Tib Hawk Plugin
Tib Hawk Plugin
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Related Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
TIBCO Hawk Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi
Other TIBCO Product Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Third Party Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
How to Contact TIBCO Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Hawk Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Preface
This manual describes the TIBCO Hawk® plug-ins, All Alerts, Hawk Console,
and Monitoring Console. These plug-ins are accessed via TIBCO Administrator.
Topics
Related Documentation
For comments or problems with this manual or the software it addresses, please
contact TIBCO Support Services as follows.
• For an overview of TIBCO Support Services, and information about getting
started with TIBCO Product Support, visit this site:
http://www.tibco.com/services/support
• If you already have a valid maintenance or support contract, visit this site:
http://support.tibco.com
Entry to this site requires a username and password. If you do not have a
username, you can request one.
Chapter 1 Introduction
This chapter describes the plug-ins installed by TIBCO Hawk. These plug-ins are
accessed using TIBCO Administrator.
Topics
• Overview, page 2
• Hawk Configuration, page 3
Overview
Hawk Configuration
By default, all machines that belong to your TIBCO Administrator domain are
monitored by the installed plug-ins. If you wish to monitor additional domains,
they have to explicitly configured.
To configure additional domains:
Topics
• Overview, page 6
• All Alerts Console, page 8
Overview
The All Alerts plug-in provides functionality which lets you view all TIBCO
Hawk alerts generated in your TIBCO Administrator domain as well as any
additional domains that you are monitoring.
Security Considerations
Security access determines whether a user can perform an operation on a machine
in your domain. TIBCO Administrator users that have Administer access can
access all the functionality provided by the Hawk plug-ins.
It is strongly recommended that only administrators have access to the All Alerts
console.
Users with read access can view alerts on the All Alerts console, only those users
that have write access can suspend alerts.
You can view all TIBCO Hawk alerts generated in your domain from this console.
Here you can specify search conditions to filter the alerts that are displayed. This
console is accessed by clicking Monitoring Management>All Alerts from the
left-hand pane of TIBCO Administrator.
It is strongly recommended that only administrators have access to the All Alerts
console.
Alerts
This console contains the following fields:
Domain — Choose the Hawk domain from the drop-down list which contains the
TIBCO Administrator domain and any additional Hawk domains that you have
configured. If you wish to view alerts from all domain, choose All.
State — Choose between Any, Active, Cleared, or Custom.
Add Search Condition — The following options are available:
• Date/Time — Specify the date and time before or after which you want to
filter the alerts.
• Level — Lowest level of the alert. Possible choices are High, Medium, Low,
Notification or Custom.
This level indicates the lowest alert level that you want to search for.
For example, if you choose medium, both medium and high alerts will be
displayed and if you choose low, all alerts will be displayed.
• Agent — Name of the agent.
• Rulebase — Name of the rulebase that generated the alert.
• Deployment — Name of the deployment.
• Component Instance — Name of the component.
When more than one selection condition can be specified, one of the following
options must also be chosen:
• Show entries where ALL conditions are true
• Show entries where ANY conditions are true
Remove — Click this button to remove the corresponding search condition.
Search — Click this button to apply the chosen search conditions to the list of
generated alerts.
Purge Cleared Alerts — Used to purge alerts that have been cleared.
Alerts that are cleared will stay in the list for 30 minutes if user does not click the purge
alert button.
List of Alerts
For each alert, the following information is displayed:
Date/ Time — Date and Time of the alert.
Domain — The domain where this alert originated.
Cleared — Whether this alert has been cleared. If the alert is cleared a X is
displayed in this column.
Alert Level — Level of the alert represented by the alert icons. See Table 1, Alert
Icons, on page 10 for a description of the alert icons.
Text — Text belonging to the alert.
details — Click on this field to view details about the generated alert.
Alert Details
This dialog lists details of the chosen alert.
Details
Date/ Time — Date and Time of the alert.
Alert Level — Level of the alert represented by the alert icons. Table 1, Alert Icons,
on page 10 for a description of the alert icons.
Text — Text belonging to the alert.
Properties
Domain — The domain where this alert originated.
Agent — The TIBCO Hawk Agent which generated this alert.
DNS — The DNS of the agent.
IP Address — The IP address of the agent.
Rulebase — The TIBCO Hawk rulebase which generated this alert.
DataIndex — If the alert was generated from a rule with composite data sources,
this value is ’_’. If the alert was generated from a rule with a tabular data source,
this value is _<indexField>:<indexValue>. Where <indexField> and
<indexValue> refer to values in the tabular data source.
Action — The number corresponding to its position in the action list for the test as
defined in the rulebase.
Rule — The rule which uses the specified datasource to test for certain conditions.
DataSource — The datasource for the rulebase.
Test — The test performed on the datasource.
The following properties are displayed if a rulebase is configured for a service
instance through TIBCO Administrator.
Action.Deployment — The deployment name of the service instance.
Action.ComponentInstance — The name of the service instance.
Action.ComponentInstanceID — The ID of the service instance.
Suspend
Reason — The reason for suspending the alert.
Suspend Interval — The duration in seconds for which the alert should be
suspended.
Suspend — Click this button to suspend the alert.
For more information on suspending alerts, refer to TIBCO Hawk Administrator’s
Guide.
Users with read access can view alerts on the All Alerts console, only those users that have
write access can suspend alerts.
Alert Icons
The alert icons represent the level of the alert generated by the TIBCO Hawk
agent. Alert icons are yellow, amber, or red representing low, medium, or high
alerts respectively. The following table describes each alert icon.
Icon Description
There are no alerts generated.
Icon Description
Low alert.
Medium alert.
High alert.
Topics
• Overview, page 14
• Agents, page 15
• Microagents, page 16
• Rulebases, page 21
Overview
The Hawk Console is used for viewing and managing the Hawk agents within the
configured Hawk domains. Using the Hawk Console you can view each agents’
microagents and the associated methods. You can also invoke the microagents
methods and examine the results.
The Hawk Console adds a tab to the View Machine dialog for each machine in
your domain. For more information on Hawk microagent methods, see TIBCO
Hawk Methods Reference.
The Hawk Console can also be used for viewing the rulebases that are loaded by
each agent in the domain.
Security Considerations
Security access determines whether a user can perform an operation on a
managed object in your domain.
It is strongly recommended that only administrators have access to the Hawk
Console.
When accessing TIBCO Hawk methods using the Machines console, if a user has
read access to the Machines console, only methods of type IMPACT_INFO are
listed. If the users have read-write access to the Machines console, all TIBCO
Hawk methods for the microagent are listed. When a method is listed, the user
can invoke or subscribe to that method.
Agents
This tab lists all machines that belong to the chosen domain.
The following information is available for each machine:
• Agent
The name of the TIBCO Hawk agent. The default name for the TIBCO Hawk
agent is the host name of the computer on which it is installed.
Click the agent name for the list of available microagent methods. See Hawk
Microagent Methods, page 18 for more information on invoking microagent
methods.
• Cluster
The cluster to which the agent belongs.
• Uptime
The number of days and hours this machine has been running.
• OS/ Version
The operating system and version.
• IP Address
The IP address of this machine.
• Status
The status of the machine is indicated by both an alert icon and the
corresponding alert level. This alert status corresponds to the highest alert
generated by the Hawk agent.
Clicking the status displays all alerts for that agent.
See Table 1, Alert Icons, on page 10 for the description of the alert icons.
Microagents
Network Operation
Using a network operation you can invoke a microagent method, of type
IMPACT_INFO that returns information but does not perform any action, on
multiple Hawk agents at the same time.
1. Select one or more microagent and click the Network Operation button. This
takes you to the Network Operation pane which lists the available methods.
2. Select a method and provide any necessary input parameters and click
Perform Query.
The results are displayed in the Success tab and are sorted by the microagent
name. The Timeout tab lists any agent that did not respond, usually due to a
network problem.
Network Action
Using a network action, you can invoke a microagent method, of type
IMPACT_ACTION or IMPACT_ACTION_INFO, that performs an action, on
multiple Hawk agents at the same time.
The procedure of invoking a network action is similar to invoking a network
operation.
Agent Tab
This dialog lists the available microagents and the rulebases defined for the agent.
Microagents
Displays the available microagents and for each microagent the following
information is displayed:
• Name — Name of the microagent.
• Instance — Number to identify the running instance
• Description — Description of the microagent.
Click on a microagent name for the list of associated microagent methods.
Rulebases
A list of the loaded rulebases is displayed.
Rulebases — The name of the rulebase. Click on this field to sort the rulebase
names.
Click on a rulebase name to view details of the rulebase.
Methods
The following fields are displayed for the microagent methods:
• Name — Name of the microagent methods.
• Instance — Instance number of the agent.
• Description — Description of the microagent method.
To invoke a microagent method click on the method name. See Invoking
Microagent Methods for details.
Method
Displays general information about the microagent method:
• Name —The name of the microagent method.
• Description — Description of the microagent method.
• Type — Type of the microagent method, either Synchronous or
Asynchronous.
• Impact — The function performed by the method and can be one of the
following types:
— IMPACT_INFO returns information.
— IMPACT_ACTION performs an action on the TIBCO Hawk system.
— IMPACT_ACTION_INFO both returns information and performs an action
based on it.
• Time Out — The method invocation timeout value in milliseconds.
Invocation
Parameters — Displays the following elements for the parameters:
— Name — Name of the input argument.
— Value — Value of the input argument.
— Type — Data type of the argument.
Description — Description of the argument.
Rulebases
This pane lists all the rulebases loaded for the chosen domain.
The following information for each rulebase is displayed:
• Rulebase
The name of the rulebase.
If the rulebase was loaded using a monitoring configuration, the name of the
MAR file is the prefix for the rulebase name.
For example, if the rulebase
• Agent
The name of the TIBCO Hawk agent. The default name for the TIBCO Hawk
agent is the host name of the computer on which it is installed.
• Cluster
The cluster to which the agent belongs.
• OS/ Version
The operating system and version.
• Status
The status of the machine is indicated by both an alert icon and the
corresponding alert level. This alert status corresponds to the highest alert
generated by the Hawk agent.
See Table 1, Alert Icons, on page 10 for the description of the alert icons.
Click on a rulebase name to view details.
Topics
• Overview, page 24
• Using the Monitoring Archive Utility, page 26
• Monitoring Console, page 33
• Using the ConfigureMonitoring Utility, page 40
Overview
Installation Considerations
If you delete the Application Domain for the console using the Resource
Management> Application Domains dialog, you would need to re-start TIBCO
Administrator.
If you update the console by first removing it and then adding it, log out of
TIBCO Administrator and log back in before using the plug-in.
If using a TIBCO Administrator domain with a database backend, make sure you
set the value for Maximum Connections in the Database Configuration tab of
the DomainUtility to be at least 10. Refer to the TIBCO Runtime Agent
DomainUtility User’s Guide for details.
Security Considerations
Security access determines whether a user can perform an operation on a
managed object in your domain.
Users with read-only access will not be able to Add, Deploy (and Undeploy), or
Update monitoring configurations.
Users with read-write access to the Monitoring Management folder get access to
all contained consoles.
Only users with read-write access can use the ConfigureMonitoring
command-line utility.
If your TIBCO Administrator domain or if the Application domain used for the
Monitoring Management Console uses a file based repository, then read-write
permissions have to be assigned to the Data Access folder.
The Data Access folder is accessed by selecting (using TIBCO Administrator)
User Management> Security> TIBCO Administrator> Permissions
Within this folder, assign read-write access to the Sys--<domainName> repository
file.
If a rulebase contains only agent-specific rules, the rulebase is not split into
separate rulebases and neither is the rulebase name suffixed with any type. If you
want the name of such a rulebase to be assigned a specific type, use the -Xtype
option when creating the monitoring archive file.
If the rulebase contains one or more agent-specific rules and one or more
application-specific rules, the rulebases are split into agent-specific and
application-specific rulebases. For example, if the rulebase
myMixedRulebases.hrb contains rules using the Logfile microagent and
microagents belonging to TIBCO BusinessWorks (of type bwengine) and TIBCO
Adapter for Active Database (of type adb). The resulting rulebases will be
myMixedRulebases.hrt, myMixedRulebases-bwengine.hrt, and
myMixedRulebases-adb.hrt.
The MAR utility will convert any six part data source to a seven part data source
in the input rulebases.
the MAR utility will convert this data source to the following:
COM.TIBCO.ADAPTER.<NAME>.<DOMAIN>.<TIBCO_DEPLOYMENT>.<TIBCO_COMPON
ENT_INSTANCE>.
If a rulebase contains a rule that contains an action that invokes a method from a TIBCO
application which is different from the TIBCO application used in the data source, the
rulebase will not be templatized and an error is generated.To allow other rules in the
rulebase to be templatized, separate the rule that caused the error and run the mar tool
again.
Rulebases that use posted conditions will not work as expected if the posted condition is
referred by rules with different adapter types in the same rulebase. This is because the
referred rulebase will be split into multiple rulebases.
While creating or updating a MAR file (using the MAR utility), an incorrect rulebase type
is assigned to the rulebase if the rulebase contains one application-specific and one or more
agent-specific rules. This problem occurs only if agent-specific rule is created first in the
rulebase and the application-specific rule created later. If this happens, the Domain,
Deployment, ComponentInstance values are not substituted. It is recommended that
when creating or updating a MAR file, the –Xtype option is used to specify the type of the
rulebase.
Examples:
— mar cvf myMarFile.mar ./
This command creates MAR file myMarFile.mar of type adb and contains
two rulebases adb.hrb and agent.hrb.
— mar cvf myMarFile.mar ./ -Xasis
Example:
— mar uf myMarFile.mar newRB.hrb
This command add the rulebase newRB.hrb to the existing MAR file,
myMarFile.mar.
• Extract MAR file
To extract a MAR file, use the command
mar x[v]f <marfilename> <inputfiles> [-Xoptions]
mar x[v]pf <propertiesfile> <marfilename> <inputfiles>
[-Xoptions]
Example:
— mar xf myMarFile.mar testRB.hrb
This command extracts the rulebase testRB.hrb from the specified MAR
file. Any other rulebase contained in the MAR file is not extracted.
— mar xpf myprop.properties myMarFile.mar testRB.hrb
This command extracts the rulebase testRB.hrb from the specified MAR
file and substitute the variables in the rulebase using the key-value pair
specified in myprop.properties file.
Any other rulebase contained in the MAR file is not extracted.
Following are the contents of a sample properties file used for variable
substitution:
TIBCO_DOMAIN=MyHawkdomain
TIBCO_DEPLOYMENT=myDeployment
TIBCO_COMPONENT_INSTANCE=myComponentInstance
• List a MAR file
To extract a MAR file, use the command
mar t[v]f <marfilename>
Example:
— mar tf myMarFile.mar
inputfiles
The files or directories, separated by spaces, that are
combined into or extracted from the MAR file.
All directories are processed at the top level only. Only files
with .hrb extension are processed.
description The description for the MAR file. If specify, the description
must be placed within quotes (").
If the d option is specified, you have to provide a
description. In the command, the options d and f must
appear in the same order as the description and MAR file.
The MAR utility recognizes the datatype of any rule in a rulebase whose
datasource name is in the following format:
COM.TIBCO.ADAPTER.<NAME>.<TIBCO_DEPLOYMENT>.<TIBCO_COMPONENT_INSTA
NCE> or
COM.TIBCO.ADAPTER.<NAME>.<DOMAIN>.<TIBCO_DEPLOYMENT>.<TIBCO_COMPON
ENT_INSTANCE>.
The following table lists valid values for some TIBCO applications that you can
use when assigning a type to the MAR file.
Monitoring Console
This console lists the monitoring applications that have been added to your
domain.
To create a monitoring application you must first create a monitoring archive file
(MAR file). This archive is created using the MAR utility and contains TIBCO
Hawk rulebases that monitor your applications. See Using the Monitoring
Archive Utility, page 26 for details on using the MAR utility.
You can use the same MAR file to create multiple monitoring applications and
deploy them separately onto different machines in your domain.
See Security Considerations on page 24 for the permissions required to access the
Monitoring Management Console.
Click Change MAR File if you want to select a different monitoring archive
file.
Select the Quick Configure checkbox if you want to identify the targets where
the monitoring configuration can be deployed. These targets are identified
using the type of the rulebase (monitoring configuration) contained in the
monitoring archive file. The type is determined by the data source of the
microagents belonging to TIBCO application being monitored. If the Quick
Configure checkbox is selected, the Deploy on Save field is enabled.
To deploy an application
If Quick Configure was not selected when adding the monitoring application,
the targets have to be manually added by clicking Add Target. See Adding
Targets for a Monitoring Configuration on page 36for more information.
6. Click Deploy.
If the monitoring configuration is successfully deployed, the Status changes
from Deployable to Deployed (loaded).
If the target application is not running, the status is changed to Deployed (Not
Loaded). When the target application starts, the status changes from
Deployed (Not Loaded) to Deployed (Loaded).
For a deployed monitoring configuration, if the TIBCO Hawk agent on the
target machine stops running, the status changes to Deployed (not available).
The Add Targets dialog is displayed as shown in the following screen. The
Available Targets pane lists the potential targets (within the domain) where
the monitoring configuration can be deployed.
If you deploy a monitoring configuration to any targets newly added to your domain, the
configuration will be deployed only on the newly added targets and will not be
re-deployed on the existing targets.
Variable Substitution
The following variables, if used, will be substituted when the monitoring
configuration is deployed:
• TIBCO_DOMAIN
• TIBCO_DEPLOYMENT
• TIBCO_COMPONENT_INSTANCE
• TIBCO_COMPONENT_TYPE
• TIBCO_DOMAIN_HOME
• TIBCO_COMPONENT_INSTANCE_TRACE_FILE
Hawk RulebaseMaps and Schedules are also similarly deployed. Only one
RulebaseMap and Schedule file can be deployed per domain. The
RulebaseMap file has to be named rbmap.hrm and the Schedules file has to be
named schedules.hsf.
Example: ConfigureMonitoring.exe -upload -mar rbmap.hrm -domain
myHawkDomain -user admin -pw adminpw
• Retrieve all potential targets for all monitoring configurations within the
specified monitoring application.
The -getTargets command retrieves all potential targets for a given
monitoring application in the TIBCO Administrator domain. An XML file
containing the targets is created in the current directory. The name of the XML
file has the format <MAR_file_name>-targets.xml, where <MAR_file_name>
is the MAR file for which the targets are retrieved.
Example: ConfigureMonitoring.exe -getTargets -monitoringAppName
myMarFile -domain myHawkDomain -user admin -pw adminpw
You can edit the XML file created by the -getTargets options to delete a target,
effectively choosing to not deploy the monitoring configuration on that target.
The following table describes the input parameters for the ConfigureMonitoring
utility.
Input Description
-domain The TIBCO Administrator domain name.
Input Description
-targetDomains (Optional) The domains where you want to deploy the
specified monitoring configurations.
If this option is not specified, the monitoring configuration
is deployed in the TIBCO Administrator domain.
The domains are specified within double-quotes ("").
Specify multiple domains using a comma separated list.
For example, -targetDomains "domain1,domain2"
-mar The MAR file name. If the MAR file is not located in the
current directory, specify the complete path name.
-initTime (optional) The default time, in seconds, to wait for the Hawk
components to initialize before executing the
ConfigureMonitoring command.
The default value is 60.
-cred The credential file containing user credentials (user and pw)
specified as properties. The password can be specified either
in plain text or encrypted form.
Passwords can be encrypted using password encryption
tool. On Microsoft Windows platforms, the tool is
<HAWK_ROOT>\bin\tibhawkpassword.exe and on
UNIX platforms, it is
<HAWK_ROOT>/bin/tibhawkpassword.
Index
A M
Agent tab 18 monitoring application
Alerts creating 33
icons 10 deploying 34
suspending 10 updating 37
All Alerts Monitoring Archive Utility 26
alert details 9 commands 27
viewing alerts 8 input parameters and options 29
monitoring configuration
adding targets to 36
Monitoring Management
C about 24
installation considerations 24
ConfigureMonitoring Utility 40
input parameters 41
customer support viii
Q
Quick Configure 34
D
Deploy on Save 34
S
Security Considerations
H All Alerts 6
Hawk Console 14
Hawk Configuration 3 Monitoring Console 24
Hawk Console support, contacting viii
about 6
Hawk microagent methods
invoking 19
list 18 T
technical support viii