load balancers or clusters TADDM discovers the following components at the application tier, along with version, configuration files and properties, host information, and vendor-specific extensions for each component (except the generic processes): Custom servers, based on custom templates that you design Java 2 Platform, Enterprise Edition (J2EE) application servers and configurations J2EE and Java 2 Platform, Standard Edition (J2SE) components and modules Web server components Web modules, configuration files, and installation directories Generic Java virtual machine (JVM) processes Databases The system infrastructure services that support the application environment are discovered along with the dependency structure between these service components and the application components. The infrastructure service components are: DNS and Network File System (NFS) services LDAP
System tier
Application tier
21
Description In addition to the discovery of components, the physical and logical connectivity at the network, system, and application tiers is discovered at the following level of support in each of the tiers: Layer 3 IP connectivity Layer 2 connectivity Application component runtime dependencies Infrastructure service dependencies
On target servers: ssh lsof Note: You can install the ssh filesets from the Expansion Pack, while the unzip, sudo, and lsof files are in AIX Toolbox for Linux.
TADDM server
The TADDM server must have the following attributes: 100 GB of available disk space 2 - 4 CPUs with a minimum process speed of 2 GHz 4 - 8 GB of memory 4 - 8 GB of swap space
22
Note: The size of a server that is shown in this section handle up to hundreds or thousands of target servers, depending on how many CIs each target server has. However, if you do not have many target servers, a small amount of CPU and memory might be suitable in your environment. For example, we have the TADDM server and database installed on the same server with 1 CPU (4.2 Ghz) and 6 GB of memory in our test environment. It is difficult to provide a standard number of CIs in a server. The actual number of CIs in a server varies depending on the complexity of the infrastructure; for example, a complex database server with a large number of instances, databases, and table spaces has a larger number of CIs per server, and the number of CIs affects the overall performance. For further information about sizing TADDM, refer to the following publication: Deployment Guide Series: IBM Tivoli Application Dependency Discovery Manager V7.1, SG24-7616.
An actual large-scale implementation had the following numbers. Having been running weekly discoveries of about 2500 hosts and network devices for 14 months uses about 7 GB of space. The reason that the planning information cannot be better qualified is that the determining factor, besides the number of hosts and devices, is the number of components that are discovered in the environment and the rate of change. Both of these factors can vary tremendously from one environment to another environment. In addition, the size of an individual component varies as well, for example, how many EJBs are deployed in a WebSphere Application Server, or how many tables exist in a database? Using Custom Server Templates and Computer System Templates to collect and track files can also greatly influence the capacity requirements of the CMDB.
2.7 Planning and sizing IBM Tivoli Usage and Accounting Manager
IT departments are faced with unparalleled pressures to operate as businesses and align IT costs with company priorities, which is difficult to accomplish, especially when those resources are shared in your infastructure. With Tivoli
23
Usage and Accounting Manager, Virtualization Edition (VE), you can help solve this problem by collecting, tracking, and reporting this usage. Understanding the overall usage of the system gives you a better picture to more effectively utilize CPU and memory resources in a shared environment, which can help manage costs. Note: IBM Tivoli Usage and Accounting Manager, Virtualization Edition (VE) as part of AIX Enterprise Edition or Management Edition for AIX is fully supported.
24
http://www.eclipse.org Web site and installed separately from IBM Tivoli Usage and Accounting Manager. Database server The data server stores the information that is produced by the processing engine. It does not have to run on the same system or platform as the processing engine. DB2 V9.1 is supported for Tivoli Usage and Accounting Manager and is included with the installation CDs. You can select to install DB2 at the time that you select to install IBM Tivoli Usage and Accounting Manager. Figure 2-3 shows the Tivoli Usage and Accounting Manager Virtualization Edition layout. In the next sections, we describe the components of IBM Tivoli Usage and Accounting Manager and the database to help you plan for the installation in your environment.
Collection
Administration Reporting Data collector File
Processing
File
Application Server
Reporting Server
Process engine
JDBC TUAMDB
25
Table 2-6 Minimum software requirements for IBM Tivoli Usage and Accounting Manager Operating system Browser Hard disk drive space AIX 5.3 or AIX 6.1 Firefox 2 5 GB minimum, 40 GB recommended (available hard disk drive space) Note: This size varies by environment. 3 GHz minimum 2 GB minimum If you use DB2 and the server is on another server than the database, you must install the DB2 client connection software on the TUAM server. The Java Database Connectivity (JDBC) drivers for DB2. The drivers are installed with DB2 and are db2jcc.jar and db2jcc_license_cu.jar. Red Hat Package Manager (RPM) Embedded WebSphere Application Server (installed during IBM Tivoli Usage and Accounting Manager installation) Integrated Solutions Console (ISC) installed during the IBM Tivoli Usage and Accounting Manager installation BIRT Report Engine and Report Designer available for download from http://www.eclipse.org for running data usage reports.
2.7.3 Estimating IBM Tivoli Usage and Accounting Manager database size
In this section, we discuss estimating the Tivoli Usage and Accounting Manager database growth. Because it is a data and collection processing tool, it collects
26
and loads data into the database and keeps it for a certain period of time. Estimating its growth is critical to ensuring that the space is properly located and the resulting performance impact can be addressed (such as the time to back up the data, query response time, response needs, and so on.) We start by checking our database size in the AIX file system directly after creation. The data size is roughly 350 MB, including the database catalog and the database log files.
Data elements
The primary growth in the database comes from the following usage and accounting data: Resource utilization The collection of the resource usage metrics from the AcctCSR file. Collection is provided by an identifier for each resource (rate code). This collection is optional. You do not need to collect the resource usage. Billing summary This data provides a summary for each resource (rate code) by account code. This data links to the identifier table for to get the identifier key for each of the entries here. The data is one-to-one mapping for the BillDetail.txt file. This data provides individual entries from the AcctCSR file. It gives the individual occurrences of source usage by resource name (rate code). This data links to the identifier table to get the identifier key for each of the entries here. The data is one-to-one mapping from the Ident.txt file. This data lists the identifiers that are used by each billing detail entry. The data is one-to-one mapping from the Ident.txt file.
Billing detail
Identifier table
Important tips to keeping the database size manageable are: Run the DBpurge program using the Job runner to remove old data. Because Tivoli Usage and Accounting Manager data is an accounting financial tool, you might want to archive the data first. Sort by the Account_Code field before running the billing, or use a Common Source Resource (CSR) or Common Source Resource Plus (CSR+) file for billing input. Only collect the identifiers and resources in which you are interested. Modify the sample collection jobs, change the mapping, and remove any unwanted identifiers and resources fields.
27
Number of identifiers Each identifier is put in a separate row in the CIMSDETAILIDENT table. Identifier mix This number is the number of unique identifiers in each collection. You must be able to estimate this number based on your understanding of the collection process.
Table 2-8 provides a list of how the database rows map to the database table.
Table 2-8 Table estimation and mapping Name CIMSRESOURCE UTILIZATION CIMSSUMMARY CIMSDATAIL CIMSDETAILIDENT Row size 300 300 350 75 Affecting source Source, Account_Code, Identifier mix, RateCode, Shift, and number of days Source, Account_Code, RateCode, Shift, and number of days Source, Account_Code, Identifier mix, Rate per id, Shift, and number of days <Ident mix> x <Ident count>
28
Chapter 3.
29
3.1 Launchpad
Launchpad is a program that helps you to install all the Tivoli products included in EE for AIX from a centralized GUI. EE for AIX consists of Launchpad, DB2, and three Tivoli products. The list of media shipped in the EE for AIX package is provided in Table 3-1.
Table 3-1 The list of media that is included in EE for AIX Product Launchpad V2.2 DB2 ESE V9.1 Fix Pack 4 IBM Tivoli Monitoring V6.2 Fix Pack 1 Tools IBM Tivoli Monitoring System p agents TADDM V 7.1 IUAM VE7.1 Media format DVD DVD DVD CD DVD CD Approximate size 476 MB 326 MB 2.66 GB 312 MB 4.17 GB 555 MB
Installing Firefox
In order to use the Launchpad, you need to install a Web browser on AIX. We installed Firefox browser on our system. Example 3-1 on page 31 shows the steps for installing Firefox on AIX. We downloaded the Firefox code from the following Web site: http://www-03.ibm.com/systems/power/software/aix/browsers/index.html The prerequisite files are also included in the downloaded filesets. Install those files first, and then install Firefox.
30
Note: When installing the Red Hat Package Manager (RPM) prerequisites for Firefox, if you get an error message about missing X11 libraries (libX11.a(shr.o) and so forth) that are already installed on your system, you need to run the following command: # /usr/sbin/updtvpkg On AIX, the RPM package database creates a virtual package named AIX-rpm, which represents a snapshot of all of the installp files installed on the system. However, this virtual package can become out-of-date if you install additional installp software on the system after you have installed the rpm.rte fileset. The /usr/sbin/updtvpkg command will update the virtual package AIX-rpm to match the current state of the system.
Example 3-1 Installing Firefox on AIX ## Download and unzip Firefox.base.tar.gz
taddm10:/mnt/Firefox ] ls
Firefox Firefox.base.tar.gz Java5_64.sdk.tar.gz atk-1.10.3-2.aix5.1.ppc.rpm cairo-1.0.2-6.aix5.1.ppc.rpm expat-1.95.7-4.aix5.1.ppc.rpm fontconfig-2.2.2-5.aix5.1.ppc.rpm freetype2-2.1.7-5.aix5.1.ppc.rpm gettext-0.10.40-6.aix5.1.ppc.rpm glib2-2.8.1-3.aix5.1.ppc.rpm gtk2-2.8.3-9.aix5.1.ppc.rpm libjpeg-6b-6.aix5.1.ppc.rpm libpng-1.2.8-5.aix5.1.ppc.rpm libtiff-3.6.1-4.aix5.1.ppc.rpm pango-1.10.0-2.aix5.1.ppc.rpm xcursor-1.0.2-3.aix5.1.ppc.rpm xft-2.1.6-5.aix5.1.ppc.rpm xrender-0.8.4-7.aix5.1.ppc.rpm zlib-1.2.3-3.aix5.1.ppc.rpm
taddm10:/mnt/Firefox ] rpm -ivh *.rpm error: failed dependencies: libX11.a(shr4.o) is needed by libX11.a(shr4.o) is needed by libXext.a(shr.o) is needed by libX11.a(shr4.o) is needed by libX11.a(shr4.o) is needed by libX11.a(shr4.o) is needed by libX11.a(shr4.o) is needed by
taddm10:/mnt/Firefox ] ls -l /usr/sbin/updtvpkg -rwxr-x--1 root system 3880 Mar taddm10:/mnt/Firefox ] /usr/sbin/updtvpkg Please wait... taddm10:/mnt/Firefox ] rpm -ivh *.rpm
2 17:11 /usr/sbin/updtvpkg
31
taddm10:/mnt/Firefox/Firefox ] ls .toc README.install Firefox.base download-prerequisites.sh taddm10:/mnt/Firefox ] smitty installp Install Software Type or select values in entry fields. Press Enter AFTER making all desired changes. [TOP] * INPUT device / directory for software * SOFTWARE to install PREVIEW only? (install operation will NOT occur) COMMIT software updates? SAVE replaced files? AUTOMATICALLY install requisite software? EXTEND file systems if space needed? OVERWRITE same or newer versions? VERIFY install and check file sizes? Include corresponding LANGUAGE filesets? DETAILED output? Process multiple volumes? ACCEPT new license agreements? [MORE...8] F1=Help F5=Reset F9=Shell F2=Refresh F6=Command F10=Exit F3=Cancel F7=Edit Enter=Do [Entry Fields] . [Firefox.base no yes no yes yes no no yes no yes yes
> + + + + + + + + + + + +
F4=List F8=Image
If you have successfully completed the installation of the Web browser, put the Launchpad media into the media drive and run launchpad.sh. Remember that you need to have a graphical user environment to invoke the Launchpad with the Web browser.
32
Running the launchpad.sh file prompts you to accept the license agreement as shown in Figure 3-1. Read the license agreement for ME for AIX (the same panel will be displayed for the EE installation), and click Accept.
33
Figure 3-2 shows the main page of the Launchpad where you can install all the products in ME for AIX. Browse each menu in the left pane for future installation.
34
/home/db2inst1
This name is the default name for the database instance home. It varies in size depending on the database configuration, and it grows over time as data is added to the database.
Example 3-2 shows the installation and configuration of DB2 for the TADDM server that is used in this publication. You can select other naming conventions that are appropriate for your environment.
Example 3-2 File systems created for DB2 taddm10:/ ] lspv hdisk0 00c1f170aa7f638b hdisk1 00c1f170b4c335e3 taddm10:/ ] lsvg -l appvg appvg: LV NAME TYPE LPs loglv00 jfs2log 1 fslv00 jfs2 128 /home/db2inst1 fslv02 jfs2 128 taddm10:/ ] mount /home/db2inst1 taddm10:/ ] mount /opt/IBM/db2 rootvg appvg active active
PVs 1 1 1
/opt/IBM/db2
To install DB2 Enterprise Server: 1. Log on to the taddm10 server as root and change the directory to where the Launchpad is located, which is /mnt/launchpad. 2. Run the launchpad.sh command to display the Management Edition (ME) for AIX Launchpad panel, which is shown in Figure 3-3 on page 36. 3. Read the license agreement for ME for AIX and click Accept.
35
The next window (Figure 3-4 on page 37) shows the main page of Launchpad where you can install all the products in ME for AIX. 4. Select Install DB2 from the left pane. There are two options that you can choose: you can either install DB2 with the fix pack or you can just apply the fix pack on an existing instance.
36
5. Select Install IBM DB2 Database Enterprise Server Edition, Version 9.1 with Fix Pack 04 incorporated as shown in Figure 3-4.
6. In the next window, provide the installation setup directory path where the DB2 installation image resides as shown in Figure 3-5. Click OK.
37
7. Click Install New to install DB2 as shown in Figure 3-6. We need to have at least 120 MB of free space for the /tmp file system.
38
8. The next window shows the Welcome to the DB2 Setup wizard panel, which is shown in Figure 3-7. The DB2 Setup wizard leads you through the installation process. Notice the list of 14 installation steps on the left side of the wizard panel. As the setup wizard leads you through the installation of DB2, this list reminds you where you are in the installation process. 9. Click Next.
The next window is the Software License Agreement panel. Read through the licensing agreement.
39
10.If you agree with the terms, click Accept and then click Next as shown in Figure 3-8.
40
11.The next window shows the Select the installation type panel, which is shown in Figure 3-9. Select Typical: 490 - 590 MB and then click Next.
41
In the next window, you have an option to choose whether to create a response file with the same configuration for future installation, which is shown in Figure 3-10. 12.Select Install DB2 Enterprise Server Edition on this computer and click Next.
In the next window, you select the installation directory. Provide a directory where you want to put the DB2 files.
42
13.For a basic install, select the default and click Next, which is shown in Figure 3-11.
43
14.On the next window, enter the information for the DB2 Administration Server (DAS) user information. We accepted the default values and entered a password for the user, which is shown in Figure 3-12. 15.Click Next.
Figure 3-12 Set user information for the DB2 Administration Server
The next window lets you create a DB2 instance. In DB2, an instance is an independent environment where database objects can be created and applications can be run against them.
44
16.We will create the DB2 instance later; therefore, select Do not create a DB2 instance as shown in Figure 3-13. 17.Click Next. Important: If you operate in an environment that requires a consistent user ID/group ID (UID/GID) for applications, database users, and groups, you need to manually assign and manage these UIDs/GIDs to ensure consistency between hosts in your environment. Installing via the GUI, by default, will allocate the next available ID, which might not be the most appropriate in all environments. In addition, in case you set up an expiration policy for a password, set up database users so that they cannot be expired.
45
18.Select Do not set up your DB2 server to send notifications at this time as shown in Figure 3-14. 19.Click Next.
46
20.If you are satisfied with the settings, then click Next as shown in Figure 3-15.
In the next window, a progress panel appears while the files are copied as shown in Figure 3-16.
47
The next window (shown in Figure 3-17) is displayed when all of the files have been copied and DB2 Enterprise Server is successfully installed.
Example 3-3 on page 49 shows the AIX commands that create the required users.
48
Example 3-3 Creating users for db2 instance taddm10:/mnt/TADDM71 ] mkgroup db2grp1 taddm10:/mnt/TADDM71 ] mkuser pgrp=db2grp1 db2inst1 taddm10:/mnt/TADDM71 ] mkuser pgrp=db2grp1 archuser taddm10:/mnt/TADDM71 ] passwd db2inst1 Changing password for "db2inst1" db2inst1's New password: Re-enter db2inst1's new password: taddm10:/mnt/TADDM71 ] passwd archuser Changing password for "archuser" archuser's New password: Re-enter archuser's new password: taddm10:/mnt/TADDM71 ] login db2inst1 db2inst1's Password: [compat]: You are required to change your password. Please choose a new one. db2inst1's New password: Re-enter db2inst1's new password: $ login archuser archuser's Password: [compat]: You are required to change your password. Please choose a new one. archuser's New password: Re-enter archuser's new password:$
49
50
51
52
53
To start the installation: 1. Accept the license agreement if prompted. After you accept the licensing agreement, you will be presented with the main Install Monitoring window. From here, the steps that are required to perform a silent installation are laid out logically in the left sidebar. Alternately, you can choose the option Install IBM Tivoli Monitoring interactively. This option launches a Korn shell (ksh) that prompts you for the required configuration parameters for the installation. This option is essentially identical to installing the product from the command line.
54
Note: We recommend the Silent Mode installation if you are inexperienced with the IBM Tivoli Monitoring product. This method prompts for the information that the wizard requires to complete an install of the selected component. Figure 3-21 shows the options for installing and configuring the Tivoli Enterprise Monitoring Server (TEMS) from the Launchpad. From this window, you can either select the components that you want to install or configure from the list in the left sidebar. The following sections guide you through each of these tasks.
55
56
After the install process has initiated, the install log is logged to the display window within the Launchpad while the component is installed. The install process will also identify any of the particular install logs that you need to inspect or review after the component is installed. You can view the entire log by utilizing the scroll bar as shown in Figure 3-23.
57
After this installation completes successfully, click the link in Step 2 (Figure 3-25 on page 59).
58
59
Next, you enter additional install parameters that are required to finalize the configuration of the TEMS hub as shown in Figure 3-26.
Configuration options
The configuration options provided in the Korn shell (ksh) that is spawned by the Launchpad are identical to the configuration options that are displayed if the install is initiated from the command-line interface (CLI) using the install.sh script from the directory that contains the IBM Tivoli Monitoring install images (provided in Example 3-5 on page 61): 1. When prompted for the IBM Tivoli Monitoring V6.2 home directory, press Enter to accept the default (/opt/IBM/ITM). 2. If you want to use another installation directory, type the full path to that directory and press Enter. 3. The output shown in Example 3-5 on page 61 is displayed. Type 1 to start the installation and press Enter. The user license agreement is displayed. Press Enter to read through the agreement.
60
Select one of the following: 1) 2) 3) 4) Install products to the local host. Install products to depot for remote deployment (requires TEMS). Install TEMS support for remote seeding Exit install.
Please enter a valid number: 1 Initializing ... install.sh warning: unarchive of "/appo/itm62/unix/jraix526.tar" may have failed, continuing ... International Program License Agreement Part 1 - General Terms BY DOWNLOADING, INSTALLING, COPYING, ACCESSING, OR USING THE PROGRAM YOU AGREE TO THE TERMS OF THIS AGREEMENT. IF YOU ARE ACCEPTING THESE TERMS ON BEHALF OF ANOTHER PERSON OR A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT AND WARRANT THAT YOU HAVE FULL AUTHORITY TO BIND THAT PERSON, COMPANY, OR LEGAL ENTITY TO THESE TERMS. IF YOU DO NOT AGREE TO THESE TERMS, - DO NOT DOWNLOAD, INSTALL, COPY, ACCESS, OR USE THE PROGRAM; AND Press Enter to continue viewing the license agreement, or enter "1" to accept the agreement, "2" to decline it, "3" to print it, "4" to read non-IBM terms, or "99" to go back to the previous screen. 4. Type 1 and press Enter to accept the agreement. 5. Press Enter to accept the default encryption key, or type a 32-character encryption key and press Enter. Note: Follow these tips to select an encryption key: Do not use the equal sign (=), the comma (,), or the l character in the encryption key. Ensure that if you select not to use the default encryption key that you record the key value. This same key will be required during the installation of components that communicate with this monitoring server.
61
6. Type the number for the operating system on which you install the monitoring server. The default value is your current operating system. Press Enter. 7. Type 1 to confirm the operating system and press Enter. A numbered list of available components is displayed. 8. Select the number which corresponds to the option for the Tivoli Enterprise Monitoring Server and press Enter. 9. Type 1 to confirm the selection and press Enter. Note: If you are installing on AIX Version 6.1 and if you only see AIX 5.3 in the selection list, select AIX 5.3. After the closest level to your level is selected, the component will install and operate normally. At this point, the installation begins as shown in Example 3-6.
Example 3-6 Installation of the Tivoli Enterprise Monitoring Server
Product packages are available in /opt/IBM/ITM Product packages are available for the following operating systems and component support categories: 1) 2) 3) 4) 5) 6) 7) AIX R5.2 (32 bit) AIX R5.2 (64 bit) AIX R5.3 (32 bit) AIX R5.3 (64 bit) Tivoli Enterprise Portal Browser Client support Tivoli Enterprise Portal Server support Tivoli Enterprise Monitoring Server support
Type the number for the OS or component support category you want, or type "q" to quit selection [ number "4" or "AIX R5.3 (64 bit)" is default ]: You selected number "4" or "AIX R5.3 (64 bit)" Is the operating system or component support correct [ 1=Yes, 2=No ; default is "1" ] ? y The following products are available for installation: 1) Monitoring Agent for UNIX Logs V06.20.00.00 2) Monitoring Agent for UNIX OS V06.20.00.00 3) Summarization and Pruning Agent V06.20.00.00
62
4) 5) 6) 7) 8) 9)
Tivoli Enterprise Monitoring Server V06.20.00.00 Tivoli Enterprise Portal Server V06.20.00.00 Tivoli Enterprise Services User Interface V06.20.00.00 Universal Agent V06.20.00.00 Warehouse Proxy V06.20.00.00 all of the above
Type the numbers for the products you want to install, or type "q" to quit selection. If you enter more than one number, separate the numbers by a comma or a space. Type your selections here: 4 The following products will be installed: Tivoli Enterprise Monitoring Server V06.20.00.00 Are your selections correct [ 1=Yes, 2=No ; default is "1" ] 1 ... installing "Tivoli Enterprise Monitoring Server V06.20.00.00 for AIX R5.3 (64 bit)"; please wait. => installed "Tivoli Enterprise Monitoring Server V06.20.00.00 for AIX R5.3 (64 bit)". ... Initializing component Tivoli Enterprise Monitoring Server V06.20.00.00 for AIX R5.3 (64 bit). 10.At the prompt, enter a host name for your Monitoring Server and press Enter as shown in Example 3-7. Note: Do not use the fully qualified domain name as the host name for your monitoring server.
Example 3-7 Installation completion
Please enter TEMS name [ TEMS is default ]: nimserver ... creating config file "/opt/IBM/ITM/config/server2_ms_HUB_TEMS.config" ... creating file "/opt/IBM/ITM/tables/HUB_TEMS/glb_site.txt." ... updating "/opt/IBM/ITM/config/kbbenv" ... verifying Hot Standby. ... Tivoli Enterprise Monitoring Server V06.20.00.00 for AIX R5.3 (64 bit) initialized.
63
Do you want to install additional products or product support packages [ 1=Yes, 2=No ; default is "2" ] ... postprocessing; please wait. ... finished postprocessing. Installation step complete. As a reminder, you should install product support on each of your TEM servers for any agents you have just installed. This is done via the "/opt/IBM/ITM/bin/itmcmd support" command on your TEM servers. You may now configure any locally installed IBM Tivoli Monitoring product via the "/opt/IBM/ITM/bin/itmcmd config" command. The Tivoli Enterprise Monitoring Server is now installed and configured. You can confirm that the server is installed and functional by using the cinfo command as shown in Example 3-8.
Example 3-8 The cinfo command displaying running processes
root@nimserver:/# /opt/IBM/ITM/bin/cinfo -r *********** Fri Mar 6 11:57:26 CST 2009 ****************** User: root Groups: system bin sys security cron audit lp Host name : nimserver Installer Lvl:06.20.01.00 CandleHome: /opt/IBM/ITM *********************************************************** Host Prod PID Owner Start ID ..Status nimserver ms 483604 root 18:06:01 nimserver ...running After you have successfully installed and configured the Tivoli Enterprise Monitoring Server hub, you can then proceed with Step 3 where you install the application support on the TEMS hub for both the base agents and the System p agents as shown in Figure 3-27 on page 65.
64
65
Example 3-9 Starting the Tivoli Enterprise Monitoring Server from the command line
root@nimserver:/# /opt/IBM/ITM/bin/itmcmd server start nimserver > /tmp/meaix/startstop_server.log 2>&1 root@nimserver:/# cat /tmp/meaix/startstop_server.log Starting TEMS... It can take up to ten minutes. KCIIN0082E TEMS started... Note: Before proceeding with installing the Tivoli Enterprise Portal, you need to stop the TEMS hub either by using Step 4 on the Tivoli Enterprise Monitoring window or by using the command line and the itmcmd command.
66
Prior to installation, you are required to accept the license agreement. After you accept the agreement, the wizard prompts you for the installation directory where the IBM Tivoli Monitoring install images are located, which is shown in Figure 3-29 on page 68. 4. Enter the full path to the install images or browse to locate them. 5. Select Open. 6. Click OK to proceed.
67
68
Next, the wizard installs the Tivoli Enterprise Portal Server and displays the detailed output in the window until the process completes, as shown in Figure 3-30.
In addition to logging in to the window, you are informed about the success or failure of the installation and which logs to review.
69
Figure 3-31 shows the wizard after the successful installation of the Tivoli Enterprise Portal Server.
70
2. Click to install both the Tivoli Enterprise Portal Server support for monitoring agents and the Tivoli Enterprise Portal Server Browser Client support for monitoring agents in that sequence using the Launchpad install wizard window, as shown in Figure 3-32. Note: The Tivoli Enterprise Portal Browser Client support package is portal server code that supports the browser clients. You must install the browser client support package on the computer where you install the portal server if you want to connect to it using a browser client.
71
3. Enter the path for the IBM Tivoli Monitoring setup directory in the dialog box or browse for the location of the setup directory where the install images are, as shown in Figure 3-33. 4. Select Open and then click OK.
72
Note: This part of the process requires you to enter the DB2 and IBM Tivoli Monitoring UIDs, passwords, and the 32-character encryption key in order for the Install Tivoli Enterprise Portal Server to connect to the DB2 instance.
73
3. If you want to set up a backup protocol, enter that protocol and press Enter. If If you do not want to use a backup protocol, press Enter without specifying a protocol. 4. Depending on the type of protocol that you specified, provide information according to the information shown in Table 2-4 on page 18. 5. Press Enter when you are asked if you want to configure the connection to a secondary monitoring server. The default value is none. 6. Press Enter to accept the default for the Optional Primary Network Name (none). 7. Press Enter to accept the default setting for Secure Sockets Layer (SSL) between the portal server and clients (N). Note: By default, SSL is disabled. If you want to enable it, type 1 and press Enter. Configure the connection between the portal server and the portal server database. 8. Type the DB2 instance name. The default value is db2inst1. Press Enter. 9. Type the DB2 administrator ID. The default is db2inst1. Press Enter. Note: The DB2 Administrator account was created during DB2 installation. 10.Type the password for the DB2 administrator ID and press Enter. 11.Confirm the password for the DB2 administrator ID by typing it again. Press Enter. 12.Type the name of the portal server database. The default is TEPS. Press Enter. 13.Type the login name of the database user that the portal server will use to access the database. The default is itmuser. Press Enter. 14.Type the password for the database user and press Enter. 15.Confirm the password for the database user by typing it again. Press Enter. 16.You are now asked if it is okay to create the itmuser login ID if it does not exist. Type 1 and press Enter. 17.You are asked if you are using DB2 or Oracle for the Tivoli Data Warehouse. Enter D for DB2 or J for Oracle Java Database Connectivity (JDBC). DB2 is the default.
74
The configuration now proceeds with the parameters that you have entered. You will see a message telling you that InstallPresentation.sh is running and then a message telling you that the installation has completed.
root@nimserver:/# itmcmd agent start px pk ph cq Multi-agent start: px Starting Premium Monitoring Agent for AIX ... Premium Monitoring Agent for AIX started
75
Multi-agent start: pk Starting Base Monitoring Agent for CEC ... Base Monitoring Agent for CEC started Multi-agent start: ph Starting Base Monitoring Agent for HMC ... Base Monitoring Agent for HMC started Multi-agent start: cq Starting Tivoli Enterprise Portal Server ... Eclipse Help Server is required by Tivoli Enterprise Portal Server (TEPS) and will be started... Eclipse Help Server is already started. Tivoli Enterprise Portal Server started Multi-agent start completed Note: If you start the Enterprise Portal Server from the command line, it starts the IBM Eclipse Help Server first if it is not already running. Table 3-3 on page 77 provides a list of the IBM Tivoli Monitoring product codes and a description of the respective functions of a particular agent or server. You can obtain a thorough and comprehensive list on the system in the file $INSTALLDIR/registry/proddsc.tbl.
76
Table 3-3 IBM Tivoli Monitoring product codes IBM Tivoli Monitoring product code ms ax cq p5 px pv va ph pk cg kf cw hd it iw cj Description
Tivoli Enterprise Monitoring Server IBM Tivoli Monitoring Shared Libraries Tivoli Enterprise Portal Server Base Monitoring Agent for AIX Premium Monitoring Agent for AIX Base Monitoring Agent for Virtual I/O Server Premium Monitoring Agent for Virtual I/O Server Base Monitoring Agent for Hardware Management Console (HMC) Base Monitoring Agent for Common Event Console (CEC) IBM Tivoli Monitoring for Cryptographic Coprocessors IBM Eclipse Help Server Tivoli Enterprise Portal Browser Client Warehouse Proxy Tivoli Enterprise Console (TEC) Graphical User Interface (GUI) Integration IBM Tivoli Enterprise Portal Server Extensions Tivoli Enterprise Portal Desktop Client
77
4. After reading and accepting the licensing agreement, enter the path to the install images or browse for the path to the install images and click Open. 5. Then, select OK to proceed. The install information window will list the agents and their corresponding two character product code as they are installed as shown in Figure 3-36 on page 79.
78
79
After the installation completes, the information window appears with information about the success of the installation and where the installation log file can be found as shown in Figure 3-37.
80
81
You are required to configure the agent parameters individually, because there are slight variations on the parameters that are required for separate agents.
82
Important: Prior to configuring the Hardware Management Console (HMC) Base agent, edit the $CANDLEHOME/configph_dd.properties file and add the following lines to the end of the file: KQZ_PRODDESC=IBM Tivoli Monitoring: HMC Base Agent KQZ_PRODNAME=IBM Tivoli Monitoring: HMC Base Agent Failure to add these lines will generate Java exception errors when you try to configure the HMC Base agent.
83
84
85
Or, click Configure <agent type> to launch a Korn shell (ksh), which prompts you for the configuration parameters that are required for the customization of each of the agents as shown in Figure 3-44.
86
87
88
Review and accept the licensing agreement. Then, enter the path to the install images. The window will switch to the install information window as shown in Figure 3-47 until the installation completes.
To configure the Warehouse Proxy agent, enter the installation directory in Step 3 of the Install Warehouse Proxy agent, and then click Configure the Warehouse Proxy Agent.
89
The Manage Tivoli Enterprise Monitoring Services window opens, where you select Warehouse Proxy and then choose Actions Configure as shown in Figure 3-48. Note: If you do not see the Warehouse Proxy agent in the list of services to manage, you might not have launched the installation of the agent, the installation might not have completed successfully, or the agent has been uninstalled. Determine which situation happened, complete the installation, and then repeat this operation.
90
Note: Further information regarding the complex deployments of agents, including remote deployment, is described in detail in Chapter 7, Deploying IBM Tivoli Monitoring agents in a large scale environment, in IBM Tivoli Monitoring: Implementation and Performance Optimization for Large Scale Environments, SG24-7443.
91
root@aix:/opt/IBM/ITM# lsgroup itmusers itmusers id=201 admin=false users=itm1 registry=files 6. Run the following command to ensure that the CANDLEHOME environment variable correctly identifies the IBM Tivoli Monitoring V6.2 installation directory: echo $CANDLEHOME 7. Change to the directory that is returned in the previous step: cd $CANDLEHOME 8. Confirm that you are in the correct directory: pwd 9. Run the following commands: chown -R itm1.itmusers . chmod -R o-rwx . Important: Running the following steps in the wrong directory can change the permissions on every file in every file system on the host. 10.Run the following command to change the ownership of additional agent files: ./bin/SetPerm
92
root@aix:/opt/IBM/ITM# ll total 136 drwxr-x--29 itm1 itmusers drwxr-xr-x 5 bin bin drwxrwx--15 itm1 itmusers drwxrwx--3 itm1 itmusers drwxr-x--4 itm1 itmusers -rw-r--r-1 itm1 itmusers -rw-r--r-1 itm1 itmusers -rw-r--r-1 itm1 itmusers drwxrwx--3 itm1 itmusers drwxrwx--6 itm1 itmusers drwxrwx--7 itm1 itmusers drwxrwx--3 itm1 itmusers drwxr-x--2 itm1 itmusers drwxrwx--4 itm1 itmusers drwxr-x--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxr-x--6 itm1 itmusers drwxr-x--4 itm1 itmusers drwxr-x--2 itm1 itmusers drwxrwx--4 itm1 itmusers drwxrwx--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxrwx--2 itm1 itmusers drwxrwx--2 itm1 itmusers drwxr-x--2 itm1 itmusers drwxrwx--2 itm1 itmusers drwxrwx--9 itm1 itmusers drwxrwx--2 itm1 itmusers drwxr-x--2 itm1 itmusers
4096 256 4096 256 256 86 37 37 256 256 256 4096 4096 12288 256 256 256 4096 256 256 8192 256 256 256 4096 256 256 256 256 256 12288 256
Mar Mar Mar Mar Jan Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar Mar May Mar Mar Mar Mar Mar Mar
15 10 13 13 22 15 15 15 13 13 13 13 13 15 13 13 13 13 13 13 15 13 13 13 13 10 13 13 13 13 15 13
10:09 16:38 2008 15:15 2005 10:21 10:08 10:09 15:24 15:26 15:16 15:37 15:12 10:23 15:12 15:12 15:24 2008 15:14 15:25 10:11 15:08 2008 15:24 15:28 2008 15:15 15:12 15:15 15:25 10:23 15:12
. .. HTML InstallITM JRE KPHOUT.LOG KPKOUT.LOG KPXOUT.LOG LAP aix513 aix526 bin classes config doc download gskit images keyfiles licenses logs lost+found misc old_registry registry samples sqllib tables teclib tmaitm6 tmp xfer
12.We now restart the agents by either logging in as the itm1 user or by issuing the following command: su - itm1 -c /opt/IBM/ITM/bin/itmcmd agent start all 13.By using the cinfo command, we check to confirm that the agents are running and that their processes are owned by our new application user as shown in Example 3-13 on page 94.
93
root@aix:/opt/IBM/ITM# ./bin/cinfo -r *********** Sun Mar 15 10:57:41 CDT 2009 ****************** User: root Groups: system bin sys security cron audit lp Host name : aix Installer Lvl:06.20.01.00 CandleHome: /opt/IBM/ITM *********************************************************** Host Prod PID Owner Start ID ..Status aix ph 512006 itm1 10:42:59 None ...running
94
Next, in order for the monitoring agent to gather data from the HMC, you must: Note: After you configure a Secure Shell connection for one agent, you do not need to configure it for subsequent agents. 1. Determine the name of the managed system that hosts the Virtual I/O Server where the monitoring agent is located. 2. Obtain the public key for the Virtual I/O Server using the following command: viosvrcmd -m <managed system> -p <vios name>-c "cfgsvc -key <ITM agent name>" For example: hscroot@hmc1:~> viosvrcmd -m 9117-MMA-SN101F170-L10 -p VIOS1_L10 -c "cfgsvc -key ITM_premium" ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAnCD5GAC3tKxv7flA4PTrHl5N57ZT+laoKOUVY9rH LQQ0fPeerykvwJO/YUhg51D4dVD1/uN8lUnvbGrXTjVq4QwEGvOt3kwy9+ACI8E6xp/Q HugUoBzSyJMPd3FUPeXHBTvdyY046wFak8AP7pHjuf+q3xvBOU/e3ax9rmv5oTcaNbhn a5mclVuIy1ltbegsduwnvA3udaDpeOev733gY5aTySGGai3BRhImkGFFHbW1lqpO6IG9 H8N8b1ztOhwY4rgEYE+O9Nizx4xvmz5Z/DycA/xr/e1hhiRFKGpP2pg+RzfatKXIFGVE FQg1l7f6iKi55WPJ9cpHtcUyLYsQIQ== root@vios1_l10 Where: Managed system is the name of the managed system on which the Virtual I/O Server and monitoring agent are located. vios name is the name of the Virtual I/O Server LPAR as defined on the HMC. ITM agent name is the monitoring agent, for example, ITM_premium. 3. Update the authorized_key2 file on the HMC using: mkauthkeys --add public_key Where public_key is the output obtained in Step 2. For example: hscroot@hmc1:~> mkauthkeys --add 'ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAnCD5GAC3tKxv7flA4PTrHl5N57ZT+laoKOUVY9rH LQQ0fPeerykvwJO/YUhg51D4dVD1/uN8lUnvbGrXTjVq4QwEGvOt3kwy9+ACI8E6xp/Q HugUoBzSyJMPd3FUPeXHBTvdyY046wFak8AP7pHjuf+q3xvBOU/e3ax9rmv5oTcaNbhn a5mclVuIy1ltbegsduwnvA3udaDpeOev733gY5aTySGGai3BRhImkGFFHbW1lqpO6IG9 H8N8b1ztOhwY4rgEYE+O9Nizx4xvmz5Z/DycA/xr/e1hhiRFKGpP2pg+RzfatKXIFGVE FQg1l7f6iKi55WPJ9cpHtcUyLYsQIQ== root@vios1_l10' After you complete these tasks, you can view the data that the monitoring agent has gathered in the Tivoli Enterprise Console.
95
96
After you log in, the enterprise environment view workspace appears that is shown in Figure 3-51.
We describe the Tivoli Enterprise Console and managing the workspaces or views and queries in the console in greater detail in Chapter 4, Operations on page 159.
97
3.4.2, Install DB2 on page 99 3.4.3, Create DB2 database on page 100 3.4.4, Install TADDM 7.1 on page 100 3.4.5, DNSLookup configuration on page 117
taddm10:/mnt/Linux_tools/ppc ] ls -l sudo* -rw-r----1 root system 205789 Feb 26 11:00 sudo-1.6.9p15-2.aix5.2.ppc.rpm -rw-r----1 root system 200394 Feb 26 11:00 sudo-1.6.9p15-2noldap.aix5.2.ppc.rpm taddm10:/mnt/Linux_tools/ppc ] rpm -ivh sudo-1.6.9p15-2noldap.aix5.2.ppc.rpm sudo ################################################## taddm10:/mnt/Linux_tools/ppc ] visudo # sudoers file. #
98
# This file MUST be edited with the 'visudo' command as root. # Failure to use 'visudo' may result in syntax or file permission errors # that prevent sudo from running. # # See the sudoers man page for the details on how to write a sudoers file. ## Host alias specification # User alias specification # Cmnd alias specification # Defaults specification # Runas alias specification # User privilege specification root ALL=(ALL) ALL cmdbadm ALL=(ALL) NOPASSWD:ALL # Uncomment to allow people in group wheel to run all commands
5. Install d ssh and lsof on all the target servers as well as TADDM server. (The ssh needs to be configured on both TADDM and target servers.) 6. Create a file system for TADDM (size: 3 GB): /opt/IBM/cmdb on a non-rootvg volume group. Note: The unzip and sudo programs are required on the TADDM server, and the ssh and lsof programs are necessary on all the target servers, as well as the TADDM server. You can find the ssh filesets in the Expansion Pack, while the unzip, sudo, and lsof files are in AIX Toolbox for Linux.
99
3. Advanced installation with a remote DB2 database. This scenario requires you to install your DB2 database on a remote server prior to the installation of TADDM. For our implementation, we chose the second option in the previous list of options, which is the simple installation without the installation of a DB2 database. This installation scenario is relatively straightforward, and it can help you understand the relationship between DB2 and TADDM. Refer to Install DB2 Enterprise Server on page 35 for installing a database.
$ /home/db2inst1/make_db2_db.sh cmdb
100
5. Click Install Application Dependency Discovery Manager Install product on the left pane, and then click Install Tivoli Application Dependency Discovery Manager. Note: If you want to invoke an install program for TADDM directly instead of using Launchpad, then run the /TADDM_media/TADDM/setupAix.bin command on the X Windows environment.
101
6. The next window (Figure 3-53) explains, IBM Tivoli Application Dependency Discovery Manager must be installed on a different computer than where its database is installed. Click OK to continue, because we intended to install the database and TADDM on the same server to simplify our configuration.
7. In the next window, provide a directory path for the TADDM setup and click OK as shown in Figure 3-54.
102
The next window displays the InstallShield Wizard, which is shown in Figure 3-55. 8. Click Next.
103
The next window shows the license agreement for TADDM. Read the licensing terms, and if you agree to the licensing terms, click I accept both the IBM and the non-IBM terms as shown in Figure 3-56. 9. Click Next.
104
In the next window, you will be prompted to enter the name of the directory where you want to install TADDM. We chose /opt/IBM/cmdb as shown in Figure 3-57. Click Next.
105
In the next window, you can enter the user that you want to start the TADDM Server process. This user must be a non-root user. If this user does not exist, you might request that the InstallShield Wizard create the user account for you by selecting Create user ID if it does not exist as shown in Figure 3-58. 10.Click Next.
106
The next window shows installation type options. Choose the installation type: simple or advanced. A simple installation uses default values for a local DB2 database. We chose Advanced because we have a database up and running for TADDM as shown in Figure 3-59. 11.Click Next.
107
In the next window, you can select the server type. Select the server type for the TADDM Server that you are installing. We chose Domain Manager (CMDB) Server, because we plan to have only one TADDM server in our environment as shown in Figure 3-60. 12.Click Next.
108
The next window shows the TADDM server port information. Review the default port information and change any port numbers that need to be changed. We accepted all of the default port values as shown in Figure 3-61. 13.Click Next.
109
In the next window, you can provide the port information for the domain manager server. We took the default values as shown in Figure 3-62. 14.Click Next.
In the next window, you can enter the host name for the Remote Method Invocation (RMI) server. We took the default for the host name for the RMI server. Next, select the platform binaries that you want installed. Choose AIX, because we are not installing the original TADDM, but the TADDM that is part of Management Edition (ME) for AIX. 15.To start this TADDM Server when the system is started, select Start the server at system boot.
110
16.To start the server after the installation of TADDM is complete, select Start the server after install as shown in Figure 3-63. Click Next.
111
The next window, which is shown in Figure 3-64, asks for the host name and port number of the Change and Configuration Management Database (CCMDB). We left this panel blank, because our implementation did not include a CCMDB. 17.Click Next.
112
In the next window, which is shown in Figure 3-65, you can select the database type for the TADDM database that you are installing. 18.We are using DB2, so we selected DB2. We chose not to set up the WebSphere Federation Server; therefore, we did not select the Setup WebSphere Federation Server check box. 19.Click Next.
113
The next window asks for information about the database. We created our database prior to installing TADDM. Enter the database information here as shown in Figure 3-66. 20.Click Next.
In the next window, you can select the option for the user registry that will be used with TADDM.
114
21.We selected File Based User Registry in this configuration as shown in Figure 3-67. 22.Click Next.
115
23.If the information is correct, click Install to begin the installation as shown in Figure 3-68.
116
24.When the installation completes, review the installation summary information, and click Finish as shown in Figure 3-69.
3.5 Installing and configuring IBM Tivoli Usage and Accounting Manager
In this section, we provide the steps to install Tivoli Usage and Accounting Manager: 3.5.1, Our lab environment on page 118 3.5.2, Installation process overview on page 119
117
3.5.3, Installing the Application server on page 119 3.5.4, Database configuration on page 129 3.5.5, Set up the processing directories on page 139 3.5.6, Run sample jobs on page 141 3.5.7, AIX and Virtual I/O Server data collectors on page 143 3.5.8, AIX Advanced Accounting overview on page 144 3.5.9, AIX data collector installation and configuration on page 145 Installation prerequisites on page 146
118
119
3. The installation of DB2 Enterprise Server Edition is a prerequisite to installing IBM Tivoli Usage and Accounting Manager. We provide the instructions for installing DB2 in 3.2, Installing and configuring DB2 on page 34. If you have not already installed DB2, you can install it at this time either by following the steps provided in that section, or simply by choosing to install DB2 at the same time that you set up the database in the Launchpad. In the Launchpad, select Install Usage and Accounting Manager Create Databaseas shown in Figure 3-71.
120
The database is created, and the log appears as shown in Figure 3-72. Click Close to continue.
4. In the Launchpad, select Install Usage and Accounting Manager Install Product Install IBM Usage and Accounting Manager as shown in Figure 3-73 on page 122.
121
Figure 3-73 IBM Tivoli Usage and Accounting Manager Launchpad Installation
5. After choosing to install IBM Tivoli Usage and Accounting Manager, you will be prompted for the installation path as shown in Figure 3-74. Enter your path and click OK.
122
6. The InstallSheild Wizard for Usage and Accounting Manager Virtualization Edition starts as shown in Figure 3-75. Choose Next to continue.
123
You will be presented with the license terms and agreement as displayed in Figure 3-76. 7. Read the terms and agreement, and if you accept these terms, choose I accept both the IBM and the non-IBM terms and then click Next to continue.
Figure 3-76 IBM Tivoli Usage and Accounting Manager Virtualization Edition License Agreement
124
You will then see the InstallShield summary as displayed in Figure 3-77. The InstallShield summary gives details of exactly what will be installed on your system and the location and size of the installation. 8. Click Install to continue or Cancel to quit the installation.
Figure 3-77 IBM Tivoli Usage and Accounting Manager Virtualization Edition summary information
While IBM Tivoli Usage and Accounting Manager installs, the InstallShield changes status to update the progress of your installation. The installation takes several minutes and might appear stalled on a couple of the windows for several minutes prior to continuing.
125
Figure 3-78 is an example of one of the installation status updates. You can cancel the installation at any point during the install by selecting Cancel while the InstallShield is running.
Figure 3-78 IBM Tivoli Usage and Accounting Manager Virtualization Edition InstallShield status
126
After the installation completes, the InstallShield completion panel appears as shown in Figure 3-79. If there are any issues with the installation, you can obtain the install log at: /opt/ibm/tivoli/common/AUC/logs/install 9. If the installation succeeds, select Finish to exit the wizard.
Figure 3-79 IBM Tivoli Usage and Accounting Manager Virtualization Edition installation completion message
127
Example 3-16 TUAM embedded WAS server restart tuam10:/opt/ibm/tuam/ewas/profiles/AppSrv01/bin ] ./stopServer.sh server1 ADMU0116I: Tool information is being logged in file /opt/ibm/tuam/ewas/profiles/AppSrv01/logs/server1/stopServer.log ADMU0128I: Starting tool with the AppSrv01 profile ADMU3100I: Reading configuration for server: server1 ADMU3201I: Server stop request issued. Waiting for stop status. ADMU4000I: Server server1 stop completed. tuam10:/opt/ibm/tuam/ewas/profiles/AppSrv01/bin ] ./startServer.sh server1 ADMU0116I: Tool information is being logged in file /opt/ibm/tuam/ewas/profiles/AppSrv01/logs/server1/startServer.log ADMU0128I: Starting tool with the AppSrv01 profile ADMU3100I: Reading configuration for server: server1 ADMU3200I: Server launched. Waiting for initialization status. ADMU3000I: Server server1 open for e-business; process id is 692414
3. Open a Web browser and direct it to the Integrated Solution Console URL: http://tuam10:11052/ibm/console
128
4. After you log in, the Welcome page appears (Figure 3-80). Verify that the product information matches the version that you have installed.
129
$ tuam10:/mnt/launchpad ] su - db2inst1 $ db2 connect to ituamdb Database Connection Information Database server SQL authorization ID Local database alias = DB2/AIX64 9.1.4 = DB2INST1 = ITUAMDB
$ db2 "SELECT PAGESIZE, SUBSTR(BPNAME,1,20) AS BUFFERPOOL FROM SYSCAT.BUFFERPOOLS" PAGESIZE BUFFERPOOL ----------- -------------------4096 IBMDEFAULTBP 2. Define a buffer pool with a page size larger than the 4 KB default by using the CREATE BUFFERPOOL command. The SQL syntax is shown in Example 3-18.
Example 3-18 Creation of larger buffer pool
$ db2 "create bufferpool BP32K size 1000 pagesize 32k" DB20000I The SQL command completed successfully. 3. Create a regular table space that uses the larger buffer pool as shown in Example 3-19.
Example 3-19 Creation of a regular table space
$ db2 "create tablespace USERSPACE2 PAGESIZE 32K managed by system using ('/home/db2inst1/db2inst1/NODE0000/SQL00002/SQLT004') bufferpool BP32K" DB20000I The SQL command completed successfully. 4. Create a temporary table space that uses the larger buffer pool as shown in Example 3-20. Ensure that the temporary parameter is used when creating this table space.
Example 3-20 Creation of temporary table space
$ db2 "create temporary tablespace TEMPSPACE2 PAGESIZE 32K managed by system using (/home/db2inst1/db2inst1/NODE0000/SQL00002/SQLT005) bufferpool BP32K" DB20000I The SQL command completed successfully.
130
5. Restart the database instance. Use the LIST APPLICATION command to check where the are any processes that are still using the database. The restart process is shown in Example 3-21.
Example 3-21 Restarting the database manager
$ db2 list application SQL1611W No data was returned by Database System Monitor. $ db2stop 03/04/2009 10:18:51 0 0 SQL1064N DB2STOP processing was successful. SQL1064N DB2STOP processing was successful. $ db2start 03/04/2009 10:19:03 0 0 SQL1063N DB2START processing was successful. SQL1063N DB2START processing was successful. tuam10:/opt/ibm/tuam/ewas/profiles/AppSrv01/bin ] ./startServer.sh server1 ADMU0116I: Tool information is being logged in file /opt/ibm/tuam/ewas/profiles/AppSrv01/logs/server1/startServer.log ADMU0128I: Starting tool with the AppSrv01 profile ADMU3100I: Reading configuration for server: server1 ADMU3200I: Server launched. Waiting for initialization status. ADMU3000I: Server server1 open for e-business; process id is 692414 $ db2 list application Auth Id Application Appl. Application Id DB # of Name Handle Name Agents -------- -------------- ---------- -------------------------------------------------------------- -------- -----
34 33 32 31 30
1 1 1 1 1
Note: If db2 LIST APPLICATION returns connections to the database, which it does in the second run in Example 3-21 on page 131, you must run /opt/ibm/tuam/ewas/profiles/bin/stopServer.sh server1 to terminate the connections. If you are running other applications that are accessing DB2, you must also stop those applications.
131
132
2. Repeat the steps to add the second JDBC driver /opt/IBM/db2/V9.1/java/db2jcc_license_cu.jar to the IBM Tivoli Usage and Accounting Manager as shown in Figure 3-82, and click OK.
133
If you use multiple databases to store Usage and Accounting Manager (for example, you have a production database and a development database), you must select the data source for one database as the default for administration, data processing, and Web reporting.
134
Note: This process is applicable for Server data sources only. 3. In the ISC, click Usage and Accounting Manager System Maintenance Data Sources on the Server tab. Then, set the Default Admin, Processing, and Reporting data source by selecting the data source name and clicking Set Admin from the pop-up menu. 4. Then, select Set Processing, and finally, select Set Reporting so that all three functions are now set and show on the Server tab with a yes in the last three columns as shown in Figure 3-84.
Figure 3-84 Setting the Default Admin, Processing, and Reporting data source
5. After the JDBC drivers have been loaded and the data source properties have all been configured, you must stop and start the embedded WebSphere server for the changes to take affect. As the root user, run: /opt/ibm/tuam/ewas/bin/stopServer.sh server1 /opt/ibm/tuam/ewas/bin/startServer.sh server1
135
You should receive a response that your connection was successful. If you receive any errors, for example, the password is incorrect, correct the issue and try again.
136
137
The confirmation message that is shown in Figure 3-87 appears. Verify that the database name and server match the system that you want to initialize. 3. Click Yes to continue to initialize the database.
138
The results of the initialization appear. 4. Confirm that the database initialized successfully. If there were any issues, review the log that is present, correct the issue, and try again. A successful initialization log is shown in Figure 3-88.
139
Job Log Files Path The job logs provide processing results for each step that is defined in the job file. If a warning or failure occurs during processing, the file indicates at which point the warning or failure occurred. Collector Log Files Path Directory that will contain the collector log files.
2. The directories that are on the Configuration tab Reporting page need to be changed from the default directories for Tivoli Usage and Accounting Manager Virtualization Edition. The paths are: Path to Standard Reports Folder Directory that contains Usage and Accounting standard reports. There are five templates included for BIRT with IBM Tivoli Usage and Accounting Manager VE. Path to Custom Reports Folder Directory that contains custom reports. You create custom reports with your report developer either independently or by using one of the standard reports as a template.
140
Path to Published Reports Folder Directory that contains published reports. Published reports are reports that have been saved with the data that was generated at the time that the reports were run. The type of reporting supported with Tivoli Usage and Accounting Manager Virtualization Edition is BIRT reporting, which is an Open Source reporting tool. We need to set each of the reporting directories to point to the BIRT directories as shown in Figure 3-90.
141
SMTP. To check the results, from the ISC menu, select Usage and Accounting Manager Chargeback Maintenance - Job Runner Log Files as shown in Figure 3-91.
142
Other errors are caused by not installing the enterprise collector pack (ecp). To perform a final database cleanup, re-initialize it as described in the previous section, Initialize the database on page 137. Alternatively, you can unload the data using the ISC menu selections Usage and Accounting Manager Chargeback Maintenance Load Tracking as shown in Figure 3-92. Clear the check box for the End Date filter and mark all by clicking the Select check boxes.
2. Click Delete Load and confirm the security question to delete the data.
143
The configuration of the data collectors must be automated in order to gather the data from all the systems in the environment back to the Tivoli Usage and Accounting Manager Server. You will need to install the data and configure the data collectors on each of the AIX or Virtual I/O Server systems where you want to gather data. The process of gathering AIX Advanced Accounting Data for use with Tivoli Usage and Accounting Manager is shown in Figure 3-93.
Figure 3-93 IBM Tivoli Usage and Accounting Manager data flow
144
Table 3-4 AIX Advanced Accounting record types AACCT Transaction Record ID 1-2 4 6 7 8 10 11 16 36 38 39 Type of data Process activity System interval File system activity Network interface I/O Disk I/O Virtual I/O Server I/O Virtual I/O Server client I/O ARM-enabled transactions WPAR system interval WPAR file system activity WPAR disk I/O
You can obtain more details about AIX Advanced Accounting in Chapter 5 Advanced Accounting, in Accounting and Auditing on AIX 5L, SG24-6396.
145
Installation prerequisites
For the installation of the AIX Advanced Accounting and Tivoli Usage and Accounting Manager data collector, we created a directory on the NFS server that contains the files that are described in Table 3-5.
Table 3-5 Tivoli Usage and Accounting Manager AIX collector installation files File name tuam_unpack_uc_collector ituam_uc_aix5.tar ituam_schedule.sh Description Installation script for the Tivoli Usage and Accounting Manager package Tivoli Usage and Accounting Manager data collector package for AIX Our custom script to manage hourly and daily processing of AIX Advanced Accounting data Our custom installation script for setting up AIX Advanced Accounting and Tivoli Usage and Accounting Manager SSH public key for root user of our Tivoli Usage and Accounting Manager server, which is required for setting up data collection and generated with the ssh-keygen command
install-tuam.sh
id_rsa.pub
You must also install the openssh packages on all the systems to which you will be adding data collectors. You can locate the openssh packages on the Expansion Pack CD-ROM that is included with AIX V6.1 Enterprise Edition. Example 3-22 shows the installation script for IBM Tivoli Usage and Accounting Manager AIX collector.
Example 3-22 Installation script: install-tuam.sh #!/usr/bin/ksh INSTPATH=/opt/ibm/tuam/collectors/unix TUAMUSER=tuam #First set up AIX Advanced Accounting acctctl acctctl acctctl acctctl acctctl on fadd fadd fadd fadd
1 1 1 1
146
acctctl fadd /var/aacct/aacct4.dat 1 acctctl isystem 5 acctctl iprocess 5 acctctl agproc on acctctl agke on acctctl agram on mkitab aacct:2:once:/usr/bin/acctctl on >/dev/console 2>&1 # Next set up userid for TUAM collector and enable ssh from the TUAM server mkgroup ${TUAMUSER} mkuser pgrp=${TUAMUSER} ${TUAMUSER} mkdir ~${TUAMUSER}/.ssh cp ./id_rsa.pub ~${TUAMUSER}/.ssh/authorized_keys2 chown -R ${TUAMUSER}.${TUAMUSER} ~${TUAMUSER}/.ssh chmod 755 ~${TUAMUSER} ~${TUAMUSER}/.ssh #Set up the script for the data collection mkdir -p /usr/local/bin cp ./ituam_schedule.sh /usr/local/bin #Install the TUAM collector mkdir -p ${INSTPATH} cp ./tuam_unpack_uc_collector ./ituam_uc_aix5.tar ${INSTPATH} cd ${INSTPATH} #use aacct_config=true when calling tuam_unpack_uc_collector to prevent #traditional UNIX process accounting for being started ./tuam_unpack_uc_collector path=${INSTPATH} user=${TUAMUSER} aacct_config=true rm ${INSTPATH}/tuam_unpack_uc_collector ${INSTPATH}/ituam_uc_aix5.tar chmod 755 ${INSTPATH}/tuam_unpack_uc_collector ${INSTPATH}/ituam_uc_aix5.tar #Adjust TUAM AAA collector to include client vscsi cp ${INSTPATH}/data/A_config.par ${INSTPATH}/data/A_config.par.back cat ${INSTPATH}/data/A_config.par|sed /^AACCT_TRANS_IDS/s/^.*$/AACCT_TRANS_IDS=1,4,6,7,8,11/ >/tmp/A_config.tmp cp /tmp/A_config.tmp $INSTPATH}/data/A_config.par #Adjust the crontab for the data collection crontab -l sed /.*aacct/s/^/#/ >/tmp/tempcrontab echo 59 * * * * /usr/local/bin/ituam_schedule.sh > /opt/ibm/tuam/collectors/unix/log/ituam_schedule.log 2>&1 >> /tmp/tempcrontab crontab /tmp/tempcrontab rm /tmp/tempcrontab
Example 3-23 on page 148 shows an example of the collector installation script output from one of our systems.
147
19 19 19 19 19
taddm10:/mnt/tuam ] ./install-tuam.sh chmod: /opt/ibm/tuam/collectors/unix/tuam_unpack_collector: No such file or directory ./tuam_unpack_uc_collector: Begin ITUAM UNIX/Linux Data Collector Installation ./tuam_unpack_uc_collector: ITUAM UNIX/Linux Data Collector will be installed in /opt/ibm/tuam/collectors/unix Nodename : taddm10 Platform Type : AIX Distribution tar file : ituam_uc_aix5.tar ITUAM UNIX/Linux Collector Home : /opt/ibm/tuam/collectors/unix ITUAM UNIX/Linux Collector User : tuam ITUAM UNIX/Linux cs_method : HOLD ITUAM UNIX/Linux server : ITUAM UNIX/Linux cs_user : Config AACCT : TRUE ./tuam_unpack_uc_collector: Unpacking ituam_uc_aix5.tar in /opt/ibm/tuam/collectors/unix x accounting x accounting/README.txt, 0 bytes, 0 tape blocks ... x scripts/oracle/ituam_stop_odb, 10526 bytes, 21 tape blocks x scripts/oracle/ituam_view.sql, 3001 bytes, 6 tape blocks ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/accounting directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/bin directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/etc directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/scripts directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/data directory ./tuam_unpack_uc_collector: Initializing ITUAM Configuration File. Setting - ITUAM_ACCDAT Setting - ITUAM_BIN Setting - ITUAM_DATA Setting - ITUAM_DESCR Setting - ITUAM_ETC Setting - ITUAM_EXAMPLES Setting - ITUAM_HELP Setting - ITUAM_HISTORY Setting - ITUAM_HOME Setting - ITUAM_LOG Setting - ITUAM_SCRIPTS Setting - ITUAM_SUPER Setting - ITUAM_USER Setting - ITUAM_SERVER
148
Setting Setting Setting Setting Setting Setting Setting Setting Setting Setting Setting
ITUAM_DEST ITUAM_ACCOUNT ITUAM_GROUP AACCT_ONLY ITUAM_SAMPLE CS_PLATFORM CS_USER CS_KEY CS_UPATH CS_METHOD CS_PROC_PATH
******************************************************************************** Starting ITUAM/UNIX create_A_storage.par Script at Thu Mar 19 15:37:26 CDT 2009 ******************************************************************************** ITUAM/UNIX create_A_storage.par: Moving /opt/ibm/tuam/collectors/unix/data/A_storage.par to /opt/ibm/tuam/collectors/unix/data/A_storage.par.bck ITUAM/UNIX create_A_storage.par: Creating new /opt/ibm/tuam/collectors/unix/data/A_storage.par ******************************************************************************** Ending ITUAM/UNIX create_A_storage.par Script at Thu Mar 19 15:37:34 CDT 2009 ******************************************************************************** ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/description directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/examples directory ./tuam_unpack_uc_collector: Initialize /opt/ibm/tuam/collectors/unix/help directory ./tuam_unpack_uc_collector: Updating root crontab previous ituam_uc_nightly entry replaced in crontab ./tuam_unpack_uc_collector: ITUAM UNIX/Linux Data Collector installation complete
149
4. Start the IBM Tivoli Usage and Accounting Manager agent using the startsvc command.
Example 3-24 Configuration and start of data collector on Virtual I/O Server
$ lssvc ITM_base ITM_premium TSM_base ITUAM_base TPC DIRECTOR_agent $ cfgsvc -ls ITUAM_base ACCT_DATA0 ACCT_DATA1 ISYSTEM IPROCESS $ cfgsvc ITUAM_base -attr ACCT_DATA0=10 ACCT_DATA1=10 ISYSTEM=5 IPROCESS=5 $ startsvc ITUAM_base
150
Figure 3-94 WPARs reduce LPARs but still provide workload isolation
Workload partitions can be created within an AIX V6 LPAR. Each workload partition provides an isolated environment for the application that it hosts. From the application or service point of view, the WPAR provides a replica of a standard AIX operating system environment. Furthermore, the WPAR runtime environment can be dedicated to only hosting that application (the workload) and can be tuned to optimize performance based on the specific workload characteristics of that application. Logically, WPARs can be considered as an operating system-level boundary around a specific set of AIX processes. Inside the WPAR, the applications have the following benefits: Private execution environments Isolation from other processes outside the WPAR Dedicated network addresses and file systems Interprocess communication that is restricted to processes executing only in the same workload partition
151
IBM Workload Partition Manager for AIX (WPAR Manager) is a tool for monitoring and managing WPARs. It will also gather information about CPU, memory, and other useful statistics. There are new concepts introduced in WPAR: Global environment This term refers to the part of the AIX operating system that hosts workload partitions. This environment is the classical AIX environment. Typically, only the AIX V6 systems root superuser has access to to this environment, because it must be set up to host WPARs exclusively, not native applications. System WPAR This term refers to a more flexible WPAR-based instance of AIX. It contains dedicated writable file systems and system service daemons. Application WPAR This term refers to a WPAR that is set up to host only a single application or process. It provides an AIX runtime environment that is suitable for execution of one or more processes that can be started from a single command.
152
In this scenario: WPAR Manager is the application and user interface. It is in charge of communicating with the user and updating the database. CAS Agent Manager is in charge of the communication between the WPAR agent and the WPAR Manager in the LPAR. The database is the repository for all WPAR definition data. There are WPARs running on the managed servers. B and G are set up as system WPARs, and W is set up as an application WPAR. In this setup, the WPAR Manager must be able to move WPARs W and G between the two nodes.
Deploying WPAR Management software usually requires a server that hosts the management software and an agent that has to be installed on each server to be managed, as shown in Figure 3-95.
153
The effort required to install, configure, maintain, and monitor various agent implementations can become an extremely time-consuming management task. In addition, the number of redundant functions that is provided by each agent implementation (for example, listening to ports, the runtime daemon, and memory consumption) leads to ineffective usage of the system resources. The goal of Common Agent Services is to minimize the complexity of the software management deployment by reducing the effort that is needed for deployment and utilizing system resources more effectively. CAS accomplishes this goal by providing a common framework that can be reused by various management applications that are deployed across the enterprise. This Common Agent Services framework consists of the following components: Agent Manager Resource Manager Common Agent
Agent Manager
Note: The Agent Manager component implements the CAS in the WPAR Manager application. This agent talks to the Common Agent on the managed systems. The Agent Manager is the server component of the Common Agent Services. It provides authentication and authorization services, enables secure connections between managed systems in your deployment, and maintains the registry about the managed systems and the software running on those systems. It also handles queries from the Resource Managers against the database. The Agent Manager has the following components: The Agent Manager service The Agent Manager service serves as a certificate and registration authority to provide authentication and authorization using X.590 digital certificates and the Secure Sockets Layer (SSL) protocol. It also handles requests for registry information from Common Agents and Resource Managers. Resource Managers and Common Agents must register with the Agent Manager service before they can use its services to communicate with each other. This registration is password-protected, and there are separate passwords for the Common Agents and Resource Managers.
154
Note: For WPAR Manager, you only need to specify the registration password for the Common Agents. The password for the Resource Manager is automatically generated during the configuration of WPAR Manager. The registry The registry is the database that contains the current configuration of all known Common Agents and Resource Managers. Information contained in the registry includes: The identity, digital certificates, and communication information for each Resource Manager The identity, digital certificates, and communication information for each Common Agent Basic configuration information for each Common Agent (for example, hardware type and operating system version) The status of each Common Agent The last error or, optionally, a considerable number of errors, reported by each Common Agent The registry information is updated by events, such as the registration of Common Agents and Resource Managers, and by periodic updates from the Common Agents. Note: For WPAR Manager, the Agent Manager uses an Apache Derby database to implement the registry. This Derby database is included within the lightweight runtime fileset that is delivered with WPAR Manager. The agent recovery service The agent recovery service provides error logging for Common Agents that cannot communicate with other Agent Manager services. WPAR Manager does not make use of this feature. Note: The Agent Manager functionality for WPAR Manager is in the fileset wparmgt.cas.agentmgr. CAS Agent Manager listens to communication from WPAR Agent and WPAR Manager on ports 9511, 9512, and 9513. These ports are default ports that can be overridden by the user during the configuration of WPAR Manager.
155
Resource Manager A Resource Manager is management software that uses the services of the
Agent Manager to communicate securely with, and obtain information about, the managed systems running the Common Agent software. The Resource Manager uses the services of the Common Agent to deploy and run its software on the managed systems. Note that in our case, the WPAR Manager component of WPAR Manager is the Resource Manager of the CAS framework. Note: The Resource Manager functionality for WPAR Manager is in the fileset wparmgt.mgr.rte. This fileset also includes the functionality of the WPAR Management console. WPAR Manager listens to ports 14080 and 14443 and communicates to port 9510 on the WPAR Agent. WPAR Manager listens to ports 9511, 9512, and 9513 on the CAS Agent Manager. These ports are default ports that can be overridden by the user during the configuration of WPAR Manager.
Common Agent
Each managed system in your deployment runs a Common Agent, which provides a single implementation of common services that can be used by all management products. The Common Agent consists of: Common Agent services Product-specific subagent (for example, for WPAR Manager, this code is the code for WPAR Agent) For instance, if two management products (A and B) manage the same system, the Common Agent is installed only one time on that system, and it runs two product-specific subagents: one for product A and one for product B. The Common Agent provides the following functions: A single set of security credentials and a common security infrastructure for all management applications Automated management of security credentials The Common Agent certificate is automatically renewed when it is near the expiration date.
156
Common Agent health monitoring and configuration monitoring services The Common Agent has a heartbeat function that sends periodic status and configuration reports to the Agent Manager. It also allows any subagent to participate and to provide application-specific status. The frequency of this update can be set, or it can be turned off. Management applications can register to the Agent Manager to receive these updates. The registry contains only the most recent configuration update. By default, only the most recent status information is saved for each Common Agent. The retention period is configurable.
157
158
Chapter 4.
Operations
This chapter describes and discusses several of the more common optimization and utilization features of the components in day to day operations within a Power System environment: 4.1, Live Application Mobility on page 160 4.2, Operating TM on page 161 4.3, Operating TADDM on page 185 4.4, Operating IBM Tivoli Usage and Accounting Manager on page 237
159
160
4.2 Operating TM
The following sections outline the basic operations involved with IBM Tivoli Monitoring: 4.2.1, Workspaces on page 161 4.2.3, Managing Tivoli Monitoring Services on page 168 4.2.4, Historical data collection on page 169 4.2.5, Understanding situation events on page 172 4.2.6, IBM Tivoli Monitoring command line on page 175 4.2.9, Best practices on page 184
4.2.1 Workspaces
The IBM Tivoli Monitoring tool that is packaged as part of AIX Enterprise Edition comes bundled with a range of queries and views to assist you with getting the tool operational in a short amount of time. You can then create your own views and queries, based on the predefined offerings for AIX, Virtual I/O Server, Hardware Management Console (HMC), and common event console (CEC).
4.2.2 Views
A range of predefined workspaces are built into your IBM Tivoli Monitoring product that consists primarily of chart views and table views. You can save them as new workspaces and customize them with a range of views.
Data views
The table and chart views are the first steps to getting something meaningful from the data that is being collected. When you understand what values and states cause problems, you can refine your views to show what is important. The table view and the chart view provide current and historical information about monitoring data from Tivoli Enterprise Monitoring agents, such as system performance and configuration: Pie charts show portions of a whole (such as a percentage). Bar and plot charts, as well as gauges, show the values of each attribute. The following sections provide an explanation of each of the views and provide an example of the same system metrics from our Network Installation Management (NIM) server represented in the various views. Each view can be
Chapter 4. Operations
161
initiated by clicking the corresponding icon from the Tivoli Enterprise Portal Toolbar and dragging the icon onto the panel that you want displayed in that particular view.
Table views
Table views show current data that is retrieved from a monitoring agent and show one column for every attribute. The table reports a single row of data or multiple rows, depending on the nature of the attribute group.
The table view also has features for refining the display to suit your needs. These features include adjusting column width, locking columns, and using drag and drop to change the order of columns. You can also sort column data differently in ascending or descending sequence by clicking the column heading. Figure 4-1 shows a table view.
162
Chart views
You can view the predefined workspaces in one of five ways as shown in Table 4-1 on page 168: A pie chart shows a slice for every data point in a single data series (row). Pie charts are well suited for showing the proportional value of related attributes to a whole, such as the percentage attributes that show how memory is being used (Figure 4-2).
Chapter 4. Operations
163
A bar chart displays a bar for each data point. Bar charts are best suited for comparing values among related attributes. The stacking bar chart is well suited for showing multiple values for the same attribute (Figure 4-3).
164
A plot chart shows changes over a period of time by drawing a continuous line from one data point to the next data point with one data point for each data sampling and one line for each selected attribute. The plot chart can be used for plotting multiple-row attribute groups (or historical data from a single-row attribute group) and multiple managed systems. You can also control the refresh rate of the plot chart so that it is independent of the refresh rate of the workspace as a whole. The plot chart is well suited for showing trends over time and among related attributes (Figure 4-4).
Chapter 4. Operations
165
A circular gauge shows the proportional amount of a data series with one gauge for each chosen attribute. This type of chart is well suited for showing individual elements that change frequently, such as a percentage of user time (Figure 4-5).
166
A linear gauge shows the collective value of every item in a single data series with one gauge for each chosen attribute. This type of chart is well suited for showing cumulative values (Figure 4-6).
In Table 4-1 on page 168, we look at the best rendering of the individual views based on the data to be displayed. This view changes from query to query and largely depends on how you configure the workspace.
Chapter 4. Operations
167
Table 4-1 Chart types and their best uses Chart type Best for Multiple attributes One slice per attribute Multiple rows Multiple managed systems One pie for each managed system No Time span
Pie chart
Displays proportional value to the whole Compares values among related attributes
Yes
Bar chart
One bar per attribute; stacking bars show one segment per attribute One line per attribute; one data point for each data sampling One gauge per attribute
No
Yes
Plot chart
Displays trends over a period of time for related attributes Shows frequently changing elements Displays cumulative values
Yes
Yes
Yes
Circular gauge
No
No
No
Linear gauge
No
No
No
168
You can launch the Manage Tivoli Enterprise Monitoring Services application by exporting your display, ensuring that you have an X Windows Server, such as Hummingbirds Exceed, running, and entering the command /opt/IBM/ITM/bin/CandleManage or $CANDLEHOME/bin/CandleManage on any of the machines that have agents or server components installed. Refer to Figure 4-7.
How it works
If historical data has been configured, it is collected by either the monitoring agent or the TEMS in the short term. The data is stored in tables, with one table per attribute that is collected. If the Tivoli data warehousing facility has been set up, the collection goes into either an Open Database Connectivity (ODBC) or Java Database Connectivity (JDBC) database for long-term storage.
Chapter 4. Operations
169
If historical data has been enabled for the attributes for a view, there is a time span icon on the toolbar. To view the historical data instead of the real-time feed in the workspace view, you use the tool to specify the period and duration for the data that you want to display. When the query is run, data less than 24 hours old is extracted from the sourced binary files, while the data older than 24 hours is taken from the data warehouse. The History Collection Configuration window in the Tivoli Enterprise Portal enables you turn the collection on or off and to configure how often and where the historical data is stored. Note: Data collection cannot be started unless you have configured it.
170
2. Select the agent type for which you want to collect data from the Select a product drop-down list. The attribute groups for which you can collect historical data are displayed in the Select Attribute Groups list box. Note that when you select a product type, you are configuring collection for all monitoring agents of that type that report to the selected monitoring server. If your monitored environment is large scale with many hundreds of agents of a type, there might be a delay when you select the product. 3. Select one or more attribute groups. You can also click Show Default Groups to automatically select the attribute groups that have predefined historical workspaces. If you have configurations that you want to populate to several attribute groups, click the attribute group that has the configurations that you want to see reflected in the Configuration Controls area, then highlight the other attribute groups (Ctrl+click to select multiples, or Shift+click to select all groups from the first one selected up to this point) to configure and click Configure Group. All the selected attribute groups will reflect the same configurations. If collection has been started for any of the attribute groups that you have selected, stop the collection before attempting to change the configurations. 4. Specify the following collection options: Collection Interval Specify the frequency of data sample transmission to the history file. The options are: every 1, 5, 15, or 30 minutes, every hour, or every day. The default interval is 15 minutes. The shorter the interval, the faster and larger the history file grows at the collection location. This history file can overload the database, Warehouse Proxy agent, and Summarization and Pruning agent. For example, if you set a 1 minute collection interval for process data, expect the summarization and pruning for that attribute group to take a long time. Only enable such a short interval for an attribute group that is critical in your work and then preferably only for a short period of time. Note that selecting too short of an interval can quickly fill file systems. We recommend that you monitor your data collection rates following any changes to the collection settings. Collection Location Specify where the historical data files will reside: at the Tivoli Enterprise Monitoring Agent (TEMA) or the Tivoli Enterprise Monitoring Server (TEMS). The default location is the monitoring agent, which minimizes the performance impact on the monitoring server from the management of
Chapter 4. Operations
171
historical data; however, the TEMS might be a better choice for certain environments. Warehouse Interval Specify whether the collected data is warehoused and how often. The options are 15 minutes, 30 minutes, 1 hour, 12 hours, 1 day, or Off. If you choose to warehouse historical data, the scheduling options for Summarization and Pruning are enabled. A more frequent warehousing interval enables quicker availability of warehoused data for retrieval. Shorter intervals cause additional processing to check for and transmit the newly collected data. And there are more frequent elevated levels of transmission activity, but for shorter durations. The collection options for an attribute group apply on all monitoring servers on which collection for those attributes is currently enabled. For certain sets of attribute groups, the configuration is hard-coded by the product. These attribute groups will display a (fixed) in the Collection and Warehouse Interval cells of the Select Attribute Groups table. 5. If warehousing is enabled, specify the time periods for which data in the warehouse is summarized. 6. If summarization is scheduled, specify the duration to keep the summarized data for each time period. 7. If pruning is scheduled, specify how long to keep the pruned data for each time period. 8. Click Configure Groups to apply the configuration selections to the attribute group or groups. If you have currently configured controls for this group (and the controls are running), click Stop Collection first. Apply your new settings, and click Start Collection. Note: Your user ID must have permissions sufficient to edit workspaces in the Tivoli Enterprise Portal in order for you to be able to configure, start, or stop the historical data collection.
172
The Situation Editor window is divided into two frames. The left frame contains the Situation tree, which shows the situations associated with the Navigator item from which the Situation Editor was opened as shown in Figure 4-9, or the situations for all installed monitoring products if you opened the editor from the toolbar (the situations show in the left frame of Figure 4-9).
Situation formula
Situation formulas are one or more expressions of which options are given when
you click the Formula button in the Situation Editor window. For example, when a situation checks for free disk space below 10%, it uses the group and item attributes that we see in Figure 4-10 on page 174. You can also create more elaborate situations that are based on multiple conditions being met before an event is triggered.
Chapter 4. Operations
173
174
For further information about these commands, refer to IBM Tivoli Monitoring Users Guide, Version 6.2.0, SC32-9409, and IBM Tivoli Monitoring Administrators Guide, Version 6.2.0, SC32-9408. This section focuses on providing the essential information about these commands.
Common commands
Basic tacmd options are: help Prints the full help text for the specified command or summary help text for all commands if no command is specified. login Authenticates a user with a server and creates a security token that is used by subsequent tacmd commands. logout Invalidates the security token created by the tacmd login command. refreshTECinfo Triggers the Event Forwarder to reprocess any updated event destinations, Event Integration Base (EIF) configurations, and custom event mapping files without recycling the hub Tivoli Enterprise Monitoring Server.
Installation commands
The tacmd installation commands are: createNode Creates a node by installing an OS agent into a new directory on the local machine and starting that OS agent. viewNode Displays the details of a node, including the components that are installed on it.
Chapter 4. Operations
175
Depot commands
The depot tacmd commands are: viewDepot Displays the types of agents that can be installed from the (currently logged in) servers agent depot or from the named remote servers depot. listBundles Displays the details of one or more deployment bundles that are available for installation from the specified directory into the local deployment depot. addBundles Installs one or more deployment bundles from the specified directory into the local deployment depot. This command must be executed locally on a Tivoli Enterprise Monitoring Server containing a depot. removeBundles Removes one or more deployment bundles from the local deployment depot. This command must be executed locally on a Tivoli Enterprise Monitoring Server containing a depot.
Agent commands
The agent tacmd commands are: startAgent The startAgent command: Starts the specific agents or the agents for the specific managed systems if they are not already running. OS agents (nodes) can be started on the local system only. The agent is marked online in the Tivoli Enterprise Portal client. stopAgent The stopAgent command: Stops the specific agents or the agents for the specific managed systems if they are running. OS agents (nodes) can be stopped on the local system only. The agent is marked offline in the Tivoli Enterprise Portal client within the next heartbeat interval.
176
restartAgent The restartAgent command: Starts or restarts the specific agents or the agents for the specific managed systems. OS agents (nodes) can be restarted on the local system only. If the agent is already started, it is stopped before being restarted. viewAgent The viewAgent command: Displays the details of the specific agent or the agent for a specific managed system. Details include the agent version, agent status (running or not), and all of the configuration data for the agent. updateAgent Enables an agent update to a specified node.
System commands
The tacmd system commands are: describeSystemType Displays the configuration options that are required for a specific managed system type. addSystem The addSystem command: Enables a user to add managed systems to the monitoring system. Deploys an agent and other needed components if they are not already installed on the node. configureSystem The configureSystem command: Enables the user to change the configuration options of an existing managed system. The user also has the option to restart the managed systems monitoring agent in order for the new configuration parameters to take effect.
Chapter 4. Operations
177
listSystems The listSystems command: Displays a list of known managed systems. The results can optionally be filtered to display only those results on a specific node, only those results for given product types, or both.
Server command
The server tacmd command is configurePortalServer. The configurePortalServer command: Adds, configures, or removes a portal server data source from the portal server configuration. This command must be executed locally to the portal server. This command uses NAME=VALUE options.
Situation commands
The situation tacmd commands are: createSit Creates a new situation, based on an existing situation. editSit The editSit command: Edits an on-server or exported situation definition. If a force parameter is specified, it disables the message that asks if you are sure that you want to edit the situation. deleteSit The deleteSit command: Deletes a situation from the server. If a force parameter is specified, it disables the message that asks if you are sure that you want to delete the situation. listSit Lists the defined situations, optionally filtering for a specific managed system or for a specific managed system type. viewSit Allows the configuration of a situation to be displayed or saved in an export file.
178
Chapter 4. Operations
179
deletesystemlist Deletes a managed system list. editsystemlist Adds or deletes managed systems to or from an existing managed system list on the server. listsystemlist Lists the available managed system lists. viewsystemlist Lists the configuration of a managed system list to be displayed or saved in an export file.
Workspace commands
The workspace tacmd commands are: exportworkspaces Exports one or more portal server workspaces to a file. importworkspaces Imports the workspaces contained in a file into the portal server. listworkspaces Lists all of the portal workspaces on the server.
180
itmcmd audit Manages log files from the command line. The default logs are in /opt/IBM/ITM/logs. itmcmd config The itmcmd config command: Configures or reconfigures the following components: The IP port that the hub monitoring server uses to listen for requests The hosts that can run a product The location of the hub monitoring server in the network The monitoring server to which an agent connects Whether a monitoring server is a hub or a remote server
You can only configure one product at a time. If you reconfigure a monitoring server, you must stop and restart that monitoring server before the changes take effect. itmcmd dbagent Starts the IBM Tivoli Monitoring for Sybase and IBM Tivoli Monitoring for Oracle monitoring agents. itmcmd dbconfig Configures the execution environment for a distributed database agent. itmcmd execute The itmcmd execute command: Runs a script or command when its execution requires the same environment settings as a particular IBM Tivoli product. The itmcmd execute command runs this script or command by building the necessary environment settings for the intended script or command and then combining them into a temporary shell script before running it. You must run the itmcmd execute command. Make sure that you are in the correct directory: cd $CANDLEHOME/bin, where $CANDLEHOME is the location where you installed your IBM Tivoli software, generally /opt/IBM/ITM. itmcmd history Manages the roll-off of history data into delimited text files. itmcmd manage Starts Manage Tivoli Enterprise Monitoring Services on a UNIX or Linux computer. You can start, stop, and configure monitoring components in Manage Tivoli Enterprise Monitoring Services.
Chapter 4. Operations
181
itmcmd server Starts and stops monitoring servers that are defined in directories under the install_dir/tables subdirectory. You must run the itmcmd server command from the host computer. itmcmd support The itmcmd support command: Adds agent-specific information to the monitoring server. Whenever you add a new monitoring agent type to your monitoring environment, run the itmcmd support command again on the monitoring server to add the new agent information to the monitoring server.
182
cinfo [-h candle_directory] [-c product] [-i] [-r] [-s product] [-R] [-v] -c <product> Displays configuration prompts and values -i Displays an inventory of installed products -r Shows running processes -s <product> Displays configuration parameters and settings -R Shows running processes, after updating a tracking database -v Shows the installed CD versions in this CandleHome -p <product> Shows associated platform codes for the specified product -d Dumps an inventory of installed products For example, if you run cinfo -p ms, you get information about the Tivoli Enterprise Monitoring Server (TEMS) as shown in Example 4-2.
Example 4-2 The cinfo product details for the TEMS
root@nimserver:/opt/IBM/ITM/bin# cinfo -p ms *********** Wed Mar 18 16:49:41 CDT 2009 ****************** User: root Groups: system bin sys security cron audit lp Host name : nimserver Installer Lvl:06.20.01.00 CandleHome: /opt/IBM/ITM *********************************************************** Platform codes: aix536 : Current machine aix523 : Product (ms) tmaitm6/aix523 : CT Framework (ax) You can view the Tivoli Enterprise Monitoring processes that are running by using cinfo -r as shown in Example 4-3 on page 184.
Chapter 4. Operations
183
root@nimserver:/opt/IBM/ITM/bin# cinfo -r *********** Wed Mar 18 16:57:58 CDT 2009 ****************** User: root Groups: system bin sys security cron audit lp Host name : nimserver Installer Lvl:06.20.01.00 CandleHome: /opt/IBM/ITM *********************************************************** Host Prod PID Owner Start ID ..Status aix ph 512006 itm1 Mar None ...running aix pk 430296 None aix px 237714 None
184
Installation and Configuration The AIX Enterprise Edition Launchpad has simplified the installation of IBM Tivoli Enterprise Monitoring in a System p environment as discussed in 3.3, Installing and configuring IBM Tivoli Monitoring V6.2 on page 50. Following this method helps to greatly reduce the amount of time and complexity around actually getting the tool operational. After the environment is being actively monitored, further customization of thresholds for alerts and event integration might be required.
Chapter 4. Operations
185
Discovery is performed using sensors that are currently built and deployed as part of the TADDM product:
1. To get into the product console, bring up your browser and enter a URL with the host name of the TADDM server and port number 9430 as shown in Figure 4-12 on page 187, for example, http://taddm10:9430.
186
2. Clicking Start Product Console shows a window that asks you to open or save the configuration file as shown in Figure 4-13.
Chapter 4. Operations
187
3. Select Open unless you want to save the file. If you save the file, it will be saved on your workstation for future use. If you click Open or click the previously saved file, it will show you the login panel as shown in Figure 4-14.
The default user is administrator and the password is collation. 4. Enter the Username and Password (Figure 4-14). Click Login and the Tivoli Application Dependency Discovery Manager panel appears.
188
Scope
A discovery scope identifies the devices, computer systems, and other components in your infrastructure that you want the server to access. You specify scopes using IP addresses, ranges of IP addresses, or subnets to define the boundary of the networks that can be accessed during discovery. A scope can be as small as a single IP address or as large as a range of IP addresses or a Class C network. You can also exclude specific devices from the scope. Before running discovery, you need to configure a discovery scope: 1. On the left pane, click the Discovery tab Scope. The Scope pane is displayed. 2. To define a new discovery scope set, click Add Set. The Scope Set Name window is displayed as shown in Figure 4-15.
3. In the Name field, type the name for the new scope set. 4. Click OK. The new scope set appears in the Scope Sets list.
Chapter 4. Operations
189
5. To add contents to the scope set, select the scope set that you have just created and click Add. The Add Scope window is displayed as shown in Figure 4-16.
To add the settings for the scope, complete one of the following steps: Select Subnet from the IP Type list and type the IP address of the subnet in the IP Address field. Select Range from the IP Type list and type the starting IP address and the ending IP address in the IP Addresses field. Select Host from the IP Type list and type the IP address of the host in the IP Address field or type the host name in the Hostname field. To exclude devices from your scope, click Add Exclusion and complete one of the following steps: From the IP Type list, select Subnet and type the IP address of the subnet in the IP Address field. From the IP Type list, select Range and type the starting IP address and the ending IP address in the IP Address field. To save the scope, click OK. The new scope appears in the list.
190
Access List
The Access List is a collection of all user names, passwords, and Simple Network Management Protocol (SNMP) community strings that the server uses when accessing entities, which are stored as configuration items in the database, in your infrastructure. You have to set up this list for the configuration items that you want to discover. To add a new Access List entry, complete the following steps from the product console: 1. On the left, click the Discovery tab Access List. The Access List pane is displayed. 2. To add a new computer system into the Access List, click Add. The Access Details panel is displayed as shown in Figure 4-17.
3. From the Component Type list, select the component type that you want to discover.
Chapter 4. Operations
191
4. For all component types other than Network Element (SNMP), complete the following steps: In the Name field, type the name of the Access List entry. In the User name field, type the user name to log in to the component that you want to discover. Notice that we already added cmdbadm user in all the target servers for discovery before adding computer systems here. In the Password field, type the password to log in to the component that you want to discover. In the Confirm Password field, retype the password for confirmation. Additional steps might be required based on the component type that you have selected. We selected password as an authentication type for computer systems type. Note: TADDM attempts to use the credentials in the order that they appear in the access list. To speed up discovery, make sure that you have the credentials in the order that makes the most sense for your environment. Order the credentials from the most general to the most specific. Use the list order in combination with limiting scope. If a credential only applies to a particular scope set, be sure to limit its use to that scope set.
192
5. In the next window, we added a database in the Access List as shown in Figure 4-18.
Chapter 4. Operations
193
6. We took the same steps to add two HMCs and four more servers. Figure 4-19 shows the list of computer systems and the database that we have created.
Discovery profile
A discovery profile is a set of rules that controls how discoveries run. Using discovery profiles, you can control what TADDM discovers. For example, you can configure individual discovery sensors, manage various configurations for the same sensor, select the appropriate sensor based on a set of criteria, and control sets of different sensor configurations to be applied on a single discovery run. By default, there are three levels of discovery profiles, which are described in Table 4-2 on page 195.
194
Table 4-2 Discovery profiles by default in TADDM Level Level 1 Type of discovery Credential-less What is discovered Basic information about active computer systems: host name, fully qualified domain name (FQDN), OS release level, IP address, and open ports. Network operating systems are also discovered. Detailed information about all of the operating systems. Entire application infrastructure: deployed software components, physical servers, network devices, virtual LANs, and hosts.
Level 2 Level 3
In order to run discovery: 1. Click the Discovery tab Overview, and click Run Discovery. 2. Check ITSO scope under Scopes, and select Level 3 Discovery from the Profile list box. Click OK as shown in Figure 4-20 on page 196.
Chapter 4. Operations
195
196
3. While running discovery, click Discovery Log to see Discovery Log Details as shown in Figure 4-21.
When the discovery finishes, a line of information appears in red on the bottom of the window (Figure 4-22 on page 198): Changes have occurred. Reload the view.
Chapter 4. Operations
197
4. Click Display Reload in the product console to apply the changes as shown in Figure 4-22.
198
Now, you are ready to see the components that TADDM has just discovered or the topology of the components. In order to search the components, click Discovered Components in the left pane as shown in Figure 4-23.
Chapter 4. Operations
199
6. Select IBM AIX Computer System to show the list of servers as shown in Figure 4-24.
200
7. We have five logical partitions on AIX as shown in Figure 4-25. Note that if you have a logical partition and you do not see the LPAR symbol to the left of the component name, verify with the HMC that the LPAR is connected and has been added properly.
Chapter 4. Operations
201
8. Right-click one of the servers, and then click Show Details. You see the details of the server as shown in Figure 4-26. The details include general information about the hardware, OS, storage, file systems, IP, installed filesets, patch level, and the contents of major configuration files.
202
9. In the same manner, we selected DB2 Instance to see the details of a database as shown in Figure 4-27.
Chapter 4. Operations
203
10.Right-click one of the DB2 instances and click Show Details as shown in Figure 4-28. The details include database information as well as the database instance itself.
204
11.Now, click the Topology tab in the left pane to check the relationship between components. Click Application Infrastructure to see how the applications are related as shown in Figure 4-29.
Chapter 4. Operations
205
You can zoom in or out on the Topology window Application Infrastructure by sliding the zoom indicator (see the cursor in Figure 4-30). Or, just click the zoom slider and use the arrow keys for sizing the window.
206
Another view provided in the Topology tab is the Physical Infrastructure. Click Physical Infrastructure to see how the components are physically associated. 12.Choose a network and right-click Show Details as shown in Figure 4-31. Even though the IP addresses of our servers are in the network of 9.12.5.x, they are shown in the network of 9.12.4.0, because our subnet mask is 255.255.252.0.
Chapter 4. Operations
207
13.The servers and HMCs in the network are displayed. Right-click one of the servers to show details as shown in Figure 4-32.
Schedule discovery
You can initiate TADDM discoveries on demand based on a schedule. Scheduling is a methodical way to keep the TADDM database up-to-date. You can schedule discoveries to start during periods of low activity, such as on weekends, during times when batch jobs are likely to run, such as late at night, or during periods of high activity, such as mid-morning or mid-afternoon. You can schedule discoveries before and after normal maintenance windows, enabling you to quickly check what changes were made during that interval.
208
To create a new discovery schedule, complete the following steps: 1. On the Discovery tab, click Schedule. 2. Select Add to define a new discovery schedule. The Discovery Schedule window opens as shown in Figure 4-33. The date and time that are shown in the window reflect the date and time on the TADDM server.
Chapter 4. Operations
209
3. Provide a name, starting time, and repeat interval. And then, click Scope to specify a scope and the level of discovery as shown in Figure 4-34.
210
History of discovery
If you want to see the previous discoveries, click History in the Discovery tab shown in Figure 4-35.
Versions
Versions are snapshots of the current infrastructure. Versions are read-only
views of the entire topology. Analytic reports support comparisons between versions. To create a new version, click Versions in the Discovery tab, and select Create. Enter a version name, and click OK as shown in Figure 4-36 on page 212. Note: We suggest that you have naming rules for version names to avoid possible confusion later. For example, you can use the date as part of the version name. A version ID is generated in TADDM whenever a new version is created. The current version has an ID value of 0.
Chapter 4. Operations
211
Custom server
You can create custom servers to discover and categorize servers that are not, by default, supported by TADDM. Your infrastructure might contain software applications and server types, such as custom Java servers, that are not automatically categorized by TADDM. Any server process with a TCP listening port that is not recognized is categorized into an Unknown Server category. Unknown servers are not displayed in the Topology tab and cannot take advantage of most of the functions. You do, however, receive basic information, such as the name and the runtime data of the unknown server. You can define a custom server to create a template that sets up the membership rules for the custom server. During a discovery, any unknown server is automatically categorized as a custom server of this type if the runtime
212
information matches the criteria that you have defined in the template. Custom servers are displayed in the topology, and you can view details about them. Although these details are not as complete as the details that are provided for supported servers, defining custom servers allows all of the components in your infrastructure to participate in the topology view and comparisons. You can manage custom servers by selecting the Discovery tab Custom Servers: 1. Before adding a server, run a basic discovery to check for unknown servers. You can run a report on unknown servers to help you identify patterns to use in the custom server template. 2. To identify patterns in unknown servers, click the Analytics tab Inventory, and the Inventory pane is displayed in the workspace. Then, select Unknown Servers, and click Run Report as shown in Figure 4-37.
You can identify a pattern in the configuration of the unknown server, such as the program name, arguments, environment, and port. Use this pattern to create the identifying criteria for the custom server template.
Chapter 4. Operations
213
3. In our environment, we use sendmail to create a new custom server. We highlight sendmail and click Create Custom Server as shown in Figure 4-38.
214
The Custom Server Details panel General Info & Criteria tab is displayed (Figure 4-39). In the Name field, type the name of the custom server. In this example, we used Sendmail - email server. 4. To enable the custom server definition, select Enabled. And then, we changed the icon for sendmail. Define the criteria for the custom server. If you are creating a custom server from an unknown server, you will see at least one criterion that is set up. Figure 4-39 shows our example.
5. To add configuration files, click the Config Files tab. The Config Files page is displayed. On the Config Files page, click Add. The Search Path for Capture File window (Figure 4-40 on page 216) is displayed. From the Search Path list, provide a directory path for the configuration file.
Chapter 4. Operations
215
To capture the contents of the configuration file, click Capture file contents, and optionally, specify the maximum number of bytes of the captured configuration file. To recursively explore through the directory structure to search for the specified file, click Recurse Directory Content. To save the settings for your custom server, click OK. Refer to Figure 4-40.
216
6. To reposition entries in the Custom Servers pane, select sendmail and move it up to your desired position as shown in Figure 4-41. Note that you can also choose to enable or disable discovery for specific applications in the Custom Server pane. Click Save to save the changes to be applied.
Now, we can run a new discovery and check our new custom server that we have just created. Run discovery and check the results by clicking the Topology tab Application Infrastructure as shown in Figure 4-42 on page 218. The applications with port number 25 are sendmails. The sendmail applications are marked with the graphic that is shown here to the left.
Chapter 4. Operations
217
If you want to see more details, right-click the discovered component and click Show Details. You can see all of the information related to the component, including the configuration file.
218
The top level in the component hierarchy of TADDM is the Business Service. Business Services can contain any number of the lower level resources, from Business Applications to modules in a WebSphere server or specific configuration files on systems. The purpose of the Business Service is to consolidate multiple lower level objects and their relationships in order to perform reporting and analysis, considering all related resources. 1. To create Business Applications, click Edit Create Business Application. Enter a name (we entered ITM agent) and description (we entered IBM Tivoli Monitoring) as shown in Figure 4-43.
Chapter 4. Operations
219
2. Click Next to select the components. We selected a DB2 instance and one Java server to show you an example of a Business Application as shown in Figure 4-44. You can choose applications that are appropriate for your environment. When you manually add a component to a Business Application, you need to choose a functional group. The functional group defines what components are compared when a comparison is performed between two Business Applications. We selected the default functional group in this example.
220
In the next window, which is shown in Figure 4-45, you can provide administrative information. We skipped this page, because it is optional.
3. In the same manner, we created the second Business Application, which is named TADDM, as shown in Figure 4-46.
Chapter 4. Operations
221
4. For the second Business Application, we assigned one DB2 instance and three Java servers to this application as shown in Figure 4-47.
222
5. After creating two Business Applications, go to the Topology tab and click Business Applications. You will see the two Business Applications that you have just created as shown in Figure 4-48.
Chapter 4. Operations
223
Now, we create a Business Service that includes the two Business Applications that we have just created. 6. Click Edit Create Business Service as shown in Figure 4-49.
224
7. Enter a Business Service Name and Description as shown in Figure 4-50. Click Next.
8. In the next window, you can add Business Applications into the Business Service. We selected ITM agent and TADDM as shown in Figure 4-51. Click Next.
Chapter 4. Operations
225
9. Notice that the name of Tivoli Service is added in the Topology tab as a Business Service. Click Tivoli Service, and you will see the Business Applications that comprise this service in the right pane as shown in Figure 4-52.
226
10.If you want to see the physical topology of ITM agent, right-click ITM agent and select Show Physical Topology from the drop-down menu as shown in Figure 4-53.
Chapter 4. Operations
227
11.In the next window, the physical topology appears as shown in Figure 4-54.
Change history
If you want to check whether any changes have been made on your applications or servers in a certain period of time, there is a Change History menu under the Analytics tab menu as shown in Figure 4-55 on page 229. We intentionally add a host, 100.100.100.1 test1 (see the last line), into the /etc/hosts file, so that the change can be discovered in TADDM.
228
taddm10:/ ] vi /etc/hosts 9.12.5.38 9.12.5.32 9.12.5.118 9.12.5.119 9.12.5.36 9.12.5.33 100.100.100.1 vio1_l10 nimserver wpar01 wpar02 hmc1 hmc2 test1 nimserver.itso.ibm.com wpar01.itso.ibm.com wpar02.itso.ibm.com hmc1.itso.ibm.com hmc2.itso.ibm.com
1. Go to the Discovery tab menu and click Run Discover. When the discovery finishes, come back to the Change History menu and click Run Report. We set Date Range to 1 hour as shown in Figure 4-55.
Chapter 4. Operations
229
The report shows all the changes that have been made on the server for the past one hour, and you can see the /etc/hosts file in the list as shown in Figure 4-56.
However, note that TADDM does not collect all the files in a server for Change History by default. You might need to check the list in a component and add additional files to be collected. The next two windows show how to add those files into a computer system. 2. Go to the Discovery tab, and then click Computer Systems.
230
3. In the right pane, click AixComputerSystemTemplate and then click Edit as shown in Figure 4-57.
Chapter 4. Operations
231
4. In the next window as shown in Figure 4-58, click the Config Files tab and add your desired files into the list.
Inventory reporting
The Inventory report lists components of a specific type with important attributes, for example, it lists all of the AIX Computer systems and their installed OSs and all of the database servers and their versions. It is a comprehensive infrastructure asset report. After you run the inventory report, you can save the data to various formats. If you select multiple types of IT components, after you select the target and file name, multiple files are created.
232
In order to create a inventory report: 1. Click the Analytics tab Inventory, and then select the component type for which you want to create a report as shown in Figure 4-59. We selected DB2 and AIX in this example. Click Run Report to create reports.
Chapter 4. Operations
233
2. Figure 4-60 is an example of a report that includes AIX Servers and the DB2 database. Click the Save icon (see cursor) to save the report to your local workstation.
234
3. Provide a file name and select the file type. You can choose various types of files, including portable document format (PDF) or comma-separated values (CSV), as shown in Figure 4-61.
Figure 4-61 File name and type for the inventory report
Chapter 4. Operations
235
If you want to produce reports with Business Intelligence and Reporting Tools (BIRT), refer to Chapter 7, Reporting Scenarios, in Deployment Guide Series: IBM Tivoli Application Dependency Discovery Manager V7.1, SG24-7616, for more details.
236
There are several aspects regarding performance with TADDM, including: Discovery tuning Storage tuning Java Virtual Machine tuning Database tuning Operating system tuning If you need further information for performance tuning, refer to Workload Partition Management in IBM AIX Version 6.1, SG24-7656.
Chapter 4. Operations
237
Each of these scripts uses common variables that are set in the A_config.par file, which is located in the /opt/ibm/tivoli/ituam/collectors/Unix/data directory. The ituam_format_aacct and ituam_get_aacct scripts do not require special variables to be set up, but in order to use the ituam_send_aacct to push the data to the IBM Tivoli Usage and Accounting Manager server, you must set the following variables in the A_config.par file: CS_METHOD Method for transferring the data to the IBM Tivoli Usage and Accounting Manager server. This method can be FTP, secure copy protocol (scp), or Secure File Transfer Protocol (SFTP). CS_PLATFORM Name of IBM Tivoli Usage and Accounting Manager server. CS_USER Name of user on IBM Tivoli Usage and Accounting Manager server for transfer. We recommend that you set up a specific user for the transfer and that you do not use the root user. CS_KEY Password for the user to perform the transfer. If you use scp, you can set up keys so that you are not required to have the password in the file in clear text. CS_COLL_PATH Path on the server for the files to be transferred. CS_PROC_PATH Path for processing the data files. The two processing scripts for gathering the accounting data and formatting the accounting data can be combined into one process. We have included a sample script that runs both of these jobs and that can be used in crontab as a timed process. Example 4-6 shows this script.
Example 4-6 IBM Tivoli Usage and Accounting Manager processing script: tuam-getdata.sh
238
#call ITUAMGET ${ITUAMGET} #wait for 2 minutes sleep 120 #check if date has changed if [ ${START} -eq $(date +%Y%m%d) ]; then echo same date - no processing needed else #date changed, run format script for the previous day ${ITUAMFORMAT} ${START} fi
There are several cronjobs that you add that have been predefined to run the IBM Tivoli Usage and Accounting Manager processing jobs on the IBM Tivoli Usage and Accounting Manager server. Example 4-7 lists these jobs.
Example 4-7 IBM Tivoli Usage and Accounting Manager cron jobs
# TUAM UNIX/Linux Data Collector scripts # 5 1 * * * (/opt/ibm/tuam/collectors/Unix/etc/ituam_uc_nightly 1> /opt/ibm/tuam/collectors/Unix/log/ituam_uc_nightly.log 2>&1) 3,13,23,33,43,53 * * * * /opt/ibm/tuam/collectors/Unix/etc/check_pacct 5 3 * * * (/opt/ibm/tuam/collectors/Unix/scripts/enterprise/CS_nightly_consolidat ion 1> /opt/ibm/tuam/collectors/Unix/log/CS_nightly_consolidation.log 2>&1) #45 3 * * * (/opt/ibm/tuam/collectors/Unix/scripts/enterprise/CS_send 1> /opt/ibm/tuam/collectors/Unix/log/CS_send.log 2>&1) Table 4-4 on page 240 describes each of these jobs.
Chapter 4. Operations
239
Table 4-4 IBM Tivoli Usage and Accounting Manager cron job descriptions Script name ituam_uc_nightly Default execution 01:05 a.m. Description Collects raw AIX accounting data and file system usage. Manages pacct file. Consolidates the nightly accounting and storage files into the common source format (CSR) file. Transfers the consolidated CSR file to the IBM Tivoli Usage and Accounting Manager server.
check_pacct CS_nightly_consolidation
CS_send (optional)
03:45 a.m.
The scheduled job produce log files that contain information about the execution of each task. The scripts also produce data files that contain accounting and file system information. Table 4-5 shows the name of the output log and the data file for each of the scheduled cron jobs. The output log directory is /opt/ibm/tuam/collectors/unix/log.
Table 4-5 IBM Tivoli Usage and Accounting Manager cron job log files Script name ituam_uc_nightly check_pacct CS_nightly_consolidation CS_send(optional) Output log file ituam_uc_nightly.log CS_nightly_consolidation.l og CS_send.log Output data directory ../collectors/unix/accountin g/<host name> ../collectors/unix/CS_input _source -
240
#!/bin/ksh #This script is supposed to be started just before midnight on the TUAM server DATETOGET=$(date +%Y%m%d) TUAMHOSTS=/usr/local/bin/ituam_hosts TUAMJOBS=/opt/ibm/tuam/jobfiles JOBRUNNER=/opt/ibm/tuam/bin/startJobRunner.sh CLIENTUSER=tuam CLIENTPATH=/opt/ibm/tuam/collectors/unix/CS_input_source SERVERPATH=/opt/ibm/tuam/logs/collectors RECORDTYPES=1 4 6 7 8 11 36 38 39 # Wait for the clock to roll over and the daily collection scripts # on the clients to finish sleep 600 # Get data from all the clients cat ${TUAMHOSTS}|while read CLIENT do echo Getting data from ${CLIENT} for TYPE in ${RECORDTYPES} do if [ ! -d ${SERVERPATH}/AACCT_${TYPE}/${CLIENT} ]
Chapter 4. Operations
241
then mkdir -p ${SERVERPATH}/AACCT_${TYPE}/${CLIENT} fi scp ${CLIENTUSER}@${CLIENT}:${CLIENTPATH}/aacct${TYPE}_${DATETOGET}.t xt ${SERVERPATH}/AACCT_${TYPE}/${CLIENT}/ done done # Load data from all the clients cat $TUAMHOSTS|while read CLIENT do echo Loading data from ${CLIENT} cat ${TUAMHOSTS}/AIXAA.xml|sed "s/sample/${CLIENT}/g" | sed "s/\"AIXAA\"/\"AIXAA -${CLIENT}\"/g" > ${TUAMJOBS}/AIXAA-${CLIENT}.xml chmod 755 ${TUAMJOBS}/AIXAA-${CLIENT}.xml ${JOBRUNNER} ${TUAMJOBS}/AIXAA-${CLIENT}.xml done Note: You will need to modify the AIXAA-${CLIENT}.xml job files that are created by the script in Example 4-8 to contain the directories for processing your data that is being transferred. The files can be edited by using the Integrated Solutions Console (ISC) under Chargeback Maintenance Job Runner Job Files.
242
You can copy the sample job for processing the AIX data and then edit it for your environment: 1. First, create a new job in the ISC. To create a new job, click Usage and Accounting Manager Chargeback Maintenance Job Runner Job Files New. Enter the name of your new job file and click OK. We want to create a job named AIXAA.xml. Refer to Figure 4-63. After the job is created, you will see a message stating, Successfully copied file. This message indicates that the file is created and contains a skeleton job file template. Tivoli Usage and Accounting Manager provides a sample job to load AIX data named SampleAIXAA.xml. We will use the contents of the SampleAIXAA.xml to overwrite the contents of the new AIXAA.xml file that we have created.
Chapter 4. Operations
243
2. From the ISC, click Sample Job Files SampleAIXAA.xml. Highlight the contents of SampleAIXAA.xml, then right-click to select the contents of the xml file and click Copy. Figure 4-64 on page 244 shows the SampleAIXAA.xml file. 3. From the ISC, click Usage and Accounting Manager Chargeback Maintenance Job Runner Job Files. Select AIXAA.xml from the menu. Replace AIXAA.xml with the contents that you copied from SampleAIXAA.xml.
The AIXAA.xml file is listed in Example 4-9. After moving over the content of the SampleAIXAA.xml file to the AIXAA.xml file, you need to edit the file to customize it for your environment.
Example 4-9 AIXAA.xml
<?xml version="1.0" encoding="utf-8"?> <!-*************************************************************** {COPYRIGHT-TOP} * Licensed Materials - Property of IBM * IBM Tivoli Usage and Accounting Manager * 5724-O33, 5765-UAV, 5765-UA7, 44E7863 * (c) Copyright IBM Corp. 2004, 2007 *
244
* The source code for this program is not published or otherwise * divested of its trade secrets, irrespective of what has been * deposited with the U.S. Copyright Office. **************************************************************** {COPYRIGHT-END} --> <Jobs xmlns="http://www.ibm.com/TUAMJobs.xsd"> <Job id="AIXAA" description="Daily collection" active="true" joblogWriteToDB="false" joblogWriteToTextFile="true" joblogWriteToXMLFile="true" joblogShowStepOutput="true" joblogShowStepParameters="true" processPriorityClass="Low" smtpServer="mail.ITUAMCustomerCompany.com" smtpFrom="[email protected]" smtpTo="[email protected]" stopOnProcessFailure="false"> <Process id="AIXAA" description="Process for AIXAA data collection" joblogShowStepOutput="true" joblogShowStepParameters="true" active="true"> <Steps stopOnStepFailure="true"> <Step id="Integrator" type="ConvertToCSR" programName="integrator" programType="java" active="true"> <Integrator> <Input name="AIXAAInput" active="true"> <Files> <File name="/usr/ituam/CS_input_source/aacct1_%LogDate_End%.txt" /> <File name="/usr/ituam/CS_input_source/aacct4_%LogDate_End%.txt" /> <File name="/usr/ituam/CS_input_source/aacct6_%LogDate_End%.txt" /> <File name="/usr/ituam/CS_input_source/aacct7_%LogDate_End%.txt" /> <File name="/usr/ituam/CS_input_source/aacct8_%LogDate_End%.txt" />
Chapter 4. Operations
245
<File name="/opt/ibm/tuam/samples/processes/exception.txt" type="exception" /> </Files> </Input> <Stage name="CreateIdentifierFromIdentifiers" active="true" trace="false" stopOnStageFailure="true" > <Identifiers> <Identifier name="Account_Code"> <FromIdentifiers> <FromIdentifier name="SYSTEM_ID" offset="1" length="12"/> <FromIdentifier name="UserName" offset="1" length="12"/> </FromIdentifiers> </Identifier> </Identifiers> <Parameters> <Parameter keepLength="true"/> <Parameter modifyIfExists="true"/> </Parameters> </Stage> <Stage name="DropFields" active="true"> <Fields> <Field name="AAID0101"/> <Field name="AAID0102"/> <Field name="AAID0103"/> <Field name="AAID0403"/> </Fields> </Stage> <Stage name="CSRPlusOutput" active="true"> <Files> <File name="/opt/ibm/tuam/samples/processes/AIXAA/server1/%LogDate_End%.txt" /> </Files> </Stage> </Integrator> </Step> <Step id="Scan" description="Scan AIXAA" type="Process"
246
programName="Scan" programType="java" active="true"> <Parameters> <Parameter retainFileDate="false"/> <Parameter allowMissingFiles="false"/> <Parameter allowEmptyFiles="false"/> <Parameter useStepFiles="false"/> </Parameters> </Step> <Step id="Process" description="Standard Processing for AIXAA" type="Process" programName="Bill" programType="java" active="true"> <Bill> <Parameters> <Parameter inputFile="CurrentCSR.txt"/> </Parameters> </Bill> </Step> <Step id="DatabaseLoad" description="Database Load for AIXAA" type="Process" programName="DBLoad" programType="java" active="true"> <DBLoad> <Parameters> </Parameters> </DBLoad> </Step> <Step id="Cleanup" description="Cleanup AIXAA" type="Process" programName="Cleanup" programType="java" active="false"> <Parameters> <Parameter DaysToRetainFiles="45"/> <Parameter cleanSubfolders="true"/> </Parameters> </Step>
Chapter 4. Operations
247
</Steps> </Process>
</Job> </Jobs> 4. Run the AIXAA.xml job by using the Job Runner in either the ISC or from the command line. In the ISC, click Usage and Accounting Manager Chargeback Maintenance Job Runner Job Files. Click AIXAA.xml from the list of jobs and select Run Job from the pull-down menu, which is shown in Figure 4-65.
Figure 4-65 IBM Tivoli Usage and Accounting Manager Job Runner
248
5. When the Job Runner completes, you will be presented with an informational window similar to Figure 4-66. Job Runner can take a few minutes to complete, so wait until this message or a completion message appears.
Figure 4-66 IBM Tivoli Usage and Accounting Manager Job Runner complete message
Chapter 4. Operations
249
6. Verify that the database has loaded successfully by checking the log files. In the ISC, click Usage and Accounting Manager Chargeback Maintenance Log Files. Figure 4-67 shows an example of the log files from the AIXAA.xml file. Any errors that occur during the processing will appear in these log files and will be separated into the processing steps. The error messages all begin with AUC. You can search for and read the messages on the following Web site: http://www-01.ibm.com/software/sysmgmt/products/support/IBMTivoliUsa geandAccountingManager.html
250
These files are located in multiple directories on your IBM Tivoli Usage and Accounting Manager server. The required files are: /opt/IBM/db2/V9.1/java/db2jcc_license_cu.jar /opt/IBM/db2/V9.1/java/db2jcc.jar /opt/ibm/tuam/server/reportsbirt/db2/standard/*.rptdesign /opt/ibm/tuam/server/reportsbirt/resources/* You must copy these files and place them into a temporary folder for use later. In our example, these files were placed in the temp folder: 1. Go to the BIRT Web site at: http://www.eclipse.org/birt/phoenix/ 2. Click Download BIRT 2.3.2 to go to the BIRT download page. 3. On the BIRT 2.3.2 download page, click All-in-One for the BIRT Report Engine. Install Eclipse by unzipping the file. Note: If you already have Eclipse installed on your system, you can download the Runtime and Remote Copy (RCP) Designer portions only. These parts are also installed by unzipping the files.
Chapter 4. Operations
251
4. Move to the folder that contains the files that you unzipped and look for a folder named eclipse. The eclipse.exe executable is in the eclipse folder as shown in Figure 4-68. Double-click eclipse.exe to start the eclipse environment.
252
5. The first time that you execute eclipse.exe, you will see a warning message as shown in Figure 4-69. Click Run to continue, and also clear the check mark from Always ask before opening this file.
6. The Eclipse Workspace Launcher will start and prompt you to enter the path to use for projects as shown in Figure 4-70. Select the path that you will use to save your BIRT projects and select OK to continue.
Chapter 4. Operations
253
7. BIRT will open up to the main workspace window as shown in Figure Figure 4-71. You need to create a new project by selecting File New Project. A pop-up window appears as in Figure 4-71. Expand Business Intelligence and Reporting Tools, select Report Project, and click Next.
254
8. You will be prompted for a name for the new project as in Figure 4-72. Enter the new project name, and click Finish to continue.
Chapter 4. Operations
255
9. You will be presented with a blank Report Design workspace similar to the one in Figure 4-73.
Configuring BIRT
In order for BIRT to connect to the DB2 server on the Tivoli Usage and Accounting Manager server, we need to configure Java Database Connectivity (JDBC) drivers and ensure that the data sets are defined with the correct user name and password. To configure BIRT: 1. From the BIRT main window, click the Data Explorer tab Data Sources. Right-click DB2, and select Edit from the pull-down menu. The menu in Figure 4-74 on page 257 appears.
256
2. Change the Driver URL to jdbc:db2://yourserver:50000/yourdbname, change the user name to db2inst1, and change the password to the password that you set for db2inst1 on your system. Click Manage Drivers. The Manage JDBC Drivers window appears as in Figure 4-75.
3. From this window, you need to add the JDBC drivers to connect to the database.Click Add and navigate to the Temp folder where you stored the driver files earlier. Select the db2jcc.jar file and click Open, and repeat for the db2jcc_license_cu.jar file. When both files appear as in Figure 4-76 on page 258, click OK to continue.
Chapter 4. Operations
257
258
Chapter 4. Operations
259
4. Next, click the Query line to edit the Data Set query. Change the user name that is in the query to db2inst1. The line that contains the user name is {call DBADMIN.GET_CLIENT(?,?)}. Change DBADMIN to DB2INST1 as shown in Figure 4-79. Click OK to continue. Complete the same process for all the data sets, including the SQL data sets, and change the user name in the SQL data sets from DBO to DB2INST1.
260
Sample reports
You can use the BIRT templates to generate reports for date ranges from your IBM Tivoli Usage and Accounting Manager database: 1. To run a report in the eclipse project Navigator window, right-click the report type that you want from the list. Select Report Run Report. Figure 4-80 shows the parameters that you enter for a Run Total Invoice report.
Chapter 4. Operations
261
2. After you set the report parameters, you will see your data on the report for the dates that you have selected. Figure 4-81 shows a sample Run Total Invoice report from our test environment.
262
3. BIRT reports can be exported into several formats, including Microsoft Excel, postscript, Microsoft Word, Microsoft PowerPoint, and PDF. Figure 4-82 on page 264 shows the PDF of the Run Total Invoice report. You can use these formats to present reports to customers about system usage and relate the system usage back to actual accounting charges.
Chapter 4. Operations
263
264
Chapter 4. Operations
265
Figure 4-84 shows the BIRT Rate Report that is available in the templates.
For additional information about producing reports with BIRT, refer to Chapter 7, Reporting Scenarios in the Deployment Guide Series: IBM Tivoli Application Dependency Discovery Manager V7.1, SG24-7616.
266
tuam10:]su - db2inst1 $db2 connect to ituamdb Database Connection Information Database server SQL authorization ID Local database alias = DB2/AIX64 9.1.4 = DB2INST1 = ITUAMDB
$db2 get db cfg | grep -i LOGSECOND Number of secondary log files (LOGSECOND) = 4 $db2 update db cfg using logsecond 150 immediate DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. $db2 get db cfg show detail | grep -i LOGSECOND Number of secondary log files (LOGSECOND) = 150 150 $db2 get snapshot for db on ITUAMDB | grep -i SEC Secondary connects total = 3 Total buffer pool read time (milliseconds) = Not Collected Total buffer pool write time (milliseconds)= Not Collected Maximum secondary log space used (Bytes) = 208181636 Secondary logs allocated currently = 50 Log read time (sec.ns) = 0.000000004 Log write time (sec.ns) = 142.000000004 Application section lookups = 3429 Application section inserts = 843 Total shared section inserts = 0 Total shared section lookups = 0 Total private section inserts = 843 Total private section lookups = 903 Secondary ID = 2 Secondary ID = 1 Secondary ID = System 32k buffer pool Secondary ID = System 16k buffer pool Secondary ID = System 8k buffer pool Secondary ID = System 4k buffer pool
Chapter 4. Operations
267
accounting files after 45 days. Be aware that the data is stored in multiple locations. The first location where the data is stored is on the client server in /opt/ibm/tuam/collectors/unix/CS_input_source, which holds the daily accounting data that is collected on the client. The data is transferred to the server, but a copy is preserved on the client also. Setting up jobs to remove the accounting files periodically is a good practice to prevent File system full conditions (Example 4-11) from occurring in your environment. The second location that contains the accounting data is on the server. The accounting data from all the Tivoli Usage and Accounting Manager clients is gathered and stored in both the /usr/ituam/CS_input_source directory and then loaded into the database also. Both the database and the file system that contains the raw data for processing will need to be monitored for size. Note: The /usr/ituam/CS_input_source directory is a link to /opt/ibm/tuam/collectors/unix/CS_input_source. It is good practice to create this path as a file system when you are collecting data from a large number of clients.
Example 4-11 File system sizes in AIX and file system full condition
$ df -k Filesystem 1024-blocks /dev/hd4 49152 /dev/hd2 2342912 /dev/hd9var 262144 /dev/hd3 507904 /dev/hd1 16384 /dev/hd11admin 131072 /proc /dev/hd10opt 147456 /dev/livedump 262144 /var/adm/ras/livedump /dev/fslv00 2097152 /dev/fslv01 2097152 /home/db2inst1 /dev/fslv02 524288 /dev/fslv03 1114112 /dev/itm_lv 4194304
Free %Used 2636 95% 76116 97% 122884 54% 479236 6% 10740 35% 130708 1% 11324 93% 261776 1% 1854484 1253384 33484 7316 3753964 12% 41% 94% 100% 11%
Iused %Iused Mounted on 1942 69% / 42773 63% /usr 2419 9% /var 310 1% /tmp 77 4% /home 5 1% /admin - /proc 2544 48% /opt 4 1% 44 448 3756 11994 3288 1% /logs 1% 25% /opt/IBM/db2 73% /opt/ibm/tuam 1% /opt/IBM/ITM
268
Chapter 4. Operations
269
Table 4-6 Tivoli Usage and Accounting Manager trace and log file information Path or filename /opt/ibm/tuam/logs/jobrunner/<JobId> <time stamp>.txt <time stamp>.xml /opt/ibm/tuam/logs/server/ message0.log message<g>.log<#> trace0.log trace<g>.log<#> *.lck function Job runner log files separated per JobID Job log output Job log for use with ISC Tivoli Usage and Accounting Manager trace and log files Messages from tuam processing, where <g> = generation and <#> = instance Trace details for tuam processing, where <g> = generation and <#> = instance Lock files for trace and log coordination
/opt/ibm/tuam/ewas/profiles/AppSrv01SystemOut.log/logs/server1 WebSphere and ISC files SystemOut.log SystemErr.log /opt/ibm/tuam/config logging.properties jdk_logging.properties /opt/ibm/tivoli/common/AUC/logs/install WebSphere messages WebSphere error log Tivoli Usage and Accounting Manager config files Settings for trace and message files Not used with version 7.1 Installation and uninstallation log files
270
271
ECC EGID EJB EIF EPOW EPS ERRM ESE ESS EUID F/C FC FCAL FDX FFDC FLOP FRU FTP GB GID GPFS GSS GUI HACMP/PowerHA HBA HMC HPC HPM HTML HTTP Hz
Error Checking and Correcting Effective Group ID Enterprise Java Bean Event Integration Base Environmental and Power Warning Effective Privilege Set Event Response Resource Manager Enterprise Server Edition Enterprise Storage Server Effective User ID Feature Code Fibre Channel Fibre Channel Arbitrated Loop Full Duplex First Failure Data Capture Floating Point Operation Field Replaceable Unit File Transfer Protocol Gigabyte Group ID General Parallel File System General Security Services Graphical User Interface High Availability Cluster Multiprocessing Host Bus Adapters Hardware Management Console High Performance Computing Hardware Performance Monitor Hypertext Markup Language Hypertext Transfer Protocol Hertz
I/O IBM ICU ID IDE IEEE IETF IP IPAT IPL IPMP IQN ISC ISM ISSO ISV IT ITM ITSO ITUAM IVM JDBC JFS JFS2 KAT KB KCT KDT KRT KST
Input/Output International Business Machines International Components for Unicode Identification Integrated Device Electronics Institute of Electrical and Electronics Engineers Internet Engineering Task Force Internetwork Protocol IP Address Takeover Initial Program Load IP Multipathing iSCSI Qualified Name Integrated Solutions Console IBM Support Management Information System Security Officer Independent Software Vendor information technology IBM Tivoli Monitoring International Technical Support Organization IBM Tivoli Usage and Accounting Manager Integrated Virtualization Manager Java Database Connectivity Journaled File System Journaled File System2 Kernel Authorization Table Kilobytes Kernel Command Table Kernel Device Table Kernel Role Table Kernel Security Table
272
LA LACP LAN LDAP LFS LFT LMB LOB LPAR LPP LPS LUN LUNs LV LVCB LVM LWI MAC Mbps MBps MCM ME MIBs ML MLS MP MPIO MPS MTU NDAF NFS NIB
Link Aggregation Link Aggregation Control Protocol Local Area Network Light Weight Directory Access Protocol Logical File System Low Function Terminal Logical Memory Block Line of Business Logical Partition Licensed Program Product Limiting Privilege Set Logical Unit Number Logical Unit Numbers Logical Volume Logical Volume Control Block Logical Volume Manager Lightweight Infrastructure Media Access Control Megabits Per Second Megabytes Per Second Multichip Module Management Edition Management Information Bases Maintenance Level Multi Level Security Multiprocessor Multipath I/O Maximum Privilege Set Maximum Transmission Unit Network Data Administration Facility Network File System Network Interface Backup
NIM NIMOL NIS NVRAM ODBC ODM OSGi OSPF PCI PID PIT PKI PLM PM POSIX POST POWER
Network Installation Management NIM on Linux Network Information Server Non-Volatile Random Access Memory Open Database Connectivity Object Data Manager Open Services Gateway Initiative Open Shortest Path First Peripheral Component Interconnect Process ID Point-in-time Public Key Infrastructure Partition Load Manager Performance Monitor Portable Operating System Interface Power-On Self-test Performance Optimization with Enhanced RISC (Architecture) Physical Partition Physical Processor Consumption Program Temporary Fix Performance Toolbox Physical Volume Physical Volume Identifier Quality of Service Proactive Analysis Component Redundant Array of Independent Disks Random Access Memory
273
RAS RBAC RCP RDAC RIP RISC RMC ROI RPC RPL RPM RSA RSCT RSH RTE RUID S SA SAN SCP SCSI SDD SED SLs SMI SMIT SMP SMS SMT
Reliability, Availability, and Serviceability Role Based Access Control Remote Copy Redundant Disk Array Controller Routing Information Protocol Reduced Instruction-Set Computer Resource Monitoring and Control Return On Investment Remote Procedure Call Remote Program Loader Red Hat Package Manager Rivet, Shamir, Adelman Reliable Scalable Cluster Technology Remote Shell Runtime Error Real User ID System Scope System Administrator Storage Area Network secure copy protocol Small Computer System Interface Subsystem Device Driver Stack Execution Disable Sensitivity Labels Structure of Management Information Systems Management Interface Tool Symmetric Multiprocessor System Management Services Simultaneous multi-threading
SMTP SNMP SO SP SPOT SQL SRC SRN SSA SSH SSL SUID SVC TADDM TCB TCP/IP TE TEM TEMA TEMS TEP TEPS TERMS TPM TSA TSD TTL TUAM UCS UDB
Simple Mail Transfer Protocol Simple Network Management Protocol System Operator Service Processor Shared Product Object Tree Structured Query Language System Resource Controller Service Request Number Serial Storage Architecture Secure Shell Secure Sockets Layer Set User ID SAN Virtualization Controller Tivoli Trusted Computing Base Transmission Control Protocol/Internet Protocol Trusted Execution Tivoli Enterprise Monitor Tivoli Enterprise Monitor Agent Tivoli Enterprise Monitoring Server Trusted Execution Path Tivoli Enterprise Portal Server Tivoli Enterprise Remote Monitor Server Tivoli Productivity Manager Tivoli System Automation Trusted Signature Database Time-to-live Tivoli Usage and Accounting Manager Universal-Coded Character Set Universal Database
274
UID VE VG VIO VIPA VLAN VMM VP VPA VPD VPN VPSS VRRP VSD WAS WED WLM WPAR WPS
User ID Virtualization Edition Volume Group Virtual I/O Virtual IP Address Virtual Local Area Network Virtual Memory Manager Virtual Processor Visual Performance Analyzer Vital Product Data Virtual Private Network Variable Page Size Support Virtual Router Redundancy Protocol Virtual Shared Disk WebSphere Application Server WebSphere Everyplace Deployment V6.0 Workload Manager Workload Partitions Workload Partition Privilege Set
275
276
Related publications
The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this book.
277
Other publications
These publications are also relevant as further information sources: Documentation available on the support and services Web site includes: User guides System management guides Application programmer guides All commands reference volumes Files reference Technical reference volumes that are used by application programmers
The support and services Web site is: http://www.ibm.com/systems/p/support/index.html Virtual I/O Server and support for Power Systems (including Advanced PowerVM feature) http://www14.software.ibm.com/webapp/set2/sas/f/vios/documentation/
Online resources
These Web sites are also relevant as further information sources: IBM AIX http://www.ibm.com/systems/power/software/aix/index.html AIX Enterprise Edition
http://www.ibm.com/systems/power/software/aix/sysmgmt/enterprise/index.html
278
Related publications
279
280
Index
Symbols
$CANDLEHOME/bin/CandleManage 169 $CANDLEHOME/configph_dd.properties 83 $INSTALLDIR/registry/proddsc.tbl 76 $TADDM_installed_directory/dist/etc/collation.properties 117 $TADDM_MEDIA/TADDM/support/bin 100 /etc/hosts 229 /home/db2inst1 13 /home/db2inst1 DB2 file system 35 /opt/IBM/cmdb 117 /opt/IBM/cmdb/dist/bin 186 /opt/IBM/db2 13 /opt/IBM/db2 DB2 file system 34 /opt/IBM/db2/V9.1/instance 49 /opt/IBM/db2/V9.1/java/db2jcc.jar 251 /opt/IBM/db2/V9.1/java/db2jcc_license_cu.jar 251 /opt/IBM/ITM 56 /opt/ibm/tivoli/common/AUC/logs/install 127 /opt/ibm/tivoli/ituam/collectors/Unix/data 238 /opt/ibm/tuam/bin/RunSamples.sh 141 /opt/ibm/tuam/ewas/bin/startServer.sh server1 135 /opt/ibm/tuam/ewas/bin/stopServer.sh server1 135 /opt/ibm/tuam/ewas/profiles/AppSrv01/bin 127 /opt/ibm/tuam/server/reportsbirt/resources 251 /usr/sbin/updtvpkg 31 application mobility 160 application server verification 127 application tier, TADDM discovery 21 application WPAR 152 archuser, DB2 user 48 ARM 145 automation 7 ax, ITM product code 77
B
Bar Chart, ITM 164 base agents 64 BIRT 26, 119, 141, 250 bulkExportPcy, tacmd command 179 bulkExportSit, tacmd command 179 bulkImportPcy, tacmd command 179 bulkImportSit, tacmd command 179 business application, TADDM 218 Business Intelligence and Reporting Tools 250 business service 219
C
CandleManage command 169 CAS 152 CEC 77, 82, 161 cfgsvc command 94, 150 cg, ITM product code 77 Change and Configuration Management Database 112 change history, TADDM 228 chargeback 143 chart view, ITM 163 check_pacct script 240 chgroup command 92 CI 23 CIMSDATAIL 28 CIMSDETAILIDENT 28 CIMSRESOURCE UTILIZATION 28 CIMSSUMMARY 28 cinfo command 6465, 93, 175, 182 Circular Gauge, ITM 166 CIs 19 cj, ITM product code 77
A
A_config.par file 238 access list 191 addBundles, tacmd command 176 advantages of EE 7 advantages of vritualization 10 agent manager 154 agents TEMS 64 AIX advanced accounting 144 AIX Enterprise Edition 34 AIX Standard Edition 3 AIX Toolbox for Linux 99 AIX Version 6.1 4 analytics 213 application infrastructure 205
281
CMDB 108 cmdb, DB2 user 48 collection interval, data warehouse 171 collection location data warehouse 171 commands CandleManage 169 cfgsvc 94, 150 chgroup 92 cinfo 6465, 93, 175, 182 control start 185 control stop 185 db2icrt 49 itmcmd 65, 72, 75, 93, 175, 180 launchpad.sh 32, 35, 100 lsof 22, 99 lssvc 94, 150 make_db2_db.sh 100 mkauthkeys 95 mkgroup 14, 92 mkuser 14, 92 scp 145 SetPerm 184 setupAix.bin 101 startServer.sh 128 startsvc 94, 150 stopServer.sh 128 sudo 22 tacmd 175 unzip 22 updtvpkg 31 viosvrcmd 95 visudo 98 Common Agent Services 152 common event console 73 Comparing the different AIX Offerings 2 components 4 computer System 200 configuration control 171 configuration item 23 configuration items 19 configure base agents 81 BIRT 256 data source 134 JDBC driver 132 sudo 98 System p agent 85 Tivoli Enterprise Monitoring Server 59 Tivoli Enterprise Portal Server 72
VIOS agent 94 WPAR manager 150 configure group 171 configurePortalServer, tacmd command 178 configureSystem, tacmd command 177 connector 73 control start command 185 control stop command 185 cq, ITM product code 77 createEventDest, tacmd command 179 createNode, tacmd command 175 createSit, tacmd command 178 createsystemlist, tacmd command 179 CS_COLL_PATH 238 CS_KEY 238 CS_METHOD 238 CS_nightly_consolidation script 240 CS_PLATFORM 238 CS_PROC_PATH 238 CS_send script 240 CS_USER 238 custom server, TADDM 212 cw, ITM product code 77
D
DAS user 44 dasadm1, DB2 user 14 dasusr1 user, DB2 14 data collector 143 data source 134 data sources configuration 134 data view, ITM 161 database estimation, ITM 16 database size estimation, TUAM 26 Database tuning 237 DB2 13, 29, 73, 120, 129 installing 34 DB2 Enterprise Server Edition 5 DB2 file systems 13 DB2 instance 44 DB2 planning 12 DB2 users and groups 13 db2fenc1, DB2 user 14 db2fgrp1, DB2 user 14 db2grp, DB2 user 14 db2icrt command 49 db2inst1, DB2 user 14, 48 db2jcc.jar 26
282
db2jcc_license_cu.jar 26 deleteEventDest, tacmd command 179 deleteSit, tacmd command 178 deletesystemlist, tacmd command 180 describeSystemType, tacmd command 177 different AIX offerings 2 DIRECTOR_agent 94 disaster recovery, through virtualization 11 discovery 189 discovery profile 194 discovery scope 189 Discovery tuning 237 disk sizing requirements, ITM 15 DNSLookup 117 domain manager 108
hd, ITM product code 77 help, tacmd command 175 history configuration 170 history of discovery, TADDM 211 HMC 8, 161 HMC Base Agent 83 hub monitoring server 14 Hub Monitoring Server, requirements 16
I
IBM operational management 4 IBM Process Management 4 IBM service management 34 IBM service management platform 4 IBM Systems Director 3, 6 IBM Tivoli Application Dependency Discovery Manager 45 IBM Tivoli Application Dependency Manager 2 IBM Tivoli Monitoring 2, 45 IBM Tivoli Usage Accounting Manager 4 IBM Tivoli Usage and Accounting Manager 2, 6 IBM Tivoli Usage and Accounting Manager Virtualization Edition 6 IBM TotalStorage 8 importworkspaces, tacmd command 180 improved hardware utilization, , through virtualization 10 increased flexibility, through virtualization 10 Infrastructure service components, TADDM discovery 21 initialize database 137 installing base agents 77 DB2 3435, 99 Eclipse Help Server 66 ITM 50 Summarization and Pruning Agent 91 System p agent 84 TADDM 97, 100 TEMS 56 Tivoli Enterprise Monitoring Server 53 Tivoli Enterprise Portal Server 66 TUAM 119 Warehouse Proxy Agent 87 warehouse proxy agent 87 WPAR manager 150 install-tuam.sh script 146 Integrated Solutions Console 26
E
Eclipse 250 Eclipse Help Server 66, 76 eCMDB 19 editEventDest, tacmd command 179 editSit, tacmd command 178 editsystemlist, tacmd command 180 EmbeddedExpress_aix_ppc32.tar 26 enabled access through shared infastructure, through virtualization 10 Enterprise Configuration Management Database eCMDB 19 Expansion Pack 99, 146 exportworkspaces, tacmd command 180
F
file systems db2 13 Firefox 30, 52 FQDN 195 fully qualified domain name 195
G
global environment 152 GPFS 160
H
hardware consolidation, through virtualization 10 hardware platform 7 Hardware Prerequisites 7 hardware sizing, TADDM 22
Index
283
integration of components 6 Introduction and Overview 1 inventory 213 inventory reporting, TADDM 232 IP.PIPE protocol 18, 51, 73 IP.SPIPE protocol 18, 73 IP.UDP protocol 18, 73 ISC 26 ISCA71_4_EWASv61.tar 26 it, ITM product code 77 ITM chart view 163 dataview 161 insalling 50 table view 162 ITM product codes 77 ITM protocol 18 ITM protocols 18 IP.PIPE 51, 73 IP.SPIPE 73 IP.UDP 73 SNA 18, 73 ITM_base 94 ITM_premium 94 itmcmd agent 180 audit 181 config 181 dbagent 181 dbconfig 181 execute 181 history 181 manage 181 server 182 support 182 itmcmd command 65, 72, 75, 93, 175, 180 ITSO 8 ITUAM_base 94 ituam_format_aacct script 237 ituam_get_aacct script 237 ituam_schedule.sh script 146 ituam_send_aacct script 237 ituam_uc_nightly script 240 iw, ITM product code 77
JDBC driver configuration 132 job files 139, 243 job runner 243
K
KDC_PORTS 51 kf, ITM product code 77
L
Launchpad 30 launchpad.sh command 32, 35, 100 LDAP 20 lightweight directory access protocol 20 Linear Gauge, ITM 167 listBundles, tacmd command 176 listEventDest, tacmd command 179 listSit, tacmd command 178 listsystemlist, tacmd command 180 listSystems, tacmd command 178 listworkspaces, tacmd command 180 live application mobility 160 LOB 19 logical paritions planning 11 login, tacmd command 175 logout, tacmd command 175 LPARs 11 lsof command 22 lsof command 99 lssvc command 94, 150
M
make_db2_db.sh command 100 Management Edition (ME) for AIX 3 ME for AIX 30 MIB2 21 mkauthkeys command 95 mkgroup command 14, 92 mkuser command 14, 92 mobility 12 ms, ITM product code 77
J
Java Virtual Machine Tuning 237 JDBC 257, 269
N
Network tier, TADDM discovery 21 NFS 160 NFS server 35
284
O
OMNIbus 73 Operating system tuning 237
P
p5, ITM product code 77 pacct 143 ph, ITM product code 77 physical infrastructure 207 physical resources, virtualization 10 Pie Chart, ITM 163 pk, ITM product code 77 planning DB2 12 ITM 14 TADDM 18 TUAM 23 workload partition manager 11 planning and sizing 9 planning, LPARs 11 Plot Chart, ITM 165 portal client 14 Portal Client, requirements 16 portal server 14, 51 Portal Server, requirements 16 PowerHA 160 PowerVM 5 live application mobility 3, 5 Workload Partitions Manager 35 WPAR manager 3 primary network name 74 processing server 24 processor considerations, ITM 15 pull mode 241 push mode 241 pv, ITM product code 77 px, ITM product code 77
reduced power and cooling requirements, through virtualization 11 refreshTECinfo, tacmd command 175 Relationship structure, TADDM discovery 22 reload 198 remote monitoring server 14 Remote Monitoring Server, requirements 16 removeBundles, tacmd command 176 report design 256 reporting server 24 resource manager 156 response file 42 restartAgent, tacmd command 177 RMI server 110
S
schedule discovery 208 scp command 145 scripts check_pacct 240 CS_nightly_consolidation 240 CS_send 240 getdata.sh 238 install-tuam.sh 146 ituam_format_aacct 237 ituam_get_aacct 237 ituam_schedule.sh 146 ituam_send_aacct 237 ituam_uc_nightly 240 secure sockets layer 74 sensors 20 service management 2 service-oriented architecture 10 SetPerm command 184 setPerm command 184 setupAix.bin command 101 Simple Network Management Protocol 191 situation event indicator 174 situation formula 173 SNA protocol 18, 73 SNMP 191 SOA 10 software requirements, TUAM 25 SQL 259 ssh 99 command 22 startAgent, tacmd command 176 startServer.sh command 128
R
rapid provisioning, through virtualization 10 RCP Designer 251 Redbooks Web site 278 Contact us xxi
Index
285
startsvc command 94, 150 stopAgent, tacmd command 176 stopServer.sh command 128 Storage tuning 237 sudo 98 command 22 Summarization and Pruning agent 14 Summarization and Pruning Agent, requirements 16 System p agents 64 System tier, TADDM discovery 21 system WPAR 152
T
table view, ITM 162 tacmd commands 175 addBundles 176 bulkExportPcy 179 bulkExportSit 179 bulkImportPcy 179 bulkImportSit 179 configurePortalServer 178 configureSystem 177 createEventDest 179 createNode 175 createSit 178 createsystemlist 179 deleteEventDest 179 deleteSit 178 deletesystemlist 180 describeSystemType 177 editEventDest 179 editSit 178 editsystemlist 180 exportworkspaces 180 help 175 importworkspaces 180 listBundles 176 listEventDest 179 listSit 178 listsystemlist 180 listSystems 178 listworkspaces 180 login 175 logout 175 refreshTECinfo 175 removeBundles 176 restartAgent 177
startAgent 176 stopAgent 176 updateAgent 177 viewAgent 177 viewDepot 176 viewEventDest 179 viewNode 175 viewSit 178 viewsystemlist 180 TADDM 2, 5 installing 97 TADDM domain 19 TADDM Domain Manager 19 taddm10, DB2 user 48 TEMS configuring 59 TEMS installing 56 TEPS monitoring agents 70 Tivoli Application Dependency Manager 2 Tivoli Application Development Discovery Manager 97 Tivoli Data Warehouse 14, 74 Tivoli Data Warehouse, requirements 16 Tivoli Enterprise Console 96 Tivoli Enterprise Monitoring Agent 171 Tivoli Enterprise Monitoring Server 51, 55, 77 installing 53 Tivoli Enterprise Portal 5 Tivoli Enterprise Portal Server 77 Tivoli Monitoring product codes 77 Tivoli Monitoring Shared Libraries 77 Tivoli Netcool 73 Tivoli Usage and Accounting Manager 2, 117 topology 205 TPC 94 transaction log 266 troubleshooting 266 TSM_base 94 TUAM architecture 25 TUAM collectors 237 TUAM components 24 tuam-getdata.sh script 238
U
unzip 98 unzip command 22 updateAgent, tacmd command 177
286
updtvpkg command 31
V
va, ITM product code 77 versions 211 viewAgent, tacmd command 177 viewDepot, tacmd command 176 viewEventDest, tacmd command 179 viewNode, tacmd command 175 viewSit, tacmd command 178 viewsystemlist, tacmd command 180 VIO 143, 149, 241 VIOS agent 94 viosvrcmd command 95 virtualization 10 physical resources 10 visudo command 98
W
warehouse interval 172 warehouse interval data warehouse 172 Warehouse Proxy agent 14 warehouse proxy agent installing 87 Warehouse Proxy Agent, requirements 16 WebSphere Federation Server 113 workload partition 150 workload partition manager planning 11 WPAR 11, 82, 144, 160 WPAR Manager 2, 5, 7 WPAR manager 5
X
X filesets, required by TADDM 22 XML 139
Index
287
288
Back cover
Learn about AIX Enterprise Edition based on AIX Version 6.1 Obtain useful planning information Explore an offering that combines AIX with IBM Tivoli Systems Management
This IBM Redbooks publication provides AIX Systems Administrators a broad understanding of the new features and products that make up the AIX Enterprise Edition offering. It will help you design or create a solution to maximize efficiencies and help organizations get the most from their Power Systems platform. AIX Enterprise Edition includes all the features of AIX with additional management software that is designed to complement the features of AIX V6.1. AIX Enterprise Edition is designed to improve the manageability of a virtualized AIX environment. Potential benefits include: Improved service availability through access to relevant, real-time information about IT resources Enhanced operational efficiency though the visualization of the relationships of IT resources and applications Improved operational efficiency by centralizing monitoring and automating the response to service issues Better utilization of IT resources through consolidated views of virtualized resource usage Improved service availability through Live Application Mobility Simplified ordering of AIX and essential service management tools at an attractive price
BUILDING TECHNICAL INFORMATION BASED ON PRACTICAL EXPERIENCE IBM Redbooks are developed by the IBM International Technical Support Organization. Experts from IBM, Customers and Partners from around the world create timely technical information based on realistic scenarios. Specific recommendations are provided to help you implement IT solutions more effectively in your environment.