HPE Operations Agent for NonStop Object Configuration Client Guide Abstract Object Configuration Client (OCC) facilitates configuration of the HPE NonStop server components for management by the HPE Operations environment. The OVNM Object Configuration Client Guide gives you information about the OCC product and the instructions on how to use it effectively. Part number: 540076-011 Published: January 2016 Edition: 11 Legal and notice information © Copyright 2016Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett Packard Enterprise. The information contained herein is subject to change without notice. Warranties HEWLETT PACKARD ENTERPRISE MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett Packard Enterprise shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Acknowledgments Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the United States and other countries. Microsoft® and Windows® are trademarks of the Microsoft group of companies. Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated. Java and Oracle are registered trademarks of Oracle and/or its affiliates. UNIX® is a registered trademark of The Open Group. Revision History Rebranded for Hewlett Packard Enterprise January 2016 i Contents Preface ·········································································································································································································· 4 Before You Begin ··································································································································································································································4 Audience ···················································································································································································································································4 Goals of Documentation ···················································································································································································································4 Organization············································································································································································································································ 5 OVNM Documentation Map ············································································································································································································ 5 Electronic Versions of the Manuals ····························································································································································································· 5 OVNM Manuals ······································································································································································································································ 6 Additional OVNM-Related Products ·························································································································································································· 6 About OVNM Online Help················································································································································································································ 6 1 Object Management: Introduction············································································································································· 8 About OVNM ·········································································································································································································································· 8 Why OVNM? ············································································································································································································································ 8 Object Management through OVNM ························································································································································································· 9 Introducing OCC···································································································································································································································· 9 2 Object Configuration Client Interface ···································································································································· 10 OCC Window ········································································································································································································································ 10 Menu Bar ·················································································································································································································································· 11 Toolbar······················································································································································································································································ 11 Monitoring Toolbar····························································································································································································································· 11 Status Bar ················································································································································································································································ 11 Menus ······················································································································································································································································· 12 File Menu ······················································································································································································································12 Threshold Menu ········································································································································································································13 Edit Menu ···················································································································································································································· 14 Monitoring Menu ······································································································································································································15 Recovery Menu ········································································································································································································· 16 View Menu ···················································································································································································································17 Tools Menu ················································································································································································································· 18 Help Menu ···················································································································································································································20 Toolbar and Monitoring Bar Icons ····························································································································································································· 21 Toolbar ···························································································································································································································21 Monitoring Bar ···········································································································································································································21 Right-Click Menus ····························································································································································································································· 23 Object Class Pane ···································································································································································································· 23 Threshold Pane·········································································································································································································24 Objects Pane ·············································································································································································································· 27 3 Object Configuration Client: The Understanding ·············································································································28 Managed Subsystems ····················································································································································································································· 28 Authentication and Security ········································································································································································································ 29 Scheduling············································································································································································································································· 30 SCHEDULE FILE·································································································································································································································· 31 HOLIDAY FILE ···································································································································································································································· 32 Monitoring ············································································································································································································································· 33 ii Actions ···················································································································································································································································· 35 EMS Alerts···················································································································································································································36 E-Mail Alerts···············································································································································································································39 Recovery ······················································································································································································································ 41 eEvents ·························································································································································································································42 EMS Actions ········································································································································································································································· 47 ObjectMAP ··················································································································································································································47 eBurst ····························································································································································································································50 Group & Subgroup Management of Objects ······································································································································································· 54 Object Location ·································································································································································································································· 55 Maintenance ········································································································································································································································· 56 4 Working With Object Configuration Client ··························································································································58 Prerequisites ········································································································································································································································ 58 Managing the Environment·········································································································································································································· 59 Creating a Threshold Configuration ························································································································································································· 61 Listing Configurations and Objects·························································································································································································· 72 Listing Configurations ··························································································································································································· 72 Listing Objects ·········································································································································································································· 73 Color Coding ··············································································································································································································74 Maintaining Configurations & Objects···················································································································································································· 75 Modifying Configurations ···················································································································································································· 75 Modifying Objects ··································································································································································································· 76 Deleting Configurations························································································································································································ 77 Deleting Objects ······································································································································································································· 77 Appendix A: Subsystems Managed ···············································································································································78 Appendix B: EMS Message Handling ··········································································································································· 81 EMS Processing Sequence ············································································································································································································ 87 Appendix C: OSS Log Handling······················································································································································ 89 Appendix D: Default Policies ····························································································································································92 Appendix E: Substitution Parameters ··········································································································································95 Appendix F: OCC Errors ····································································································································································· 96 Appendix G: NetBatch Monitoring················································································································································ 98 iii Preface HPE Operations NonStop Server Management (OVNM) is an out-of-the-box solution that provides seamless integration of HPE Operations (previously known as HPE OpenView – OVO) with HPE NonStop servers. The software is a natural extension of HPE Operations and provides you with true end-to-end management of your NonStop environment. Object Configuration Client (OCC) facilitates configuration of the HPE NonStop server components for management by the HPE Operations environment. The OVNM Object Configuration Client Guide gives you information about the OCC product and the instructions on how to use it effectively. Designed to meet the practical needs of the HPE NonStop environment, this manual explains the concepts behind OCC and illustrates all the facets of the software. This Guide contains all the information necessary to understand OCC and to use it effectively to solve your HPE NonStop Enterprise Management issues. Before You Begin Before reading the documentation, you are expected to have a basic understanding of HPE Operations environment, as well as the HPE NonStop environment. Familiarity with the HPE NonStop Distributed Systems Management software, especially the Event Management Service, would be helpful. Audience This guide is intended for two types of users. • Administrators, who plan, set up, and maintain OVNM and HPE Operations Manager • Operators, who perform daily tasks using OVNM and HPE Operations Manager Goals of Documentation After reading the Object Configuration Client Guide, you should know the following information. • Introduction to Object Management and how it is implemented using Object Configuration Client (OCC). • Navigating through the various menu options and screens. • Finding the step-by-step procedure that corresponds to the task that you want to perform. • Steps to configure monitoring and escalation. 4 Organization The guide is organized as follows. Table 1. Guide Organization S. No. Chapter Name Description Chapter 1 Object Management: Introduction Introduces Object Management and how it is implemented with OVNM. Chapter 2 Object Configuration Client Gives detailed reference for the various components of the Object Configuration Introduction Client GUI. Chapter 3 Object Configuration Client: Gives information about the concepts related to the Object Configuration Client. The Understanding Chapter 4 Working with Object Configuration Client Gives instructions for using the various features, such as creating a threshold configuration, of the Object Configuration Client. Appendix A. Subsystems Managed Gives a list of all the predefined subsystems managed by Object Configuration Client. Appendix B. EMS Message Handling Gives an example of setting up an EMS threshold. Appendix C. OSS Log Handling Gives an example of setting up OSS threshold for monitoring OSS logfile. Appendix D. Default Policies Gives a table containing the list of pre-configured policies. Appendix E. Substitution Parameters Gives a list of substitution parameters or macros that are used during message construction. Appendix F. OCC Errors List the common messages of Object Configuration Client. OVNM Documentation Map HPE Operations Agent for NonStop (OVNM) provides a set of manuals and online help that help you use the product and understand the concepts underlying the product. This section describes what information is available and where you can find it. Electronic Versions of the Manuals All manuals are available as Adobe Portable Document Format (PDF) files in the documentation directory on the OVNM product CD-ROM. All manuals are also available in the HPE Web server directory. For details, contact the appropriate HPE support service. 5 OVNM Manuals This section provides an overview of the OVNM manuals and their contents. Table 2. OVNM Manuals Manual Description Media OVNM Concepts Guide Explains OVNM features, functions, benefits, architecture, and data flow. Describes OVNM agent and server components. PDF OVNM Installation Guide Explains how to install, configure and start & stop OVNM components. PDF OVNM User Guide Explains how to start & stop OVNM components. Also includes OVNM utilities and troubleshooting. PDF OVNM Object Configuration Client Guide Explains the Object Configuration Client (OCC) interface and provides the instructions on how to use the software effectively. PDF OVNM ObjectStats Guide Explains the ObjectStats interface and the instructions on how to use it effectively. PDF OVNM Console Guide Explains the OVNM Policy Manager interface and provides the instructions on how to use the software effectively. PDF OVNM ObjectMAP Guide Explains the ObjectMAP interface and provides the instructions on how to use the software effectively. PDF OVNM Event Management Guide Explains the concepts of Event Integration. PDF Object Reference guide Lists the various threshold policies in Object Configuration Client (OCC). PDF OVNM Troubleshooting Guide Explains the common troubleshooting queries along with the common OVNM error messages and how to handle them. PDF Additional OVNM-Related Products This section provides an overview of the OVNM-related manuals and their contents. Table 3. OVNM-related manuals Manual Description Media Performance Agent PDF OVNM Performance Agent for NonStop SMART Plug-In SPI for MQ-SERIES PDF SPI for BASE24 PDF About OVNM Online Help This preface describes online documentation for the HPE Operations Agent for NonStop Server (OVNM) graphical user interfaces (GUIs). 6 Table 4. OVNM Online Help Help File Description Object Configuration Client Explains the Object Configuration Client GUI and how to use the interface effectively. ObjectStats Explains the ObjectStats GUI and how to use the interface effectively. Console Explains the Console GUI and how to use the software effectively. ObjectMAP Explains the ObjectMAP GUI and how to use the software effectively. Host Installation Client Explains the Host Installation Client GUI and how to use the interface effectively. Host Management Client Explains the Host Management Client GUI and how to use the interface effectively. 7 1 Object Management: Introduction About OVNM HPE Operations Agent for NonStop (OVNM) is a fully integrated, out-of-the-box solution that seamlessly works with many Enterprise Management Systems (HPE OM, Tivoli, BMC, etc.), extending the managed domain to include HPE NonStop Servers. This tight integration gives organizations a cost-efficient, easily configurable, and time-saving way to rapidly and successfully incorporate HPE NonStop business applications and management solutions into their service delivery infrastructure. OVNM helps administrators efficiently monitor distributed enterprise-wide NonStop environments from a central, best-in-class console. The agent helps you increase availability and performance, visualize capacity shortages and trends and lower the overall cost of maintaining your NonStop environment. Why OVNM? • Increased Service Availability • Health-Monitoring of HPE NonStop Systems • Enhanced Productivity • Enhanced Flexibility • Consolidated Policy Based Management Views • Reduced Costs 8 Object Management through OVNM OVNM is an integrated set of modules to manage HPE NonStop servers from any of the most popular Enterprise Management Systems. It also provides the ability to manage the HPE NonStop environment without an Enterprise Management system if that is your desire. The modules include both Object Management and Event Management. Object management enables you to define HPE objects and an easy way to manage them. OVNM provides the Object Configuration Client (OCC) GUI to easily create, maintain and manage HPE NonStop Objects. Figure 1. Object Management The figure provides an overview of the OVNM Object Management capabilities. The NonStop object integration provides the ability to: • Generate EMS events based on object resources. • Define thresholds, which can be set using the OCC interface. • Set Message severity and various token values for the Enterprise Management System, such as HPE Operations Manager (HPE OM) service view ID’s. Introducing OCC OCC is designed to configure HPE NonStop Server system objects for management, such as CPUs, Disks, Files and Processes. It allows you to set the attributes to be monitored for such objects. You define the desired state of an object in operation, and what should be considered as an odd or undesirable state for the object. You can configure multiple HPE NonStop nodes from a single management workstation, a single node from multiple workstations, or any other combination thereof. The most important feature of the OCC is to configure events that need to be managed by the Enterprise Management System. 9 2 Object Configuration Client Interface The following figure illustrates OVNM Object Configuration Client Interface. Figure 2.OCC Interface OCC Window The OCC window is divided into the following areas. • Object Class Panel: Object Class is the vertical panel on the left side of the window displaying a list of object classes. The objects are displayed in a tree view that lists the various nodes configured along with the subsystems. • Threshold or Configuration Panel: This is the first horizontal area in the upper right side of the window, which lists all the thresholds configured for a selected object type. It also displays the Operator, Monitoring and Recovery Status; Multi-node and Creator / Modifier information; Created and Last Modified date along with the Comments. You can choose the columns and the sequence in which they will be displayed. • Objects Panel: This is the lower right horizontal area, which lists all the objects corresponding to a selected threshold in the Threshold pane along with their severity status. It also displays the Manager, Operator, Threshold, Monitoring and Recovery Status, Created date, Last Polled Time and Last Polled Value. You can choose the columns and the sequence in which they will be displayed. • Message/Log Panel: This is the horizontal panel at the bottom of the OCC window. It displays the list of messages/logs related to OCC and Elink. This pane is not displayed by default. You can display or hide it by selecting the Messages option in the View menu. 10 Menu Bar The following figure illustrates the Menu Bar of OVNM Object Configuration Client Interface. Figure 3. OCC Menu Bar The first bar at the top of the window is the Menu Bar, giving access to various menus. The menus available are File, Threshold, Edit, Monitoring, Recovery, View, Tools and Help. Toolbar The following figure illustrates the Toolbar of OVNM Object Configuration Client Interface. Figure 4. OCC Toolbar The Toolbar is displayed at the top of the window, below the Menu bar. It consists of various icons, which are shortcuts to some of the frequently used commands in the various menus on the Menu bar. Along with the icons, it gives you the option to select HPE NonStop nodes using the Node box. You can display or hide it by selecting the Toolbar option in the View menu. It is a dock-able bar, which means that it can be positioned anywhere you want on the screen. The various icons are enabled or disabled depending on the selections made in the various panes. Monitoring Toolbar The following figure illustrates the Monitoring Bar of OVNM Object Configuration Client Interface. Figure 5. OCC Monitoring Toolbar The Monitoring bar is displayed adjacent to the Toolbar. You can display or hide it by selecting the Monitoring Toolbar option in the View menu. It is a dock-able bar. The bar consists of various icons, which are shortcuts to the frequently used commands in the Monitoring and Recovery menus. The various icons are enabled or disabled depending on the selections made in the various panes and the conditions specified. Status Bar The following figure illustrates the Status Bar of OVNM Object Configuration Client Interface. Figure 6. OCC Status Bar The Status bar can be seen at the base of window. The Status bar can be divided into three areas, which offer the following information. • Left Area: In this area, tips are provided on various menu options and icons present on the Toolbar, along with other status messages. • Middle Area: In this area, the Node name and IP address of the selected node along with the status of the action executed is displayed. • Right Area: This area shows whether the local OCC application is registered and connected with the local Elink. 11 Menus The various menus available on the Menu bar are as follows. • File • Threshold • Edit • Monitoring • Recovery • View • Tools • Help File Menu This is the first menu on the Menu bar. The option available in this menu is as follows. • Exit: Use this option to exit from the OCC application. Figure 7.OCC File Menu 12 Threshold Menu The Threshold menu includes options related to threshold configurations and objects, such as creating new threshold configurations, modifying existing ones, and deleting objects. The shortcuts for most of the commands in the Threshold menu are available on the Toolbar. Figure 8. OCC Threshold Menu The various options available in the Threshold menu are as follows: • New Configuration: Use this option to create a new threshold configuration. Clicking this option displays the Threshold dialog box, in which the specifications for the threshold like the Subsystem and Object Type can be specified. • List Configurations: Use this option to list all the thresholds corresponding to the selected Object Class in the Thresholds pane. • Modify Config: Use this option to access the Modify Configuration / Object dialog box. This allows you to modify the configuration settings for an existing threshold. • Delete Config: Use this option to delete the selected threshold(s). • List Objects: Use this option to list all the objects corresponding to the selected threshold configuration. It is especially useful in case the threshold was created using wildcard characters. • Stop Listing Objects: Use this option to stop the listing of objects. This option is enabled only for the period when the command for listing objects is being executed. As soon as the listing is complete or is stopped, the option is disabled. • Modify Object: Use this option to access the Modify Configuration / Object dialog box, using which you can modify the configuration settings for the selected object. This option is enabled only when you select an object in the Objects pane. • Delete Object: Use this option to delete the selected object(s). This option is enabled only when you select an object(s) in the Objects pane. • Add New Object: Use this option to add new objects to an existing threshold without using the Auto Maintenance feature. New objects can be added irrespective of the template set for the threshold. Clicking this option displays the Add User Object dialog box. When you use the Add New Object feature, you will notice that the manager field is now open whenever the manager field is also used to create the original threshold. You can use wildcards in both the Object and the Manager fields This feature will add whatever objects match the template that is entered, even if the object is already on the database, so you need to be careful when using this feature. There is no way to view what templates were already used in previous 'add new object' transactions. This information is not recorded anywhere. 13 If you use this feature multiple times on the same threshold, all of the objects are basically lumped together; there is no way to determine which objects were added at the same time. Figure 9. OCC Add User Object Dialog Box Edit Menu Edit is the third menu on the Menu Bar. The option available in the Edit menu is: Find Object: If you have numerous objects defined within a threshold, you may find it difficult to locate a specific object in the List Objects display in the Objects pane. Figure 10. OCC Edit Menu Use the Find Object option to display the Find Object dialog box where you can enter the object name and then click the Find button. This will highlight the specified object in the display. Figure 11. OCC Find Object Dialog Box 14 Monitoring Menu This is the fourth menu on the Menu Bar. This has various commands related to controlling monitoring at different levels. The shortcuts for the options in this menu are available on the Monitoring toolbar and in the right-click menus of the various panes. Figure 12. OCC Monitoring Menu The various options available in the Monitoring menu are as follows. • Activate Node Monitoring: Clicking this option activates monitoring for the selected node. This reactivates monitoring for the threshold flagged for active monitoring in the node. It does not change the status of the thresholds configured for inactive monitoring. This option is enabled only when the overall monitoring is inactive and a node is selected in the Object Class pane. • Inactivate Node Monitoring: Clicking this option inactivates monitoring for the selected node. This command inactivates all the thresholds flagged for active monitoring in the node. This option is enabled if the overall monitoring is active and a node is selected in the Object Class pane. NOTE: In the previous OVNM versions, when you used the Object Configuration Client to turn Node Monitoring OFF, the OVNM application would continue to consume EMS messages and react to them (if they were defined in an EMS threshold) and send them to HPE OM (if specified). With OVNM release 4.8, when you use the Object Configuration Client to turn monitoring off/on for the entire node, you have the option of having this impact the EMS traffic as well. For details on how to enable the feature, refer to Customizing Node Monitoring Feature section in User Guide. • Activate Config Monitoring: Use this option to activate monitoring for the selected threshold configuration(s). It activates monitoring for all the objects under the selected threshold(s), which are flagged for active monitoring. This option is enabled only if monitoring is inactive for the selected threshold(s). • Inactivate Config Monitoring: Use this option to deactivate monitoring for the selected threshold configuration(s) only. It inactivates monitoring for all the objects under the selected threshold(s), which are flagged for active monitoring. This option is enabled only if monitoring is active for the selected threshold(s). • Activate Object Monitoring: Use this option to activate monitoring for the selected object(s) in the Objects pane. This option is enabled only if the monitoring for the selected object(s) is inactive. • Inactivate Object Monitoring: Use this option to deactivate monitoring for the selected object(s) in the Objects pane. This option is enabled only if the monitoring for the selected object(s) is active. 15 Recovery Menu The various options available in the Recovery menu are as follows. • Activate Config Recovery • Inactivate Config Recovery • Activate Object Recovery • Inactivate Object Recovery Figure 13. OCC Recovery Menu The various options available in the Recovery menu are as follows. • Activate Config Recovery: Use this option to activate recovery for the selected threshold configuration(s). It activates recovery for all the objects under the selected threshold(s) for which recovery has been configured. This option is enabled only if recovery has been configured but inactive for the selected threshold(s). • Inactivate Config Recovery: Use this option to deactivate recovery for the selected threshold configuration(s). It inactivates recovery for all the objects under the selected threshold(s) for which recovery has been configured. This option is enabled only if recovery has been configured and active for the selected threshold(s). • Activate Object Recovery: Use this option to activate recovery for the selected object(s). This option is enabled only if recovery has been configured but inactive for the selected threshold(s). • Inactivate Object Recovery: Use this option to deactivate recovery for the selected object(s). This option is enabled only if recovery has been configured and active for the selected threshold(s). 16 View Menu The various options available in the View menu are as follows. • Toolbar • Monitoring Toolbar • Status Bar • Messages • Columns Figure 14. OCC View Menu The various options available in the View menu are as follows. • Toolbar: This option enables you to toggle between the displayed and hidden modes of the Toolbar. • Monitoring Toolbar: This option enables you to toggle between the displayed and hidden modes of the Monitoring toolbar. • Status Bar: This option enables you to toggle between the displayed and hidden modes of the Status bar. • Messages: This option enables you to toggle between the displayed and hidden modes of the Message/Log panel. • Columns: This option enables you to select the fields to be displayed in the Threshold and the Objects pane. Clicking this option displays the Column Settings dialog box. Figure 15. Column Setting Dialog Box Use the Configurations View and Objects View tabs to configure the information display in the Threshold and Objects pane, respectively. Select the options from the Available Columns list and Click the Add button to add the column to the Current Columns list. Use the Remove button to hide the display of the selected column. Move Up and Move Down buttons allow you to specify the sequence in which the columns are displayed. 17 Tools Menu The various options available in the Tools menu are as follows. • Managed Subsystems • Log on • Log off • Cancel all requests for this node • Options Figure 16. OCC Tools Menu The Tools menu offers the following options. • Managed Subsystems: This option displays the Managed Subsystems dialog box, using which; you can select the subsystems to be configured. • Log on: This option can be used to log on to the selected node. Logging on authenticates you for operations like creating, modifying or deleting configurations and objects. This option is enabled if a node is selected in the Object Class pane and if you are not logged on to the selected node. • Log off: This option can be used to log off from the selected node. This option is enabled if a node is selected in the Object Class pane and if you are already logged on to the selected node. • Cancel all requests for this node: This option can be used to cancel all the requests for the selected node. This option is enabled only for the period when a request is sent to the node. As soon as the task is completed or is stopped, the option is disabled. • Options: Clicking the Options displays the Options dialog box. This dialog box can be used to configure the auto-logoff time, the default enterprise solution selection and whether or not to save the values used when adding new thresholds as a default value for future thresholds. Figure 17. OCC Options Dialog Box 18 There are two Severity fields that can be defined when using the OCC. The first one is located in the Actions/Alert panel. This severity is used to define the severity that will be used in the Violation EMS message that is generated by OVNM. This value is also used in ObjectMap and ObjectStats. The second field is defined in the Actions/eEvents panel. This severity is used when sending the message to the Enterprise Management system and Console. As the values of these severities are different, the Keep severities in sync checkbox is checked. When this checkbox is checked, a change to one of those values will automatically change the other value, unless the value in the eEvents panel is Original. If the option is not checked, the user can update both fields – no automatic updates will be applied. This allows you to intentionally use different severities in the Enterprise Management system than what is seen in ObjectMap, which could be viewed by a different department. The default value for the Session Timeout is 2 hours. After 2 hours of no activity within the OCC application, any future action that requires modifying the database will require the user to log on again. Most OVNM customers will want to create eEvents records for every single threshold. By checking this box, it makes that process automatic (as it was in previous releases). By default, it will also select OVO (HPE OM) as the default enterprise solution. If you are not using any Enterprise Management solution, you can turn this feature off – there is no need to create eEvents records if the messages are not going to be forwarded on. Console will always get the messages regardless of this setting. If you are using an Enterprise Solution, but not HPE OM, you can change this to match your environment. The ‘Save Last-Used Threshold Schedule’ feature allows you to decide if you want to save the values you specify in the “Schedule” panel as default values for future thresholds. Each subsystem will have its own default values. The ‘Save Last-used Alert Schedule’ refers to the ‘repeat every’ and escalation values in the Alert tab. Each subsystem will have its own default values. When these options are turned off, the OCC goes back to the original default values regardless of what values you may have saved in the past. The Auto-start elink at startup allows you to automatically start up the elink process while launching the Object Configuration Client. NOTE: Under normal circumstances, Elink should already be running before you start this application, which would make this option meaningless. In the event that you require a VPN connection to be established before you can connect to the HPE NonStop, then you can configure the Elink Service to be MANUALLY started and use the Configuration Client to start it when needed. The Auto-start elink at startup should always be checked. Un-checking this option will prevent the Configuration Client from starting Elink when Elink is not already running. For more information about configuring Services, see Control Panel Administrative Tools Services option. 19 Help Menu The various options available in the Help menu are as follows. • Help Topics • About Figure 18. OCC Help Menu The Help menu offers the following options. • Help Topics: This option provides you help on various features of OCC. • About: This option provides the version number of the OCC software and the copyright and license information. NOTE: The various options and icons will be enabled or disabled depending on the selections made in the various panes. For example, the options related to modifying thresholds will be enabled only when you select the threshold to be modified in the Threshold pane. 20 Toolbar and Monitoring Bar Icons Toolbar The following table lists and describes the various Icons available in OCC Toolbar Table 5. Toolbar Icons S. No Toolbar Icons Menu Options Menu 1. New Configuration Threshold 2. List Configurations Threshold 3. Modify Config Threshold 4. Delete Config Threshold 5. List Objects Threshold 6. Modify Object Threshold 7. Delete Object Threshold 8. Find Object Edit Node Box: Along with the various icons, the Toolbar also has the Node box, using which you can select the HPE NonStop node to be monitored. Figure 19. OCC Monitoring Bar Node Box Monitoring Bar The following table lists and describes the various Icons available in OCC Monitoring Bar. Table 6. S. No Monitoring Bar Icons Monitoring Bar Icons Menu Option Menu 1. Activate Node Monitoring Monitoring 2. Inactivate Node Monitoring Monitoring 3. Activate Config Monitoring Monitoring 4. Inactivate Config Monitoring Monitoring 5. Activate Config Recovery Recovery 6. Inactivate Config Recovery Recovery 21 S. No Monitoring Bar Icons Menu Option Menu 7. Activate Object Monitoring Monitoring 8. Inactivate Object Monitoring Monitoring 9. Activate Object Recovery Recovery 10. Inactivate Object Recovery Recovery 22 Right-Click Menus OCC provides the right-click feature in its interfaces, which makes it user-friendly. Right-click menus are provided in various panes, which have some of the most frequently accessed commands along with other commands specific to the selection made. To access the right-click menus, you need to make a selection in the pane and then right-click on it. Object Class Pane The following right-click menus can be accessed in the Object Class panel. Node Icons Figure 20. OCC Object Class Pane Node Icon Right-Click Menu The right-click menu available by clicking on any of the node icons in the Object Class panel has been displayed above. The options available in the menu are: • Log on: Use this option to log on to the selected node. • Log Off: Use this option to log off from the selected node. • Stop Listing Objects: Use this option to stop the process of listing objects. • Cancel Request(s): Use this option to cancel request(s) sent to the selected node. • Start Monitoring: Use this option to start monitoring for the selected node. This option will be enabled only when monitoring for the node is in inactive state. • Stop Monitoring: Use this option to stop monitoring for the selected node. This option will be enabled only when monitoring for the node is in active state. • Refresh Monitoring state: Use this option to refresh the monitoring status of the selected node. • Configure Managed Subsystems: Use this option to access the Managed Subsystems dialog box. Object Class Icons The right-click menu available using the right-click action on the Object Class icon is displayed above. It has only one option, List Configurations. You need to select an Object Type from the tree structure in the Object Class pane and then right-click on it to access this menu. Figure 21. • OCC Object Class Pane Object Class Icon Right-click Menu List Configurations: Use this option to list all the thresholds configured for the selected Object Type. The list is displayed in the Threshold pane. This is a shortcut for the List Configurations option in the Threshold menu. 23 Threshold Pane The menu displayed above is the right-click menu of the Threshold pane. To access this menu, right-click on selected threshold configuration in the Threshold pane. Figure 22. OCC Threshold Pane Right-click Menu The various options in this menu are as follows. • View Config Detail: Using this option, you can check the conditions specified for the selected threshold configuration. Clicking this option displays the Configuration / Object Detail dialog box. Modifications cannot be made using this dialog box, as only the Cancel button is enabled. The OK and the Apply buttons are disabled. Figure 23. OCC Configuration / Object Detail Dialog Box 24 • Modify Configuration: Use this option to access the Modify Configuration / Object dialog box, using which you can modify the configuration settings for the selected threshold configuration. It is a shortcut for the Modify Config option in the Threshold menu. • Delete Configuration: Use this option to delete a selected threshold configuration. It is a shortcut for the Delete Config option in the Threshold menu. • List Objects: Use this option to list all the objects under the selected threshold configuration. The list is displayed in the Objects pane. This is a shortcut for the List Objects option in the Threshold menu. • Monitoring Active: Use this option to activate monitoring for the selected threshold configuration(s) only. It activates monitoring for all the objects under the selected threshold(s), which are flagged for active monitoring. This option is enabled only if monitoring is inactive for the selected threshold(s). This is a shortcut for the Activate Config Monitoring option in the Monitoring menu. • Monitoring Inactive: Use this option to inactivate monitoring for the selected threshold configuration(s) only. It inactivates monitoring for all the objects under the selected threshold(s), which are flagged for active monitoring. This option is enabled only if monitoring is active for the selected threshold(s). This is a shortcut for the Inactivate Config Monitoring option in the Monitoring menu. • Recovery Active: Use this option to activate recovery for the selected threshold configuration(s) only. It activates recovery for all the objects under the selected threshold(s), which are flagged for active recovery. This option is enabled only if recovery is inactive for the selected threshold(s). This is a shortcut for the Activate Config Recovery option in the Recovery menu. • Recovery Inactive: Use this option to inactivate recovery for the selected threshold configuration(s) only. It inactivates recovery for all the objects under the selected threshold(s), which are flagged for active recovery. This option is enabled only if recovery is active for the selected threshold(s). This is a shortcut for the Inactivate Config Recovery option in the Recovery menu. • Copy to Node(s): Use this option to copy the selected threshold to multiple nodes. • Add New Object: Use this option to add new objects to an existing threshold without using the Auto Maintenance feature. This option enables you to add new objects irrespective of the template set for the threshold. This option is a shortcut to the Add New Object option in the Threshold menu. 25 • Auto-Maintenance: Use this option to to perform a "one time - on demand" discovery. When new objects have been added to the backend environment and you don't want to wait for the scheduled auto maintenance time, or the threshold does not use auto maintenance feature, you can force a re-discovery by using this option. There is a need to remember the following points while working with the Auto-Maintenance feature. When you use the Add New Object feature, you will notice that the manager field is now open whenever the manager field is also used to create the original threshold. You can use wildcards in both the Object and the Manager fields. This feature will add whatever objects match the template that is entered, even if the object is already on the database, so you need to be careful when using this feature. There is no way to view what templates were already used in previous 'add new object' transactions. This information is not recorded anywhere. If you use this feature multiple times on the same threshold, all of the objects are basically lumped together; there is no way to determine which objects were added at the same time. Figure 24. Apply Auto-Maintenance Immediately Dialog Box The options supported by this feature are, Rebuild and Update (add only). NOTE: If you use Rebuild, be aware that objects could be deleted from the database if they no longer exist or they do not match the template that was specified when the threshold was first added. So if you had manually added objects via the "Add Object" feature that does not match the template, those objects will be deleted. This feature is not allowed if there are no wildcards in the threshold definition since it would not have anything more to discover. It is not related at all to the scheduled/normal auto maintenance. You can use this feature on any threshold; auto maintenance does not have to be defined for the threshold. 26 Objects Pane The right-click menu of the Objects pane is displayed above. Selecting object(s) in the Objects pane and then right clicking on it can access this. Figure 25. OCC Objects Pane Right-Click Menu The various options in this menu are as follows. • View Object Detail: Use this option to check the conditions specified for the selected object. Clicking this option displays the Configuration / Object Detail dialog box. Modifications cannot be made using this dialog box, as only the Cancel button is enabled. The OK and the Apply buttons are disabled. • Modify Object: Use this option to do modifications for already created Objects. This is a shortcut for the Modify Object option in the Threshold menu. • Delete Object: Use this option to delete the selected objects. This is a shortcut for the Delete Object option in the Threshold menu. • Monitoring Active: Use this option to activate monitoring for the selected object(s). This option is enabled only if monitoring for the selected object(s) is inactive. It is a shortcut for the Activate Object Monitoring option in the Monitoring menu. • Monitoring Inactive: Use this option to inactivate monitoring for the selected object(s). This option is enabled only if monitoring for the selected object(s) is active. It is a shortcut for the Inactivate Object Monitoring option in the Monitoring menu. • Recovery Active: Use this option to activate recovery for the selected object(s). This option is enabled only if recovery for the selected object(s) is configured but inactive. It is a shortcut for the Activate Object Recovery option in the Recovery menu. • Recovery Inactive: Use this option to inactivate recovery for the selected object(s). This option is enabled only if recovery for the selected object(s) is configured and active. It is a shortcut for the Inactivate Object Recovery option in the Recovery menu. 27 3 Object Configuration Client: The Understanding Object Configuration Client (OCC) is an interface, which enables you to create threshold configurations to ensure monitoring, escalation and mapping for HPE NonStop objects. This section covers the various concepts of OCC. Managed Subsystems The intuitive OCC interface enables you to define sets of monitoring thresholds for each object. Each set is known as a configuration or threshold configuration for that object. The first step in defining threshold configurations for one or more objects is to select the subsystems that you want to monitor for each HPE NonStop node. You can select the subsystems and their object types using the Managed Subsystems dialog box. Only the subsystems selected in this dialog box are visible in OCC. You can also access the dialog box using the Managed Subsystems option in the OCC Tools menu. Figure 26. OCC Managed Subsystems Dialog Box OCC allows you to monitor most of the major HPE NonStop subsystems. Refer to Appendix A: Subsystems Managed for a list of all the subsystems managed by OCC. 28 Authentication and Security OCC provides security features, which make sure that only authorized users can access the OCC database. Authentication is required for operations like creating, modifying or deleting configurations and objects. The Log on to dialog box is displayed. Figure 27. OCC Log on to Dialog Box You need to enter the user ID and the password in the User Name and Password boxes, respectively, to access the HPE NonStop host. The HPE NonStop administrator specifies these. Select the Use this user-id across all nodes check box to use the same user name across all the configured nodes. Click the OK button after specifying the necessary details. When this box is selected, the user id and password will be verified on all nodes, so it really only works when the password is the same across the network. You can configure authentication information using the General tab page in the Options dialog box. To access this, click the Options command in the Tools menu. Figure 28. OCC Options Dialog Box You can specify the time-out parameter for a particular session using the Session Timeout box in the Authentication area in the Options dialog box. After the specified time, the system will logout and you will have to login again. The default value is 2 hours. 29 Scheduling OCC allows you to schedule object monitoring for a specified time period. The alert messages for object violations are generated or suppressed according to the schedule defined for a particular threshold. The schedule can be specified while creating a threshold configuration using the Schedule dialog box. To access the Schedule dialog box click the Schedule button in the New/Modify Threshold dialog box. Figure 29. OCC Schedule Dialog Box By default, monitoring will poll the system for violations every 5 minutes, 24 hours a day, and 7 days a week. Use the Schedule dialog box to specify a schedule according to your business requirements. The default Poll Interval value is 5 minutes. This means that the OCC monitoring process on the HPE NonStop host will check for object state changes every 5 minutes. The unit for Poll Interval can be changed from minutes to seconds or hours. The frequency can also be changed within the range of 01 to 59, giving a possible range of 1 second to 59 hours for the time between violation checks. The daily default Start Time and Stop Time are 00:00 and 23:59, respectively. This indicates that monitoring will be active throughout the day, based on the HPE NonStop system time. You can enter a different monitoring start time and stop time by entering the appropriate hours and minutes in the Start Time and Stop Time boxes, respectively. Using the Start Time and Stop Time options and creating separate threshold records can monitor the same object monitored for different thresholds during different periods. Other uses would be to monitor the same object for the same threshold, but for discrete periods, or on different days by making two different threshold configurations. However, if you have a need to use a complicated schedule, it is better if you select the “Use Extended host schedule” box and use that feature instead. By default the thresholds are monitored continuously seven days a week using the All check box in the Days area. You can select specific days using the check boxes for different days of the week. 30 If you select the Use Extended Host Schedule check box, you will be presented with a new screen for defining the schedule. Figure 30. OCC Schedule Dialog Box Using the Extended Schedule feature, you can define complex schedules (outside of the OCC) and then use them for your thresholds. This window allows you to specify the polling interval and the schedule ID number. This is a 6-digit number that is defined in the SCHEDULE file. The SCHEDULE file is an edit file you maintain in the OVNM subvolume, along with the HOLIDAY file. There are sample files that are included with OVNM called SAMPSCHD and SAMPHOLI. NOTE: The Extended Schedule feature is available for all subsystems except the EMS and Scheduler subsystems. SCHEDULE FILE The SCHEDULE file must contain the definition of any Extended Host Schedule before you can specify it in the OCC. The SCHEDULE file supports a variety of methods to define a particular schedule ID. The Schedule ID will be listed in the first 6 columns of the file - and it must be exactly 6 digits. Only numbers are allowed, alphabetic and special characters are not allowed. And the Schedule ID must be followed by a colon (:). The information that follows the Schedule ID defines when the schedule would be active or inactive. An individual Schedule ID must be defined on a single line of text, although you can combine Schedule IDs to create complex schedules. An exclamation point (!) designates that everything on the line that follows is a comment and should be ignored. You should define the conventions first that will be used when defining Schedule IDs. For example - you should plan on supporting compound schedules. You may want to designate the range of schedule IDs from 000001 to 001000 (1 to 1000) for the simple schedules. These could be used within a compound threshold, but (if you decide) never by themselves (so they can be changed without worrying about altering when a particular threshold will be active). You may want to designate a range of IDs for weekly schedules, monthly schedules, year-end schedules, holiday-based schedules, etc. You may want to designate a range of IDs for particular applications - so Payroll can have a range, Distribution will have a range, File Transfer will have a range, etc. Or you may want your schedules based on the type of schedule - jobs that run Monday through Friday, jobs that run only on weekends, job that run only after standard working hours, third shift jobs, etc. But, you should spend some time planning the range of numbers that will be used for what purpose. And ideally, the Schedule IDs would be kept in sequential order within the SCHEDULE file. Once you have created the conventions for what number to assign to the ID, you have to define what the schedule will look like. • Days of the week are abbreviated as Mon Tue Wed Thu Fri Sat and Sun. • Commas are used to create a list (Mon, Tue, Wed) • Hyphens are used to define a range (Mon - Wed or 10:00 - 15:00) • Times are entered in a 24-hour clock format (00:00 thru 23:59) 31 • If no time is entered, it assumes the time is 'all day'. • You can exclude holidays by creating a Holiday Schedule ID and then using EXCEPT SCHEDULE <holiday schedule ID> when defining the Schedule ID. The Holiday Schedules are defined in the HOLIDAY file. • You can merge schedules by using OR. For example, 001000: sched 000103 or sched 000104 or sched 000105 HOLIDAY FILE There are many times when systems are brought down for maisntenance or do not run on national holidays. If you have thresholds that will alert you when the application is not running, you do not want to be alarmed if the application is supposed to be down. This is what the HOLIDAY file is used for. You create a Holiday ID and then define the dates that are part of that holiday. The Holiday ID can contain numeric and alphabetic characters and the underline (_). The Holiday ID is followed by a colon just like in the Schedule file. If a particular holiday always falls on the same DATE (like January 1), you can enter Jan 01 and every January 1st will be considered a holiday. If your holiday date changes from year to year, you will need to edit the holiday file each year to account for that. If this is needed, it is recommended that you enter 2-3 years into the future so you don't have to rush to change this file during a 'freeze' period. You will need to remember to update it each year, but the updates could be performed at any time. Once you have completed your changes to the SCHEDULE or HOLIDAY files, you need to run the ZTCHGSCH Tacl routine. This routine will edit your changes and if there are no errors, it will send a message to the monitoring program informing it of the changes. For more information about this, see the appendix in the User and Installation guide that describes the use of the ZTCHGSCH Tacl routine 32 Monitoring Monitoring is inactivated by default on the HPE NonStop host when OCC is started. The OCC Monitoring Gateway is responsible for the overall monitoring. When any object’s monitoring is started, OCC forwards the appropriate commands to the OCC Monitoring Gateway, which further reads the information from the Objects database and starts the monitoring process. The HPE NonStop host will do the monitoring as per the checks specified for the threshold configuration. The initial monitoring status of the configuration can be specified using the Monitoring box in the Threshold dialog box while creating a threshold configuration. Figure 31. OCC Threshold Dialog Box with Monitoring Box The objects can be in two different states. The two different states are as follows. • Active: This option activates monitoring for the objects that are to be monitored at a particular time of the day. OCC polls each configured object to check for any violations. • Inactive: This option inactivates monitoring for the objects that are not to be monitored at present and OCC will temporarily stop polling the configured objects for any violations. This is the default option. First, the HPE NonStop host checks for the value in the Monitoring box. It will proceed with monitoring only in case the value has been set as Active. If the value in the Monitoring box is Inactive, it will skip monitoring for that object and move on to the next one. Next, it checks for the parameters like Poll Interval set in the Schedule dialog box when the threshold was created. Depending on the values specified in this dialog box, it will proceed with the appropriate actions assigned for that object. Refer to the Scheduling section for more details on the various parameters in the Schedule dialog box. NOTE: Inactivating the monitoring is considered as a Pause in the monitoring process. This means that OCC will stop issuing events for the objects in the Violation State and the database will not be modified. If at the time of inactivation the object was in a violation state, the state after activation will be the same as before inactivation, even though the object could be in a normal state now. This situation will be in effect until the next poll interval. This is applicable for inactivating at the object, configuration and system levels. 33 Monitoring can be specified at three different levels; the overall monitoring of the Node, the Threshold level, and the Object level. The commands through which you can configure monitoring can be accessed using the Monitoring menu, the Monitoring bar and the right-click menus of the Threshold and the Objects pane. • Node Level Monitoring: You can configure the overall monitoring of a node by using the Activate Node Monitoring and the Inactivate Node Monitoring commands. These can be accessed from the Monitoring menu and the Monitoring bar. Only one of the two options is enabled at a given time. Selecting any one of the options automatically disables the other. • Threshold Level Monitoring: Monitoring for a selected threshold and all its corresponding objects can be configured using the commands on the Monitoring menu (Activate Config Monitoring, Inactivate Config Monitoring), the Monitoring bar (Activate Configuration Monitoring, Inactivate Configuration Monitoring), and the right-click menu of the Threshold pane (Monitoring Active, Monitoring Inactive). Only one of the two options, activating or inactivating is enabled at a given time. Selection of one disables the other. • Object Level Monitoring: You can configure the monitoring of selected Object(s) by using the Activate Object Monitoring and the Inactivate Object Monitoring commands in the Monitoring menu and on the Monitoring bar. This action can also be performed using the Monitoring Active and Monitoring Inactive commands in the right-click menu of the Objects pane. Only one of the two options, activating or inactivating is enabled at a given time. Selection of one deactivates the other. 34 Actions Once thresholds are defined, OCC continuously and automatically monitors your chosen system resources and system objects. If a violation is detected, indicating that a system object is no longer in the desired operational state, OCC immediately triggers pre-programmed action(s). Pre-programmed actions can include: generation of an EMS event message, transmission of e-mail alerts to support personnel and/or execution of automated recovery scripts to correct the original fault. You choose the type of action you want to execute for each violation, however, OCC will always generate an EMS message. To access the Actions dialog box, click the Actions button in the Threshold dialog box. Figure 32. OCC Actions Dialog Box The various types of actions have been described in this section. • EMS Alerts • E-Mail Alerts • Recovery • eEvents 35 EMS Alerts OVNM always generates EMS alerts in response to threshold violations. EMS alerts can be configured using the Alert tab page in the Actions dialog box Figure 33. OCC Actions Dialog Box Alert Tab Page The Exception section of the Alert tab allows you to adjust the initial violation, repeat, and escalation event messages. The Severity box allows you to set the internal OVNM severity levels as Critical, Major, Minor, Warning, or Info for the violation messages generated in response to the threshold violations. NOTE: The default severity level is Critical. Severity is shown in the EMS message. This value also dictates what severity will be displayed in ObjectMap and ObjectStats. Note that the severity on this panel does not affect the severity COLOR shown in Console. That value is based on the value in the eEvents panel. You must be aware of the value in the Tools, Options, Keep, and Severity in the Sync option. Based on how that is set, changes to this field may or may not be automatically transferred to the Violation Severity field in the eEvents panel. You determine how frequently the Exception Event should be generated using the Repeat Every box. The default value is 9 minutes, but the unit can be changed to seconds or hours and the required frequency value can be entered as desired, from 00 to 59. Entering a value of 00 allows only a single exception Event to be generated. The polling interval specified in the Schedule dialog box determines how often OVNM checks the object state when the object is in the normal state. The Repeat Every interval determines how often the violation message is generated. The object will always be checked based on the polling interval. So if the polling interval is 5 minutes and the Repeat Every interval is 15 minutes, the object will be polled every 5 minutes regardless of its current state (normal or in violation). However, OVNM will only report it as in violation, once every 15 minutes. As soon as it determines it is back to normal, it will generate a ‘back to normal’ EMS message. This feature is not currently available for EMS-driven thresholds. Repeat messages are not generated until the Repeat Every interval is exceeded, so it is recommended that this value be a multiple of the polling interval. The selection of the Escalate check box determines when the first Escalation Event is generated after the initial violation, by specifying data in the Log Escalation Event After box. Once Escalation Events are being generated 36 for a violation, Exception Events are no longer generated. The default value is 30 minutes, but the unit can be changed to seconds or hours and the required frequency value can also be specified, from 01 to 59. It must be greater than the Poll Interval value and must be greater than Repeat Every IF Repeat Every is not zero. By setting the Repeat Every value to zero, OVNM will only generate an alert when the object goes into an abnormal state and when it has continued to be in an abnormal state for time specified by Log Escalation Event After. This feature is not currently available for EMS-driven thresholds. The behavior of AO for escalation event in case of Repeat Int: 00 When the Repeat Interval is 00 min and the Escalation Int is 2 mins, the ORMCOM is logging escalation event in every 2 mins 13-12-30 02:07:06 \VEGAS.$VOM01 *TANDEM.OVMON.H01 002474 OVNM: File \VEGAS.$DATA01.USER.TEST1, Escalation If : File^eof Greater Than 0, Current : 2098, Current State = Critical, Prev State = Critical, Sampling Int = 30 SECS 13-12-30 02:09:06 \VEGAS.$VOM01 *TANDEM.OVMON.H01 002474 OVNM: File \VEGAS.$DATA01.USER.TEST1, Escalation If : File^eof Greater Than 0, Current : 2098, Current State = Critical, Prev State = Critical, Sampling Int = 30 SECS, Escalation int = 2 MINS When an Escalation event occurs the event will have a unique Event Number, and the text Escalation will be included in the original violation text. You have the option of sending an email (assuming Email server is configured) in case of an escalation. For details, refer to Email Alerts. Specifying Unique Escalation Actions It is also possible to perform different actions for the escalation event that OVNM generates. If you have specified the Log escalation event after time period, you can create a separate EMS threshold for that event and then define unique actions, Emails and/or messages to the Enterprise Management system. Normally, you will define everything you need to on the original threshold definition. But when the object has been in a violation mode too long (has reached its escalation time) and you need to take a different action, by creating an EMS threshold on the OVNM-generated EMS message, you can specify different activities. The activities defined on the original threshold (email and auto-recovery) will still happen – these ‘escalation’ activities will happen in addition to those. To use this feature, configuration changes must be made to the OVNM configuration file OCCCONF. To use this feature for Email and recoveries, you must EDIT and add the CHECKALLEVENTSFOR ACTION parameter to the OCCCONF file. SET OCC CHECKALLEVENTSFORACTION YES This line must be placed between the Customer Changes #1 lines in the OCCCONF file. Without those lines, EMS violation messages that are generated by OVNM will NOT be checked to determine if there are EMS thresholds defined. The standard process is for OVNM to ignore its own events for that function. An EMS threshold for the OVNM-generated escalation event needs to be added via the Object Configuration Client. The escalation event numbers can be found in Threshold Events section of the Object Reference guide. The SSID will be TANDEM.OVMON. While creating the EMS threshold, you can use the normal process for defining the email, recovery and/or eEvent message that will be used for the escalation event. Please note that on the Email page, there is a check box for Mail on Escalation Only and Mail on Normal. Neither of these options actually applies to EMS thresholds. These options are no longer available for EMS thresholds with OVNM 5.3.2 onwards. In addition to specifying additional email and/or recovery options for the Escalation event, you can also alter the message that is sent to the Enterprise Management system (the eEvents panel). But in order for this to work, you need to add the same CheckAllEventsForAction parameter as above to the OVNMCONF file, between the Customer Changes #1 lines. In this case, you will use SET OVNM instead of SET OCC. Note that if you use this option, the 37 message defined in the normal threshold will be overridden with the message defined in the EMS threshold – you will not receive two messages in the Enterprise Management system. This does allow you to have one message for the standard violation alert (and repeated alerts), a different message for the ‘back to normal’ event and a third message for the Escalation event if you create 2 EMS thresholds (one for the violation alert and one for the escalation alert). 38 E-Mail Alerts Once thresholds are defined, OCC continuously and automatically monitors your chosen system resources and system objects. If a violation is detected, indicating that a system object is no longer in the desired operational state, OCC immediately triggers transmission of e-mail alerts to support personnel. This is to notify the concerned people that manual corrective actions need to be taken. You can also configure to send e-mail alerts when the object returns to its normal state. The e-mail alerts can be configured using the Mail tab page in the Actions dialog box, which can be accessed using the Actions button in the Threshold dialog box. Figure 34. OCC Actions Dialog box with Mail Tab Page The e-mail feature is disabled by default. To enable e-mail escalations in case of a violation, you can use the Mail on Violation check box. Use the Mail on Normal check box to enable e-mail alerts when the object in violation returns to its normal state. After enabling the feature, if you deselect the check box, e-mail alerts will be suspended. Use the To box to specify the e-mail addresses, profile names or the distribution list to whom the alerts should be sent. If multiple addresses are used, use commas and/or semicolons to separate them. The To box can accept 240 characters. It is mandatory to fill-out the information in this box. In the Subject box, you need to specify the subject for the e-mail. The text in this box should not exceed 80 characters. It is mandatory to specify the subject for a mail. The Repeat Count box allows you to specify the number of e-mail messages to be sent in case of a violation. These e-mail messages will be sent while the object remains in violation and the counter value will be cleared once the object goes to the normal state. If the object goes in a violation state again, e-mail messages will be sent until the Repeat Count value is reached. The default value is set to 2 and can take a value in the range of 1-32767. NOTE: The Repeat Count value does not apply to the EMS subsystem thresholds. In this case, e-mail messages will be sent to the specified recipients whenever a violation condition is met, unless the Burst Definition data is configured. The actual message text to be sent is specified in the Violation Message box in case of violation and the Normal Message box when the object comes back to the normal state. You can type a maximum of 1024 characters in this box. But with substitution, the maximum size of the text can be 2048 bytes. The Mail on escalation only check box can be selected to allow OVNM to send e-mail alerts only when an escalation event is generated. This suppresses the email sent for a violation, but still allows the email on normal. Even though this check box is available on EMS thresholds, it is not supported since there is no way to define an ‘escalation time period’ for EMS thresholds. 39 The message text supports a list of parameters, which can be accessed using the Parameter list link. Clicking the Parameter list link displays the Substitution Parameters dialog box. This lists all the parameters that can be substituted during message construction. To use a parameter, select it from the list and Click the Insert button. Figure 35. OCC Actions Dialog Box Mail Tab Page with Substitution Parameters For example, if the file name is taken from the variable %s%, the Subject token will contain the file name that is in violation. The same is true of the Node (%n%) and the Current Value (%cv%) of the threshold being checked. In this case the violation will be for a file becoming full and %cv% will contain the current percentage size of the file being monitored. This type of substitution is very generic simply because the substitution parameters provide all the information, therefore this message will suit all file full monitoring violations. The description for these parameters is given in Appendix E: Substitution Parameters. These parameters are supported in the Violation Message, Normal Message and the Subject fields. The parameters are case insensitive and need to have the % symbol typed in both the sides as denoted. 40 Recovery One of the most important features of OVNM OCC is Recovery, which triggers automated actions in case of a violation. You can define the recovery actions to be taken for different violation conditions. This feature is disabled by default and has to be enabled manually. Recovery can be activated or inactivated at the configuration and the object level using OCC. • Threshold Level Recovery: To initiate recovery at the configuration level you can use the Activate Config Recovery and Inactivate Config Recovery options in the Recovery menu. These two options can also be accessed using the Activate Configuration Recovery and Inactivate Configuration Recovery icons on the Monitoring toolbar. • Object Level Recovery: To activate or inactivate recovery at the object level you can use the Activate Object Recovery and Inactivate Object Recovery options in the Recovery menu. These options are also available as the Activate Object Recovery and Inactivate Object Recovery icons on the Monitoring toolbar. Recovery can be enabled manually using the Action tab page in the Actions dialog box. Figure 36. OCC Actions Dialog Box Action Tab Page You can select the actions to be executed in case of a threshold violation using the first Command box. The default value is None, which indicates that no recovery action will be triggered. Selecting the User defined command option enables a second Command box, where you can enter the command to be executed. You can specify any command that can be executed from a TACL prompt, like TACL command, TACL macro or Command Line Utility/Program; in the User-defined command option. For more details please refer to Log Success/Failure of User Defined Command for Recovery section in the OVNM User guide. To use substitution parameters in your command, click the Parameter list link. There are also many thresholds that have pre-canned recoveries in the drop down list. Not every threshold has these, but if they do, you should think about using these instead of writing your own recovery. A generic ‘recovery’ option for all thresholds is “turn monitoring off/on for group/subgroup”. This is typically used with EMS thresholds to automate the function of turning monitoring off or on for a set of objects. Using this feature, you can group a variety of objects into the same group/subgroup and then create an EMS threshold for a specific event that would use the Turn monitoring off for group/subgroup. When the EMS event is generated, OVNM will consume it and automatically turn monitoring off for all objects that have the same value for group and subgroup that was specified in the recovery. The same mechanism can be used to turn monitoring back on. This is quite useful when you have a planned outage and do not want to send alerts or perform recoveries for objects you know are going to be down. Another option instead of using EMS thresholds is to use the ZTALTMON Tacl utility. This is described in more detail in the User Guide, in Appendix C: OVNM Utilities. 41 You can schedule recovery 24 hours, seven days a week using the 24x7 option button in the Schedule section. Define a customized schedule using the User Defined option button, which enables the Schedule button. Clicking the Schedule displays the Schedule dialog box. Use the various options available on the Schedule dialog box to specify a customized recovery schedule. Figure 37. OCC Recovery Schedule Dialog Box The default Delay Interval value is 05 minutes. This means that the OVNM recovery process on the HPE NonStop host will check for object state changes every 5 minutes. The unit for Delay Interval can be changed from minutes to seconds or hours. The frequency can also be changed within the range of 01 to 59, giving a possible range of 1 second to 59 hours for the time between violation checks. The daily default Start Time and Stop Time are 00:00 and 23:59, respectively. This indicates that OVNM recovery will be active throughout the day, based on the HPE NonStop system time. You can enter a different recovery start time and stop time by entering the appropriate hours and minutes in the Start Time and Stop Time boxes, respectively. By default the thresholds are recovered continuously seven days a week using the All check box in the Days group box. You can select specific days using the check boxes for different days of the week. Select the Next scheduled day check box to start recovery on the next day scheduled. You can activate or inactivate recovery using the Recovery box in the Action tab page. The Log area is used to specify the message log to be generated if the recovery is a Success or a Failure. The three options available are None, User Text and Default. If you select None, no message will be generated. You can specify the text for the message by selecting the User Text option or log the default message using the Default option. For details on various recovery methods, refer to Recovery Methods section in the Object Reference guide. eEvents OVNM provides direct correlation and formatting facility for leading Enterprise Management Console solutions provided by Tivoli, HPE OM and/or SNMP. Each one of these Enterprise solutions supports specific event information in the event that triggers the user-defined policies at the Enterprise level. For instance, HPE OM view makes considerable usage of the Service area impacted by the failure. This information can be predefined and formatted by OVNM, before it is presented to the HPE OM. Similar enhancements to support Tivoli TEC and HPE 42 Operations are also available. The event translation and forwarding facility is designed to support any event produced on the HPE NonStop platform to be forwarded to the Enterprise Management system. This feature is available for all thresholds. The eEvents tab page allows the user to achieve the following using the various radio buttons. • Disable Events: This option can be selected to disable the forwarding of the events. This option is selected by default. A new default value can be defined in Tools/Options by selecting the default Enterprise Management system. • HPE OM/OVO: Select this option to forward the events to the Console or the HPE OM interface. • Tivoli: Select this option to forward the events to the Tivoli Management console. • SNMP: Select this option to forward the events to the SNMP Adapter console. The other fields are displayed on the tab page depending on the radio button selected. Figure 38. OCC Actions Dialog box − eEvents Tab Page 43 The eEvent Status drop-down box allows the user to specify the action to be performed on the event. • ACTIVE: If selected, this option will allow the processing of the message as described in the eEvents tab page and send the message to the Enterprise console. This is the default option. • INACTIVE: If selected, this option will not apply the instructions defined in the Events tab page. The overrides will not be applied to the message but the message will still be sent to the Enterprise console with the default EMON formatting. • DROP THIS EVENT: If selected, this option will not forward the message to the Enterprise console. This will block the message from being forwarded. No other information needs to be provided when this option is selected. • CUSTOM: This option is available only when the Tivoli option is selected and the customized message is forwarded to the Tivoli Management Console. OVNM allows logging of any user message with user supplied class and/or user supplied slots. The CUSTOM option allows the user to define the message class and its slots. During message construction, the user can use a static text, supplied substitution parameters or any standard/user token value of the actual EMS message. The format to define the message layout is simple and follows the below mentioned convention. MsgClassName; soltName=’slotVal’; slotName=’slotVal’; …………………… …………………… slotName=’slotVal’; Where, slotVal could be a static text, supplied macro or User/Standard EMS token Figure 39. OCC Actions Dialog Box Events Tab Page – CUSTOM eEvents Status In the example above, the message class will be set to HOST_MRO_OPS. The severity slot will be set to CRITICAL. The msg slot will be set to the first 256 bytes of the message text. The msg_type slot will be set to ‘actionid: Value of the supplied token’. The location slot will be set to the ‘collName: Value of the supplied token’. The value of the ownership will be set to ‘Process: Value of the supplied token’. If the Append mode check box is selected, the slots will be appended to the standard message format and the message class will be decided using the cdf file conditions. The Violation Severity box allows you to change the severity of a message before it is forwarded to the Enterprise console. These severity settings match those available for the Enterprise console selected. 44 The options available for HPE OM/OVO and SNMP are as follows: • CRITICAL • MAJOR • MINOR • WARNING • NORMAL • ORIGINAL The options available for Tivoli are as follows: • FATAL • CRITICAL • MINOR • WARNING • HARMLESS • ORIGINAL The severity value of the message will be overridden with the specified value if any of the Severity options other than ORIGINAL is selected. If ORIGINAL is selected, severity override will take place and the value specified in the Action panel is used. The value specified on the eEvents panel impacts the value that is used in the Console and the Enterprise Management System. If the Tools/Options/Keep Severity in the Sync option is turned ON, then any change here affects the value in the Action panel. If that option is turned OFF, then it is possible to use a different severity in the Enterprise Management System and Console, then the value displayed within the text of the EMS violation message. Specify the Object Name, Manager Name, Customer Name, Location, Service ID, Message Group/Layer and Event Text Replacement in the various fields available. The Insert from file link on the eEvents tab page allows loading the message format from a saved template file. This is a .txt file that contains information to specify the Custom message format. This allows you to define a common format that can then be used for many thresholds without having to enter the same text over and over again. 45 Click the Parameter list hyperlink to view the Substitution Parameters dialog box. All the Supplied macros that can be substituted during message construction are displayed. Figure 40. Substitution Parameters Dialog Box The Token list hyperlink displays the Event Token Numbers dialog box. The dialog box displays a list of tokens. Figure 41. Event Token Numbers Dialog Box All the displayed tokens in the list are from the standard zspic C header files. These files are installed by using the Host Installation Client (Tools Get Token Files). Third party C header files can be added as well using the same procedure. 46 EMS Actions ObjectMAP Polling and escalations are not allowed for EMS thresholds as they are driven by EMS messages and not by polling at certain intervals. ObjectMAP is an application that brings real time and customized monitoring of object states at the Group, Sub-Group, System, Subsystem, Threshold and Object levels for your Enterprise. NOTE: The ObjectMAP tab page is displayed in the Actions dialog box only when the EMS subsystem is selected. This tab page is used to define how to add, update or delete objects from the ObjectMAP GUI that are triggered by EMS thresholds. Figure 42. OCC Actions Dialog Box ObjectMAP Tab Page Select the Do not map event radio button in case the event is not to be mapped. That is the default – so if you do nothing with this screen, EMS thresholds will not show up on ObjectMap. To define how to add or update information on ObjectMap for EMS thresholds, select the Add/Update radio button. The Delete radio button is used to specify the conditions that would cause an object to be deleted from ObjectMAP once they are met. The other fields on the tab page get enabled when you select the Add/Update or Delete radio buttons. To map an event using default attributes, select the Map event using default attributes radio button. This is the default option. The event can also be mapped using rule numbers using the Map event using rule number radio button and specifying the number in the corresponding field. Knowledge of RDL (Rule Definition Language) is required to use this feature. RDL is used to write the code for the rule. This is included primarily to support people who used PNA – not for new OVNM customers. To map an event using the subject or the manager token number, select the Map event using radio button and specify the subject and manager token numbers in the Subject token number and Manager token number boxes, respectively. 47 Selecting the MAP event using radio button also activates the Lookup token numbers hyperlink. Clicking the hyperlink displays the EMS Event Token Numbers dialog box. Figure 43. EMS Event Token Numbers Dialog Box This dialog box can be used to select the Subject Token Name and Manager Token Name to get the corresponding values in the Subject token number and Manager token number fields. Figure 44. OCC Actions Dialog Box ObjectMAP Tab Page NOTE: The token information is taken from the files, which can be imported using the Tools - Get Token Files option in the OVNM Host Installation Client. For details, refer to User guide. You can also specify the duration for which the object is to be displayed in ObjectMAP using the Auto-remove object check box. This is used if there is no event generated that can be used to remove the violation from ObjectMAP. Using this option allows you to automatically have items removed from ObjectMAP. The risk of using this option is that an item could be removed before it has actually been resolved. Select the After radio button and specify the number of hours or minutes after which the object is to be removed from the map. Selecting the At time option allows you to specify the time when the object is to be removed from the map. 48 The Group Name and Threshold name boxes are used to specify the group and threshold names, respectively. These fields must match to link the UP and DOWN EMS messages. These values will be displayed in ObjectMAP. NOTE: The initial messages generated by OVNM after checking the status of objects for the first time allows the current state of the object to be mapped to the ObjectMAP. In case these messages are causing you problems, then the SkipEMS: Yes option or SkipEMS: All options can be used to suppress the first EMS message. The SkipEMS: Yes option suppresses the first EMS message if the object is in Normal state and the threshold has been defined with the eEvents pane. The SkipEMS: All option suppresses the first EMS message if the object is Normal regardless of whether or not an eEvents record was defined. The default is value is set as SkipEMS: Yes. To change this option you need to edit the MONCONF file and create a CUSTCHGS Tacl routine. For more information about how to create the CUSTCHGS routine, refer to Appendix Q in the User Guide. The EMSON utility turns the flag ON for every EMS threshold. This enables OVNM to send ALL the EMS thresholds to ObjectMAP, even if the Map Event to ObjectMAP check box has not been configured for that threshold. To run the EMSON utility, execute the run EMSON / in <your ORMCONF file>/ command at the TACL prompt. NOTE: In case of linked EMS thresholds, the DOWN object state is displayed in the ObjectMAP until an UP event is detected by OVNM. Once an UP event occurs, the DOWN state is deleted from ObjectMAP automatically. However, if the DOWN and UP states of the EMS thresholds are not linked then once the DOWN event is detected, it will be displayed in ObjectMAP and will not be deleted until a manual action is taken. 49 eBurst OVNM provides the facility to define the burst criteria to be used to suppress the burst of EMS messages. The eBurst criterion is linked to an individual EMS threshold. The eBurst tab page in the Actions dialog box is displayed only when the EMS subsystem is selected. Figure 45. OCC Actions Dialog Box eBurst Tab Page • eBurst Panel : This is the panel you will use to define how a burst should be detected. You have the option of processing all of the messages until a burst is detected or ignoring all of the messages until a burst is detected. If you check None, the Burst Definition record will be deleted (if one existed). • Process Until Burst: Use this option if you want the first EMS message to cause an email, recovery or message sent to Console and the Enterprise Management system (such as HPE OM). This option will process every EMS message until the burst is detected. • Ignore Until Burst: Use this option if you do not want any of the EMS messages processed at all until an excessive number of them are seen. For example, if an application generates error messages occasionally, and you don’t care about them until more than 100 of them are generated in short time duration, then you would use this option. Using this option will prevent emails, recoveries and messages to Console and the Enterprise Management system until an excessive number are consumed. • Burst = x events within y minutes: This is the actual burst definition. This describes how many events in what time frame need to be consumed before a burst is declared as active. • Event Subject BLANK: If you leave this field blank, the burst detection logic will not consider the value in the subject of the EMS message when creating ‘burst threads’. In this case, all events from the same SSID, regardless of the subject will be counted towards the burst. The ‘subject’ of an EMS message is defined as the one with the ‘subject token’ marker. For example, TANDEM.PATHWAY TCP stop EMS messages will contain the name of the TCP as the subject. You must determine what the subject of an EMS message is before using this feature – some applications do not use what you might expect to be the subject. To determine the token that contains the subject marker, you can use EMSA, or some other utility that shows the subject marker. ASTERISK: If you enter an asterisk, you are asking OVNM to maintain separate burst threads for each unique subject. So if Pathway generates 100 TCP down EMS messages, one for each TCP, then OVNM will create 100 burst threads, each with a count of one event. Therefore, no burst will be detected, since only one EMS message was consumed for each individual subject. 50 A SPECIFIC VALUE: If you enter a specific value here, only the EMS messages that also match the subject you specified will be considered when deciding if there is a burst. • Reset: This is used to define when the burst should be considered as expired. Once a burst has been detected, no more EMS messages will be processed until after the amount of time defined in this field. The start of the burst will be defined as the EMS generation time of the first EMS message that is part of the burst criteria. So if the burst is defined as 5 messages in 5 minutes, the reset time is defined as 30 minutes, and the very first EMS message is generated at 12:00, 2 more at 12:02 and 2 more at 12:03 (5 total), the reset time will be at 12:30 – 30 minutes after the first message that was part of the burst criteria. Using the same burst criteria, if a message was consumed at 12:00, 12:01, 12:02, 12:04, 12:06, 12:08, 12:09; 12:10: 12:10, then the first message that is part of the burst will be at 12:06, the burst detected message would be generated at 12:10 (the second 12:10) and the burst will be ‘over’ at 12:36. • Generate start/end EMS burst notification messages: If this check box is checked, then both ACC ($OVOCC) and EMON ($OVEMN) will generate EMS messages when they detect a new burst and when the burst expires. If this box is not checked, then these messages will not be generated by OVNM. EMS Burst Suppression Considerations The following methods can be used to suppress duplicate EMS messages from being processed and/or sent to Enterprise Managers. 1. Collector Level Burst Suppression The first method involves suppressing the duplicate EMS messages at the collector level. You will need to use EMSCCTRL to configure this option. This method eliminates the workload from OVNM to implement burst suppression. Refer to the appropriate HPE documentation for more details. 2. EMS Distributor Level Burst Suppression The second method involves suppression at the EMS Distributors that are used by OVNM. This method also eliminates the workload from OVNM to implement burst suppression. Refer to the appropriate HPE documentation for details. 3. Object Configuration Client Level Burst Suppression The Object Configuration Client can be used to define the EMS burst definitions for each EMS threshold where burst suppression should be used. Burst suppression requires an EMS threshold to be defined . When you create an EMS threshold, you specify the SSID, Event number and any other attributes that describe the event(s) you want captured. The Object Configuration Client allows you to use wildcards in various portions of the threshold definition. For example, you can create an EMS Threshold for the SSID TANDEM.PATHWAY and all events (*). You can specify that the event text needs to contain a particular string. All of these attributes are used to determine whether or not the EMS message should be processed by OVNM, and what actions should be performed. You can configure it to send an email, or perform an automated action (user-defined command). You can also use the EMS threshold definition to define how you want the message sent to HPE operations Manager/Console or any other enterprise management system (using the eEvents panel). When OVNM is deciding whether or not an EMS message should be considered part of a burst, it will always compare the SSID and EVENT – regardless of how the EMS threshold was defined. So, for a given EMS threshold, there could be several “threads” of burst definitions. For example – if you define an EMS threshold for SSID TANDEM.PATHWAY and the event number you specify is an asterisk (all events), then each unique event number that Pathway generates will be treated as a separate burst thread. So Pathway could generate 100 events and still not cause a ‘burst’, if each event has a unique event number. Burst criteria can also use the SUBJECT of the event. In the Object Configuration Client, if you enter a specific value in the Event Subject field in the eBurst panel, then only events with that subject will be considered when ‘counting’ EMS messages (regardless of how the EMS threshold was defined). If you leave the Event Subject blank, then subject will NOT be used when counting events – in other words, only the SSID and Event Number will be used when counting events. In that scenario, ten events with different subjects will all be counted in the same bucket (or burst thread). If you enter an asterisk into the Event Subject field in the eBurst panel, then each unique subject will be treated independently. So if we use the TANDEM.PATHWAY example again, and you are capturing TCP down events, then a given TCP will have to generate enough of the down events for OVNM to consider it a burst. If you have 100 TCP’s and they all go down, this would not be considered a burst since each subject would be different. If you want it to be considered a burst, then leave Event Subject blank. 51 When deciding whether or not you should define the Event Subject in the eBurst panel, keep in mind how your EMS threshold was defined. If you used the EVENT SUBJECT or EVENT SUBJECT MANAGER condition when defining the threshold, then you may not need to specify anything in the eBurst panel for Event Subject since the threshold criteria is already limiting which subjects are processed. Since a given EMS threshold could have several or even hundreds of separate burst threads, you might have to adjust some parameters. These parameters need to be defined between the CUSTOMER CHANGES #1 lines in the OCCCONF and OVNMCONF files. Burst definitions are used by BOTH halves of the OVNM application – the recovery/email portion (ACC) and the Enterprise/Console portion (EMON). THREADTABLECOUNT is used to define the number of entries to be used in the burst thread table. The default value is 100. This means that OVNM will support up to 100 individual/concurrent burst threads at a time. If you need more than that, you will need to add a SET statement to the OCCCONF/OVNMCONF files. If this value is too small, OVNM will generate Event 142 “Burst Thread Table is full. Increase THREADTABLECOUNT.” After you increase the value, you will need to bounce OVNM for the change to take effect. BURSTLINKCOUNT is used to define the number of entries in the burst link list table. For each unique Burst Thread, an entry will be added to the burst link list for each EMS message received before the burst is declared. These entries are rather small and consist of the time that the EMS message was generated. So if you expect 20 individual burst threads, and each of your EMS threshold eBurst definitions say that the burst requires five messages, then this value will have to be at least 100 (20 * 5). If this table fills up, OVNM will generate EMS Event 143 “Burst Link List Table is full. Increase BURSTLINKCOUNT." When setting the values for THREADTABLECOUNT and BURSTLINKCOUNT you should always leave plenty of extra room. If either of those tables becomes full, the burst definition feature may not work properly. BURSTCLEANUP-INTERVAL is used to tell OVNM how often to spin through the various tables to delete entries that have expired (are longer than the burst reset time or the “within” time of the burst definition). The default for this parameter is 1 hour (60 minutes). The value you specify here is in MINUTES. When this timer expires, OVNM will spin through all the burst tables and delete any entry that is no longer required. It will also check to see if there are any active bursts whose Max Burst Reset time has been exceeded. If so, that burst will be reset (and the end of burst message will be generated). Cleaning up the old entries will make room for new entries. This is really only important when events are consumed that are potential burst messages. When they are consumed, they will take up entries in these tables. If OVNM never sees them again, this is the only way to delete those entries. There are other parameters that can help improve the efficiency of OVNM as it processes EMS thresholds. EVENTRULEFILEREADLEVEL is a flag that signifies whether or not OVNM should maintain the contents of the EVNTRULE File in memory. This is the file that describes the EMS thresholds and is linked to the Burst Definition records. If this is not in memory, then every time an EMS message is received, OVNM must read this file to determine if the EMS message should be processed any further. EEVENTSFILEREADLEVEL provides the same function for the eEvents file. This is the file that contains the data from the eEvents panel in the OCC. When the memory feature is turned on, then changes to these files will NOT be recognized by OVNM for a period of time after the change was made. This is coded this way to reduce the likelihood of reading these files into memory multiple times as you are making updates. A parameter (UPDATE-WAITTIME-MINS) can be modified to adjust the wait time between the time the last update was made and when OVNM will re-read the files into memory. OVNM will re-read the file into memory once that number of minutes has gone by with no additional changes. In other words, if this is set to 5 minutes (the default), and you make a change every minute for 10 minutes, OVNM will not re-read the file until 15 minutes have expired since the first update – which is 5 minutes after the last update. With the default value, there will be at least a 5 minute delay between the time a record is changed and when OVNM recognizes the change. You can set this lower if you want, but if you set it too low, then OVNM could end up reading the file before you are actually done with your changes, causing it to re-read the file multiple times. If you do not have very many eEvents or EVNTRULE records, then it may make more sense to have a very small value (1 minute). If you have 1000’s of records, then you will want a higher value to limit the chances of re-reading the file multiple times. When making changes to this parameter, you need to add the SET statement between the CUSTOMER CHANGES #1 lines. If you make it to the SET statement that is already in the OCCCONF/OVNMCONF file, then the next time a change is made via the HIC or ALTROVNM, your change will be lost. When the BURSTDEF file is re-read into memory, all information regarding bursts is lost – everything is reset to zero, so you will want to be careful when making changes that impact the BurstDef file. When this happens, OVNM 52 will generate EMS Event 148 “Reloading burstdef file – all burst info will be reset”. In addition, any existing burst will end, but no ‘expired’ message will be generated – the internal tables are not reviewed before wiping them clean. If you have checked the “Generate start/end EMS Burst notification messages” check box in the eBurst panel, then OVNM will generate messages whenever a burst is detected and when the burst has expired (exceeded the reset time specified). Some of these messages will also include the number of messages that were suppressed. When it is a “process until burst”, only the burst-expired EMS message will contain the number of messages suppressed. For “ignore until burst”, both the ‘burst detected’ and ‘burst expired’ messages will contain the number of messages suppressed. This counter is reset whenever the EMS message is displayed and whenever the BURSTDEF file is re-read into memory. When the burst is detected, OVNM will generate event 146 (for process until) or 147 (for ignore until). The message will look like one of the following: Process Burst Detected SSID/Event: Ignore Burst Detected - TANDEM.PATHWAY.D44/1043 Subject: TCP1 Suppressed 9 events. TANDEM.PATHWAY.D44/1043 Subject: TCP1 When the “ignore burst” message is generated, it will show you how many events were suppressed since the last time its counter was reset. The counter can be reset after a BurstCleanUp Interval as well, so this count may not include every single EMS message that was suppressed prior to the burst being detected. The Subject will only be reported if a specific subject is involved in the burst. When the burst reset period ends, OVNM will generate event 144 (for process until) or 145 (for ignore until). The message will look like the following (Process Burst will be Ignore Burst for an ignore until burst definition): Process Burst Period ending - exceeded Reset Burst Period. Suppressed 1 events. SSID/Event: TANDEM.PATHWAY.D44/1047 Subject: TCP1 53 Group & Subgroup Management of Objects OVNM allows the user to manage objects in groups and subgroups. This feature allows the user to escalate objects to the EMS or Enterprise Consoles based on their location or business significance. For instance, all processes belonging to an ATM system can have a group name of ATM and SNAX objects can have subgroup names of SNAX. In order to display objects that reported events on SNAX and belonging to the ATM group, the user can take action against the objects in the group. You can classify and organize objects into groups and sub-groups depending on the business requirements using the Group tab page in the Objects Properties dialog box. For this, click the Object Properties link in the Threshold dialog box. Figure 46. OCC Object Properties Dialog Box Group Tab Page A default value will be used for Group/Subgroup unless a value is specified. The default value for Group is Subsystem Name, for example, ATP6100, BASE24. The default value for Subgroup is Object Type, for example, Line, Link, Process, Station, and System. The object states of the user-defined Group and Sub-Group can be viewed using ObjectMAP. NOTE: The change in the monitoring and recovery status, active or inactive, for a group/subgroup only impacts the objects and not the main configuration. The GROUP and THRESHOLD NAME specified on the ObjectMAP tab must match to link the UP EMS message to the DOWN EMS message. Those values will be displayed as group/subgroup in ObjectMAP. 54 Object Location OVNM allows the user to define a physical and logical location of an object that is being monitored. This is significant when OVNM shows an object in abnormal state. The operations staff can quickly identify the physical or logical location of the object. The facility allows the user to maintain the objects with their physical location and contact information. For example, the information for an ATM at 23 N. 1st St or Joe’s Trading Station in Building 5, can quickly assist the support staff to dispatch the nearest help to the user. The Location tab page in the Object Properties dialog box can be used to specify the location for the threshold being created. Click the Object Properties link in the Threshold dialog box to access the Object Properties dialog box. The information will include the name, phone number and complete address. The Comments field is read-only and can be edited using the Threshold dialog box. Figure 47. OCC Object Properties Dialog Box Location Tab Page copy 55 Maintenance An object is monitored for various policies and normally the object is always configured on the host system. However, in a transient situation like the daily transaction files, it is not possible to know what the object state will be from one day to the other. However, the policy to manage the object remains the same. For instance, a file that is transferred or created on a daily basis for transaction processing will get generated daily, and it might not be possible to configure the static name of the file object. However, once the file is generated, it is important that the file does not get full or corrupted, as defined by the policy. The Auto Maintenance facility automatically rediscovers new objects and applies the policy defined by the user. This can be done on a daily or an hourly basis depending upon the requirement of the user. The smallest rediscovery time-period is 30 minutes. Let’s take File Transfer as an example. Your application may receive files on a regular basis, several times a day. You want to make sure those files are configured in such a way that they never fill up. You can create a FILESYS/PERCENT FULL threshold using a template that describes where the files will exist. By using Maintenance, you will be able to define the frequency of auto-maintenance. At that interval, OCC will search for new files that are within that template and apply the PERCENT FULL threshold. If the files are transient and always have unique names, you would use the Rebuild option to prevent the system from monitoring files that will never exist again. By using this feature, you eliminate the need to manually tell OCC to rediscover new objects. NOTE: The Auto maintenance feature is not available for the EMS subsystem. Clicking the Advanced button in the Threshold dialog box displays the Advanced Options dialog box. The Maintenance tab page of the Advanced Options dialog box can be used to schedule maintenance and reconfigure the environment. Figure 48. OCC Advanced Options Dialog Box The Auto Maintenance list box provides the following options: • None • Rebuild • Update (add only) 56 You can remove all the objects and rebuild the environment or update the existing environment using the Auto Maintenance list box. Select the None option in Auto Maintenance to disable maintenance. You can also schedule maintenance using the Schedule section. Absolute Schedule allows you to specify the start time and days for maintenance. To schedule maintenance after a specified interval, select the Relative Schedule option button. Selecting the Relative Schedule option button enables the Interval box, which can be used to specify the time interval. NOTE: NOTE: Auto maintenance should be used responsibly. The lowest refresh time rate is 30 minutes, but you should decide if that is too frequent for the threshold that you are creating. Most of the times, a once-a-day refresh is adequate. In case you do not want to wait for OCC to automatically update the newly added objects to a threshold, you can use the Add New Object option in the Threshold menu to add objects to a threshold. The Add User Object dialog box is displayed where the object can be entered in the Object field. However, no other changes can be made, since all the other options are disabled. The auto maintenance feature is not available for the EMS subsystem and OSS.LOGFILE object class. 57 4 Working With Object Configuration Client Prerequisites The prerequisites for using OCC are as follows: 1. OVNM Backend Components Should be Running: In order to get the information from the backend and saving the information specified using the front-end, the OVNM backend components should be up. Use the following command to verify the status of the backend components. Switch over to the volume.subvolume, where OCC is installed before issuing the command. $ABC.OCCSUB>RUN STATOVNM 2. Elink Should be Up and Running: Elink is the communication channel between the HPE NonStop host and the front-end. Elink must be running for using the various features of OCC. The status of Elink can be verified using the NonStop Nodes Status window, which can be accessed by selecting the Start Programs HPE OVNM NonStop Server Tools NonStop Nodes Status menu option. Figure 49. OCC NonStop Nodes Status Window A Green icon next to the node name in the window indicates that the connection is established with the remote HPE NonStop Elink. In case the remote HPE NonStop Elink is not up, the icon will be seen in red. The Red icon also indicates that the backend applications are not running. The Elink status can also be monitored using the OCC Message/Log pane. 58 Managing the Environment The first step in defining, modifying or listing threshold configurations for one or more objects is to select the subsystems that you want to monitor for each HPE NonStop node. You can select the subsystems or their object types using the Managed Subsystems dialog box. Follow the steps below to modify the list of subsystems and their object types in the OCC window. 1. Click the Tools menu. 2. In the displayed menu, click the Managed Subsystems menu option. This displays the Managed Subsystems dialog box. Figure 50. OCC Managed Subsystems Dialog Box 3. Select the HPE NonStop node using the Node box. 4. The Configured subsystems box displays the list of subsystems, which can be managed by OCC. The subsystems already selected have a tick mark on the left side. To select or uncheck a subsystem, click the square box next to the subsystem name. A checkmark will appear next to each selected object. Click the check box again in case you want to deselect an entry. 59 5. Clicking the plus sign next to the subsystem names displays the list of object types for that subsystem. You can select the individual object types using the list. To close the list, click the minus sign next to the subsystem. Figure 51. 6. Managed Subsystems Dialog Box To save the selected options and to continue working in the same screen without exiting, click the Apply button. This way, you can save the entries for one node and then select a new node to configure. By clicking on the Apply button, all the changes that you have made will be saved, but they will be reflected only when you exit. Click the Finished button to save the current node’s settings and to close the Managed Subsystems dialog box. 60 Creating a Threshold Configuration Threshold configurations can be created using OCC. Creating a threshold configuration in OCC defines the acceptable operational values for a specific HPE NonStop object. These are the conditions that OCC checks when an object state is monitored. If the threshold conditions defined for an object become true, a threshold violation is said to have occurred. Each object can have different available threshold configuration conditions and possible settings for each threshold. OCC provides a set of default policies that are configured automatically while installing OVNM on HPE NonStop Managed server. Refer to Appendix D: Default Policies for a list of default policies. Follow the steps below to create a new threshold configuration. Step A: Getting Started The Threshold dialog box is used to create a new threshold configuration. To begin with the process, access the dialog box by clicking on the New Configuration option in the Threshold menu. The shortcut for the option is available on the Toolbar as the New Configuration icon. This displays the Threshold dialog box. Figure 52. OCC Threshold Dialog Box Step B: Selecting Nodes Use the Nodes area in the Threshold dialog box to select the nodes on which the configuration is to be applied. You can select individual nodes using the check boxes in the Node Name list or use the Select All button to select all the configured nodes. To unselect all the listed nodes, use the Unselect All button. The threshold configuration will be applied on all the selected nodes. 61 Step C: Entering the Object Details Use the various fields in the Object Details section in the Threshold dialog box to enter the object specifications. 1. Select the subsystem using the Subsystem box. The options available depend on the selections made in the Managed Subsystems dialog box. Refer to Appendix B: EMS Message Handling and Appendix C: OSS Log Handling for details on how to manage threshold for the EMS and OSS subsystems, respectively. 2. Specify the object type using the Object Type box. The options available depend on the subsystem selected. 3. Type in the object name using the Object box. You can either type in the object name or select from the list of the last five entries made. Wildcard characters are allowed for most of the subsystems. 4. Specify the manager name for the objects in the Manager box. The Manager box is not activated for all the subsystems. The objects belonging to subsystems such as SPOOLER, PATHWAY and SNAX typically have a manager associated with it. The Object and the Manager fields support wildcard characters. NOTE: Use of wildcard characters makes adding objects to the OCC database easy. However, care should be taken to prevent adding objects that do not need to be monitored. For example, you can add the Percent Full threshold for all the files in the system, but most of the files on the system do not grow. In addition, there are files that always fill up before rolling over to the next sequential file. TIP: The fields available in the Object Details section are different for the following subsystems. • ATP6100: For the SU Object type, SU and Line fields are displayed instead of Object and Manager fields. SU should be a valid SU or a wildcard character. The line name will be the name of the line under which the SU’s are defined. • • BASE24: The Resource Node box is displayed in the Object Details section when you select the BASE24 subsystem. Specify the BASE24 resource node in this box. This field accepts wildcard characters. The Manager name in this case has to be the SVNCP process that owns the resource node and must have been defined during the installation or using ALTROVNM before starting OCC. The SVNCP process name MUST be defined using ALTROVNM/Option 28 (Add/alter Base24 NCP processes) before you will be allowed to enter BASE24 thresholds. • PROCESS: The fields available in the Object Details area will depend on the Object type selected for the Process subsystem. For example, for the DYNAMIC object type, the Object File Name field is displayed. • TCPIP: The Port box is displayed instead of the Object box in the Object Detail section when you select the TCPIP subsystem. Specify the port number in the Port box. This field allows * wildcard character. The Process box is displayed instead of the Manager box in the Object Detail section for the TCPIP subsystem. Specify the process name in this box. This field allows * wildcard character. 62 Step D: Entering Object Properties Specify the Object properties using the Object Properties link in the Object Details section. 1. Click the Object Properties link in the Object Details section. This displays the Object Properties dialog box. The dialog box has two tab pages, Group and Location. The Group tab page is displayed by default. Figure 53. OCC Object Properties Dialog Box Group Tab Page 2. To classify the objects into groups and sub-groups, type in the group name and the sub-group names in the Group and Sub-group boxes, respectively in the Group tab page. 3. Click the Location tab on the Object Properties dialog box to access the Location tab page. Figure 54. OCC Object Properties Dialog Box Location Tab Page 63 4. The Location tab page in the Object Properties dialog box can be used to specify the location for the threshold being created. The information will include the name, phone number and complete address. Type in the information in the various boxes and Click the OK button to save the information specified and close the Object Properties dialog box. Step E: Entering Maintenance Information Specify the maintenance information using the Advanced button in the Threshold section. 1. Click the Advanced button. The Advanced Options dialog box is displayed with the Maintenance tab page. Figure 55. OCC Advanced Options Dialog Box Maintenance Tab Page 2. The maintenance feature is disabled by default. Select the type of auto maintenance using the Auto Maintenance box in the displayed Maintenance tab page. The other options in the tab page will depend on the selection made. 3. Specify the schedule for maintenance using the Schedule section. You can either select the Absolute Schedule radio button and specify the days on which maintenance is to be scheduled, or the Relative Schedule radio button and select the interval. 4. Click the OK button. This will save all the specifications and close the Advanced Options dialog box. Step F: Entering the Violation Details Enter the violation details using the various fields in the Threshold section in the Threshold dialog box. 1. The Object is in violation, if box gives the list of threshold policies supported by a particular object class. Select the required option from the list. When you select a particular threshold policy, the tip for Threshold section at the right side of the dialog box shows additional information about that particular threshold. See Object Reference guide for the list of valid threshold policies for the various subsystems. 2. The Is box gives the list of operators supported for a given threshold. In cases where no operator is required, the box is disabled. Select the appropriate operator from the list. 3. The Value 1 and Value 2 boxes are activated only when operators are required. The entry is in the form of a specific value. Type in the required values in the boxes. 4. Enter the comments for the threshold in the Comments box. Step G: Select the monitoring status for the threshold being created using the Monitoring box. 64 Step H: Entering Monitoring Schedule OCC allows you to schedule the monitoring process according to your business requirements. 1. Click the Schedule button in the Threshold dialog box. This displays the Schedule dialog box. This allows you to organize object monitoring for a specified time period. Figure 56. OCC Schedule Dialog Box 2. By default, monitoring will poll the system for violations of a threshold every 5 minutes. Change the polling interval using the Poll Interval box in the Schedule dialog box. 3. Specify the daily monitoring start time and stop time using the Start Time and the Stop Time boxes, respectively. 4. To schedule monitoring 7 days a week, select the All check box. You can select the specific days of the week for monitoring using the various check boxes for different days of the week. 5. If you select the Use Extended Host Schedule check box, you will be presented with a new screen for defining the schedule. To define a schedule, refer to section Scheduling. 6. Click the OK button to save the information specified and return to the Threshold dialog box. 65 Step I: Entering Action Details The Actions button helps you to access the Actions dialog box using, which you can configure alert, recovery, e-mail and page options. You can also provide specifications for Tivoli and HPE OM. To access the Actions dialog box, click the Actions button in the Threshold dialog box. Figure 57. 1. OCC Actions Dialog Box with Alert Tab Page Entering Alert Definition Data: a. The Exception section of the Actions dialog box allows you to tailor the Exception and Escalation event messages. Specify the internal severity levels using the Severity box. This severity is used in the text of the alert message and determines the severity value in ObjectMap and ObjectStats. Changing this value may or may not change the corresponding value in the eEvents panel, depending on the value set in Tools/Options/Keep Severity in Sync. b. Specify the frequency of the alert messages using the Repeat Every box. c. Select the Escalate check box and specify the time when the first alert will be generated after the initial violation in the Log Escalation Event After box. d. Specify the sound alarm to be played in case of a violation using the ObjectMAP Alarm box. The sound alarm is only played when objects go into violation. No sound is played when it returns to normal. NOTE: The Alert tab page will be disabled if you have selected the EMS subsystem in the Threshold dialog box. 66 2. Entering Recovery Data a. To specify the recovery details, click the Action tab on the Actions dialog box. This displays the Action tab page. Figure 58. OCC Actions Dialog Box with Action Tab Page b. Select the recovery type to be applied using the first Command box. c. Other fields enabled in the tab page will depend on the recovery selected. If you select the User defined command option in the Command box, the next Command box is activated. You can define the action to be performed in case of a violation using this box. You can use the Parameter list link to use substitution parameters. For more details on configuring thresholds with a user-defined Automatic Recovery Command, refer to Appendix N: Log Success/Failure of User Defined Command for Recovery in User Guide. d. Select the 24x7 option button in the Schedule section to activate recovery 24 hours a day, seven days a week. You can define a customized recovery schedule using the Schedule button. To activate the Schedule button, select the User Defined option button. Figure 59. OCC Recovery Schedule Dialog Box a. By default, OCC will start the recovery process for a threshold every 5 minutes. You can change the delay interval using the Delay Interval box. b. Specify the start time and stop time using the Start Time and Stop Time boxes, respectively. c. To schedule monitoring 7 days a week, select the All check box. You can select the specific days of the week for monitoring using the various check boxes for different days of the week. d. You can use the Next schedule day check box to schedule recovery on the next scheduled day specified in the Days section. 67 e. Click the OK button to close the Schedule dialog box and to return to the Actions dialog box. f. 3. Activate or deactivate recovery using the Recovery box in the Options section in the Action tab page. Entering E-Mail Alert Information a. To specify the e-mail alert data, click the Mail tab on the Actions dialog box. The e-mail feature is not activated by default. Click the Mail on Violation check box to enable the e-mail feature. Figure 60. OCC Actions Dialog Box with Mail Tab Page b. Enter the e-mail addresses, profile names or the distribution list to whom the alerts should be sent in the To box. c. Specify the subject of the message to be sent in case of a violation in the Subject box. d. Enter the message to be sent in case of a threshold violation in the Violation Message box. You can also click the Parameters list link to use substitution parameters. e. The Mail on escalation only check box can be selected to allow OCC to send e-mail alerts only when an escalation event is generated. f. To enter the specifications for the mail message to be sent when the object in violation returns to its normal state, select the Mail on Normal check box. g. Selecting the Mail on Normal check box activates the Subject and the Normal Message boxes. Specify the subject in the Subject box and the message in the Normal Message box. As in the case of violation message, you can use the Parameters list link. 68 4. eEvents a. Click the eEvents tab in the Actions dialog box. Figure 61. OCC Actions Dialog Box eEvents Tab Page b. Select the HPE OM/OVO, Tivoli or SNMP radio button to forward the events to the corresponding Management consoles. This activates the various fields in the tab page. c. Select the eEvents status using the eEvents Status box. d. If the event status is specified as ACTIVE or INACTIVE, select the internal severity levels using the Violation Severity box. If you select ORIGINAL, the value specified in the Alert tab will be used. If you select any other value, then the value in the Alert tab may or may not be automatically updated, based on the value specified in Tools/Options/Keep Severity in Sync. The severity specified here is used in Console and the Enterprise Management System. It does not impact ObjectMap, ObjectStats or the text in the violation message. Specify the Object Name, Manager Name, Customer Name, Location, Service ID, Message Group/Layer, and Event Text Replacement information in the respective fields. If you select DROP THIS EVENT in the eEvent status field, then none of the other fields are necessary since the event will not be passed on. e. If the event status is specified as CUSTOM, specify the message layout in the Message box. Select the Append mode check box to append the slots to the standard message format. In this case, the message class will be decided by OCC using the cdf file conditions. f. You can also use the Parameters list link for the Event Text field. To load the message format from a saved template file use the Insert from file link. To use event token numbers use the Token list link. 69 Step J: Configuring EMS Actions 1. ObjectMAP a. Click the ObjectMAP tab to configure the objects to be displayed in the ObjectMAP interface. NOTE: The ObjectMAP tab page is displayed only if you select the EMS subsystem. Figure 62. OCC Actions Dialog Box ObjectMAP Tab Page b. Select the Add/Update radio button to add or update an object. To remove an object, select the Delete radio button. In case you do not want to map the event, select the Do not map event option. c. Select the appropriate radio buttons in order to map the event using default attributes, rule number or the token numbers using the Map event using default attributes, Map event using rule number and Map event using radio buttons, respectively. If you select the Map event using option, the Subject token number and Manager token number fields are activated. You can either specify the appropriate token numbers or select the token numbers using the Lookup token numbers link. d. In order to remove the object automatically after a specified time, select the Auto-remove object check box and specify the time using the After and At time fields. e. Specify the group name using the Group Name box. f. Use the Threshold name box to enter the name for the threshold. 70 2. eBurst a. Click the eBurst tab to configure burst criteria to be used to suppress the burst of EMS messages. The tab page is displayed only when you select the EMS subsystem. Figure 63. OCC Actions Dialog Box eBurst Tab Page b. Selecting None radio button specifies that every EMS message will be processed even if no burst criteria is defined and a burst of EMS messages is consumed. Selecting the Process Until Burst or Ignore Until Burst radio button enables the Burst and Reset area. Process Until Burst radio button sets the burst conditions for the EMS messages. The EMS messages are processed until the burst conditions are met. The Ignore Until Burst option allows ignoring the processing of EMS messages until the burst conditions are met. c. You can reset the burst period using the Reset area. Enter the maximum burst time using the After MAX burst period of field. The default value is set to 01 Minute. d. To specify the burst condition, enter the number of events in the Burst field and specify the time duration in minutes using the Within field. Enter the subject for the events using the Event Subject field. By entering the burst criteria, you can limit the: − Number of messages that are sent to the Enterprise Solution − Number of emails that are generated − Number of recoveries that are performed e. Select Generate start/end EMS burst notification messages check box to start generating the EMS burst notification messages. Step K: Saving the Threshold Data After entering the necessary data, including any Schedule or Action changes, click either the Apply or the OK button to record the data in the database. Use the Apply button to save the entered threshold and to continue with the creation of another threshold. Use the OK button to save the entered threshold and exit the dialog box. In either case, if the threshold’s monitoring was set to Active, OCC will start monitoring the new threshold as soon as the data is saved. NOTE: The Object Configuration Client returns the number of objects added. If no objects were added, it is considered an error and a message is displayed. 71 Listing Configurations and Objects After having created new thresholds, you can list the thresholds and the corresponding Objects in the Threshold and the Objects pane, respectively. Listing Configurations 1. Right-click on an object type in the Object Class pane. 2. Select the List Configurations option in the displayed menu. Figure 64. OCC List Configurations Option An easy way to list configurations is by double-clicking on the Object Type. NOTE: When you are viewing thresholds in the Threshold pane, you are looking at a copy from memory unless you click the List Configurations option to refresh memory. 72 Listing Objects 1. List the thresholds for the required subsystem in the Threshold pane. 2. Select the threshold whose objects you want to list. 3. Click the List Objects option in the Threshold menu. This is also available on the Toolbar as the List Objects icon. You can also right-Click the particular configuration in the Threshold pane and select the List Objects option in the displayed menu. The listing for all the objects in the selected threshold is shown in the Objects pane. Figure 65. OCC Object Listing Result Once the objects have been listed, you can refresh the displayed data by double clicking on the corresponding threshold configuration in the Threshold pane. The data is updated from the backend. The data in the front-end memory is shown in case you click the corresponding threshold configuration. 73 Color Coding The color of the listed threshold and objects, in the Threshold pane and Objects pane, respectively, can be Green, Red or Blue, depending on the status of monitoring and recovery. Table 7. Color Coding S. No. Color Monitoring Status Recovery Status 1. Green Active Active 2. Green Active Not Defined 3. Red Inactive Active 4. Red Inactive Not Defined 5. Red Inactive Inactive 6. Blue Active Inactive Figure 66. OCC Color Coding 74 Maintaining Configurations & Objects Once a new threshold has been configured, you can modify or delete the thresholds and the objects as per your requirement. The various options available for maintaining threshold configurations and objects are: • Modify Config • Delete Config • Modify Object • Delete Object You can access these options using the Threshold menu, the shortcut icons available on the Toolbar and the right-click menu in the Threshold & Objects panes. Modifying Configurations 1. List the thresholds in the Threshold pane. 2. Select the threshold to be modified. 3. Click the Modify Config option in the Threshold menu. This option is also available as the Modify Configuration icon on the Toolbar. The Modify Configuration / Object dialog box is displayed. Figure 67. 4. OCC Modify Configuration / Object Dialog Box Make the necessary modifications in the Modify Configuration / Object dialog box and Click the OK button to save the modification and close the dialog box. 75 Modifying Objects 1. List the objects in the Objects pane. 2. Select the object to be modified. 3. Click the Modify Object option in the Threshold menu. This option is also available as the Modify Object icon on the Toolbar. The Modify Configuration / Object dialog box is displayed. Figure 68. 4. OCC Modify Configuration / Object Dialog Box Make the necessary modifications in the Modify Configuration / Object dialog box and Click the OK button to save the modification and close the dialog box. NOTE: When an object is modified, the status changes to Unknown. List the objects again to see the current status. 76 Deleting Configurations 1. List the thresholds in the Threshold pane. 2. Select the threshold to be deleted. 3. Click the Delete Config option in the Threshold menu. This action can also be performed using the Delete Configuration icon on the Toolbar. 4. An OVNM Object Configuration Client confirmation box is displayed. Click the Yes button to delete the selected threshold. Figure 69. OCC Confirmation Box Deleting Objects 1. List the objects in the Objects pane. 2. Select the object to be deleted. 3. Click the Delete Object option in the Threshold menu. This action can also be performed using the Delete Object icon on the Toolbar. 4. An OCC confirmation box is displayed. Click the Yes button to delete the selected object. Figure 70. OCC Confirmation Box 77 Appendix A: Subsystems Managed OCC allows you to monitor most of the major HPE NonStop subsystems. A list of all the predefined subsystems managed by OCC is as follows. NOTE: The BASE24, and MQ-SERIES subsystems will not be enabled in OCC by default. These subsystems will be activated only when the corresponding plug-ins have been installed. 1. ATP6100 The ATP6100 subsystem consists of the ATP6100 line-handler process and a protocol module. The ATP6100 line-handler process is a HPE NonStop™ process pair running in a HPE NonStop™ host. The process acts as a file-system interface between an application and a protocol module that resides and runs in the Communication Line Interface Process (CLIP) as a task. In the wide area network (WAN) subsystem that uses the SWAN concentrator, the ATP6100 line-handler process thus allows communication over a variety of asynchronous communication devices especially terminals and printers. Application data is passed to one of several protocol modules by ATP6100. The protocol module gives the application extensive control over the line, and each protocol module can control either a single line or multiple lines. 2. BASE24 BASE24 is a major ATM application available from ACI. This software is used by most of the world’s major banking institutions for their credit card transactions. The counters/modifiers defined under this subsystem help monitor and manage various objects like LINE, LINK, PROCESS, STATION, SYSTEM and TDF-60. The PNA24 module is used for discovery and recovery of the BASE24 objects and is included in the base product. This greatly increases the Out-of-the-Box capabilities of OCC, especially regarding a major application such as BASE24. The BASE24 subsystem will only be available if you have installed the BASE24 plug-in. 3. CLIM-IP The CLuster I/O Protocol (CLIM-IP) provides the physical interface to the network or storage devices. The CLIM includes a ServerNet PCIe card with multiple ports that interface to the ServerNet fabric of the NonStop host system. 4. CP6100 The CP6100 subsystem consists of the CP6100 input-output process (IOP) and a protocol module. The CP6100 IOP, also known as the CP6100 Communication Access Process (CAP), is a NonStop™ process pair running in a NonStop™ host. The process acts as a file-transfer mechanism to move data between an application and a protocol module that resides and runs in the Communication Line Interface Process (CLIP) as a task. The protocol module is a microcode file or a download module (DLM) that contains OSI Layer-1 and Layer-2 processing tasks. The CP6100 CAP thus provides the application with a data-link level interface to asynchronous, byte-synchronous, or bit-synchronous protocol modules in a 6100 Communication Subsystem (CSS), which uses the ServerNet Wide Area Network (SWAN) concentrator. Application data is passed to one of several protocol modules by CP6100. The protocol module gives the application extensive control over the line, and each protocol module can control either a single line or multiple lines. 5. CPU This subsystem manages and controls one of the major components of the system, the CPU. The counters/modifiers predefined for this subsystem greatly facilitate the monitoring and recovery of all the CPUs’ for the HPE NonStop node. 6. DISK Another major component of a system is the Disk subsystem. The predefined disk counters/modifiers help in managing, monitoring and recovering this complex and major subsystem on the HPE NonStop platform. 7. EMS EMS is the subsystem that handles EVENTS on a HPE NonStop node. The counters/modifiers defined for this subsystem allow the customer to easily monitor and react to any kind of event generated on a HPE NonStop 78 system. The EMS management feature allows the user to trigger actions based on EMS events. This feature allows the customer to define HPE NonStop subsystem generated events as well as user-application generated events for escalation and automation. Additional slot values as they are known, can also be added for the HPE Operations environment. Any EMS or Non-EMS event can be automated via Gateway processes or by simple TACL macro commands. 8. EXPAND The EXPAND communication protocol is an NSK proprietary protocol that is used by different HPE NonStop nodes to communicate with each other. Customers who have multiple HPE NonStop systems use and depend upon EXPAND for their applications to run smoothly. OCC has predefined counters/modifiers that facilitate the monitoring and recovery of the lines and paths defined under the EXPAND subsystem. 9. FILESYS The FILESYS subsystem deals with the monitoring and management of files on a HPE NonStop system. Files can be monitored in various ways and predefined actions can be taken if and when the criterion is met. The counters/modifiers that have been predefined for this system greatly facilitate the management of files. You can use the FILESYS objects to manage SQL/M*. 10. ICE Internet Communication for the Enterprise (ICE) is a major communication application available from Insession Technologies. This software is used by hundreds of organizations worldwide to help run their mission critical HPE NonStop applications. In this release, OCC helps to monitor and manage APPL, PU and TNSERVER objects. Based on customer demand additional objects can be incorporated. 11. ICE-DLSw ICE - DLSw connects HPE NonStop servers to backbone networks. The solution performs encapsulation functions previously executed on data center routers. With ICE - DLSw, any IP router can be inter-connected, and any HPE NonStop LAN controller can be used. 12. MQ-SERIES MQSeries messaging products enable application integration by helping business applications to exchange information across different platforms by sending and receiving data as messages. They take care of network interfaces, assure ‘once only’ delivery of messages, deal with communications protocols, dynamically distribute workload across available resources, handle recovery after system problems, and help make programs portable. So programmers can use their skills to handle key business requirements, instead of wrestling with underlying network complexities. The MQ-SERIES subsystem will only be available if you have installed the MQ-SERIES plug-in. 13. NETBATCH NetBatch subsystem is used for scheduling, and control systems for batch processing. It takes advantage of the HPE multiprocessor architecture and allows running of batch operations in a single or in many processors concurrently. 14. OSS The Open System Services (OSS) environment provides a user and programming interface similar to that of the UNIX operating system. The OSS environment combines the benefits of the UNIX operating system with the features of the HPE NonStop operating system. You can use OSS objects to monitor Weblogic and TUXEDO processes. The log files created by Weblogic and TUXEDO can be monitored using the OSS LOGFILE objects. 15. PATHWAY Pathway is an application framework shell provided on the HPE NonStop platform. Developers using Pathway can utilize the various facilities offered by this framework. Predefined counters/modifiers manage, monitor and recover the various objects defined under Pathway like Servers, TCP and Terminals. 16. PLUGPLAY Plugplay subsystem monitors Primary CPU Switched, Backup CPU Switched, Device Audited Switched, Primary Status Switched, Primary Access Switched, Primary Path Switched, Primary Path Used Switched, Backup Status 79 Switched, Backup Access Switched, Backup Path Switched and Backup Path Used Switched. Whenever any of the above-mentioned attributes change their state, OCC treats it as a violation state. 17. PROCESS The Process subsystem has predefined counters/modifiers to manage and monitor various processes running on the HPE NonStop platform. 18. RDF RDF monitors the changes made to a production database on a local (primary) system and maintains a copy of that database on one or more remote (backup) systems. It applies changes to the backup database as soon as they are detected on the primary system, RDF keeps the backup database continuously up to date with changes made by business applications on the primary system. You are therefore able to switch your business operations from the primary system to the backup system with minimal interruption and loss of data in the event of planned or unplanned outages of the primary system. The thresholds in this subsystem allow you to monitor the activities of RDF to make sure it is operating as you expect to reduce the chance of any data loss or extended RDF recoveries. 19. SNAX-XF This is a part of the SNAX family of products available on the HPE NonStop platform. SNAX-XF primary lines control and serve attached SNA peripheral nodes (SNA type 2.0 nodes). This subsystem in OCC helps in managing the LUs’ and PUs’ defined in this subsystem. 20. SPOOLER The spooler subsystem is a set of utilities that form an interface between you & your application programs and the print devices on a system. The spooler receives output from an application and stores data on the disk. When the print device is available the output is sent to that device for printing. Predefined counters/modifiers help in managing this important subsystem. 21. SPOOLERP This is the new version of Spooler that is supplied for the HPE NonStop S-Series. This subsystem allows the user to monitor and manage Spooler objects like the COLLECTOR, DEVICES and PRINT PROCESSES. 22. TAPE This subsystem supervises all tape operations within the HPE NonStop platform. Counters such as Mounts are predefined and are simple to set up. 23. TCPIP The S-Series HPE NonStop platform uses TCPIP as a major protocol to communicate. TCPIP stacks or processes and ports need to be monitored closely and actively. This subsystem achieves that through predefined counters and modifiers. 24. TMF Transaction Monitoring Facility or TMF is a major subsystem on the HPE NonStop platform. It provides services for transactions like Rollback and Roll forward (in case of system failures), Audit trails and Audit dumps (for data integrity). Various applications use these services for the Transaction protection that is built into this subsystem. 25. X25 This is a commonly used communication protocol and is available on the HPE NonStop platform. The counters/modifiers predefined in this subsystem help manage objects using this protocol. 80 Appendix B: EMS Message Handling This appendix contains an example of setting up an EMS event for forwarding to the HPE Operations environment. In this example, we will use the event logged by the Expand subsystem when a line is started. The highlight of the example is the ability to customize the event text and the ability to assign Service-ID for the event that will be propagated to the Service View in the HPE OM panel. 1. Select the EMS subsystem in the Object Class pane and Click the New Configuration option in the Threshold menu. Figure 71. 2. OCC Threshold – New Configuration Menu Option Clicking the New Configuration option displays the Threshold dialog box. This dialog box is used to specify the Object and Threshold details. Use the Help button in the Threshold dialog box to get help on how to create a threshold configuration for a NonStop EMS event. Figure 72. OCC Threshold – EMS Help 81 3. Select the nodes on which the configuration is to be applied using the Nodes area. Figure 73. 4. Select the Subsystem and Object Type as EMS and EVENT in the Threshold dialog box. Figure 74. 5. OCC Threshold – Nodes Area OCC Threshold Dialog Box with EMS Subsystem and EVENT Object Type Selected Specify the owner and the subsystem of the event in the owner.subsystem format in the Owner.Subsystem box. 82 You can use the Figure 75. button next to the box to type the text in upper or lower case. OCC Threshold Dialog Box with Owner.Subsystem Information Examples of valid Owner.Subsystem are: TANDEM.EMS TANDEM.PATHWAY MYORG.1 For HPE NonStop subsystems, the subsystem owner is “TANDEM”. NOTE: OCC version 5.3.x onwards will not allow *.* for EMS in Owner.subsystem name. The following message is displayed. 6. The Event Number box allows you to define a single threshold policy that would apply to all the events for a given owner.subsystem. By entering an asterisk, the policy will apply to all events that are generated by the owner.subsystem. If a second EMS threshold is created for the same owner.subsystem, then the event will take the unique actions specified. For example, if the specific policy has a schedule that is a subset of the * policy, and the event occurs outside its specific schedule, it will be ignored. If you want the actions specified for the * policy to be taken for the event number outside its normal schedule, a third policy covering the rest of the day has to be created. 83 The Event Number field can accept any string of 32 characters. The value can be: Figure 76. 7. Integer Range, for example a:b, where a and b are numbers separated by a colon Multiple integers separated by commas, for example 1,2,3,4 Multiple ranges separated by colons, for example 1:10, -5:-2 and 100:200 Multiple integers and range(s) together, for example 1,2,3,100:150, -100:99 Negative event number(s) and negative event range(s) OCC Threshold Dialog Box with Event Number Information Select the threshold violation criteria using The object is in violation, if box. Other fields in the Threshold area get activated depending on the selected violation criteria. Figure 77. OCC Threshold Dialog Box with Threshold Information 84 The EMS Object provides several Threshold options. If you are not familiar with EMS Tokens then it is recommended that you select either EXECUTE-DEFINED-ACTION or EVENT TEXT. • EXECUTE-DEFINED ACTIONS: This threshold type is used when you do not need any additional qualification on the EMS event – when Owner.Subsystem and event number provide enough information to identify the EMS event message you want to process. After selecting the option, click the Action button to define the action to be taken. • EMPHASIS-TOKEN-TRUE: This threshold is used when SSID and Event are all that are needed to identify the correct EMS message and you want only those events that contain an Emphasis Token that has a true value. SSID can support * in subsystem portion. For example: TANDEM.*. • EVENT TEXT MESSAGE: This threshold can be used for matching event text associated with the event text token or the text area of the EMS Message. The operators available with threshold are: “Equal to <value 1>”, “Contains <value 1>” and “Equals <value 1> at offset <value 2>”. The easiest method to test for text within an EMS message is using “Contains <value 1>”. The text can occur anywhere in the message and it is NOT case sensitive. You can use the “*” and “?” wildcard characters with the “Contains <value 1>” operator. CAUTION: It is recommended that you do use wildcard characters with the “Equal to <value 1>” and “Equals <valiue 1> at offset <value 2>” operators. This might lead to unexpected results. • EVENT PASS VALUE: This threshold type allows the user to check if the event contains the specified pass value. The pass value is associated with the filter that passed the event. Refer to the NonStop Server EMS Manual for details. NOTE: For TANDEM.EMS.512 thresholds, you must use a pass value less than or equal to 1000. • EVENT SUBJECT AND MANAGER: This threshold type allows the user to check if the event contains the specified subject and manager associated with the subject and the manager token, respectively. Refer to the NonStop Server EMS Manual for details. The event must match both subject and manager to be considered a match. • EVENT SUBJECT: This threshold type allows the user to check if the event contains the specified subject associated with the subject token. Refer to the NonStop Server EMS Manual for details. 8. Set the monitoring for the objects as active using the Monitoring box. Monitoring is inactive by default. Use the Schedule button to specify the monitoring schedule. Figure 78. OCC Threshold Dialog Box with Monitoring Activated 85 9. Click the Actions button to open the Actions dialog Box. The Alert tab is displayed by default, but there are no fields on this page that are useful for EMS thresholds. Figure 79. OCC Actions Dialog Box NOTE: Service IDs are associated with NonStop Server Service Components in HPE OM Services View. 10. Configure recovery, e-mail and events facility using the Action, Mail and eEvents tab pages, respectively. 11. Specify the map event and event burst information using ObjectMAP and eBurst tab pages respectively. 12. After entering all the relevant information, click the OK button in the Actions dialog box. 13. The Threshold dialog box is displayed. To save the information and to close the dialog box, click the OK button. For details, refer to Configuring HPE OM Services section in the Event Management for Windows guide. 86 EMS Processing Sequence EMS thresholds allow wildcards in various locations of the SSID and Event number that specify which events should be processed. You can use an asterisk in the Subsystem number and the event number fields. For example, TANDEM.* with event *. This definition would then apply to any EMS message generated by the TANDEM SSID Owner. When OVNM is processing EMS events and matching them against the EMS thresholds, it will always look for a specific match before it looks for a generic match. Since it may not always be obvious which EMS threshold(s) will be used for a given event, the following will try to describe the process that is used. There are 4 types of EMS thresholds that can be defined. Table 8. EMS Threshold List A Owner.Subsystem Number Specific Event Number B Owner.Subsytem Number Event * C Owner.* Specific Event Number D Owner.* Event * 87 The thresholds will be searched in the below given sequence. 1. OVNM will attempt to match a record with the same SSID and Event number (TANDEM.PATHWAY, event 203 for example). 2. If no match is found or a match is found but the qualification fails, then it will continue the search to the next level. This will match on the SSID only (TANDEM.PATHWAY) and will match any event for that SSID. 3. If again there is no match, then it will check to see if a threshold exists for the Owner and the specific event (TANDEM.*, Event 203 for example). 4. If there is still no match found, then it will look for a match on Owner and any event (TANDEM.*, any event). Normally, once a match is made, it will not check any other match level. The exception to this rule is for the exact match (A). As stated above, when it searches for an exact match (SSID and Event) and finds it, it will continue checking the other levels, if the qualification for the event fails. So if you had specified Event Text Contains and the text was not found, then it will go on to the next match levels B, C and D. This is not performed on the other levels though. So if no match is made at level A but there is at level B, but the qualification fails, the event is not processed. If the qualification is successful, then it is processed. In addition, once a match is made at a given level, all thresholds at that same level will be processed. So if you have different qualifications specified, all those thresholds will be evaluated and all thresholds will be processed in which the event passes the qualification test. For example, consider these EMS thresholds – all using “executed-defined-actions”. A APPL.PAYROLL 123 Execute defined actions B APPL.ATM 123 Text contains cash C APPL.PAYROLL 124 Text contains check D APPL.PAYROLL 124 Text contains cashed E APPL.PAYROLL 124 Text contains check cashed F APPL.PAYROLL * Execute defined actions G APPL.ATM * Text contains cash H APPL.* 123 Execute defined actions I APPL.* * Execute defined actions • APPL.PAYROLL.123 will be processed by level A. • APPL.PAYROLL.100 will be processed by level F. • APPL.ATM.123 will be processed by level B if it contains “cash”. If not, it will be processed by level G. It is an exact match for SSID and Event, but if it fails the qualification test, then OVNM will continue looking for thresholds with wildcards. • “APPL.ATM.100 just-this-text” will be bypassed. There is no exact match for it, so the first threshold that is a match is level G, but since the event does not contain ‘cash’, it fails the qualification test. Since this is not the ‘exact match’ level, no lower levels are checked. • “APPL.PAYROLL.124 Check Cashed” will be processed by level C, D and E since it matches the criteria for all of those thresholds. The above describes the process used for both Actions and deciding which message should be sent to the Enterprise Management Solution. The only differences between the action processing and the Enterprise Management processing is that only one message will be sent to the Enterprise Management system regardless of the number of ‘matches’ and it will be based on the LAST threshold that was added. The last one added will be the first one to be processed. 88 Appendix C: OSS Log Handling This appendix contains an example of setting up OSS event for monitoring OSS logfile and forwarding these events to the HPE Operations environment. 1. Select the OSS subsystem in Object Class pane and Click the New Configuration option in the Threshold menu. Figure 80. OCC Threshold – New Configuration Menu Option 2. Clicking the New Configuration option displays the Threshold dialog box. This dialog box is used to specify the Object and Threshold details. Select the nodes on which the configuration is to be applied using the Nodes area. 3. Select the Subsystem and Object Type as OSS and LOGFILE. Figure 81. OCC Threshold Dialog Box with OSS Subsystem and LOGFILE Object Type Selected 89 4. Specify the name and location of the OSS log file in the Object File Name box. Figure 82. OCC Threshold Dialog Box with Object File Name Information The Object File Name field can accept any string of 64 characters and is case-sensitive. Specify the complete path for the logfile in the field. For example: /home/tandem/admin/logfile. In case you are specifying a file in guardian format in an expand node, use the following: /E/<node name>/G/<volume>/<subvolume/file name 5. Select the violation criterion in The object is in violation box. You can also add comments, if any, in the Comments box. Figure 83. OCC Threshold Dialog Box with Threshold Information 90 6. Set the monitoring for the objects as active using the Monitoring box. Monitoring is inactive by default. Use the Schedule button to specify the monitoring schedule. Figure 84. 7. OCC Threshold Dialog Box with Monitoring Information Click the Actions button to access the Actions dialog box. The Log Event tab page can be used to configure the Collector where the OSS events will be logged. The other information that needs to be specified includes Owner, Subsystem Num and Error Number. Figure 85. OCC Actions Dialog Box Log Event Tab Page 8. Configure severity, recovery, e-mail and enterprise management console facility using the Alert, Action, Mail and eEvents tab pages, respectively. 9. After entering all the relevant information, click the OK button in the Actions dialog box. 10. The Threshold dialog box is displayed. To save the information and to close the dialog box, click the OK button. 91 Appendix D: Default Policies The following table contains the list of pre-configured policies. These policies are configured automatically during the OVNM installation on the HPE NonStop Managed Host if you select the Add Default Policies check box in the Policies tab page of the Host Installation Client New OVNM Configuration dialog box. Figure 86. Host Installation Client’s New OVNM Configuration Dialog Box For details, refer to Installing OVNM on HPE NonStop Server section in the installation guide. Table 9. Default Policies Subsystem Object Type Threshold Poll Interval Repeat Every Severity CPU CPU CPU IS DOWN 1 min 0 min Critical CPU CPU CPU QUEUE LENGTH > 5 1 min 0 min Critical CPU CPU LOW PCBS IN USE > 220 1 min 0 min Critical DISK DISK DISK IS DOWN 5 min 0 min Critical DISK DISK PERCENT FULL > 80 5 min 0 min Critical EMS EVENT EXECUTE-DEFINED-ACTION TANDEM.OVNM.* - - Original EMS EVENT EXECUTE-DEFINED-ACTION TANDEM.OVMON.* - - Original EMS EVENT EXECUTE-DEFINED-ACTION TANDEM.OVMON.999 - - Warning EMS EVENT EXECUTE-DEFINED-ACTION TANDEM.OVNPM.* - - Original EMS EVENT EXECUTE-DEFINED-ACTION TANDEM.OVNPM.999 - - Warning 92 Subsystem Object Type Threshold Poll Interval Repeat Every Severity EXPAND LINE NOT STARTED 5 min 0 min Critical EXPAND PATH NOT STARTED 5 min 0 min Critical PATHWAY PATHMON PATHMON STOPPED 30 min 0 min Critical PATHWAY TCP TCP IS NOT STARTED 30 min 0 min Critical PLUGPLAY DISK DISK PLUGPLAY 14 min 0 min Major PLUGPLAY EXPAND EXPAND PLUGPLAY 14 min 0 min Major PLUGPLAY SNAX-XF SNAXXF PLUGPLAY 14 min 0 min Major PLUGPLAY TAPE TAPE PLUGPLAY 14 min 0 min Major PLUGPLAY X25 X25 PLUGPLAY 14 min 0 min Major PROCESS LOOPING ANY PROCESS IS LOOPING (DYNAMIC) 2 min 0 min Critical PROCESS PROCESS PROCESS IS DOWN, $ZPMON 2 min 0 min Minor PROCESS PROCESS PROCESS IS DOWN, $ZPNS 2 min 0 min Minor PROCESS PROCESS PROCESS IS DOWN, $ZTA* 2 min 0 min Minor SNAX-XF SUBSYS NOT STARTED 3 min 0 min Minor SPOOLER COLLECTOR COLLECTOR FILE PERCENT_FULL > 80 15 min 0 min Warning SPOOLER DEVICE DEVICE ERROR 15 min 0 min Warning SPOOLER DEVICE DEVICE PRINT PROCESS ERROR 15 min 0 min Warning SPOOLER PRINTPROC PRINT PROCESS ERROR 15 min 0 min Warning TAPE TAPE MOUNTS OUTSTANDING 10 min 0 min Critical TCPIP PROCESS PROCESS IS DOWN 1 min 0 min Critical TCPIP PROCESS PORT IS IN FIN-WAIT STATE 1 min 0 min Critical TMF AUDITDUMP AUDIT DUMP IS DISABLED 1 min 0 min Critical TMF AUDITDUMP AUDIT DUMP IS INACTIVE 1 min 0 min Critical TMF AUDITTRAIL CANNOT ROLLOVER 1 min 0 min Critical TMF AUDITTRAIL OVER FLOW IN USE 1 min 0 min Critical TMF TMF HUNG TRANSACTIONS 1 min 0 min Critical TMF TMF TMF IS STOPPED 1 min 0 min Critical TMF TRANSACTIO NS TRANSACTION IS HUNG 1 min 0 min Critical X25 LINE NOT STARTED 2 min 0 min Minor FILESYS FILE AUDITED 30 min 60 min Minor 93 Subsystem Object Type Threshold Poll Interval Repeat Every Severity FILESYS FILE LICENSED 30 min 60 min Minor FILESYS FILE PROGID 30 min 60 min Minor FILESYS FILE FILE EXISTS 60 min 0 min Critical 94 Appendix E: Substitution Parameters Table 10. Substitution Parameters Parameter Name Description %s% Subject Name or Object Name which has violated threshold %m% Manager Name for the Subject that violated threshold %e% Event Number of the event that reports violation %n% Node Name to which the subject belongs %ssid% Subsystem Name to which the subject belongs %ssn% Subsystem Number to which the subject belongs %sso% Subsystem Owner to which the subject belongs %t<Offset:length>% Event Text Message (default = <0:255>) %t(index)#TokenNumber% Token Number of the event that reports violation (default index =0) %lt^mmddyy% Log Event Time showing the date in mmddyy format %lt^mmddyyyy% Log Event Time showing the date in mmddyyyy format %lt^ddmmmyyyy% Log Event Time showing the date in ddmmmyyyy format %lt^mm% Log Event Time showing only the month %lt^dd% Log Event Time showing only the day %lt^yy% Log Event Time showing only the short year %lt^yyyy% Log Event Time showing only the long year %gt^mmddyy% Event Generation Time showing the date in mmddyy format %gt^mmddyyyy% Event Generation Time showing the date in mmddyyyy format %gt^ddmmmyyyy% Event Generation Time showing the date in ddmmmyyyy format %gt^mm% Event Generation Time showing only the month %gt^dd% Event Generation Time showing only the day %gt^yy% Event Generation Time showing only the short year %gt^yyyy% Event Generation Time showing only the long year %cs% Current state of the configured object. This is applicable only to OCC violation events. %cv% Current value of the configured object. This is applicable only to OCC violation events. %v1% Threshold value1 for a configured object. This is applicable only to OCC violation events. %v2% Threshold value2 for a configured object. This is applicable only to OCC violation events. %transid% TMF Transaction ID 95 Appendix F: OCC Errors The following table enlists and describes various OCC Errors. Table 11. OCC Errors Error Description Invalid Manager Name Configuration Invalid entry in the Manager Name field in the Threshold dialog box. This field is not available for all the subsystems. For example, Manager name for BASE24 objects has to be the NCP process that owns the resource node and must have been defined during the installation or using ALTROVNM before starting OCC. Invalid Object Name Configuration Invalid entry in the Objects field in the Threshold dialog box. This should contain the object name for the selected subsystem. Wildcard characters are allowed for most of the subsystems. Invalid EMS Owner. Subsys Configuration Invalid entry in the Owner.Subsystem field in the Threshold dialog box. This field is available for the EMS subsystem. Examples of valid entries are: TANDEM.EMS, TANDEM.PATHWAY, and MYORG.1. For HPE NonStop subsystems, the subsystem owner is “TANDEM”. Command Failed. Error = -9999 Please List Again Working with thresholds or objects without updating the displayed information with current data in the Threshold and Objects pane. Update the displayed thresholds and objects with the current data in the Threshold and Objects pane respectively by listing them again. Multi-Node Key in use. Try again! This error is generated on trying to create a copy of a multi-node configuration. Check whether the configuration is multi-node in the Multi-node column of the Threshold pane. Lost connection with node The connection with the NonStop node is lost. Host version mismatch There is a version mismatch between the OCC and the NonStop Server OVNM component. Insufficient Write privileges The user trying to perform a particular task does not have the required Write privilege. <value1> and <value2> should be >=0 The user trying to enter negative values in the Value1 and Value2 boxes. Enter positive values in the boxes and create the threshold configuration again. Threshold obsolete, use PROCESS/LOOPING Too many wildcards used, review config Too many objects found for use. The system attempted to transfer too much data. Use wildcard characters with care as this increases the search for objects to use for the threshold configuration. UPDATE OBJECTS/CONFIG FAILED(201) The current path to the device is down, an attempt was made to write to a non-existent process, the message-system request was incorrectly formatted, or an error was found in the message system interface. Invalid Threshold in current Support for the DIAGNOSING and SUSPENDED thresholds is not available on Dxx machines. OS Version Selecting these thresholds will cause this error message to be displayed and no configuration or object will be added to the database. For example, Creating a threshold configuration of ATP6100 subsystem on Dxx machines will give this error message as these machines do not support DIAGNOSING and SUSPENDED thresholds. 96 Error Description Please List Objects before Add Object When multiple users are working with thresholds or objects without updating the displayed information with current data in the Threshold and Objects pane. For example, if one user has deleted a particular threshold and then the other user on a separate workstation trying to Add object to the threshold will encounter this error. Update the displayed thresholds and objects with the current data in the Threshold and Objects pane, respectively, by listing them again. 97 Appendix G: NetBatch Monitoring This appendix describes how to set up NetBatch EMS thresholds to monitor jobs in Progress and jobs that Abended. The group and threshold names that are used in the ObjectMap panel do not have to be exactly what is documented here, but they need to be consistent. In this example, NetBatch is the group name. Whatever name you use, it has to be the same for all of these thresholds. The threshold names used are JobsInProgress and AbendedJobs. Spaces are allowed, but it is recommended not to use spaces, as two spaces between words will be considered different than a single space. Only three Event numbers have been used here, but there are five thresholds defined. • Event 102 (job started) is used to ADD to the JobsInProgress group and DELETE from the AbendedJobs group. • Event 202 (job ended normally) is used to DELETE from the JobsInProgress group. • Event 203 (job abended) is used to DELETE from the JobsInProgress group and ADD to the AbendedJobs group. Follow the procedure described below to set up NetBatch EMS thresholds to monitor jobs in Progress and the jobs that have Abended. 1. These thresholds will require you to tell AO what tokens to use in the ObjectMap display. NetBatch has many tokens that are defined, but not all of them are used in the EMS messages, which get generated when a job starts, completes or abends. The first step in this process is to collect the EMS token files for C. These files can be interpreted by AO to assist in your token selection: a. From the Host Installation Client, select any Tandem node – preferably the one with the most current Operating System. b. This step is performed only once per PC. c. Click the Get Token Files button. d. This will prompt you for your password and then start downloading the entire “C” files from $system.zspidef. This process could take several minutes, depending on your LAN speed. 2. The next step is to add the first threshold for event 102. This threshold will add the Job to the Jobs-in-progress window in ObjectMap. Specify the following information in the various fields. a. Subsystem/Object Type = EMS/Event b. Owner.Subsystem = Tandem.NetBatch c. Event number = 102 d. Object is in violation if “EXECUTE-DEFINED-ACTIONS” e. Comments – Any relevant text can be specified. f. 3. Monitoring – Active Click the Actions button and in the displayed dialog box specify the following information. a. Severity: Anything you want, eventually this will be enhanced to include Normal. b. Click the ObjectMap tab. i. Select add/update. ii. Click Map event using. iii. Click Lookup token numbers: Click where it says “select file to scan”. A list of files should be displayed. Select the file called ZBATC (netBATch). If no files are displayed, then step 1 was not completed successfully. In the left column (subject), select ZBAT Job Name ID. In the right column (manager), select ZBAT Scheduler ID. Click the Done button. c. Enter NetBatch as the Group Name. 98 d. Enter JobsInProgress as the Thresholdname. e. Click the OK button. f. Click the Apply button. NOTE: Be sure you click Apply to save the information for the next entry. 4. Add the second threshold for the same event – 102. This threshold will DELETE the Job from the Abended window in ObjectMap. All the data from above should still be available in the add threshold window. a. Change the comments if required. b. Click the Actions button. i. Click the ObjectMap tab. ii. Select Delete (at the top). iii. Change “JobsInProgress” to “AbendedJobs”. iv. Click the OK button. v. 5. Click the Apply button. Add the third threshold. This one will be for the event 202, which signifies that a job has ended successfully. All the previous data should still be available from the previous add. a. Change the Event Number to 202. b. Change the comments if required. c. Click the Actions button. i. Click the ObjectMap tab. ii. Make sure that the Delete option is still selected. iii. Change “AbendedJobs” to “JobsInProgress”. iv. Click the OK button. v. 6. Click the Apply button. Add the fourth threshold. This one will use the event number that is used when the job abends. This particular threshold will add it to the AbendedJobs window. a. Change the Event Number to 203 b. Change the comments if required. c. Click the Actions button. i. Click the ObjectMap tab. ii. Note that the Delete option is still selected and the threshold name is JobsInProgress. iii. Click the OK button. iv. Click the Apply button. 7. Add the fifth and last threshold. This is the abend event (203) and it will add it to the abended jobs window. a. Change the comments if required. b. Click the Actions button. i. Click the ObjectMap tab. ii. Change the Delete option to Add/Update. iii. Change the threshold name to AbendedJobs. iv. Click the OK button. v. Click the OK button. When you view the thresholds in the main configuration pane, you should see five thresholds – two for event 102, one for event 202 and two for event 203. 99 You can now use ObjectMap to view jobs that are in progress or in an abend state. However, since all of this is based on EMS messages, ObjectMap will not report any jobs that were started or abended before you added these thresholds. If you stop/restart ObjectMap, your pre-existing information will be lost and once again, you will only get information about new jobs that start, stop or abend. By clicking the JobsInProgress entry in the left pane of ObjectMap and clicking the ListMap icon on the top and then doing the same for AbendedJobs, you can have two windows that are visible concurrently that show the list of jobs in progress and those that have abended. These windows will be updated in real-time as long as ObjectMap is communicating with the backend. 100
© Copyright 2026 Paperzz