Patrol For Unix and Linux Unix Get Started
Patrol For Unix and Linux Unix Get Started
Supporting
PATROL for Unix and Linux 9.2
March 2005
Copyright 2005 BMC Software, Inc., as an unpublished work. All rights reserved. BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. IBM is a registered trademark of International Business Machines Corporation. DB2 is a registered trademark of International Business Machines Corporation. Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle Corporation. All other trademarks belong to their respective companies. PATROL technology holds U.S. Patent Number 5655081. BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable End User License Agreement for the product and the proprietary and restricted rights notices included in this documentation.
Customer support
You can obtain technical support by using the Support page on the BMC Software website or by contacting Customer Support by telephone or e-mail. To expedite your inquiry, please see Before Contacting BMC Software.
Support website
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at http://www.bmc.com/support_home. From this website, you can
I I I I I I I
read overviews about support services and programs that BMC Software offers find the most current information about BMC Software products search a database for problems similar to yours and possible solutions order or download product documentation report a problem or ask a question subscribe to receive e-mail notices when new product versions are released find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax numbers, and telephone numbers
product information product name product version (release number) license number and password (trial or permanent)
operating system and environment information machine type operating system type, version, and service pack or other maintenance level such as PUT or PTF system hardware configuration serial numbers related software (database, application, and communication) including type, version, and service pack or maintenance level
I I I
sequence of events leading to the problem commands and options that you used messages received (and the time and date that you received them) product error messages messages from the operating system, such as file system full messages from related software
Contents
Chapter 1 PATROL for Unix and Linux Components and Capabilities 13 14 15 15 15 16 16 17 18 18 18 19 21 23 23 23 26 32 32 33 33 34 34 36 37 38 39 39 39 40 40 49 49 50 51 51 52
5
PATROL KM for Unix and Linux Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Built-in Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL for Unix and Linux Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for History Loader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Perform Data Collector for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2 Installing and Migrating PATROL KM for Unix and Linux
Verifying Installation Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System Requirements for PATROL for Unix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Additional Requirements Needed to Install and Use the PATROL Perform Data Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking for Product Patches or Fixes Before Installing. . . . . . . . . . . . . . . . . . . . . Determining How to Install Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . Target Computers and Their Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining Where to Install KMs Based on Architecture. . . . . . . . . . . . . . . . . . . Mounting a CD on Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Assessing and Implementing a Different Security Level . . . . . . . . . . . . . . . . . . . . Typical and Custom Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . First-Time Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing for the First Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrading from an Earlier Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automatic Migration of Console and Agent Customizations . . . . . . . . . . . . . . . . Determining Whether You Can Migrate KM Customizations . . . . . . . . . . . . . . . . Conditions for Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining the Location of PATROL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrade Scenarios for PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . .
Contents
Upgrading Without Saving KM Customizations . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Upgrading and Preserving KM Customizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Migrating Your KM Customizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Preparing to Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Migrating Customizations with the PATROL Configuration Manager . . . . . . . . 55 Moving Files from the PATROL_CACHE Directories . . . . . . . . . . . . . . . . . . . . . . . 55 Migrating Customizations Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Installing Using the Distribution Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Installing PATROL KM for Unix and Linux Using the Distribution Server . . . . . 60 Considerations for Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Browser Version Required for Viewing PATROL Console for Unix Help . . . . . . 61 Additional Considerations for Using Online Help for Unix . . . . . . . . . . . . . . . . . . 62 Uninstalling PATROL for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . 64 Uninstalling PATROL for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Uninstalling All Product Files Except Log Files and Configuration Files . . . . . . . 66 Uninstalling All Products and Associated Log Files and Configuration Files . . . 67 Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Chapter 3 Loading and Configuring PATROL KM for Unix and Linux 71
Preparing to Use PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Migrating Customized Processes from Previous Versions of PATROL KM for Unix . . 73 Using the PATROL Configuration Manager to Migrate Customized Processes . 74 Using the pconfig Utility to Migrate Customized Processes. . . . . . . . . . . . . . . . . . 74 Manually Starting the PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Loading and Preloading KMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Determining Which KMs to Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Determining Which KMs to Preload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Loading KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Verifying What You Have Loaded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Preloading KMs on the PATROL Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Removing KMs from Your Console and Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Unloading KMs from a PATROL Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Removing KMs from the Agent Preload List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Configuring PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Configuring the PATROL KM for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Specifying a Data Collection Method for the PATROL KM for Unix . . . . . . . . . . 89 Enabling the PRINTER and NETWORK Application Classes . . . . . . . . . . . . . . . . 92 Configuring the PATROL KM for Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Configuring Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 About Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 PATROL Native Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Configuring PATROL Native Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Appendix A Accessing Menu Commands, InfoBoxes, and Online Help 99
Appendix B
103
Troubleshooting PATROL for Unix Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Data Collection and Parameter Population Problems . . . . . . . . . . . . . . . . . . . . . . 104 Error Messages in the $BEST1_HOME/bgs/monitor/log/bgscollect_portnumber.log . . . . . . . . . . . 105 Index 107
Contents
Figures
PATROL for Unix and Linux Select Product and Components to Install Screen (Typical) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 PATROL for Unix and Linux Select Product and Components to Install Screen when installing on Unix (Custom) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 PATROL for Unix and Linux Select Product and Components to Install Screen when installing on Windows (Custom) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Application Classes that Appear When UNIX3.kml Is Loaded . . . . . . . . . . . . . . . . . . 79 Application Classes that Appear When LOG.kml Is Loaded . . . . . . . . . . . . . . . . . . . . 80 Application Classes that Appear When EVENT_MANAGEMENT.kml Is Loaded . 80 Application Classes that Appear When HISTORY.kml Is Loaded . . . . . . . . . . . . . . . 81 COLLECTORS Icon (PSL Data Collection Method) . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 DCM Icon (DCM Data Collection Method) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Perform Home Directory Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Figures
10
Tables
System Requirements for PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . 23 PATROL for Unix User Account Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 PATROL for Unix Components that Require setuid root Permissions . . . . . . . . . . . . 26 Additional Requirements for the PATROL Perform Data Collector . . . . . . . . . . . . . . 27 Settings for the /etc/system File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Versions That You Can Migrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Choosing an Upgrade Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Default Values for PATROL Location Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 PATROL for PATROL KM for Unix and Linux .kml Files . . . . . . . . . . . . . . . . . . . . . 76 PATROL for Unix and Linux Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Selecting a Recovery Action Instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Recovery Action Configuration Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Tables
11
12
Chapter
This chapter provides information about components within the PATROL for Unix and Linux product, and how those components can help you to monitor computers in your environment. Topics covered in this chapter include PATROL KM for Unix and Linux Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Built-in Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL for Unix and Linux Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL KM for History Loader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Perform Data Collector for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 15 15 15 16 16 17 18 18 18 19
Chapter 1
13
monitors a complete range of Unix and Linux operating system parameters including: system-wide CPU usage disk and I/O usagetracks usage to locate overused disks file system resourcesdetermines disks that are heavily used or running out of space kernel resource usagemonitors use of the kernel i-node table, file table, and process table log filesmonitors the size and content of specified log files memory activitymonitors paging, I/O caching, and swapping network activitymonitors TCP/IP traffic level network traffictracks network traffic related to Remote Procedure Call and Network File System SMP applicationmonitors the use of individual CPUs in an SMP system system swap filesmonitors the percentage of used and free swap space user sessions and processestracks users on the system process presencemonitors the process table and alerts based on the presence or absence of user-defined command text compositesCPU > 90 and Page-Outs > 1 can be used to warn of a physical memory deficit
14
provides time-of-day scheduling for executing system commands, PSL commands, and PATROL reconfiguration allows scheduling of blackouts (periods of time in which PATROL stops monitoring) provides base event management capabilities at the server level
FilesystemCleanup
NOTE
PATROL for Log Management also provides built-in recovery actions. See the PATROL for Log Management User Guide for information.
For more information about specific recovery actions, see the online Help, which you can access from the PATROL console, or see Configuring Recovery Actions on page 94.
PATROL Agent
The PATROL Agent for Unix is a core piece of the PATROL architecture and is used to monitor computers. PATROL Agents load information from Knowledge Modules (KMs), gather statistics, and send alerts and requested information to the PATROL consoles. PATROL Agents accept requests from the PATROL console and initiate actions based on those requests.
Chapter 1
15
detect the presence and status of an application instance (discovery) collect data on any measurable aspect of an application instance (parameters) interpret data by using defined rules act as a service provider for event management store collected data in local files (history) implement predefined actions to correct abnormal conditions (recovery actions)
You must install a PATROL Agent on each computer you want to manage. For more information, see the PATROL Agent Reference Manual.
monitor the percentage of used and free swap space on disks monitor CPU loads across a network automatically spawn recovery actions in your Unix and Linux environment monitor processes that are running on the system (process presence monitoring) monitor MEMORY utilization and free memory monitor FILESYSTEM capacity
For information about configuring the PATROL KM for Unix, see Configuring the PATROL KM for Unix on page 89. Also, see the PATROL Knowledge Module for Unix User Guide or the PATROL Knowledge Module for Unix online Help for information about using the features of this product.
monitor log files with dynamic log file names select logs to be monitored, including log files that have not yet been created
16
generate an alert when a monitored log file cannot be found use regular expressions to create an exclude alert string that prevents alarms and warnings from occurring by filtering out messages in the log that match specified alarm or warning strings use regular expressions to create an exclude to warn alert string that interprets message text that matches alarm strings and moves the text into a warning alert a specific person or group based on a matched string in the log file reset log alerts which occur as a result of updated text in the log file that matches a specified alert string temporarily stop log monitoring during system maintenance by using external control flags view error strings found in the last log update that caused alert and all entries that match that error string from the last log update.
For information about configuring the PATROL KM for Log Management, see the PATROL for Log Management User Guide. Also, see the PATROL Knowledge Module for Log Management online Help for information about using the features of this product.
configure notification (email, paging, trouble-ticket, or custom notification) for PATROL alerts configure PATROL to send notifications to an enterprise console configure recovery actions for PATROL alerts reword notification messages and customize message content configure PATROL to monitor the availability of hosts manage PATROL parameter thresholds and polling schedules configure blackout periods for notification and for availability monitoring
Chapter 1
17
integrate with any command line email client, paging solution, compiled executable, or script. Sample scripts are provided. integrate with the AlarmPoint enterprise notification software using provided scripts
PATROL for Unix Performance Getting Started PATROL for Unix and Linux Release Notes
PATROL Security
This release of the PATROL for Unix and Linux product provides several options to secure your Unix environment. See PATROL Security Levels on page 38 for more information on setting up security within your monitored environment. For detailed information about PATROL security, see the PATROL Security User Guide.
18 PATROL for Unix and Linux Getting Started
Related Documentation
Related Documentation
For additional information about PATROL KM for Unix and Linux product components, see the following documentation
I I I I I I I I I I I I
PATROL Agent Reference Manual PATROL Knowledge Module for Unix and Linux User Guide PATROL Knowledge Module for Unix and Linux Release Notes PATROL Knowledge Module for Event Management User Guide PATROL History Loader Knowledge Module User Guide PATROL Log Management Knowledge Module User Guide PATROL Security User Guide PATROL Security Release Notes PATROL Knowledge Module for Event Management online Help PATROL Knowledge Module for Unix online Help PATROL Knowledge Module for Log Management online Help PATROL Knowledge Module for History Loader online Help
For information about the PATROL KM for Unix and Linux parameters, see the online Help systems. For additional information about PATROL, see the following documentation:
I I I I I I I I I I I I I I I
PATROL Console for Microsoft Windows User Guide, Volume 1 PATROL Console for Microsoft Windows User Guide, Volume 2 PATROL Console for Microsoft Windows User Guide, Volume 3 PATROL Console for Unix User Guide PATROL Central Operator - Microsoft Windows Edition Getting Started PATROL Central Operator - Web Edition Getting Started PATROL Agent Reference Manual PATROL Script Language Reference Manual Volume I - PSL Essentials PATROL Script Language Reference Manual Volume 2 - PSL Functions PATROL Script Language Reference Summary PATROL Agent Reference Manual Command Line Interface Reference Manual API Reference Manual Installation Utility Reference Manual Help for your PATROL Console
Chapter 1
19
Related Documentation
To view the complete PATROL documentation library, visit the support page on the BMC Software website at http://www.bmc.com/support_home.html. Log on and select a product to access the related documentation. (To log on if you are a first-time user and have purchased a product, you can request a permanent user name and password by registering at the Customer Support page. To log on if you are a firsttime user and have not purchased a product, you can request a temporary user name and password from your BMC Software sales representative.) The complete PATROL documentation library is also available on the PATROL documentation CD that is included with major releases of the PATROL Console and Agent.
20
Chapter
This chapter provides the information that you need to install and migrate PATROL KM for Unix and Linux. For additional information about the PATROL installation process, see the PATROL Installation Reference Manual. The following topics are discussed in this chapter: Verifying Installation Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 System Requirements for PATROL for Unix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Additional Requirements Needed to Install and Use the PATROL Perform Data Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Preparing for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Installation Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Checking for Product Patches or Fixes Before Installing. . . . . . . . . . . . . . . . . . . . . 33 Determining How to Install Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . 34 Target Computers and Their Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Determining Where to Install KMs Based on Architecture. . . . . . . . . . . . . . . . . . . 36 Mounting a CD on Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 PATROL Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Checking Security Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Assessing and Implementing a Different Security Level . . . . . . . . . . . . . . . . . . . . 39 Typical and Custom Installation Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 First-Time Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Installing for the First Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Upgrading from an Earlier Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Automatic Migration of Console and Agent Customizations . . . . . . . . . . . . . . . . 49 Determining Whether You Can Migrate KM Customizations . . . . . . . . . . . . . . . . 50 Conditions for Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Determining the Location of PATROL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Upgrade Scenarios for PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . 52 Upgrading Without Saving KM Customizations . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Upgrading and Preserving KM Customizations . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Migrating Your KM Customizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Chapter 2 Installing and Migrating PATROL KM for Unix and Linux 21
Preparing to Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Migrating Customizations with the PATROL Configuration Manager . . . . . . . . 55 Moving Files from the PATROL_CACHE Directories . . . . . . . . . . . . . . . . . . . . . . . 55 Migrating Customizations Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Installing Using the Distribution Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Import a CD Image or Customized Installation Package into the Distribution Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Installing PATROL KM for Unix and Linux Using the Distribution Server . . . . . 60 Considerations for Using Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Browser Version Required for Viewing PATROL Console for Unix Help . . . . . . 61 Additional Considerations for Using Online Help for Unix . . . . . . . . . . . . . . . . . . 62 Uninstalling PATROL for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Determining the Version of the Installation Utility . . . . . . . . . . . . . . . . . . . . . . . . . 64 Uninstalling PATROL for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Uninstalling All Product Files Except Log Files and Configuration Files . . . . . . . 66 Uninstalling All Products and Associated Log Files and Configuration Files . . . 67 Where to Go from Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
22
Supported Platforms
See the PATROL for Unix Release Notes for a list of supported platforms. In addition, check the product page for version 8.3.06 of PATROL KM for Unix and Linux on the BMC Software Customer Support website. Technical Bulletins on the product support page may contain information about platforms that were supported after PATROL for Unix 8.3.06 was released.
Use Netscape Navigator version 3.014.78 see Browser Version Required for Viewing to use online Help with PATROL for PATROL Console for Unix Help on page 61 Unix.
219-MB for PATROL Agent for Unix 115-MB for PATROL Console for Unix less than 2-MB for PATROL KM for Unix disk space less than 1-MB for PATROL KM for Log Management
less than 1-MB for PATROL KM for Event NA Management installing into a PATROL 3.6.50 Unix environment You must launch the installation utility from the command line and use the releaseversion option. see Upgrading from an Earlier Version on page 49
Chapter 2
23
Table 1
Resource
You must have a valid demonstration license or a permanent license to run your PATROL products. A valid demonstration license is installed automatically and is typically good for 30 days. 256-color display TCP/IP network communications must be available If you are installing an agent or console with PATROL KM for Unix and Linux, you must specify the port number to connect to all the agent computers. 32-MB for PATROL Agent 48-MB for PATROL Console for Unix versions 7.1.41 or higher
screen resolution should be set to at least 600 x 800 pixels NA The default port number for the PATROL Agent is 3181.
NA NA NA
The PATROL Security Level is set during the installation of the PATROL infrastructure components. If your product contains the PATROL Agent, you will have an opportunity to select the security level. Make sure that the level that you select/accept is compatible with the rest of your enterprises PATROL installation. Knowledge Modules (KM) inherit the security level. Products that consist of only KMs do not provide an opportunity to change the security level during installation. Do not use Security level 3 or higher if you will be using Enterprise Configuration or the PATROL Advisor. These security levels require passwords to be entered every time the host is accessed.
accounts
24
Accounts
You must create a dedicated user account before PATROL is installed. Use this account as your PATROL default account. The PATROL account must conform to the following guidelines: Table 2
Resource account file customizations
directory permissions
file systems
on AIX computers, the PATROL installation account must be a member of the adm group do not use the root account to install PATROL for Unix and Linux; this could create security risks The account must have access to a root account on the computer where PATROL will be installed.
see Components that Require setuid Permissions on page 25 for information about PATROL for Unix components that will need setuid root access ensure that the umask setting for the installation account is set to 022
umask setting
NOTE
Processes initiated by KM menu commands will prompt you for the root password.
Chapter 2
25
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
Table 3
Component
PATROL Foundation Components PATROL Console PATROL Agent SNMP Master Agent (snmpmagt) PATROL Perform Data Collector (bgscollect) procstat command FILESYSTEM application NETWORK application NFS application
PATROL KM for Unix Components read into kernel memory (/dev/mem and /dev/kmem) read certain device files access kernel memory mount and unmount file systems clean up file systems (this is a recovery action) delete hosts from the address resolution protocol (ARP) cache run Unix to Unix copy (UUCP) utilities reset NFS counters to zero start and stop printers PRINTER application start and stop print queues delete print jobs move print jobs
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
The PATROL Perform Data Collector allows you to collect and analyze kernel-level data from Unix and Linux operating systems in your environment. If you want to install and use the PATROL Perform Data Collector, you must meet the additional system requirements listed in Table 4 on page 27. For more information about PATROL Perform Data Collector system requirements, see the PATROL for Unix Performance Getting Started.
26
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
Table 4
Resource
you must specify a name for the history data repository at least 3-MB of free disk space on all systems
if a directory name is not specified, you will not be able to use the history features of the investigative node all users must have execute (x) permission These requirements apply to both managing and remote nodes.
file system
BMC Software recommends using a local file system for the history and collected data repositories
if the data repositories must reside on a Unix network file system (NFS), make sure that rpc.lockd and rpc.stat are running on the client and the server this requirement must be met on all nodes
ensure that the LANG variable for your By default, the LANG environmental variable systems is set to the correct locale that you for most systems is set to English, unless you are working on an internationalized platform. want to use To use a different locale than the one on your computer, you must manually set the LANG environmental variable to the locale you want to use. The LANG variable must correspond to the correct locale and alias for your platform. See the PATROL Installation Release Notes for a list of the locales and aliases for supported platforms in this release.
naming conventions
you must use full path names when you specify directories during the installation process
do not use the tilde (~) or relative path names (./.) during the installation
Chapter 2
27
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
Table 4
Resource Unix shells
Korn shell
you must set shared memory segments and semaphores to use the PATROL Perform Data Collector
See Shared Memory and Semaphore Resources for the PATROL Perform Data Collector on page 2-28.
Shared Memory and Semaphore Resources for the PATROL Perform Data Collector
Perform Agent and the Collect programs require semaphores and shared memory segments on all computers. PATROL for Unix collectors require one semaphore and one shared memory segment for each metric group per instance and each collector per instance. Resource limits may be set to low values on your system, particularly on Solaris. This can be a problem, especially if an RDBMS is running on the same node, because RDBMS systems also use these resources. See your system administrator for help in setting semaphore and memory segment parameters.
NOTE
Because these changes alter kernel settings, you must restart the system for the changes to take effect.
28
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
BMC Software recommends that you reset these values after installation, as indicated in Table 5. The values in the /etc/system entry column represent a default system configuration installation. Increasing these limits does not incur any additional overhead, because they are used only when required. If your system is already set to higher values, increase the values by an amount corresponding to the increase shown in the table.
Setting Boot Time Values for Shared Memory and Semaphore Parameters
When setting shared memory and semaphore parameters, if the boot time value is less than the recommended number, you must increase it. To evaluate whether you need to increase the value of a parameters boot time value, use the guidelines in (Table 5).
NOTE
Instance can be a system or an RDBMS collect.
Table 5
semsys: seminfo_semmap
Set equal to If semsys: semsys:seminfo_semmni + two seminfo_semmni was set to 256, set semsys: seminfo_semmap equal to 258 Note: Obsolete in Solaris 8 and beyond
semsys: seminfo_semmni
Add (25 + 25 multiplied by the Number of number of instances) to the semaphore current value identifiers (semaphore sets), system-wide
If the current value of the machine is 100 and you will be running one system collector set the value to 150
Chapter 2
29
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
Table 5
semsys:
For Parameter...
seminfo_semmnu
semsys: seminfo_semmsl semsys: seminfo_semopm seminfo_semume seminfo_semvmx seminfo_semaem IPC Shared Memory shmsys: shminfo_shmm shmsys: shminfo_shmmin
No specific recommendation. PATROL Perform will attach two semaphores per identifier. No specific recommendations for any of these four semaphore settings. They have no impact on the operation of PATROL Perform.
No specific recommendation. The default value is high enough for PATROL Perform.
PATROL Perform allocates small segments, so this value will never be a limiting factor. shmsys:shminfo_shmmni should always be set to 1
Minimum size of The system default of 1 is recommended. an IPC shared memory segment that can be created Add (25 + 25 multiplied by the System wide number of instances) to the limit on the number of shared current value memory segments Add (25 + 25 multiplied by the Limit on the number of shared number of instances) to the current value memory segments that one process can create
shmsys: shminfo_shmmni
If the current value of the machine is 100 and you will be running one system collector, set the value to 150 If the current value of the machine is 100 and you will be running one system collector, set the value to 150
shmsys: shminfo_shmseg
30
Additional Requirements Needed to Install and Use the PATROL Perform Data Collector
For sem-map (maximum number of entries in the semaphore map, default value=10), increase the value by 90.
On Linux Systems
The shared memory and semaphore requirements on Linux are the same as the requirements for other Unix variants. If there are not other shared memory intensive applications running on the Linux machine (such as Oracle) it will not typically be necessary to change the default IPC kernel settings under Linux. The current shared memory settings on the machine can be seen by running the following command: ipcs -l Shared memory and semaphore settings can be changed in the Linux kernel by editing the kernel settings files in /proc/sys/kernel. The files are: sem, shmall, shmmax, shmmni. The shm* files contain a single value that equates to the setting on the machine. The sem file has four values separated by tabs. Updating these files changes the specified setting in the running kernel. However, the default kernel limits are sufficient to run Perform on the machine.
On Hewlett-Packard Systems
On HP-UX you can use the SAM tool to change the settings for resource limits and to reconfigure the kernel. SAM will relink the kernel. See the man pages for more information on using SAM for this purpose. Use the recommended values shown in Table 5 on page 29 to adjust the settings for HPUX.
1 Issue /sbin/sysconfigdb -l ipc to view the current settings. See man pages for more
information on the sysconfigdb command.
NOTE
HP recommends that you do not attempt to edit the /etc/sysconfigtab file. The sysconfigdb utility will automatically make any changes available to the kernel and will preserve the structure of the file so that future upgrades will be correctly merged.
Chapter 2
31
2 Look at the current values, and then refer to Table 5 on page 29 for the
recommended values. Increase your values to those recommended in Table 5.
3 Synchronize the file with the systems configuration data base by entering the
following command:
/sbin/sysconfigdb -s
Installation Prerequisites
Before you install, you must
I I I I I I
ensure that all system requirements are met (see page 23) determine how to install products (see page 33) ensure you are using the appropriate version of the installation utility (see page 34) understand target machines and their roles (see page 34) choose between Typical and Custom installation options (see page 39) understand PATROL security options (page 38)
32
Local Installation
If you install locally, you must install PATROL KM for Unix and Linux and a PATROL Agent on each computer that you want to monitor, and PATROL KM for Unix and Linux and a PATROL Console for Windows or Unix on each computer from which you want to view results. If you install locally in a PATROL 7.x environment, you must install PATROL for Unix and Linux on the computer that hosts the PATROL Console Server. Details for installing products locally are contained in this chapter.
Remote Installation
If you create an installable image, the product configuration information that you enter, such as the BMC Software products installation directory, account names, passwords, PATROL Agent port number, and security options, must be the same for all computers on which the image is to be installed. If you want to specify different settings for different computers, you must either create a separate image for each set of values that you want to implement or edit the variables in the images control file by using the ctltool.
Chapter 2
33
NOTE
I
To create an installable image that you can install on multiple Windows or Unix operating systems, you must launch the installation utility from a command line and use the repository_oslist command line option to specify the operating systems on which you want the image to install. You can also use the -repository_oslist option to create an image on a Windows computer to be installed on Unix computers or create an image on a Unix computer to be installed on Windows computers. You cannot create an installable image that can be installed on both Windows and Unix computers. You must create one image for all Windows operating systems and one image for all Unix operating systems; however, you can create the images from either a Windows or Unix computer.
For more information about creating, distributing, and installing installable images, and about using the ctltool, see the PATROL Installation Reference Manual.
1 Open a command prompt. 2 Navigate to the directory where the installation utility is located. 3 Type setup.sh -v and press Enter.
The installation script displays version information at the command prompt.
34
applications such as consoles, user interfaces, viewers, and browsers. Select this option if the computer to which you are installing will perform any of the following roles: monitor, manage, and develop KMs on Unix by using a PATROL Console for Unix (PATROL 3.x architecture) monitor, manage, and develop KMs on Windows by using a PATROL Console for Windows (PATROL 3.x architecture)
I
Managed Systems (also referred to as agent computers) host software that manages
the resources on the computer, such as a PATROL Agent, and PATROL Knowledge Modules. Select this option if the computer to which you are installing will perform any of the following roles: host a PATROL Agent (works with both the PATROL 3.x and PATROL 7.x architecture) host KMs and components that contain the knowledge that PATROL uses to monitor the resources on this computer
I
A Common Services (new with PATROL 7.x architecture) computer hosts services that are shared among managed systems and console systems. You can install each of these common services on any computer in the network. Select this option if the computer to which you are installing will perform any of the following roles: host the PATROL Central Operator Web Edition (PATROL 7.x architecture) Web server host the PATROL Console Servers host the RTservers
Additional Information
For more information about the PATROL consoles and PATROL Console Server or RTserver, see the products respective online help systems and the following documents:
I
PATROL Central Operator - Web Edition Getting Started PATROL Central Operator - Microsoft Windows Edition Getting Started
Chapter 2 Installing and Migrating PATROL KM for Unix and Linux 35
PATROL Configuration Manager User Guide PATROL Console for Microsoft Windows User Guide - Understanding the Basics of PATROL, Volume 1 PATROL Console for Unix User Guide PATROL Console Server and RTserver Getting Started
PATROL 3.x
Install KM packages to computers whose roles are defined as Managed Systems and Console Systems. A PATROL 3.x environment includes the following components:
I I
PATROL Agent 3.x runs on Managed Systems. PATROL Console for Windows or PATROL Console for Unix 3.x runs on Console Systems.
PATROL 7.x
For PATROL Central Operator Microsoft Windows Edition, install KM packages to Console Systems, Common Services Systems, and Managed Systems. For PATROL Central Operator Web Edition, install KM packages to Common Services Systems and Managed Systems. A PATROL 7.x environment includes the following components:
I I I I
PATROL Agent 3.5 or 3.6 runs on Managed Systems. RTserver runs on Commons Services Systems. PATROL Console Server runs on Common Services Systems. PATROL Central Operator Microsoft Windows Edition, PATROL Central Operator Web Edition, or both run on Console Systems.
36
For more information about the PATROL 7.x architecture, see the PATROL Infrastructure Planning Guide.
Mounting a CD on Unix
The following sections provide information about the mount commands you must use to mount the PATROL product CDs on your Unix system.
1 Log on as root. 2 Insert the CD into the CD drive. 3 Use the mount command appropriate to your platform to mount the CD.
Platform AIX Tru64 HPUX-PA1.0 Version 10.20 or higher Linux Solaris Mount Command mount -r -v cdrfs /dev/cd0 /cdrom /sbin/mount -t cdfs /devices/disk/cdrom_device /cdrom mount -F cdfs -o ro /dev/dsk/drive_for_cdrom/cdrom mount /dev/cdrom /path_to_target_mount_point Volume Manager (/usr/sbin/vold) automatically mounts. Otherwise, use mount -r -F hsfs /dev/sr0 /cdrom
If a problem occurs, consult your system administrator or read the man page for mount.
4 Log off.
Chapter 2
37
1 Log on as root. 2 Create a directory on your local computer (for example, /mnt/cdrom or
/mnt/cdrom/cdrom0 for Solaris) as the mount point for the CD on the remote host
computer.
3 Use the mount command appropriate to your platform to mount the CD.
Platform AIX, Tru64, HPUXPA1.0 Linux Solaris Mount Command mount host:/cdrom /mnt/cdrom mount host:/path_to_file_system_to_be_exported /path_to_target_mount_point mount host:/cdrom/cdrom0 /mnt/cdrom/cdrom0
If a problem occurs, consult your system administrator or read the man page for mount.
4 Log off.
NOTE
The PATROL Agent, console server, and consoles must operate at the same security level to communicate with each other. When you install agents, console servers, or consoles that need to communicate with previously installed versions of these components, check the security level of the previously installed components and be sure to install the new ones at the same level.
38
1 From the command line switch to the path on the computer that you want to check.
Your previous PATROL installations will reside in $BMC_ROOT/../common/security/bin/OS.
2 Run the following command to display the security policy of the current machine:
esstool policy -a
The security level is displayed in the security level field of the output.
The Typical installation type uses defaults values for all optional configuration information. It prompts you only for mandatory configuration information. This type is for any or all of the following situations: You are new to the PATROL product that you are installing and you have an agent or console already installed in the default directories. You are performing a first-time installation (you are not upgrading), and you are installing into the default product installation directories.
Chapter 2
39
First-Time Installation
NOTE
If you are installing PATROL KM for Unix and Linux to an existing PATROL Agent or Console environment that is not in the default installation directory, use Custom. Do not use Typical. Typical will automatically install the agent or console with PATROL for Unix and Linux and overwrite your existing installation. If you do not want to overwrite your existing installation, use Custom so that you can clear the selection of the agent or console product.
With the Custom installation type, you can install individual components of the product. It requires that you specify all configuration information. This type is for any or all of the following situations: You want to install individual components rather than the entire product. You want to specify I the port numbers that components use to communicate with each other I a security level greater than basic security I any other product settings that a user might want to change. You are upgrading PATROL KM for Unix and Linux from a previously installed version. You are installing into an existing PATROL environment that is not in the default installation directory. The Custom installation type installs the components and KMs that you select.
First-Time Installation
The installation utility offers two types of installations: Typical and Custom. For a description of the two types of installations, see Typical and Custom Installation Types on page 39.
40
First-Time Installation
NOTE
By default, the Typical installation type configures the PATROL Agent to connect through port 3181. If you want to connect the agent from a different port, you must use the Custom installation type.
Install on a limited number of computers in the test environment, test the installation thoroughly, and then install in your production environment. You must have created and be logged in as the PATROL default account. If you want to install PATROL KM for Unix and Linux on a computer running Unix but that does not have a browser installed, you must have access to a second computer that runs a browser that is supported by the installation utility. Mount the CD-ROM on a Unix or Linux computer. See Mounting a CD on Unix on page 37.
To Install Using the Typical Installation Type 1 From the installation PATROL for Unix CD or from an installation image that has
been electronically downloaded from an EPD site and extracted, run setup.sh.
NOTE
You can download the complete PATROL for Unix and Linux product solution or individual product components from the product EPD Web site.
If you are installing into a Unix environment without a browser, perform the following steps to launch the installation utility:
A From a command line, change to the directory where the installation utility is
located and enter the following command to start the installation Web server:
./setup.sh -serveronly
A message box is displayed that shows the URL to use to connect to the installation Web server.
B On another computer with a browser, start the browser. C Connect to the installation Web server from the browser to start the installation
utility by using the URL that is displayed in the message box on the computer on which you are installing the product.
Chapter 2
41
First-Time Installation
2 In the Welcome to the Installation Utility window, click Next to begin your
installation.
3 Review the license agreement, select Accept, and click Next to continue. 4 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
5 In the Select Type of Installation window, select Typical and click Next to continue. 6 In the Specify Installation Directory window, accept the default directory and click
Next to continue.
By default, PATROL for Unix will be installed into the /opt/bmc directory.
7 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
I
If you are installing to a computer that hosts or will host a PATROL Console for Unix, select Console Systems. If you are installing to a computer that hosts or will host a PATROL Agent or PATROL KMs, select Managed Systems. If you are installing to a computer that hosts or will host the PATROL Central Operator Web Edition (PATROL 7.x architecture) Web server, the PATROL Console Servers, or the RTservers, select Common Services.
For more information, see Target Computers and Their Roles on page 34.
8 From the Select Products and Components to Install window, select the items that
you want to install (see Figure 1) and click Next. See PATROL for Unix and Linux Components on page 15 for information about each of the product components you can install. Each computer that you want to monitor must have a PATROL Agent installed on it to collect data. Computers may have one or more PATROL KMs installed on them, depending on what you want to monitor on the computer. Figure 1 PATROL for Unix and Linux Select Product and Components to Install Screen (Typical)
42
First-Time Installation
9 In the Temporary space for installing external components screen, enter or browse to a
directory (for example, C:\temp for Windows or /tmp for Unix) on your computer that can serve as a storage location where the product files can be copied temporarily before being installed on your computer and click Next. If the directory that you enter does not exist, the installation utility will attempt to create it. The installation utility creates then begins to copy the files required for the product installation from the current CD image. This process may take a few moments.
NOTE
Make sure that the temporary directory that you specify has adequate disk space to make a copy of all the components required by the product that you are installing. After the installation is complete, the installation utility removes the copied files and the temporary directory.
The Additional CDs Needed screen is displayed and lists in sequence the CDs required to complete the installation.
10 Insert the CD that is indicated on the Additional CDs Needed screen, then enter the
drive letter or mount volume in the space provided. If you copied the CD to your computer, enter the directory where the image is located and click Next.
NOTE
On Unix systems, you cannot eject removable media while the media is being accessed. To swap CDs, you may need to exit the installation utility, then, from a command line, cd to / and restart the utility by specifying the absolute path; for example, /mnt/cdrom/setup.sh.
11 When the next Additional CDs Needed screen is displayed, follow the directive to place the original product CD back in the CD-ROM drive and click Next. 12 {Unix installations only] If the Provide the System Root Account Properties window is
displayed, enter the ID and password for the root account and click Next.
NOTE
I
If you wish to continue without specifying the root password, then select Next. You will need to complete the root configuration at a later time before the products you selected will run correctly. If you need to run configuration scripts, you will need to complete the root configuration or use a sudo account and password in instead of root authorization. See the Installation Utility Reference Manual for details.
Chapter 2
43
First-Time Installation
13 In the PATROL Default Account Properties window, enter the user name and
password that you want to use for your PATROL default account and click Next. You should have created this account manually before you began to install PATROL. (For more information about the PATROL account, see Accounts on page 25).
14 In the Review Selections and Install window, review the selections carefully to
ensure that they are correct:
I I
If you want to change your selections, click Back and make those changes. If the selections are correct, click Start Install to start installing.
A status window opens that contains current messages, current milestones, and percentage complete.
15 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100% complete.)
16 (Optional) In the results window, click View Log to review the details of the
installation.
17 Click Finish to close the installation utility. To Install Using the Custom Installation Type 1 From the installation PATROL for Unix CD or from an installation image that has
been electronically downloaded from an EPD site and extracted, run setup.sh.
NOTE
You can download the complete PATROL for Unix and Linux product solution or individual product components from the product EPD Web site.
If you are installing into a Unix environment without a browser, perform the following steps to launch the installation utility:
A From a command line, change to the directory where the installation utility is
located and enter the following command to start the installation Web server:
./setup.sh -serveronly
A message box is displayed that shows the URL to use to connect to the installation Web server.
44
First-Time Installation
C Connect to the installation Web server from the browser to start the installation
utility by using the URL that is displayed in the message box on the computer on which you are installing the product.
2 In the Welcome to the Installation Utility window, click Next to begin your
installation.
3 In the Review License Agreement window, review the license agreement, select
Accept, and click Next to continue.
4 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
5 From the Select Type of Installation Window, select Custom and click Next. 6 In the Specify Installation Directory window, enter the path up to, but not
including your current installation directory and click Next. For example, to install PATROL for Unix into the directory /opt/bmc/PATROL3-4, enter PATROL3-4 in the PATROL 3.x Product Directory field. If your installation directory is at the root level (such as /opt/bmc), do not enter anything into the PATROL 3.x Product Directory field. You will specify the PATROL product directory in step 12 on page 47.
7 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
I
If you are installing to a computer that hosts or will host a PATROL Console, select Console System. If you are installing to a computer that hosts or will host a PATROL Agent or PATROL KM, select Managed System. If you are installing to a computer that hosts or will host the PATROL Central Operator Web Edition (PATROL 7.x architecture) Web server, the PATROL Console Servers, or the RTservers, select Common Services.
For more information, see Target Computers and Their Roles on page 34.
8 From the Select Products and Components to Install screen, select the items that
you want to install (see Figure 2 on page 46) and click Next.
Chapter 2
45
First-Time Installation
See PATROL for Unix and Linux Components on page 15 for information about each of the product components you can install. Each computer that you want to monitor must have a PATROL Agent installed on it to collect data. Computers may have one or more PATROL KMs installed on them, depending on what you want to monitor on the computer.
NOTE
If you are installing PATROL for Unix from a Windows Server, the PATROL Agent is not listed a selectable item in the Select Products and Components to Install screen, as shown in Figure 3 on page 46. The PATROL Agent is not listed because the PATROL Agent that is a component of PATROL for Unix is a Unix agent. If you want to install the PATROL Agent on Windows Servers, you must install the Windows agent from the PATROL for Microsoft Windows Servers product.
Figure 2
PATROL for Unix and Linux Select Product and Components to Install Screen when installing on Unix (Custom)
Figure 3
PATROL for Unix and Linux Select Product and Components to Install Screen when installing on Windows (Custom)
9 In the Temporary space for installing external components screen, enter or browse to a
directory (for example, C:\temp for Windows or /tmp for Unix) on your computer that can serve as a storage location where the product files can be copied temporarily before being installed on your computer and click Next.
46
First-Time Installation
If the directory that you enter does not exist, the installation utility will attempt to create it. The installation utility creates then begins to copy the files required for the product installation from the current CD image. This process may take a few moments.
NOTE
Make sure that the temporary directory that you specify has adequate disk space to make a copy of all the components required by the product that you are installing. After the installation is complete, the installation utility removes the copied files and the temporary directory.
The Additional CDs Needed screen is displayed and lists in sequence the CDs required to complete the installation.
10 Insert the CD that is indicated on the Additional CDs Needed screen, then enter the
drive letter or mount volume in the space provided. If you copied the CD to your computer, enter the directory where the image is located and click Next.
NOTE
On Unix systems, you cannot eject removable media while the media is being accessed. To swap CDs, you may need to exit the installation utility, then, from a command line, cd to / and restart the utility by specifying the absolute path; for example, /mnt/cdrom/setup.sh.
11 When the next Additional CDs Needed screen is displayed, follow the directive to place the original product CD back in the CD-ROM drive and click Next. 12 In the Provide the PATROL 3.x Product Directory window, enter in the PATROL
3.x Product Directory field the directory in which you want to install PATROL KM for Unix and Linux. This directory is appended to the base directory path that is shown in the BMC Products Installation Directory field. The installation directory was entered in step 6 on page 45.
13 {Unix installations only] If the Provide the System Root Account Properties window is
displayed, enter the ID and password for the root account and click Next.
NOTE
If you wish to continue without specifying the root password then select Next. You will need to complete the root configuration at a later time before the products you selected will run correctly.
Chapter 2
47
First-Time Installation
14 If the PATROL Default Account Properties window appears, enter the user name
and password that you want to use for your PATROL default account and click Next. You should have created this account manually before you began to install PATROL. (For more information about the PATROL Account, see Accounts on page 25).
NOTE
This Complete the Confirm BMC Startup window described in step 15 may not be displayed if you are not installing into a managed system.
15 If the Complete the Confirm BMC Startup Information window appears, perform
the following steps:
A In the Specify the Current Agent Port Number field, enter the port number that
you want the PATROL Agent to use. The default is 3181.
NOTE
If your previous installation used a different port number, change the default to the current port number for the PATROL Agent.
B In the Restart the PATROL agent automatically? field, select the appropriate
option:
I
If you want the installation utility to restart the PATROL Agent after the installation is complete, select Yes. If you want to restart the PATROL Agent manually after the installation is complete, select No.
16 In the Review Selections and Start Install window, review the selections carefully
to ensure that they are correct:
I I
If you want to change your selections, click Back and make those changes. If the selections are correct, click Start Install to start installing.
A status window opens that contains current messages, current milestones, and percentage complete.
17 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100% complete.)
18 (Optional) In the results window, click View Log to review the details of the
installation.
48
Upgrading Without Saving KM Customizations on page 53 Upgrading and Preserving KM Customizations on page 53
agentsstored in the agent configuration file consolesstored in the console cache files
NOTE
Customized Knowledge Modules and PSL files are also stored in the cache but they are not automatically preserved and incorporated.
Chapter 2
49
migrating customizations using the PATROL Migration Tools (page 55) migrating customizations manually (page 57)
NOTE
The PATROL KM for Event Management has no migration path from versions prior to 2.6.00. Migration of the PATROL KM for Event Management is not required because the configuration information, including parameter settings, is stored in the PATROL Agent configuration database and is backward compatible. See the PATROL Knowledge Module for Event Management User Guide for more information about upgrading the PATROL KM for Event Management.
Table 6
Component
PATROL KM for Unix PATROL KM for Event Management PATROL KM for Log Management PATROL Knowledge Module for History Loader
50
have not made any customizations to the KM files in your previous version of PATROL KM for Unix and Linux want to overwrite customizations you made to the KM files with the default values of the new version of PATROL KM for Unix and Linux have a currently installed version of PATROL KM for Unix and Linux that cannot be migrated (See Table 6Versions That You Can Migrate on page 50)
made customizations to the KM files in your previously installed version of PATROL KM for Unix and Linux and want to save those customizations and migrate them to the new version of PATROL KM for Unix and Linux
Chapter 2
51
Depending upon which PATROL architecture you are using, the <patrol_directory> is /PATROL3 or /PATROL7.
b
$TARGET is the output of the target script, indicating the system type and OS version.
not migrating customizations migrating customizations using PATROL Configuration Manager migrating customizations manually migrating customizations using the PATROL Migration Tools and then installing the product using the Common Installation Utility for local installations the Distribution Server for remote installations
52
NOTE
Customizations applied using PATROL Configuration Manager or operator overrides are automatically saved in the agent configuration database. They will take effect automatically unless the parameter name or application name has changed.
modified PSL code, whether it is embedded in .km files or in .psl files new Knowledge Modules that you created
The results from the migration tools can be installed using either the PATROL Installation Utility or the Distribution Server. For more information about the PATROL migration tools, see the PATROL Migration Tools User Guide.
Chapter 2
53
Preparing to Upgrade
Whether you are upgrading and migrating customizations or simply upgrading, you must first back up the current installation. If the .kml file or any of the .km files for the new version of PATROL KM for Unix and Linux has a different file name from the previous version, you must remove those files from the list of KMs that are preloaded on the PATROL Agent.
1 Shut down any PATROL Agents, consoles, and related services that are currently
running.
2 Ensure that no one is accessing any PATROL files or directories. 3 Perform a full backup of the directories where PATROL files are typically stored.
These directories are listed in the following table:
File Type executables and data console customizations Directory PATROL_HOME/.. for agent and console installation directories PATROL_CACHE for the console working cache
54
If you have localized parameters or global parameters that have customized poll times or thresholds, use the AS_CHANGESPRING KM to migrate these customizations into PATROL Configuration Manager rulesets as described in the PATROL Configuration Manager User Guide. If you have created custom recovery actions, follow these steps:
1 Ensure that you have made a record of your customizations and have backed up
the customized files in the PATROL_HOME and PATROL_CACHE directories.
2 Uninstall the old version of PATROL KM for Unix and Linux. 3 Install the new version of PATROL KM for Unix and Linux as described in the
section Installing for the First Time on page 40.
4 Ensure that you have made a record of your custom recovery actions. 5 Use the Recovery Action Event Management commands as described in the
PATROL Configuration Manager User Guide to migrate your custom recovery actions to the PATROL Configuration Manager. All other customizations must be migrated manually, as described in Migrating Customizations Manually on page 57.
Chapter 2
55
add_* apilib* bds_* bsd_* ChkUnldDcm* Composites* CPU* DISK* FILESYS* FSDebug* haag_* internal_* Linux* make_* most_* network_* nis_* osf_* PRINTER* PROC* RS6000* SECURITY* SINIX* SOLARIS* stop_* tcp_* UNIX* usr_*
I I I I I I I I I I I I I I I I I I I I I I I I I I I I
aix_* appclass* blackout* Capture* COLLECTORS* Configure* DCM* display_* Filesys* get_* HP* KERN* linux_* mem_* net_* NFS* not_* PATROL* printer_* proc* SCHEDULER* sequent_* SMP* solaris_* svr4_* toggle_* unix_* uu*
I I I I I I I I I I I I I I I I I I I I I I I I I I I
all_* BASE3* boot_* cat_* COMPOSITE* cpu* debug_* edit_* fs_* HAAG* hp_* kern* list_* MEMORY* NETWORK* nfs_* OSF* pkmunix* prn_* response_* sec_* set* SNMP* statvfs_* SWAP* uname_* USERS*
LOG* PMG*
56
Naming Patterns for the PATROL Knowledge Module for History Loader:
I I I I I I I
H*.km
H*.psl
See the PATROL Knowledge Module for History Loader User Guide for more information about migrating the PATROL Knowledge Module for History Loader.
To Migrate Customizations to KM Files Manually 1 Ensure that you have made a record of your customizations and have backed up
the customized files in the PATROL_HOME and PATROL_CACHE directories.
2 Uninstall the old version of PATROL KM for Unix and Linux. 3 Install the new version of PATROL KM for Unix and Linux as described in the
section Installing for the First Time on page 40.
4 Identify and record the coding changes, which represent your customizations, in
PATROL KM for Unix and Linux by comparing the content of the ASCII files in the newly installed PATROL KM for Unix and Linux version with the content of the customized ASCII files with the same name that is saved in the directory to which you moved the old version.
5 Incorporate your customizations to the new PATROL KM for Unix and Linux by
performing the following steps:
A Restart the PATROL console. B Load the newly installed PATROL KM for Unix and Linux.
Chapter 2
57
C Using a PATROL console in developer mode, enter the customizations that you
identified in step 4 on page 57, one by one.
If you modified .psl files that were shipped by BMC Software, you must manually re-edit the PSL code in the new KM by using a PATROL console in developer mode to reapply your changes. If you modified PSL code embedded in a .km file, that code will be overwritten when you install a new version of the product. You must manually edit the new .km files by using a PATROL console in developer mode to reapply your changes. If you created a new PSL file (not shipped by BMC Software) outside of a .km file, or if you created new PSL code (not shipped by BMC Software) and embedded it in a .km file that was shipped by BMC Software, use the pslsearch utility to search your .km, .psl, and .ctg files for terms that you may have used that have since been adopted by BMC Software as PSL keywords. Rename any terms that pslsearch identifies as matching existing keywords. Reapply your changes by using a PATROL console in developer mode. For instructions about using the pslsearch utility, see the PATROL Migration Tools User Guide.
Install, uninstall, upgrade, and reinstall products on remote systems from one central location. Create collections of products and system groups to distribute multiple products to multiple systems in one distribution. Schedule a distribution for a specific date and time.
58
Maintain multiple product versions to be distributed. View reports to check distribution status, gather distribution data, and diagnosis problems.
To Import Components in to the Distribution Server 1 Using the Distribution Server Manager, start the Distribution Server and connect
to it.
2 In the Distribution Server tab area, click the Components tab. 3 In the list area, click the Import button. 4 Navigate to the location where the components are located and click Next. 5 Select the directory that contains the Products directory (do not select the Products
directory itself). If the components are not accessible on a local drive, you can specify them by using the NFS name and path.
EXAMPLE
Assuming that you copied the CD image into a directory called merged_CD and then, after migrating your customizations and creating a customized installation package, you copied the updated package to the directory containing the CD image, the resultant directory structure would resemble merged_CD/Products/pukchm. You would select the directory merged_CD.
6 Select the check boxes for the components that you want to import and click OK. 7 On the Import Components screen, click Import to import the selected components. 8 When the Import Status screen is displayed, click Close.
Chapter 2
59
9 If the components you are importing are located on another CD, the Import
External Dependencies screen is displayed. Enter or browse to the location of the CD listed on the Import External Dependencies screen click Next.
10 On the Import Components screen, click Import to import the selected components. 11 When the Import Status screen is displayed, click Close. Where to go from here
To remotely install PATROL KM for Unix and Linux throughout your enterprise, use the instructions in the Distribution Server Getting Started Guide. For an overview of that process, see Installing PATROL KM for Unix and Linux Using the Distribution Server.
Installing PATROL KM for Unix and Linux Using the Distribution Server
Once you have imported PATROL for Unix and Linux into the Distribution Server, you must perform the following tasks within the tool. The tasks can be grouped into three stages.
To Set Up Products 1 Import components into the Distribution Server repository on the Components tab
of the Distribution Manager.
3 Configure the collections on the Configurations tab of the Distribution Manager. To Set Up Systems 1 Create accounts in the operating system of the computers to which you want to
distribute PATROL KM for Unix and Linux.
2 Add accounts and create profiles for the systems on the Systems tab of the
Distribution Manager.
3 Add the systems and install the Distribution Client on the Systems tab of the
Distribution Manager.
4 Arrange systems in system groups on the Systems tab of the Distribution Manager.
60 PATROL for Unix and Linux Getting Started
To Distribute Products 1 Distribute configurations of collections to system groups on the Distributions tab of
the Distribution Manager.
2 Run reports to review distributions on the Reports tab of the Distribution Manager.
For detailed instructions about how to perform remote installations with the Distribution Server, see the Distribution Server Getting Started Guide.
Browser Version Required for Viewing PATROL Console for Unix Help
One of the following browsers is required to view PATROL Help in a PATROL Console for Unix version 3.x:
I I
Unix: Netscape Navigator version 3.01 through 4.78 Red Hat Linux: Netscape Navigator version 4.x
Installation Requirement
You must install Netscape Navigator on the computer where the PATROL console resides. You can install Netscape anywhere on your Unix computer as long as the binary is in the path.
Download Location
Netscape Navigator is supplied by Netscape Communications Corp. You can locate the browser at http://ftp.netscape.com/pub/communicator/.
Chapter 2
61
Netscape Navigator displays warning messages when it is invoked multiple times within the same user account because of its file-locking mechanism. It will, however, continue functioning. By default, when Netscape Navigator starts, it uses a private color map. As a result, you might experience color flashing on your workstation. If so, you can set the value of PATROL_BROWSER so that the colormap option is not specified. However, some subsequent color requests might fail and the online Help will be improperly displayed. The Exceed for Windows NT X Window Server product by Hummingbird Communication Ltd. may not always display the Help files properly.
Consult your Netscape Navigator documentation for specific platform requirements and restrictions.
LANG Variable
The Unix LANG environment variable must be set to C so that Netscape Navigator will work properly. Otherwise, you might experience product failures.
Type of Shell Bourne Korn C Export Command for LANG Variable LANG=C export LANG export LANG=C setenv LANG=C
62
PATH Variable
The PATROL user account PATH variable must contain the location of the directory containing the Netscape files. If the directory containing the Netscape files is not in the path, add the directory to the PATROL user account path. This requirement applies only to the PATROL user account on the PATROL console computer.
Type of Shell Bourne Korn C Export Command for PATH Variable PATH=$PATH:/netscape_location export PATH export PATH=$PATH:/netscape_location setenv PATH=$PATH:/netscape_location
PATROL_BROWSER Variable
When PATROL starts the Help browser, it uses the command in the PATROL_BROWSER environment variable. As a default, the PATROL_BROWSER environment variable contains the following command:
Type of Shell Bourne Korn C Export Command for PATROL_BROWSER Variable PATROL_BROWSER=netscape -display $DISPLAY -install -iconic export PATROL_BROWSER export PATROL_BROWSER=netscape -display $DISPLAY -install iconic setenv PATROL_BROWSER=netscape -display $DISPLAY -install iconic
To use different arguments, set the value of PATROL_BROWSER to the appropriate string.
EXAMPLE
For a Korn shell: export PATROL_BROWSER=/usr/local/bin/netscape -raise
Chapter 2
63
Distribution Server Getting Started PATROL Knowledge Module for Unix User Guide PATROL Agent Reference Manual
To Uninstall Individual Products Using the Installation Utility 1 Change to the Uninstall directory in your BMC Software product installation
directory and type ./uninstall.sh to launch the installation utility in uninstall mode.
64
3 Select the installation directory from which you want to remove a product, and
click Next.
4 Select the product or products that you want to uninstall, and click Next. 5 Review your selections and click Uninstall.
After the uninstallation is complete, a window is displayed that tells you whether the uninstallation was successful.
To Uninstall Individual Products in a Unix Environment without a Browser 1 If you are uninstalling from a Unix environment without a browser perform the
following steps to launch the installation utility:
B A message box is displayed that shows the URL to use to connect to the
installation Web server.
C On another machine with a browser, start the browser. D Connect to the installation Web server from the browser to start the installation
utility by using the URL that is displayed in the message box.
2 The Welcome window is displayed. Click Next. 3 Select the installation directory from which you want to remove a product, and
click Next.
4 Select the product or products that you want to uninstall, and click Next. 5 Review your selections and click Uninstall.
After the uninstallation is complete, a window is displayed that tells you whether the uninstallation was successful.
Chapter 2
65
Uninstalling All Product Files Except Log Files and Configuration Files
This task describes how to uninstall the PATROL product but retain log files, which contain history for future analysis, and configuration files for redeployment.
1 Uninstall all products as described in Uninstalling PATROL for Unix and Linux
on page 64.
3 Open the uninstall.ctl file in a text editor, and edit the /BMC/BASE variable to
specify the name of the directory from which you removed the products in step 1.
Use the following table to help determine the log file and output log file locations:
Option -log Description sends the log information to a standard log file This file contains all installation status information. -output sends the log information to an output log file Value path to log file; any valid path and file name (with a .txt extension) If a space exists in the path, the entire path must be enclosed in quotation marks. path to output log file; any valid path and file name (with a .txt extension)
This file contains all messages about the If a space exists in the path, the entire path must be enclosed in quotation progress of the installation that are marks. normally sent to standard output.
66
Example
If /opt/bmc is your product installation directory, you would change to the /opt/bmc/Uninstall/Install/instbin directory and enter the following command:
thorinst.sh -uninstall /opt/bmc/Uninstall/Install/instdata/uninstall.ctl -log /var/logs/NetworkLogs/MyLogs.txt -output /var/adm/NetworkLogs/MyLogs.out
This action removes all installation files and directories except those that are used by the utility at the time the uninstallation is performed. Log files, configuration files, and user-modified files would also be retained.
Uninstalling All Products and Associated Log Files and Configuration Files
This task describes how to remove all PATROL products and related log files and configuration files from your Unix computer. Once these files have been removed, you cannot recover them unless you have made a back-up copy of the installation.
1 Uninstall all products as described in Uninstalling PATROL for Unix and Linux
on page 64.
3 Open the uninstall-all.ctl file in a text editor, and edit the /BMC/Base variable to
specify the name of the directory from which you removed the products in step 1.
Chapter 2
67
Use the following table to help determine the log file and output log file locations:
Option -log Description sends the log information to a standard log file This file contains all installation status information. -output sends the log information to an output log file Value path to log file; any valid path and file name (with a .txt extension) If a space exists in the path, the entire path must be enclosed in quotation marks. path to log file; any valid path and file name (with a .txt extension)
This file contains all messages about the If a space exists in the path, the entire progress of the installation that are path must be enclosed in quotation normally sent to standard output. marks.
Example
If /opt/bmc is your product installation directory, you would change to the /opt/bmc/Uninstall/Install/instbin directory and enter the following command:
thorinst.sh -uninstall /opt/bmc/Uninstall/Install/instdata/uninstall-all.ctl -log /var/logs/NetworkLogs/MyLogs.txt -output /var/adm/NetworkLogs/MyLogs.out
This action removes all installation files and directories. The files that were used to perform the uninstallation will be marked for deletion and will be removed when the computer on which the products were uninstalled is rebooted.
68
instructions about how to access the KM Appendix A, Accessing Menu Commands, menu commands, InfoBoxes and online InfoBoxes, and Online Help Help troubleshooting information using PATROL for Unix and Linux functionality to monitor and manage Unix and Linux operating systems Appendix B, Troubleshooting PATROL for Unix and Linux Problems PATROL Knowledge Module for Unix User Guide and PATROL for Unix and Linux online Help
PATROL Agent configuration variables PATROL Knowledge Module for Unix User Guide and pertaining to PATROL KM for Unix and PATROL for Unix and Linux online Help Linux definitions and default values for parameters consumer and collector parameter dependencies step-by-step procedures and detailed descriptions of the applications, menu commands, parameters, and InfoBoxes PATROL Knowledge Module for Unix User Guide and PATROL Knowledge Module online Help systems PATROL Parameter Reference Manual and PATROL Knowledge Module online Help systems PATROL Knowledge Module for Unix and Linux User Guide and PATROL KM for Unix and Linux online Help
Chapter 2
69
70
Chapter
This chapter provides information about how to begin configuring and using PATROL KM for Unix and Linux. In this chapter, the term Knowledge Module (KM) is usually equivalent to a .kml file. A .km file is equivalent to an application class, which is a subset of a KM or .kml file.
NOTE
I
For information about configuring the PATROL Knowledge Module for History Loader, see the PATROL Knowledge Module for History Loader User Guide. For information about configuring the PATROL Knowledge Module for Event Management, see the PATROL Knowledge Module for Event Management User Guide.
The following topics are discussed in this chapter: Preparing to Use PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migrating Customized Processes from Previous Versions of PATROL KM for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the PATROL Configuration Manager to Migrate Customized Processes . Using the pconfig Utility to Migrate Customized Processes . . . . . . . . . . . . . . . . . Manually Starting the PATROL Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Loading and Preloading KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining Which KMs to Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining Which KMs to Preload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Loading KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Verifying What You Have Loaded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Preloading KMs on the PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing KMs from Your Console and Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unloading KMs from a PATROL Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing KMs from the Agent Preload List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the PATROL KM for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Specifying a Data Collection Method for the PATROL KM for Unix . . . . . . . . . . 73 74 74 74 75 75 75 75 76 78 81 84 84 87 89 89 89
71
Configuring the PATROL KM for Log Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Enabling the PRINTER and NETWORK Application Classes . . . . . . . . . . . . . . . . 92 Configuring Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 About Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 PATROL Native Recovery Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Configuring PATROL Native Recovery Actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
72
The PATROL console version 3.5.x or later and PATROL KM for Unix and Linux are installed on the computer you that want to use for the PATROL console. The PATROL Agent version 3.5.x or later and PATROL KM for Unix and Linux are installed on the computer that you want to monitor and manage. PATROL KM for Unix and Linux is installed on the PATROL console computers and the PATROL Agent computers. If you are using PATROL Central Operator Microsoft Windows Edition, PATROL KM for Unix and Linux is installed on the PATROL Console Server. If you are using PATROL Central Operator Web Edition, PATROL KM for Unix and Linux is installed on the PATROL Console Server and PATROL Web Server.
73
1 Add the PROCCONT.km to the /AgentSetup/disabledKMs variable. 2 Delete the /PUK/9.1.00/migration variable. 3 Reinitialize the PATROL Agent. 4 Apply the PCM rulesets to be migrated. 5 Remove the PROCCONT.km from the /AgentSetup/disabledKMs variable. 6 Reinitialize the PATROL Agent.
1 Ensure that the PATROL KM for Unix is not on the Agent preload KMs list. 2 Close the PATROL Console. 3 Using the pconfig utility, delete the /PUK/9.1.00/migration variable, if it exists. 4 Using the pconfig utility, insert the agent configuration variables pertaining to the
new customized processes that you have created.
5 Using a PATROL Console, which already has the PATROL KM for Unix loaded,
connect to the PATROL Agent. This will cause the Unix KM to load the Agent, or add the UNIX3.kml to the Agent preload list and reinitialize the agent.
74
1 Navigate to the directory where the PATROL Agent is installed. 2 Type ./PatrolAgent -p portnumber and press Enter.
See the PATROL Agent Reference Manual for more information about using the PATROL Agent.
75
You can find the steps for loading and preloading KMs in the following sections:
I I
If you use certain KM files regularly and want to maintain their data collection history without gaps, preload the .kml files (listed in Table 9) on the appropriate PATROL Agents as described in Preloading KMs on the PATROL Agent on page 81. Table 9
.kml Files UNIX3.kml LOG.kml EVENT_MANAGEMENT.kml
HISTORY.kml
Loading KMs
Before you can begin using KMs that you have installed, you must first load them with a PATROL console. In this task, follow the instructions that apply to your console.
1 On the Common Tasks tab of the taskpad, click the Load Knowledge Modules icon.
PATROL Central Microsoft Windows Edition displays the wizard.
76
3 Select the check boxes for the computers on which you want to load KMs, and click
Next.
The wizard displays a list of available .kml files for each selected computer. Each .kml file is listed once for each computer. You can display .km files instead (equivalent to application classes) by changing the filter. The KMs available in this product are listed in Table 9 on page 76.
4 Select the check boxes for the KM and computer pair that you want to load. 5 Click Next and click Finish.
PATROL loads the selected KMs on the selected computers.
2 Select each computer on which you want to load the same KMs, and click Next.
The Load KMs page displays a list of available .km and .kml files. If you selected more than one computer, the Load KMs page displays only the .km and .kml files that have been installed on all of the selected computers. If you want to load a particular .km or .kml file on a particular computer, select that computer by itself to load the file.
4 Click Finish.
PATROL loads the selected KMs on the selected computers.
77
To Load KMs from the PATROL Console for Microsoft Windows 1 From the PATROL Console for Microsoft Windows menu bar, choose File => Load
KM.
The Load KMs dialog box displays a list of available .kml files. You can display .km files instead (equivalent to application classes) by selecting KM Files (*.km) from the drop-down list box. See Table 9 on page 76 for a list of the KMs that are available in this product.
2 Select one or more of the .kml (or .km) files, and click Open.
PATROL loads the selected KMs on all of the computers listed under PATROLMainMap in the tree view.
To Load KMs from the PATROL Console for Unix 1 From the PATROL Console for Unix menu bar, choose File => Load KM.
The Load KMs dialog box displays a list of available .kml files. You can display .km files instead (equivalent to application classes) by changing the filter. See Table 9 on page 76 for a list of the KMs that are available in this product.
2 Select one or more of the .kml (or .km) files, and click Open.
PATROL loads the selected KMs on all of the computers to which your console is connected.
78
If you loaded UNIX3.kml, waited for application discovery to finish, and do not see all the application classes that are listed Figure 4, view the System Output Window from the agent computer icons menu and look for error messages. The figure should show only what appears after discovery; it should not include objects that appear only after being configured. Figure 4 Application Classes that Appear When UNIX3.kml Is Loaded
79
Figure 5
80
Verifying that the PATROL Knowledge Module for History Loader Is Loaded
If you loaded the HISTORY.kml file for the PATROL Knowledge Module for History Loader, you will see the application classes that are listed in Figure 7 in your console after application discovery is finished. This example shows the loaded application classes in a tree view. If your PATROL console does not have a tree view, double-click the agent computer icon to view the application classes that are loaded.
NOTE
When you load the PATROL Knowledge Module for History Loader HISTORY.kml file, applications for all supported RDBMS types are automatically loaded. If you are not using all of these RDBMS types, you can delete the unused applications to save memory and other resources.
If you loaded HISTORY.kml, waited for application discovery to finish, and do not see all the application classes that are listed Figure 7, view the System Output Window from the agent computer icons menu and look for error messages. The figure should show only what appears after discovery; it should not include objects that appear only after being configured. Figure 7 Application Classes that Appear When HISTORY.kml Is Loaded
81
The PATROL Agent must be running. You must be running a PATROL console in developer mode (PATROL Console for Windows or Unix). You must have permission to modify the configuration change file (.cfg).
To Use wpconfig to Preload a KM from the PATROL Console for Microsoft Windows 1 Access the PATROL Agents pop-up menu and choose Development => Agent
Configuration.
The console starts the wpconfig utility and displays the wpconfig window.
3 Scroll down the variable list and double-click the preloadedKMs variable.
The Modify Variable dialog box is displayed.
5 In the Type field, leave REPLACE. 6 In the Value field, use the comma-separated format without spaces to type the
names of the .kml files that you want to preload. See Table 9 on page 76 for a list of the KMs that are available in this product. For example, a valid and typical preloaded KMs list is as follows:
UNIX3.kml,EVENT_MANAGEMENT.kml,AS_EVENTSPRING.km
7 Click OK.
The Change Entry dialog box closes.
82
10 Click OK to apply your updated configuration to the PATROL Agent. 11 Save your changes to the configuration change file by clicking the Save button. 12 Close the wpconfig window. To Use xpconfig to Preload a KM from the PATROL Console for Unix 1 Access the PATROL Agents pop-up menu and choose Development => Agent
Configuration.
The console starts the xpconfig utility and displays the xpconfig window.
2 From the Host column in the left pane of the xpconfig window, click a PATROL
Agent computer name to highlight it.
The filter displays all the variables that begin with this character string.
6 Click Change.
An Edit window is displayed.
7 Use the comma-separated format without spaces to type the names of the .kml files
that you want to preload. See Table 9 on page 76 for a list of the KMs that are available in this product. For example, a valid and typical preloaded KMs list is as follows:
LM_KIT,EVENT_MANAGEMENT.kml,AS_EVENTSPRING.km
83
8 Choose File => Exit to close the Edit window and save your changes. 9 In the Edit Variable dialog box, click OK to close the box. 10 Click Apply Configuration and close the xpconfig window.
The xpconfig utility sends the updated configuration to the selected PATROL Agent.
84
1 On the Common Tasks tab of the taskpad, click the Unload Knowledge Modules
icon. PATROL Central Microsoft Windows Edition displays the wizard.
3 Select the check boxes for the computers from which you want to unload .km files,
and click Next. The wizard displays a list of application class names (that correspond to .km file names) for each computer selected. Each application class name is listed once for each computer.
4 Select the check boxes for the .km and computer pair that you want to unload, and
click Next. To unload an entire KM, select all the .km files that make up the KM. See Table 9PATROL for PATROL KM for Unix and Linux .kml Files on page 76 for a list of the .km files in each KM.
5 Click Finish.
The console removes the selected .km files from the current management profile.
1 From the Managed Systems page, click the Load/Unload KMs button.
The Load KMs page opens, listing each computer on which a PATROL Agent has been installed.
2 Select the computers from which you want to unload .km files, and click Next.
The Load KMs page displays a list of .km files. Currently loaded .km files are highlighted (selected) in the list.
3 Cancel the selection of the .km files that you want to unload by clicking them in the
list. To unload an entire KM, cancel the selection of all the .km files that make up the KM.
4 Click Finish.
The console removes the .km files that you specified from the current management profile.
Chapter 3 Loading and Configuring PATROL KM for Unix and Linux 85
1 From the KM tab of the tree view, right-click the application class name that you
want to delete and choose Delete from the pop-up menu. The console displays a dialog box that asks if you want to delete the selected application.
3 Repeat Step 1 and Step 2 until you have deleted all of the application classes (.km
files) associated with the KM that you want to delete.
4 From the console menu bar, choose File => Save KM to save your changes. To Unload KMs from the PATROL Console for Unix
Unloading a KM is also referred to as deleting a KM in the PATROL Console for Unix. However, the files are actually unloaded from the consoles memory rather than deleted from your hard drive.
1 From the PATROL Main window, choose Attributes => Application Classes.
The console displays the List of Application Classes window.
2 Click the name of the application class that you want to delete.
The console highlights the application class name.
3 From the List of Application Classes menu bar, choose Edit => Delete.
The application class is removed from your console, and its corresponding .km file is removed from your console session file when you save your changes.
4 Repeat Step 2 and Step 3 until you have deleted all of the application classes
associated with the KM that you want to delete.
5 From the List of Application Classes menu bar, choose File => Save KM to save
your changes.
86
The PATROL Agent must be running. You must be running a PATROL console in developer mode (PATROL Console for Windows or Unix). You must have permission to modify the configuration change file (.cfg).
To Use wpconfig to Remove a KM from the Preload List in the PATROL Console for Microsoft Windows 1 Access the PATROL Agents pop-up menu and choose Development => Agent
Configuration.
The console starts the wpconfig utility and displays the wpconfig window.
3 Scroll down the variable list and double-click the preloadedKMs variable.
The Modify Variable dialog box is displayed.
5 In the Type field, leave REPLACE. 6 In the Value field, delete the .kml file names that you want to remove from the
preload list. See Table 9 on page 76 for a list of the KMs that are available in this product.
7 Click OK to close the Change Entry dialog box. 8 Click OK to close the Modify Variable dialog box.
87
10 Click OK to apply your updated configuration to the PATROL Agent. 11 Save your changes to the configuration change file by clicking the Save button. 12 Close the wpconfig window. To Use xpconfig to Remove a KM from the Preload List in the PATROL Console for Unix 1 Access the PATROL Agents pop-up menu and choose Development => Agent
Configuration.
The console starts the xpconfig utility and displays the xpconfig window.
2 From the Host column in the left pane of the xpconfig window, click a PATROL
Agent computer name to highlight it.
The filter displays all the variables that begin with that character string.
7 Delete the .kml file names that you want to remove from the preload list. See
Table 9 on page 76 for a list of the KMs that are available in this product.
8 Choose File => Exit to close the Edit window and save your changes. 9 In the Edit Variable dialog box, click OK to close the box.
88
2 Select Debug and Diagnostics => Toggle PSL/DCM Collection from the pop-up menu.
A confirmation dialog box is displayed. The dialog box states that you are about to toggle the collection method, and that the agent will be reinitialized to use the new collection method.
3 Click Yes.
PATROL changes the collection method and reinitializes the agent. In the process of changing collection methods, PATROL destroys some existing parameters, and creates others.
89
NOTE
Neither collection method gathers data for every available parameter in the KM. Refer to DCM Collection Exceptions and PSL Collection Exceptions in the PATROL Knowledge Module for Unix User Guide for parameter availability information.
If you are using the DCM data collection method, a DCM icon (shown in Figure 9) is displayed in the computer window. Figure 9 DCM Icon (DCM Data Collection Method)
Variables
PATROL can store the location of the Perform installation in two different variables:
I I
(pconfig)
90
To Specify the Location of the Perform Home Directory 1 Access the Unix OS application menu commands as described in Accessing KM
Commands and InfoBoxes on page 100.
3 Enter the path where the Perform installation is located and click Apply.
PATROL stores the information in the PATROL Configuration Database variable (pconfig), /UNIX_OS/PERFORM_HOME. You can also store this information in the BEST1_HOME environment variable. However, you must set up this variable outside of PATROL and source the variable or restart PATROL if it is running.
91
5. PATROL checks for the BEST1 directory under the current directory and its subdirectories. If the BEST1 directory does not exist or is invalid, the DCM process fails to start bgscollect.
NOTE
Almost all the functionality of the PATROL KM for Log Management must be accessed using a PATROL Console in developer mode. If a configuration task requires a console in developer mode, it will be noted in the instructions for that task.
For details about using the PARTOL KM for Log Management, see the PATROL for Log Management User Guide.
92
reduce the log file to 0 MB by deleting all the messages in the log file when the file reaches the size limit back up the file into the pmg_backup subdirectory located in the same directory as the monitored log file and reduce the log file to 0 MB
The backup file is written to the same directory with an incremental number appended to the log file name each time the file is backed up. For example, the first time that the error_log.txt reaches its size limit, PATROL creates a backup file named error_log.txt1. The next time that it reaches its limit, PATROL creates a backup file named error_log.txt2 and so on.
NOTE
It is recommended that you periodically move the backup files to another location. The PATROL recovery action checks to make sure that the backup file name is not already in use. If hundreds or even thousands of backup files exist in the log directory, PATROL may take some time to complete this recovery action.
Recovery actions run automatically by default; however, they can be configured to require user confirmation if the Run Attended option button is set to Yes.
If you are adding a new log file to be monitored, follow the steps in the PATROL Knowledge Module for Log Management User Guide. If you want to configure a recovery action for an existing log file, follow the steps in the PATROL Knowledge Module for Log Management User Guide. You must be logged into a PATROL Console running in developer mode
1 Type a value in the Size Limit field (the value is in bytes for example, 100 equals
100 bytes).
2 Select an Action option button to specify a recovery action for PATROL to take
when the log file reaches the specified size limit
93
NothingPATROL continues monitoring the log file but does not attempt to
DeletePATROL reduces the log file to 0 MB by deleting all the messages in the
Backup and Delete PATROL backs up the existing log file and reduces the log
file to 0 MB
3 Click the Yes or No option button to indicate whether PATROL should Run
Attended (prompt an operator for confirmation before performing a recovery action).
94
If you dont want the parameter to alarm until the recovery actions have been attempted, you must use PATROL native recovery actions, rather than PATROL KM for Unix recovery actions. However, you can use both types. For example, you could define PATROL native recovery actions and specify that the parameter enters a WARN or ALARM state only after all recovery actions fail. Then you could create a PATROL KM for Unix recovery action that runs only if the PATROL native recovery actions fail. For more information about using PATROL KM for Unix recovery actions, see the PATROL Knowledge Module for Unix User Guide.
Recovery Action & Description FilesystemCleanup Removes files once the percentage of the file system currently in use exceeds the threshold established in either Alarm1 or Alarm2 for the FSCapacity parameter. Also attempts to remove core dump files, and if the file system is /tmp or /tmp is mounted off this file system, attempts to remove from /tmp files that are 30 days or older.
95
To Configure Recovery Actions 1 Access the host application class menu as described in Appendix A, Accessing
Menu Commands, InfoBoxes, and Online Help on page 99.
2 From the list of recovery actions, select the desired recovery action and click
Accept.
3 From the list of recovery action instances, select the instance and click Edit. For
information about which instance to select, see Table 11. Table 11
Purpose
FilesystemCleanup Remove files once the percentage of the file system currently in use exceeds the threshold established in either Alarm1 or Alarm2 for the FSCapacity parameter. Also attempts to remove core dump files, and if the file system is /tmp or /tmp is mounted off this file system, attempts to remove from /tmp files that are 30 days or older.
4 From the Edit Recovery Action dialog box, choose from the settings described in
Table 12. Table 12
Setting Run Unattended If you select this setting, use the slide bar to set the amount of time PATROL waits for user input before it cancels the recovery action. Run Attended
This recovery action applies to all FILESYSTEM instances. This mode is the default setting.
Do Not Execute
96
NOTE
For more information about the recovery action and its configuration options, click the Help button.
If a Problem Occurs
If you experience a problem when configuring recovery actions, see Appendix B, Troubleshooting PATROL for Unix and Linux Problems..
97
98
Appendix
BMC Software offers several PATROL consoles from which you can view a PATROL Knowledge Module (KM). Because of the different environments in which these consoles run, each one uses a different method to display and access information in the KM. This appendix provides instructions for accessing the KM menu commands, InfoBoxes, and online Help on each of the PATROL consoles. See the online Help for specific PATROL for Unix and Linux components to view more detailed information about navigation in the PATROL Consoles. Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Appendix A
99
In the navigation pane, right-click a In the navigation pane, right-click a PATROL object and choose managed system or application InfoBox from the pop-up menu. icon and choose Knowledge Module Commands from the popup menu. In the tree view area, right-click an In the tree view area, right-click a PATROL object and choose application icon and choose Infobox from the pop-up menu. Knowledge Module Commands from the pop-up menu.
100
NOTE
If you are trying to access Help from a PATROL Console for Unix, see the PATROL Installation Reference Manual for specific instructions about installing and setting up a browser in the Unix environment.
Table 14
Console
To access application class help Double-click an application class in the KM tab of the console. From the Application Properties dialog box, click the Help tab. Then click Show Help.
Right-click the application icon for the PATROL KM on which you need help and choose KM Commands => Product Help. From the console menu bar, choose Help => Help Topics => PATROL Knowledge Modules.
Right-click a parameter icon and choose Help On from the pop-up menu. Double-click a parameter icon; click the ? icon or Help button in the parameter display window. Double-click a parameter in the KM tab of the console; from the properties dialog box, click the Help tab; then click Show Help.
Right-click the application icon for the PATROL KM on which you need help and choose KM Commands => Product Help. From the console menu bar, choose Help On => Knowledge Modules.
Choose Attributes => Application Classes and double-click the application name. Click Show Help in the Application Definition dialog box.
Appendix A
101
Table 14
Console
In the upper right corner of In the tree view, right-click In the tree view, right-click an application class and a parameter and choose PATROL Central, click Help. Help and choose PATROL choose Help. KM Help.
102
Appendix
This appendix describes some common problems you may experience while using PATROL KM for Unix, and provides suggestions resolutions for these problems. Data Collection and Parameter Population Problems . . . . . . . . . . . . . . . . . . . . . . 104 Error Messages in the $BEST1_HOME/bgs/monitor/log/bgscollect_portnumber.log . . . . . . . . . . 105
Appendix B
103
NOTE
The installation program prompts you for the root password, regardless of the target platform. However, only the HP-UX platform uses this information.
On HP-UX, you will not lose process data unless DCM/bgscollect is disabled. This failure to collect data can also adversely affect other PATROL components and application classes, such as the ERP and database products, which rely on operating system process information.
Solution
If you entered the root password incorrectly, use the following procedure to resolve this problem:
1 Log onto the computer as root. 2 Type ./configure.sh. 3 Type ./b1config7120.sh. NOTE
The name of b1confignnnn.sh script contains the nnnn variable, which always reflects the current version of the Perform Data Collector. In the example shown in step 3, the variable refers to version 7.1.20.
104
Sun Jun 25 00:00:18 2000 bgscollect (18871) Removing group with name = <Group Name>
Solution
If you see these error messages in the
$BEST1_HOME/bgs/monitor/log/bgscollect_portnumber.log, increase the shared memory
segment and semaphore settings for the computer. See the following documentation for information about increasing shared memory and semaphore settings on your computer:
I I I
Unix man pages documentation for any other applications that are running on the computer Shared Memory and Semaphore Resources for the PATROL Perform Data Collector on page 28.
Appendix B
105
106
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Index
Symbols
$PATROL_HOME 51 %PATROL_CACHE% 51 custom processes, migrating 7374 customer support 3 customizations migrating 53 migrating manually 57 customized PSL migrating 58
A
accounts local partition requirements 25 permissions needed for PATROL 25 requirements, AIX computers 25 requirements, customizations 25 root access requirements 25 umask settings 25 agent installing a KM to 35 AIX 37, 38 AIX platforms PATROL account requirements 25 AIX systems shared memory and semaphores 31
D
data collection, specifying method 89 data collection troubleshooting 104 DCM collection method 89 deleting old version 55 Digital UNIX 37, 38 directory PATROL installation default 42 documentation library 20 documentation, related 19
B
backing up current installation before migration 54 BMC Software, contacting 2 Bourne shell 62 browsers installing PATROL without one 41, 44 uninstalling without one 65
E
environment variable PATROL_HOME 51 environment variables LANG 62 PATH 62, 63 PATROL_BROWSER 63 setting for Help browser 62 setting for the browser 62 eXceed 62 exportfs command 38
C
C shell 62 collection method changing 89 determining type used 90 specifying 89 colormap option 62 console installing a KM to 35 console systems overview 35 custom installation option 40
F
features, product 1415 first time installation 40 first-time installation typical installation option 39
Index
107
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
H
HP Tru64 (Compaq Tru64 UNIX) systems shared memory and semaphores 31 HP Tru64 systems shared memory and semaphores 31 HPUX 37, 38 HPUX systems shared memory and semaphores 31
customizations 53 customized PSL 58 determining if KM is migratable 50 from an earlier version of the KM 49 KM customizations manually 57 migration backing up current installation before 54 mounting the CD-ROM 38
I
installable images creating for each platform 34 installation backing up before migration 54 choosing a target machine 34 creating vendor-specific installation images 34 custom option 40 default PATROL directory 42 password troubleshooting 104 preparing for 32 -serveronly option 41, 44 system requirements 23 typical option 39 verifying requirements 23 without a browser 41, 44 installing clearing cache 55 for the first time 40 upgrading from an earlier version 49
N
Netscape Navigator 61 new PATROL user installing for the first time 40 new PATROL users easy install option 39 NFS Mount a CD-ROM 38
O
online Help installing 35
P
password supplying for installation 104 troubleshooting 104 PATH environment variable 63 PATROL default installation directory 42 PATROL account requirements AIX platforms 25 customizations 25 PATROL accounts local partition requirements 25 permissions needed 25 root access requirements 25 umask settings 25 PATROL Agent installing a KM to 35 port number default 41 starting manually 75 PATROL Agent for Unix 15 PATROL Central Operator - Web Edition installing 35 PATROL Configuration Manager migrating customized processes 74 PATROL Console and Netscape Navigator 61 installing a KM to 35 PATROL KM for Event Management 1718 PATROL KM for Log Management 1617 PATROL KM for Unix 16
K
KM customizations migrating manually 57 KMs determining if migratable 50 installing individual 40 upgrading from an earlier version 49 Korn shell 62
L
LANG environment variable 62
M
managed systems overview 35 manual migration of KM customizations 57 manually starting a PATROL Agent 75 migrating
108
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
PATROL Knowledge Module for History Loader 18 PATROL Perform Data Collector 18 PATROL Security 18 PATROL security overview of levels 38 PATROL_BROWSER variable 63 PATROL_BROWSER environment variable 63 PATROL_CACHE 51, 55 PATROL_HOME 51 PCM migrating customized processes 74 pconfig utility migrating customized processes 74 Perform collector, existing 90 planning for installation 32 platforms creating vendor-specific installable images 34 pop-up blocking software 32 port number default for PATROL Agent 41 preparing for installation 32 product components PATROL Agent for Unix 15 PATROL KM for Unix 16 product features 1415 product support 3 products uninstalling in Unix environments 64 PSL collection method 89 migrating 58 -serveronly option for installation 41, 44 setting environment variables for Help browser 62 share command 38 shared memory and semaphores AIX systems 31 Digital UNIX (HP Tru64) systems 31 HP Tru64 systems 31 HPUX 31 Solaris systems 28 shells Bourne 62 C 62 Korn 62 Solaris 37, 38 Solaris systems shared memory and semaphores 28 starting PATROL Agent, manually 75 support, customer 3 system requirements 23 system roles console systems 35 managed systems 35 overview of target machines 34
T
Table 3, PATROL for Unix Components that Require setuid root Permissions, on page 2-26 25 target machines overview 34 technical support 3 troubleshooting data collection failures 104 passwords for installation 104 typical installation option 39
R
recovery actions built-in 15 file system clean-up 15 remote installation creating vendor-specific images 34 requirements overview 23 privileges 37, 38 system 23
U
umask setting, PATROL account 25 uninstalling without a browser 65 uninstalling products in Unix environments 64 upgrading 49 backing up current installation before 54 choosing a procedure 51 from an earlier version of the KM 49 user account 63
S
security overview of levels 38 selecting a collection method 89 semaphores and shared memory segments 28 -serveronly command uninstalling 65
V
variable PATROL_BROWSER 63
Index
109
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
110
Notes