BMC PATROL For Microsoft Windows Servers Getting Started
BMC PATROL For Microsoft Windows Servers Getting Started
BMC PATROL For Microsoft Windows Servers Getting Started
Getting Started
Supporting
BMC PATROL KM for Microsoft Windows Operating System 4.2
BMC PATROL KM for Microsoft Windows Active Directory 1.6
BMC PATROL KM for Microsoft Windows Active Directory Remote Monitoring
1.7
BMC PATROL KM for Microsoft Windows Domain Services 1.5
BMC PATROL KM for Microsoft Cluster Server 1.7
BMC PATROL Cluster Configuration Wizard 1.5
BMC PATROL KM for Microsoft COM+ 1.3
BMC PATROL KM for Microsoft Message Queue 1.4
BMC PATROL KM for Event Management 2.8
BMC PATROL KM for Log Management 2.5
BMC PATROL Wizard for Microsoft Performance Monitor and WMI 2.1
BMC PATROL Adapter for Microsoft Office 1.1
BMC PATROL Agent 3.7
September 2009
www.bmc.com
Telephone
Fax
Fax
Customer support
You can obtain technical support by using the BMC Software Customer Support website or by contacting Customer
Support by telephone or e-mail. To expedite your inquiry, see Before contacting BMC.
Support website
You can obtain technical support from BMC 24 hours a day, 7 days a week at http://www.bmc.com/support. From this
website, you can
read overviews about support services and programs that BMC offers
find the most current information about BMC products
search a database for issues similar to yours and possible solutions
order or download product documentation
download products and maintenance
report an issue or ask a question
subscribe to receive proactive e-mail alerts when new product notices are released
find worldwide BMC support center locations and contact information, including e-mail addresses, fax numbers, and
telephone numbers
product information
product name
product version (release number)
license number and password (trial or permanent)
machine type
operating system type, version, and service pack or other maintenance level such as PUT or PTF
system hardware configuration
serial numbers
related software (database, application, and communication) including type, version, and service pack or
maintenance level
messages received (and the time and date that you received them)
(USA or Canada) Contact the Order Services Password Team at 800 841 2031, or send an e-mail message to
ContractsPasswordAdministration@bmc.com.
(Europe, the Middle East, and Africa) Fax your questions to EMEA Contracts Administration at +31 20 354 8702, or send
an e-mail message to password@bmc.com.
(Asia-Pacific) Contact your BMC sales representative or your local BMC office.
Contents
Chapter 1
17
18
18
18
19
19
20
21
22
28
30
30
31
31
31
32
34
34
35
35
35
35
36
37
Chapter 2
39
Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verifying installation requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Additional component-specific requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Virtual machine support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Turning off pop-up blocking software before installing . . . . . . . . . . . . . . . . . . . . .
Unsupported platform option in the installation utility user interface. . . . . . . . .
Extraneous target platform options available in the installation utility user
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking for product patches or fixes before installing . . . . . . . . . . . . . . . . . . . . .
Determining how to install products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
41
41
42
46
51
52
52
52
Contents
53
53
53
5
89
177
178
178
179
179
179
180
185
185
185
7
Using the PATROL KM for MS Windows Active Directory Remote Monitoring . . 196
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Application classes, menu commands, InfoBox items, and parameters . . . . . . . 196
Chapter 6
201
215
219
220
220
220
236
239
242
248
249
250
251
252
252
252
253
255
265
265
266
Appendix C
277
278
278
282
283
283
284
284
285
285
286
286
286
287
Index
291
Contents
10
Figures
Upgrading overview for PATROL for Windows Servers . . . . . . . . . . . . . . . . . . . . . . . 69
PATROL KM for Microsoft Cluster Server with external CLA configuration . . . . . . 77
PATROL KM for Microsoft Cluster Server with internal CLA configuration . . . . . . 77
Shipped rulesets in PATROL Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . 255
Using the child_list and variable_list variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
Figures
11
12
Tables
Monitored events - DNS name registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Core Active Directory service monitored events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
File replication service/group policy monitored events . . . . . . . . . . . . . . . . . . . . . . . . 27
Time synchronization service monitored events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Kerberos monitored events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Netlogon monitored events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
PATROL for Microsoft Windows Servers Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
System requirements for installing and using PATROL for Windows Servers . . . . 41
Advanced user rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Removing rights and admin group membership from the PATROL Agent . . . . . . . 48
Versions that you can migrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Choosing an upgrade procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Default values for PATROL location variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
KM file naming patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Monitoring configuration options for PATROL KM for Microsoft Cluster Server . . 76
PATROL for Microsoft Windows Servers .kml files . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Console functionality that requires local admin rights . . . . . . . . . . . . . . . . . . . . . . . . . 99
PATROL KM for Microsoft Windows OS configuration tasks . . . . . . . . . . . . . . . . . 104
Enabling and disabling system monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Event filter events:example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Event filter options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Default service monitoring flags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Service monitoring options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Configuration variable and service restart: combinations . . . . . . . . . . . . . . . . . . . . . 119
Process monitoring options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Regular expression syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Process control options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Event details displayed in the Windows Event Viewer dialog box . . . . . . . . . . . . . 126
Built-in recovery actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Selecting a recovery action instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Recovery action configuration options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Notification script location on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Requirements for notification server when using Windows e-mail clients . . . . . . . 135
Quick Config - Notification Server dialog box properties . . . . . . . . . . . . . . . . . . . . . 139
Notification server properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
PATROL Wizard for Microsoft Performance Monitor and WMI Tasks . . . . . . . . . 144
Reports for PATROL KM for Microsoft Windows OS . . . . . . . . . . . . . . . . . . . . . . . . 170
Reports for PATROL KM for Microsoft Windows Domain Services . . . . . . . . . . . . 171
Reports for PATROL KM for Microsoft Message Queue . . . . . . . . . . . . . . . . . . . . . . 172
Reports for PATROL for Microsoft COM+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Tables
13
14
Tables
15
16
Chapter
18
18
18
19
19
20
21
22
28
30
30
31
31
31
32
34
34
35
35
35
35
36
37
17
18
For more information about specific recovery actions, see the online Help, which you
can access from the PATROL console, or see Configuring recovery actions on
page 128.
19
Product components
Product components
The PATROL for Windows Servers product includes components and Knowledge
Modules (KMs) that manage and monitor elements of your server environment. A
KM is a set of instructions that the PATROL Agent uses to monitor objects in your
enterprise. PATROL for Windows Servers includes the following components and
KMs, which are described in the sections that follow.
20
Product components
For information about configuring these features, see Configuring the PATROL KM
for Microsoft Windows OS on page 103.
21
Product components
For a brief description of product features, see the sections that follow. For more
detailed information about how to use the product and complete descriptions of the
application classes and parameters, see the product online Help.
Managed systems
PATROL KM for Microsoft Windows Active Directory monitors the performance of
managed systems in a Microsoft Windows Active Directory environment. A PATROL
KM for Microsoft Windows Active Directory managed system is a Windows domain
controller onto which PATROL for Windows Servers has been installed.
A managed system provides a view of its Microsoft Windows Active Directory
environment. Each managed system is responsible for monitoring Microsoft
Windows Active Directorys key indicators that are required to ensure and maintain
the consistency of the Directory data and the desired level of service throughout the
Microsoft Windows Active Directory forest.
Replication monitoring
PATROL KM for Microsoft Windows Active Directory monitors the Microsoft
Windows Active Directory replication for errors and latency (to verify that replication
occurs within a reasonable time), both within a site (intrasite) and between sites
(intersite) in the configuration naming context and/or the domain context of the
current domain controller.
Directory replication is monitored at each managed system (domain controller). This
functionality includes monitoring basic replication by creating synthetic transactions
and verifying the replication of those transactions.
22
Product components
FSMO monitoring
PATROL KM for Microsoft Windows Active Directory monitors the availability of
the forest-wide and domain-wide flexible single master operations (FSMO) roles.
23
Product components
LDAP monitoring
PATROL KM for Microsoft Windows Active Directory monitors Lightweight
Directory Access Protocol (LDAP) locally at each monitored system for connection
availability and response time. The AD_AD_LDAP application class monitors the
performance of these LDAP requests.
SAM monitoring
PATROL KM for Microsoft Windows Active Directory monitors the Security Account
Manager (SAM). SAM provides legacy NT authentication support. The
AD_AD_SAM application class monitors these security requests.
Authentication monitoring
PATROL KM for Microsoft Windows Active Directory monitors Kerberos and NTLM
authentication requests made against the Microsoft Windows Active Directory
server. The AD_AD_AUTHENTICATION application class monitors these requests.
24
Product components
Event monitoring
To measure the overall health of the domain controllers, PATROL KM for Microsoft
Windows Active Directory configures the PATROL KM for Microsoft Windows OS to
monitor various events pertaining to
25
Product components
Event
Significance
System
DNSAPI
System
DNSAPI
System
DNSAPI
System
DNSAPI
System
NETLOGON
5773
System
NETLOGON
5774
Event Log
Source
Event
Significance
Directory
Service
all sources
Severity =
error
System
LSASS
Severity =
error
Product components
Table 3
Event log
Source
Event
Significance
FRS
all sources
Severity =
error
Application
USERENV
Severity =
error
User =
System
Application
SCECLI
Severity =
error
Event log
Source
Event
Significance
System
W32TIME
Severity =
error
Severity =
warning
Kerberos
To identify events that many indicate problems with Kerberos, the default
authentication protocol, PATROL KM for Microsoft Windows Active Directory
monitors the event shown in Table 5
Table 5
Event Log
Source
Event
Significance
System
KDC
Severity =
error
Net Logon
To identify events that may indicate problems with Net Logon service and protocol,
which is required for proper domain controller functionality, PATROL KM for
Microsoft Windows Active Directory monitors the events shown in Table 6 on
page 28.
27
Product components
Table 6
Event log
Source
Event
System
NETLOGON Severity =
error 5705,
5723
Significance
critical NETLOGON service errors
FSMO monitoring
PATROL KM for Microsoft Windows AD Remote Monitoring monitors both the
forest-wide and domain-wide Flexible Single Master Operation (FSMO) roles.
Active Directory supports multi-master replication of the directory data between all
domain controllers in the domain. This model takes domain configuration changes
made at any domain controller in the domain and automatically propagates those
changes to each of the domain controllers in the domain.
However some changes do not lend themselves to a multi-master environment. One
domain controller, the operations master, accepts requests for such changes. The
operations master roles can be moved between domain controllers within the domain
and are referred to as Flexible Single Master Operation (FSMO) roles. In any Active
Directory forest, there are five FSMO roles that are assigned to one or more domain
controller. Some FSMO roles must appear in every forest, while other roles must
appear in every domain within the forest.
The following operations master roles must appear in every forest:
28
schema master
domain naming master
Product components
relative ID master
infrastructure master
primary domain controller (PDC) emulator
NOTE
Domain controllers and the client must be able to locate and establish an LDAP connection
with the FSMO role holders.
LDAP monitoring
Lightweight Directory Access Protocol (LDAP) is monitored locally at the managed
node. LDAP response time is measured as the amount of time required to establish an
LDAP connection to a domain controller. Longer connect times may indicate a
heavily loaded domain controller. To eliminate network latency, response time for
performing an LDAP bind operation is measured on the domain controller being
tested.
A DNS address record (A record) that matches the IP address of the domain
controller and is registered with the DNS server.
A DNS LDAP service location (SRV) record that matches the host name of the
domain controller and is registered with the DNS server.
To obtain information about this record, the KM sends the following query to the
default DNS server: _ldap._tcp.dc._msdcs.fullyQualifiedDomainName.
A global catalog LDAP SRV record that matches the host name of the global
catalog for the domain controller and is registered with the domain controller.
To obtain information about this record, the KM sends the following query to the
default DNS server: _ldap._tcp.dc._msdcs.fullyQualifiedForestRootDomainName.
29
Product components
domain controllers
member servers
For instructions on how to monitor these features, see the PATROL KM for Microsoft
Windows Domain Services online Help system.
30
all clusters in a domain (only available when the agent is outside of the cluster)
individual clusters
cluster communication networks
cluster network interfaces
cluster nodes
cluster objects and resources
cluster groups
workload data
group resources
quorum device
Product components
For more information about specific functionality that supports these features see the
PATROL KM for Microsoft Cluster Server online Help.
MSMQ service
MSMQ queues
MSMQ messages
MSMQ roundtrip message time
For instructions on how to monitor these features, see the PATROL KM for Microsoft
Message Queue KM online Help system.
31
Product components
The PATROL KM for Microsoft COM+ product monitors and manages the following
functions for Windows servers:
For instructions on how to use these features, see the PATROL KM for Microsoft
COM+ KM online Help system.
The PATROL KM for Log Management also provides the following management
features:
32
triggers alerts when a text string or regular expression is discovered within a log
file
creates automated recovery actions when a log file exceeds an acceptable size or
growth rate
Product components
creates robust searches by using NOT and AND statements with the text strings or
regular expressions in the log search
sets multiple schedules for multiple polling cycles per log file
You can set up the following predefined recovery actions to execute when monitored
log files exceed a specified size or growth rate.
To get started with the PATROL KM for Log Management, see Configuring the
PATROL KM for Log Management on page 149. For detailed instructions, see the
BMC PATROL KM for Log Management User Guide and the PATROL KM for Log
Management online Help system.
33
Product components
To get started with the PATROL KM for Event Management, see Configuring e-mail
notification on page 133. For more detailed instructions and reference information,
see the PATROL KM for Event Management User Guide.
34
Services
PATROL Agent
PATROL for Windows Servers includes the PATROL Agent. The PATROL Agent
monitors a system according to the instructions provided by loaded PATROL KMs.
You can display the information gathered by the PATROL Agent on the PATROL
Console. For more information, see the PATROL Agent Reference Manual.
Services
The PATROL for Microsoft Windows Servers product uses the following services:
Table 7
Service
Component or KM
PatrolAgent
PATROL Agent
yes
no
35
Related documentation
Related documentation
For additional information about PATROL for Windows Servers, see the online Help
for the component of interest and refer to the PATROL for Microsoft Windows
Servers release notes. For information about the PATROL for Windows Servers
parameters, see the product Help or the PATROL Parameter Reference Manual. For
additional information about PATROL, see the following documentation:
To view the complete PATROL documentation library, visit the support page on the
BMC Software Web site at http://www.bmc.com/support. Log on and select a
product to access the related documentation.
To log on if you are a first-time user and have purchased a product, you can request a
permanent user name and password by registering at the Customer Support page. To
log on if you are a first-time user and have not purchased a product, you can request a
temporary user name and password from your BMC Software sales representative.
36
See...
how to load and configure the components using a Chapter 3, Loading and configuring PATROL for
PATROL console
Microsoft Windows Servers
troubleshooting configuration problems
PATROL for Windows Servers agent configuration Appendix B, Agent configuration variables and
variables and predefined rulesets
rulesets
KMs included in each PATROL for Windows
Servers .KML file
37
38
Chapter
This chapter provides the information that you need to install PATROL for Windows
Servers. For additional information about the PATROL installation process, see the
PATROL Installation Reference Manual. The following topics are discussed in this
chapter:
Installation overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Verifying installation requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Additional component-specific requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Virtual machine support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Turning off pop-up blocking software before installing . . . . . . . . . . . . . . . . . . . . .
Unsupported platform option in the installation utility user interface. . . . . . . . .
Extraneous target platform options available in the installation utility user
interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking for product patches or fixes before installing . . . . . . . . . . . . . . . . . . . . .
Determining how to install products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining the version of the installation utility . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining where to install the PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing the PATROL Agent over an existing installation . . . . . . . . . . . . . . . . . .
Extracting installation files after download. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Determining where to install KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PATROL Security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assessing and implementing a different security level . . . . . . . . . . . . . . . . . . . . . .
Default and custom installation types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
First-time installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing for the first time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
First-time installation using Distribution Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Distribution Server features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing a CD or customized installation package into Distribution Server. . .
Installing with the Distribution Server (overview) . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2
40
41
41
42
46
51
52
52
52
53
53
53
54
54
54
54
55
56
56
57
57
58
58
63
63
64
65
39
Installation overview
Installation overview
This chapter contains instructions for installing PATROL for Windows Servers. For
additional installation instructions, see the following documents:
Component
See
PATROL Perform Agent for Microsoft Getting Started with PATROL for Microsoft Windows
Windows Servers
Servers Performance
40
system requirements
requirements for specific PATROL for Microsoft Windows Servers components
account requirements
System requirements
Verify that the target computer meets the installation requirements listed in Table 8
on page 41. These requirements apply to all PATROL for Windows Servers
components.
Table 8
System requirements for installing and using PATROL for Windows Servers (Part 1 of 2)
Resource
Requirements
Comments
operating
systems
security levels
PATROL
products
license
ports
(UDP/TCP)
Chapter 2
41
Table 8
System requirements for installing and using PATROL for Windows Servers (Part 2 of 2)
Resource
Requirements
Comments
(UNIX only)
browser to
support online
Help for
PATROL
Console for
UNIX
Use Netscape Navigator version 3.014.78 to use Browser version required for viewing
online Help with PATROL for UNIX.
PATROL Console for UNIX Help on
page 80
browsers
disk space
151 MB for an agent
needed to install (without components and KMs)
151 MB for a console
(without components and KMs)
242 MB for an agent
(with all solution components and KMs)
116 MB for a console
(with all solution components and KMs)
Monitor
(for Console)
256-color display
File system
FAT or NTFS
Network
42
NT_DHCP parameters
WpReplicationFailures parameter
executing the WINS Database Scavenging menu command
As a default, the SNMP service is configured to accept SNMP packets from any host.
If the service is configured to accept packets from hosts, then the local host IP address
or hostname must be added to the list of hosts. It is not sufficient to add localhost or
the loopback address 127.0.0.1.
At a minimum, the SNMP community string must have READ permissions. To
initiate the WINS Database Scavenging menu command, the community string must
have WRITE permissions as well.
On Windows 2000 servers, the community string must be an ASCII character string.
Microsoft Windows 2000 does not support non-ASCII characters in community
strings.
For the NT_DHCP application class to work, the default PATROL Agent account
must have full access to %PATROL_HOME% and all subdirectories. On Windows
2003 and later, the default PATROL Agent account must also be a member of the
DHCP Users group.
Process monitoring
To monitor processes, the PATROL Agent must have access to the following hive and
all sub-keys:
HKLM\SOFTWARE\Microsoft\WindowsNT\perflib
43
PATROL KM for Windows Active Directory requires that the Event Log component
of PATROL KM for Microsoft Windows Servers is active. By default the Event Log
component is active. For more information, see Configuring Windows events
monitoring on page 106.
PATROL for Windows Servers monitors Microsoft Windows Active Directory only
when Microsoft Windows Active Directory is running on domain controllers.
PATROL KM for Microsoft Windows Active Directory supports the Read Only
Domain Controller support on Microsoft Windows 2008.
44
Chapter 2
45
Accounts
This section describes how to set up a PATROL installation account for Windows.
Stand-alone workgroup servers must use a local user account as a PATROL Agent
default account.
Servers that are trusted members of a domain can use either a local or a domain
account.
Domain controllers must use a PATROL Agent default account that is also a
domain account.
NOTE
If you are not using the PATROL Agent default account as a Console connection account, you
will need to have the Log on locally account rights for the connection account.
PATROL Agent first tries to log on locally; if this fails, it tries to connect to the console by
using the network login rights.
KM functions performed
The PATROL Agent uses the PATROL Agent default account to perform the
following KM functions:
46
Agent Dependency
Debug programs
Increase quotas
Log on as a service
Administrative rights
BMC Software recommends that you make the PATROL Agent default account a
member of the local Administrators group of the computer where the agent will
reside. On a domain controller, BMC Software recommends that you make the
account a member of the domain Administrators group.
However, you can choose to remove the PATROL Agent default account from the
local or domain Administrators group. You could also remove the advanced user
rights described in Table 9 on page 47. However, if you do so, the PATROL Agent
cannot perform all of its tasks. Table 10 on page 48 shows the PATROL for Microsoft
Windows Servers tasks that the Agent cannot perform when the following
restrictions are placed on the PATROL Agent default account:
The account is in a domain user group or local user group, but is not in the domain
or local administrators group.
The account does not have all of the advanced user rights noted in Table 9 on
page 47.
Chapter 2
47
Table 10
Removing rights and admin group membership from the PATROL Agent (Part 1 of 3)
KM
Effect
PATROL KM for
Windows Operating
System
48
Table 10
Removing rights and admin group membership from the PATROL Agent (Part 2 of 3)
KM
Effect
PATROL KM for
Microsoft Windows
Active Directory
PATROL KM for
Microsoft Cluster Server
Chapter 2
49
Table 10
Removing rights and admin group membership from the PATROL Agent (Part 3 of 3)
KM
Effect
PATROL KM for
Microsoft Windows
Domain Services
WARNING
Do not use a built-in Windows domain or local Administrator account as the PATROL default
account. Such account usage causes files created by PATROL to be owned by the
Administrator, which could result in security or file access problems.
50
An internal CLA configuration can use either a separate user-defined cluster account
(a domain account with cluster administrative privileges) or, when certain
requirements are met, it can use the PATROL default account.
When installed, if the PATROL KM for Microsoft Cluster Server does not discover a
separate cluster account, it checks the PATROL agent default account for the
following required characteristics:
If these requirements are in place, the Cluster KM uses the PATROL agent default
account to access the cluster and to communicate with the agents running on all other
nodes in the cluster, and the PATROL MCS Service runs under this account.
This account information is not replicated to other nodes so, if you want the Cluster
KM to use the PATROL agent default account to monitor the cluster, these
requirements must exist for every PATROL agent default account on every node in
the cluster.
To discover the PATROL KM for Microsoft Cluster Server you require the Logon as a
batch job privilege for cluster account and PATROL Default Account.
Chapter 2
51
ensure that pop-up blocking software is turned off before installation (see page 52)
determine if you are using an unsupported platform option in the installation
utility user interface (see page 52)
determine the extraneous target platform options available in the installation
utility user interface (see page 53)
check for product patches or fixes before installing (see page 53)
verify if you are installing PATROL Agent on top of an existing installation (see
page 54)
determine the order in which you must extract the installation files after download
(see page 54)
determine how to install products (see page 53)
ensure you are using the appropriate version of the installation utility (see page 54)
understand where to install the PATROL Agent and KMs (see page 54)
understand PATROL security options (page 56)
choose between Default and Custom installation options (see page 57)
52
WARNING
Do not select the Windows NT 4.0 (Intel) platform when building an installable image.
None of the preceding platforms are supported by the PATROL for Microsoft
Windows Servers solution. Do not select these target platforms when building an
installable image.
53
54
EXAMPLE
If you downloaded the following components, you must extract them in this order:
1. installation utility (extract first)
2. PATROL KM for Log Management
3. PATROL Agent for Microsoft Windows Servers
4. PATROL for Microsoft Windows Servers (extract last)
Chapter 2
55
When installing these KMs on a PATROL console computer, select Console Systems
as the system role during the installation.
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the products respective online help systems and the following
documents:
56
1 From the command line switch to the path on the computer that you want to check:
%BMC_ROOT%\common\security\bin\Windows-x86
2 Run the following command to display the security policy of the current machine:
esstool policy -a
The security level is displayed in the security level field of the output.
The Default installation type uses default values for all optional configuration
information. It prompts you only for mandatory configuration information. This
type is for any or all of the following situations:
You are new to the PATROL product that you are installing and you have an
agent or console already installed in the default directories.
You are performing a first-time installation (you are not upgrading), and you
are installing into the default product installation directories.
NOTE
If you are installing PATROL for Windows Servers to an existing PATROL Agent or Console
environment that is not in the default installation directory, use Custom. Do not use Default.
Default will automatically install the agent or console with PATROL for Windows Servers and
overwrite your existing installation.
Chapter 2
57
First-time installation
With the Custom installation type, you can install individual components of the
product. It requires that you specify all configuration information. This type is for
any or all of the following situations:
You want to install individual components rather than the entire product.
You want to specify the following settings:
the port numbers that components use to communicate with each other
a security level greater than basic security
any other product settings that a user might want to change
You are upgrading PATROL for Windows Servers from a previously installed
version.
You are installing into an existing PATROL environment that is not in the
default installation directory.
With each installation type, you can always deselect any components that you do not
want to install.
First-time installation
The installation utility offers two types of installations: Default and Custom. For a
description of the two types of installations, see Default and custom installation
types on page 57.
NOTE
By default, the Default installation type configures the PATROL Agent to connect through
port 3181. If you want to connect the agent from a different port, you must use the Custom
installation type.
58
You first should install on a limited number of computers in the test environment,
test the installation thoroughly, and then install in your production environment.
First-time installation
A From a command line, change to the directory where the installation utility is
located and enter the following command to change to installation mode:
change user/install
A message box is displayed that shows the URL to use to connect to the
installation Web server.
3 In the Welcome to the Installation Utility window, click Next to begin your
installation.
4 Review the license agreement, select Accept, and click Next to continue.
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next to continue.
6 In the Select Type of Installation window, select Default and click Next to continue.
7 In the Specify Installation Directory window, accept the default directory and click
Next to continue.
Chapter 2
59
First-time installation
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
If you are installing to a computer that hosts or will host only a PATROL
Console for Windows, select Console Systems.
If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed Systems.
If you are installing to a computer that hosts or will host the PATROL Central
Operator Web Edition, or the PATROL Console Server select Common Services.
9 From the Select Products and Components to Install window, select components
that you want to install or accept the defaults and click Next.
10 In the PATROL Default Account Properties window, enter the user name and
password that you want to use for your PATROL default account and click Next.
This window is displayed only when you are installing a product that requires a
PATROL logon.
You should have created this account manually before you began to install
PATROL. (For more information, see Accounts on page 46.)
11 In the Review Selections and Install window, review your selections and, to make
changes, click Back or, to start installing, click Start Install.
A status window opens that contains current messages, current milestones, and
percentage complete.
12 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
13 (Optional) In the results window, click View Log to review the details of the
installation.
60
First-time installation
A From a command line, change to the directory where the installation utility is
located and enter the following command to change to installation mode:
change user/install
A message box is displayed that shows the URL to use to connect to the
installation Web server.
5 In the Select Installation Option window, select I want to install products on this
computer now and click Next.
6 From the Select Type of Installation Window, select Custom and click Next.
7 In the Specify Installation Directory window, enter the directory where the
products that you select will be installed and click Next.
The PATROL product directory is appended to the path that you enter in this step.
You will specify the PATROL product directory in step 10 on page 62.
8 In the Select System Roles window, select any or all of the following roles to
indicate the components that you want to install and click Next:
If you are installing to a computer that hosts or will host a PATROL Console,
select Console System.
If you are installing to a computer that hosts or will host a PATROL Agent,
select Managed System.
If you are installing to a computer that hosts or will host the PATROL Central
Operator Web Edition or the PATROL Console Server, select Common Services.
Chapter 2
61
First-time installation
For more information about the PATROL consoles and PATROL Console Server or
RTserver, see the following documents:
9 From the Select Products and Components to Install window, select the items that
you want to install, and click Next.
10 In the Provide the PATROL 3.x Product Directory window, enter in the PATROL
3.x Product Directory field the directory in which you want to install PATROL for
Windows Servers as appropriate for your installation.
This directory is appended to the base directory path that is shown in the BMC
Products Installation Directory field entered in step 7 on page 59.
11 If the PATROL Default Account Properties window appears, enter the user name
and password that you want to use for your PATROL default account and click
Next. This window is displayed only when you are installing a product that
requires a PATROL logon.
You should have created this account manually before you started the installation
process. (For more information, see Accounts on page 46.)
12 In the Complete the Confirm BMC Product Startup Information window, perform
the following steps (this window does not appear if you are not installing into a
managed system):
A In the Specify the Current Agent Port Number field, enter the port number that
you want the PATROL Agent to use. The default is 3181.
NOTE
If your previous installation used a different port number, change the default to the
current port number for the PATROL Agent.
B In the Restart the PATROL agent automatically? field, click Yes or No.
13 In the Review Selections and Start Install window, review the selections and, to
make changes, click Back or, to start installing, click Start Install.
14 When the status window reports that the installation is 100% complete, click Next
to view the results window. (Next does not appear until the installation is 100%
complete.)
62
15 (Optional) In the results window, click View Log to review the details of the
installation.
Install, uninstall, upgrade, and reinstall products on remote systems from one
central location.
View reports to check distribution status, gather distribution data, and diagnosis
problems.
To import PATROL for Windows Servers into the Distribution Server, perform the
following tasks: Importing a CD or customized installation package into
Distribution Server on page 64.
Chapter 2
63
Ensure that you use the Distribution Server version 7.1.01 or later.
EXAMPLE
Assuming that you copied the CD image into a directory called merged_CD and then, after
migrating your customizations and creating a customized installation package, you copied the
updated package to the directory containing the CD image, the resultant directory structure
would resemble merged_CD\Products\pokchm. You would select the directory
merged_CD.
6 Select the check boxes for the components that you want to import and click OK.
7 Click Import to import the selected components.
64
To set up products
1 Import components into the Distribution Server repository on the Components tab
of the Distribution Manager.
2 Add accounts and create profiles for the systems on the Systems tab of the
Distribution Manager.
3 Add the systems and install the Distribution Client on the Systems tab of the
Distribution Manager.
4 Arrange systems in system groups on the Systems tab of the Distribution Manager.
To distribute products
1 Distribute configurations of collections to system groups on the Distributions tab of
the Distribution Manager.
2 Run reports to review distributions on the Reports tab of the Distribution Manager.
For detailed instructions about how to perform remote installations with the
Distribution Server, see the Distribution Server Getting Started Guide.
Chapter 2
65
NOTE
Customized Knowledge Modules and PSL files are also stored in the cache but they are not
automatically preserved and incorporated.
Component
Version
66
Table 11
Component
Version
When the PATROL KM for Microsoft Windows Active Directory is installed on a server that
has PATROL KM for Windows Domain Services 1.3.00, 1.4.00, or 1.4.01 installed, the
application classes that begin with NT_AD are automatically disabled. These disabled
application classes are recorded in the configuration variable /AgentSetup/disabledKMs.
Chapter 2
67
Variable
Default value
PATROL_HOME
PATROL_CACHE
%HOMEDRIVE%\%HOMEPATH%\<PATROL_directory>
Figure 1
No
Saving
customizations?
Installing over an
existing PATROL for
Windows Servers
installation?
Yes
Yes
No
No
Yes
migrating
manually
Import merged package into the Distribution Server and start installer using instructions in
Importing a CD or customized installation package into Distribution Server on page 64.
Chapter 2
69
NOTE
Customizations applied using PATROL Configuration Manager or operator overrides are
automatically saved in the agent configuration database. They will take effect automatically
unless the parameter name or application name has changed. In either of those cases, you
must reapply the customizations.
When installing PATROL for Microsoft Windows Servers over an existing version, if
you stop PATROL services manually (not normally required) before running the
installation program, stop the PatrolAgent service (PatrolAgent.exe) first, followed by
any other PATROL services.
NOTE
To upgrade and preserve customizations, you must either migrate your customizations
manually or use the PATROL Migration Tools version 3.5 to create a customized installation
package. If you are using the Distribution Server to install the merged customization package,
ensure that you have the latest version of the product installed as well as any available
patches.
70
Preparing to upgrade
Whether you are upgrading and migrating customizations or simply upgrading, you
must first back up the current installation. If the .kml file or any of the .km files for the
new version of PATROL for Windows Servers has a different file name from the
previous version, you must remove those files from the list of KMs that are preloaded
on the PATROL Agent.
1 Shut down any PATROL Agents, consoles, and related services that are currently
running.
Directory
console customizations
Chapter 2
71
If you have localized parameters or global parameters that have customized poll
times or thresholds, use the AS_CHANGESPRING KM to migrate these
customizations into PATROL Configuration Manager rulesets as described in the
PATROL Configuration Manager User Guide.
1 Copy the entire contents of the PATROL for Windows Servers CD to a temporary
directory on a hard drive on a server. You can delete this temporary directory after
you have successfully created an installable image.
2 Navigate to the packaged_results directory for the merged package and open the
.ppf file with a text editor. Write down the file name in the first line of the .ppf file.
This file name is the name of the directory that you will look for in the Products
3 Rename the packaged_results directory with the file name that you found in the .ppf
file in the previous step.
EXAMPLE
If pokckm/8.5.00/030107-233044 was listed in the first line of the .ppf file, you would use
pokckm as the directory name.
4 Copy the renamed directory to the Products directory of the temporary directory
that you used in Step 1. You will be replacing the files there with the merged files
that contain your customizations.
5 Copy the PATROL for Windows Servers CD image to the server that you will use
to install PATROL for Windows Servers.
Install PATROL for Windows Servers from the target server by following the
instructions in Installing for the first time on page 58.
Import the customized version of PATROL for Windows Servers into the
Distribution Server by following the instructions in Importing a CD or
customized installation package into Distribution Server on page 64.
Component
Naming pattern
NT_*
PATROL*
RECOVERY*
Com*
Chapter 2
73
Table 14
Component
PATROL KM for Microsoft Message Queue
Naming pattern
MQ*
MSMQ*
MSDM*
NT_*
NTD_*
AD*
MWD*
MCS*
AS*
EVENT*
LOG*
PMG*
H*.km
H*.psl
History-*
History_Loader*
Hist*
COM_DEB_*
COM_STAT_*
NT_WMI*
NT_PERFMON*
4 Identify and record the coding changes, which represent your customizations, in
PATROL for Windows Servers by comparing the content of the ASCII files in the
newly installed PATROL for Windows Servers version with the content of the
customized ASCII files with the same name that is saved in the directory to which
you moved the old version.
74
If you modified .psl files that were shipped by BMC Software, you must manually
re-edit the PSL code in the new KM by using a PATROL developer console to
reapply your changes.
If you modified PSL code embedded in a .km file, that code will be overwritten
when you install a new version of the product. You must manually edit the new
.km files by using a PATROL developer console to reapply your changes.
If you created a new PSL file (not shipped by BMC Software) outside of a .km file,
Installing PATROL for Microsoft Cluster Server
Chapter 2
75
Table 15
Monitoring
configuration
Characteristics
external CLA
internal CLA
76
Figure 2
Cluster 1
Node 1
Node 1
Cluster-level
agent computer
Node 2
Node 2
Cluster 1
Node 2
While the PATROL KM for Microsoft Cluster Server (MCS KM) is loaded on all of the
agents on all of the nodes in the cluster, only the MCS KM on the quorum-owning
node actively monitors the cluster.
Chapter 2
77
know the user name and password of the cluster connection account
installed the PATROL KM for Microsoft Windows OS and loaded the
NT_BASE.kml
NOTE
If you use Windows Server 2008 as an external CLA, you must install Failover Clustering tools
from Server Manager. By default, the cluster.exe is not present in Windows 2008 non-cluster
computer.
78
Installation process
The PATROL KM for Microsoft Cluster Server installation process consists of the
following tasks:
WARNING
Do not load the PATROL KM for Microsoft Cluster Server on a virtual agent.
PATROL Agent
PATROL KM for Microsoft Cluster Server
PATROL KM for Microsoft Windows
2 This task is only required if you are using an external CLA. Install the following
components on each computer that contains an external cluster-level agent:
PATROL Agent
PATROL KM for Microsoft Cluster Server
3 Install the PATROL KM for Microsoft Cluster Server on the computer that has
your PATROL Console. This component can exist on the same computer as the
external cluster-level agent or on a cluster node.
Chapter 2
79
Installation requirement
You must install Netscape Navigator on the computer where the PATROL console
resides. You can install Netscape anywhere on your UNIX computer as long as the
binary is in the path.
Download location
Netscape Navigator is supplied by Netscape Communications Corp. You can locate
the browser at http://home.netscape.com/download.
80
The Exceed for Windows product by Hummingbird Communication Ltd. may not
always display the Help files properly.
LANG variable
The UNIX LANG environment variable must be set to C so that Netscape Navigator
will work properly. Otherwise, you might experience product failures.
Type of shell
Bourne
LANG=C
export LANG
Korn
export LANG=C
setenv LANG=C
PATH variable
The PATROL user account PATH variable must contain the location of the directory
containing the Netscape files. If the directory containing the Netscape files is not in
the path, add the directory to the PATROL user account path.
This requirement applies only to the PATROL user account on the PATROL console
computer.
Type of shell
Bourne
PATH=$PATH:/netscape_location
export PATH
Korn
export PATH=$PATH:/netscape_location
setenv PATH=$PATH:/netscape_location
PATROL_BROWSER variable
When PATROL starts the Help browser, it uses the command in the
PATROL_BROWSER environment variable. As a default, the PATROL_BROWSER
environment variable contains the following command:
Chapter 2
81
Type of shell
Bourne
Korn
EXAMPLE
For a Korn shell:
export PATROL_BROWSER=/usr/local/bin/netscape -raise
82
WARNING
If you use a different version of the installation program to uninstall the product than the
version that you used to install the product, you might remove files that are needed to
perform uninstallation of other BMC Software products.
Chapter 2
83
NOTE
As an option, you can launch the installation utility in uninstall mode by choosing Start =>
Settings => Control Panel => Add/Remove Programs and double-clicking BMC Software
Tools in the Add/Remove Programs Properties dialog box.
A From a command line, change to the directory where the installation utility is
located and enter the following command to change to installation mode:
change user/install
B Change to the Uninstall directory and enter the following command to start the
installation Web server:
uninstall.exe -serveronly
A message box is displayed that shows the URL to use to connect to the
installation Web server.
2 Select the installation directory from which you want to remove a product, and
click Next.
3 Select the product or products that you want to uninstall, and click Next.
4 Review your selections and click Uninstall.
After the uninstallation is complete, a window is displayed that tells you whether
the uninstallation was successful.
84
3 Open the uninstall.ctl file in a text editor, and edit the /BMC/Base variable to specify
the name of the directory from which you removed the products in step 1.
Use the following table to help determine the log file and output log file locations:
Option
Description
Value
-log
-output
This file contains all messages about the If a space exists in the path, the entire
path must be enclosed in quotation
progress of the installation that are
marks.
normally sent to standard output.
Chapter 2
85
Example
If C:\Program Files\BMC Software is your product installation directory, you would
change to the C:\Program Files\BMC Software\Uninstall\ Install\instbin directory and
enter the following command:
thorinst.exe -uninstall C:\Program Files\BMC
Software\Uninstall\Install\instdata\uninstall.ctl -log
Z:\NetworkLogs\MyLogs.txt -output Z:\NetworkLogs\MyLogs.out
This action would remove all installation files and directories except those that are
used by the utility at the time the uninstallation was performed. Log files,
configuration files, and user-modified files would also be retained.
3 Open the uninstall-all.ctl file in a text editor, and edit the /BMC/Base variable to
specify the name of the directory from which you removed the products in step 1.
86
Use the following table to help determine the log file and output log file locations:
Option
Description
-log
sends the log information to a standard any valid path and file name (with a
.txt extension)
log file
-output
Value
This file contains all messages about the If a space exists in the path, the entire
progress of the installation that are
path must be enclosed in quotation
normally sent to standard output.
marks.
Example
If C:\Program Files\BMC Software is your product installation directory, you would
change to the C:\Program Files\BMC Software\Uninstall\Install\instbin directory and
enter the following command:
thorinst.exe -uninstall C:\Program Files\BMC
Software\Uninstall\Install\instdata\uninstall-all.ctl -log
Z:\NetworkLogs\MyLogs.txt -output Z:\NetworkLogs\MyLogs.out
This action would remove all installation files and directories. The files that were
used to perform the uninstallation will be marked for deletion and will be removed
when the computer on which the products were uninstalled is rebooted.
Chapter 2
87
Source of Information
setting up and configuring PATROL for Chapter 3, Loading and configuring PATROL for
Windows Servers
Microsoft Windows Servers, and PATROL for
Windows Servers component online Help
88
Chapter
This chapter provides information about how to begin using and configuring the
PATROL for Microsoft Windows Servers components. The following topics are
discussed in this chapter:
Preparing to use PATROL for Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Loading and preloading KMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Loading the PATROL for Microsoft Windows Servers KMs . . . . . . . . . . . . . . . . . 93
Preloading KMs on the PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Requirements for configuring from the PATROL Console. . . . . . . . . . . . . . . . . . . 99
Configuring the PATROL KM for Microsoft Windows OS. . . . . . . . . . . . . . . . . . . . . 103
Enabling and disabling system monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Configuring Windows events monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Configuring service monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Configuring process monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Creating custom parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Viewing event logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Configuring Blue Screen monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Notifying when disks are not present . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Providing nonaggregate values for a drive instance . . . . . . . . . . . . . . . . . . . . . . . 128
Configuring recovery actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
About recovery actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Built-in native recovery actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Configuring built-in native recovery actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Configuring e-mail notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Using notification scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Defining notification servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Assigning notification servers for the remote agents. . . . . . . . . . . . . . . . . . . . . . . 140
Assigning notification targets for a PATROL alert. . . . . . . . . . . . . . . . . . . . . . . . . 142
Configuring the PATROL KM for Microsoft Active Directory . . . . . . . . . . . . . . . . . . 143
Configuring PATROL Wizard for Microsoft Performance Monitor and WMI . . . . 144
Loading the PATROL Wizard for Microsoft Performance Monitor and WMI . 144
Creating performance monitor parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Setting alarm thresholds. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Chapter 3 Loading and configuring PATROL for Microsoft Windows Servers
89
90
If PATROL for Windows Servers has not been installed, see Chapter 2, Installing
and migrating PATROL for Windows Servers. After installing, return to this section
for information about how to configure the components.
Before configuring the PATROL for Windows Servers components, you should verify
that the following software requirements are met:
A supported version of a PATROL Console version 3.x and PATROL for Windows
Servers must be installed on the computer you want to use for the PATROL
Console.
A supported version of the PATROL Agent and PATROL for Windows Servers
must be installed on the computer you want to monitor and manage.
NOTE
For supported versions of PATROL products, see the release notes for the version of PATROL
for Microsoft Windows Servers that you are installing.
You should also verify that you have access to all required information about the
monitored domain controllers or Windows servers.
EXAMPLE
If you want to monitor the operating system, ensure that you have the PATROL Console and
the PATROL KM for Windows OS installed on the console machine and the PATROL Agent
and the PATROL KM for Windows OS installed on the agent machine.
91
Table 16
.kml file
Component
Description
COM.kml
HISTORY.kml
MSMQ.kml
92
Table 16
.kml file
Component
Description
NT_LOAD.kml
NT_BASE.kml
NT_HYPER-V.kml
MWD_ACTIVE_Dire PATROL KM for Windows Active
ctory_MN.kml
Directory
NTD.kml
MCS_Load.kml
PATROL KM for Microsoft Cluster Server loads application classes that are used to
monitor Microsoft server clusters
LOG.kml
the components that you want to load on the agent and console computers are
installed
the agents to which you want to load components are running
the PATROL Console is running
93
3 Click OK.
NOTE
If you have installed PATROL KM for Microsoft Windows OS over a previous version, the
first time you load the KM, several minutes may be required to migrate forward existing
configuration settings. If the KM icons do not appear within 10 minutes, open and read the
information in the PATROL system output window.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product component
files. Loading individual .km files can break the interdependencies between the .km files.
3 Click Open.
NOTE
If you have installed PATROL KM for Microsoft Windows OS over a previous version, the
first time you load the KM, several minutes may be required to migrate forward existing
configuration settings. If the KM icons do not appear within 10 minutes, open and read the
information in the PATROL system output window.
NOTE
Unless you are an advanced PATROL user, use the .kml files to load product component
files. Loading individual .km files can break the interdependencies between the .km files.
94
4 From the Knowledge Modules screen, select the KMs that you want to load. For
detailed information about the application classes that are loaded with these .kml
files, see PATROL for Microsoft Windows Servers .kml files on page 278.
5 Click Finish.
The KMs that you selected are loaded on the managed system, added to your
management profile, and displayed in the PATROL Central Operator tab.
1 From the Monitored Systems page, click the Load/Unload KMs button.
The Load KMs page opens, listing each computer on which a PATROL Agent has
been installed.
2 Select the computers on which you want to load KMs, and click Next.
The Load KMs page displays a list of available .km and .kml files.
If you selected more than one computer, the only .km and .kml files that are listed
are the ones that have been installed on all of the selected computers. If a particular
.km or .kml file was installed only on one computer, you must choose that
computer by itself to load the file.
95
NOTE
If you want to load a .km or .kml file that was not listed in Step 2, ensure that the KM is
installed on the appropriate computer and select only that computer in Step 2.
use the PATROL Configuration Manager to apply one of the predefined rulesets to
the PATROL Agent (see PATROL for Microsoft Windows Servers rulesets on
page 252)
The wpconfig utility must be installed on a computer that can access machines that
are running the PATROL Agent over the network.
You must have permission to modify the configuration change file (.cfg).
96
3 In the Host Name field, enter the name of a computer that is hosting the PATROL
Agent and click OK.
The wpconfig utility gets the PATROL Agents configuration.
5 Scroll down the variable list and double-click the preloadedKMs variable.
The Modify Variable dialog box is displayed.
9 Click OK.
The Change Entry dialog box closes.
97
The wpconfig utility must be installed on a computer that can access machines that
are running the PATROL Agent over the network.
You must have permission to modify the configuration change file (.cfg).
To use wpconfig to remove a KM from the preload list in the PATROL Console
for Microsoft Windows
1 From a Windows command window, type wpconfig.
The wpconfig window is displayed.
3 In the Host Name field, enter the name of a computer hosting the PATROL Agent
and click OK.
The wpconfig utility gets the PATROL Agents configuration.
5 Scroll down the variable list and double-click the preloadedKMs variable.
The Modify Variable dialog box is displayed.
98
8 In the Value field, delete the .kml file names that you want to remove from the
preload list. See Appendix C, PATROL for Windows .kml files for a list of the
KMs that are available in this product.
If the console connection account does not meet these requirements, the features
described in Table 17 are not available.
Table 17
KM
Functionality
Menu command
Behavior
PATROL KM for
Microsoft Active
Directory
Running the AD
Operations report
AD Operations
Report
PATROL KM for
Microsoft Cluster
Server
Deleting account
information
Delete Access
Information
99
Table 17
KM
Menu command
Behavior
Availability Report
Running a Server
Information report
with the Remote
Servers KM
Server Information
Report
Displaying
information about a
user using the Users
KM
Display User
Information
Stopping or Starting
the WINS service
Start/Stop WINS
Service
Starting or stopping
the DFS service
Start/Stop DFS
Service
DFS Operations
Report
PATROL KM for
Running an
Windows Domain availability report
Services
with the Remote
Servers KM
100
Table 17
KM
Menu command
Behavior
Start/Stop Replica
DFS Service
Disconnecting DFS
users
View/Disc.
Connected Users
Compressing the
DHCP database
Compress DHCP
Database
Starting or stopping
the DHCP service
Start/Stop DHCP
Service
Stopping or Starting
the DNS service
Start/Stop DNS
Server Service
PATROL KM for
Starting or stopping
Windows Domain the DFS Replica
Services, continued service
Chapter 3
101
Table 17
KM
Functionality
Menu command
Behavior
PATROL KM for
Microsoft
Windows OS
Configuring Blue
Screen KM (NT_BSK)
system recovery
actions
Configuring Blue
Screen monitoring
(NT_BSK)
Managing Windows
services, such as
starting and stopping
services or changing
service startup
properties
Manage Windows
Operating System
Services
Managing Windows
event logs
Windows Event
Viewer
102
OS Reports
Table 17
KM
Functionality
Menu command
Behavior
PATROL KM for
COM+
Starting or Stopping
the DTC
Start/Stop DTC
Service
Viewing application
properties
View application
properties
Starting or stopping
the MSMQ service
Start/Stop MSMQ
Service
PATROL KM for
MSMQ
Chapter 3
103
Table 18
Tasks
Menu command
Page
106
configure service monitoring From the PATROL Console, access the Services application
and choose the KM menu command Configure Service
Monitoring.
117
configure process
monitoring
119
125
125
127
System
Monitored by default
processors
all processors discovered on the From the PATROL Console, access the Processors application
system
and choose the KM menu command Enable-Disable
Processor Monitoring.
physical
disks
all physical disks discovered on From the PATROL Console, access the Physical Disks
the system
application and choose the KM menu command
Enable-Disable Physical Disk Monitoring.
104
To enable or disable
Table 19
System
Monitored by default
To enable or disable
logical
disks
pagefiles
event logs
network
protocols
network
interfaces
printers
job objects
all job objects discovered on the From the PATROL Console, access the Job Objects application
system
and choose the KM menu command Enable-Disable Job
Object Monitoring.
For the platforms shown above, Microsoft requires that you restart the system after
running the diskperf command. For more information, see Microsoft Knowledge Base
article Q262937, PRB: RegQueryValueEx() May Not Return Disk Performance
Counters.
Chapter 3
105
106
1 Using the Configure Windows Event Log Monitoring => Create Filter menu
command, create a new filter. In the Create Filter dialog box, select the Filter
Property - Source, and deselect the option to Automatically include new sources. This
sets the following agent configuration variable to 0:
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config//EventLogMonitoring/eventlog/Ev
entFilters/filtername/IncludeAllSources
2 Using PATROL Configuration Manager or the wpconfig utility, manually add the
unregistered event source to the following agent configuration variable.
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config//EventLogMonitoring/eventlog/Ev
entFilters/filtername/SourceList/list
Chapter 3
107
Event
type
Event
Event source category
Event
ID
Error
WinMgmt
None
37
Error
WinMgmt
None
41
Error
WinMgmt
None
61
Description
You want to be notified immediately when these particular events occur. However,
you want to be notified only when the event is related to the perfproc.dll performance
library, not any other performance counter libraries.
In addition, you do not want to be flooded with events, so if these events are
generated multiple times within a short period, you want to be notified only once.
Finally, if these events are detected, you want PATROL to remain in alarm until the
alarm is acknowledged by an operator.
Using the Event filter options presented in the Configuring Windows Event Monitoring
=> Create Filter dialog boxes, you can create a filter with all of the properties proposed
in this example.
108
Table 21
Option
Description
Configuration
variables
Filter name
child_list
If you change the filter name, you will lose the historical data
stored under the old name.
For more
information, see
Using the child_list
variable on
page 267.
FilterDescription
EventReport
Notify PATROL
immediately....
ELMError
ELMWarning
ELMInformation
ELMStatus
ELMSuccessAudit
ELMFailureAudit
ELMOtherTypes
NA
If you select this option, PATROL immediately updates the
appropriate parameter when an event matches the filter criteria.
Depending on which event types the filter monitors, the
following parameters are displayed in an alarm state when an
event matches the filter:
ELMErrorNotification
ELMFailureAuditNotification
ELMNotification (This parameter is active only when you
have selected both of the following options: Notify
immediately and consolidate event types. For more
information, see the description in Event Type tab section of
this table.)
ELMWarningNotification
NA
Select/Deselect
source(s) for this
filter
SourceList/list
Chapter 3
109
Table 21
Option
Description
Automatically
Include New
Sources
If you select this option, this event filter automatically monitors IncludeAllSources
any new applications that are added to the system
Disable Case
Sensitivity
If you select this option, the event filter makes filter comparisons FilterDisableCase
in a case-independent manner
EventType
Consolidate event
types...
ConsolidateEventTy
pes
If you want to have separate parameters for each event type that
can alarm independently, deselect this option.
Event ID filter properties
EventIdList/list
Enter a Windows
The Microsoft Windows event IDs that you want to monitor
Event ID or a range with this filter.
of IDs
To specify a range of event IDs, separate the beginning and
ending of the range with a dash. For example, to monitor events
100 through 200, enter 100-200.
Include all
specifies that all of the Windows event IDs in the list are
Windows event IDs monitored by the event filter
in the list
IncludeAllEventIds
IncludeAllEventIds
specifies that all of the Windows event IDs except those in the
Include all
Windows event IDs list are monitored by the event filter
except those in the
Select this option when there are certain event IDs that you are
list
not interested in monitoring and you want to exclude them from
the event filter.
Event Handling filter properties
Annotate graph
parameter...
110
Annotation
Table 21
Option
Description
Configuration
variables
Write event
details...
EventReport
EvRptOfError
EvRptOfFailureAudit
EvRptOfInformation
EvRptOfStatus
EvRptOfSuccessAudit
EvRptOfWarning
ELMRptOfOtherTypes
ELMRptOfNotification (This parameter is active only when
you have selected both of the following options: Notify
immediately and consolidate event types. For more
information, see the description in Event Type tab section of
this table.)
RetainEventDescripti
ons
Chapter 3
111
Table 21
Option
Description
Report multiple
events...
112
Configuration
variables
ConsolidationNumbe
r and
ConsolidationTime
Table 21
Option
Acknowledge
Alarms
Configuration
variables
Description
AcknowledgeBy
IncludeAllUsers
specifies that all of the user IDs except those in the list are
monitored by the event filter
Select this option when there are certain user IDs that you are
not interested in monitoring and you want to exclude them from
the event filter.
Disable Case
Sensitivity
If you select this option, the event filter makes filter comparisons FilterDisableCase
in a case-independent manner
Chapter 3
113
Table 21
Option
Description
Configuration
variables
CategoryList/list
specifies that all of the categories in the list are monitored by the IncludeAllCategories
event filter
Include all
categories except
those in the list
specifies that all of the categories except those in the list are
monitored by the event filter
IncludeAllCategories
Select this option when there are certain categories that you are
not interested in monitoring and you want to exclude them from
the event filter.
Disable Case
Sensitivity
If you select this option, the event filter makes filter comparisons FilterDisableCase
in a case-independent manner
The text strings that you want to monitor with this event filter
StringList/list
specifies that all of the strings in the list are monitored by the
event filter
StringList/list
specifies that all of the strings except those in the list are
monitored by the event filter
IncludeAllStrings
Select this option when there are certain strings that you are not
interested in monitoring and you want to exclude them from the
event filter.
Disable Case
Sensitivity
114
If you select this option, the event filter makes filter comparisons FilterDisableCase
in a case-independent manner
Table 21
Option
Configuration
variables
Description
SourceList/list
If you have configured the sources for the filter and an event
occurs, the event is matched with the configured source list. If
the source generating the event does not exist in the configured
source list, the source generating the event is compared with the
specified regular expression.
For example, if the sources are Norton AntiVirus Client or
Symantec AntiVirus Client, the regular expression should be
configured as ^(Norton|Symantec) AntiVirus Client.
For more information about using regular expressions, see
Using regular expressions on page 120.
Advanced properties - Enter a Regular Expression for Event ID
the regular expression that is used as a criteria for including or
Enter a Regular
Expression for Event excluding event IDs to be monitored with the Windows event
ID
filter.
EventIdList/list
If you have configured the event IDs for the filter and an event
occurs, the event is matched with the configured event ID list. If
the event ID does not exist in the configured list, the event ID is
compared with the specified regular expression.
For more information about using regular expressions, see
Using regular expressions on page 120.
Chapter 3
115
Table 21
Option
Description
Configuration
variables
enables you to create a filter that monitors events generated only ComputerNamesList
/list
by a specified computer.
Enter the name of the computer that you want the event log
filter to monitor.
You can also use the following new pconfig variables to
configure or to view the names of the computers that you want
the event log filter to monitor:
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/Event
LogMonitoring/eventLog/EventFilters/filterName/Comput
erNamesList/list lists the names of the computers you
provided when creating the filter.
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/Event
LogMonitoring/eventLog/EventFilters/filterName/Include
AllCompList indicates whether all computers are
monitored.
116
Startup type
Auto restart
Alarm
Automatic
Manual
Disabled
To change the default settings for services, choose the Configure Service Monitoring
menu command from a Services application instance to perform the following tasks:
To add services to the list of monitored services, choose the Configure Service
Monitoring => Add Service menu command.
To remove services to the list of monitored services, choose the Configure Service
Monitoring => Remove Service menu command.
By default, the Windows KM monitors all services with startup type as automatic or
manual.
If you want to monitor a disabled service, add the service by using the Configure
Service Monitoring => Add Service menu command. The Monitor pconfig variable
for the service is set to 1.
If you add a disabled service and later remove the service by using the Configure
Service Monitoring => Remove Service menu command, the Monitor pconfig
variable is not set to 0. However, the removedServiceList pconfig variable is
updated to contain this particular service.
Thus, Windows KM monitors a service only if the Monitor pconfig variable for the
service is set to 1 and the service is not included in the list of the removedServiceList
pconfig variable.
Chapter 3
117
Configuration
variable
Option
Description
Restart service
when stopped
Yes
If you select this option, PATROL automatically
attempts to restart the service when it is stopped (only
for services with a startup type of Automatic). To use
this option, you must also select the option Generate
a PATROL Alarm/Warn when the service is
stopped.
AutoRestart
Generate a
PATROL
Alarm/Warn
when the service
is stopped
Yes (Alarm)
By default, when a service is stopped, PATROL
generates an Alarm. However, for a particular service,
you can specify a Warning instead. This feature is
only for services with a startup type of Automatic.
WarningAlarm
Enable process
monitoring for
this service
MonitorProcess
Use specified
command to
check status of
non responsive
service
MonitorNotResp
ond
118
Possible values
DisableServiceRestart (global)
AutoRestart (local)
OverrideGlobalServiceRestart (local)
No
No
Yes
Yes
No
No
No
Yes
For more information about these configuration variables, see Appendix B, Agent
configuration variables and rulesets.
Method
When to use
Chapter 3
119
literal character
matching character
repetition clause
alternation clause
sub pattern grouped with parenthesis
Symbol
Description
()
groups sub pattern; repetition and alternation operators apply to the entire
preceding sub pattern
[]
anchors the pattern to the beginning of the string; this character must be the first
character in the set
anchors the pattern to the end of the string; this character must be the last
character in the set
2 Select (highlight) the process that you want to monitor, or if the process is not
currently running, enter the process name and any appropriate command-line
arguments.
120
You can enter the process name using a regular expression. For more information
about regular expressions, see Using regular expressions on page 120.
3 Select the Select the process(es) using a regular expression for monitoring check box.
PATROL KM for Microsoft Windows adds all the processes for monitoring that
contain the name of the selected process.
However, if you do not select this check box, PATROL KM for Microsoft Windows
adds only the selected process instances for monitoring.
TIP
If you are specifying a process name and you want to ensure that only that specific process
is monitored (and not other processes that have that process name as part of their name),
use the ^ and the $ regular expression characters to enclose the process name, as shown
below.
^processname$
For more information about using regular expression characters, see Using regular
expressions on page 120.
NOTE
If you enter multiple regular expressions that match the same process, multiple process
instances are created for that process.
WARNING
When entering the process name, omit the extension. For example, enter processname
argument. Do not enter processname.exe.
Example: svchost -k rpcss
In addition, when entering a process whose name includes special characters that are used
in regular expressions, such as a dollar sign ($), or a period (.), you must escape each
special character with a slash. For example, if the process name is $abc.exe, you must enter
the process name as \$abc.
monitor the process(es) only when it is running with the command line
arguments shown
5 Click Apply.
Chapter 3
121
The processes you selected are removed from the list of running processes and
are added to the list of monitored processes that are shown on the left pane of
the Configure Process Monitoring window.
The processes you selected are added to the PATROL console, beneath the
NT_PROCESS application (labeled Processes).
3 Click Apply.
When any process consumes high CPU for a period longer than what you
specified, PATROL begins monitoring the process and adds the process to the
PATROL console, beneath the NT_PROCESS application (labeled Processes).
122
If a problem occurs
If the Processes folder is not displaying or it does not contain any processes, check the
annotation of _DiscoveryStatus and _CollectionStatus parameters of the NT_OS
application class.
2 For the length of time specified for high CPU utilization, enter any negative
number.
3 Click Apply.
To configure process control
1 Access the NT_PROCESS application menu (labeled Processes) as described in
Accessing KM commands and InfoBoxes on page 216 and choose the KM menu
command Configure Process Monitoring.
2 From the Configure Process Monitoring window, select the monitored process that
you want to configure.
3 Select the appropriate options, described in Table 27 on page 124, and then click
Apply.
Chapter 3
123
Table 27
Configuration
variable
No
StartupCommand
Option
Description
TimeLimitForKillR
unAwayProcess
EnableAlarmIfProc
essDown
EnableAlarmIfProc
essStarts
124
2 From the Create Expressions dialog box, enter a name for the expression
(parameter).
3 Follow the instructions provided in the wizard. For more information, click the
Help button.
After you complete the wizard, the new composite parameter is displayed on the
console beneath the NT_Composites application (labeled Composites).
Chapter 3
125
4 From the Select Event Range list, select the range for the number of events to
display.
The details of the latest events are displayed in the Windows Event Viewer dialog
box, as described in Table 28.
NOTE
For optimizing performance of event retrievals, the Windows Event Viewer dialog box
displays a maximum of 100 events at a time. By default, the Windows Event Viewer dialog
box retrieves the latest 100 events for the selected event type. If you select the range for the
events, the Windows Event Viewer dialog box retrieves the latest events for the selected
event type, based on the range.
5 To view details pertaining to a particular event, select the event in the Windows
Event Viewer dialog box and click View.
Table 28
Field
Description
Type
126
Warning
Information
Error
Success audit
Failure audit
Other
Date
Time
Source
Event
Category
User
Computer
The PDStatus parameter goes into an alarm state when a physical disk is removed,
and it provides you the name of the removed disk.
The LDStatus parameter goes into an alarm state when a logical disk is deleted,
and it provides you the name of the deleted disk.
The DeletedLDList variable provides a list of the deleted logical disk instances.
Chapter 3
127
LDldFreeSpacePercent
LDldFreeMegabytes
LDldDiskSpaceUsed
1 = values shown for a particular drive instance do not consider the mount drives
0 = value shown is an aggregate of a particular drive instance and all of its mount
drives
128
Runs
automatically?
Recovery action
Parameter
Yes
Yes
No
(PATROL KM for
Microsoft Windows OS)
Start Windows
Management
Instrumentation Service
Check
(PATROL KM for
Microsoft Windows OS)
Clean Temporary
Directories
(PATROL KM for
Microsoft Windows OS)
Chapter 3
129
Table 29
Recovery action
Parameter
Description
Terminate Process
NT_PROCESS\PROCProcessor
TimePercent
No
NT_PROCESS\PROCStatus
Yes
(PATROL KM for
Microsoft Windows OS)
Restart Process
(PATROL KM for
Microsoft Windows OS)
Restart Service
Yes
(PATROL KM for
Microsoft Windows OS)
NT_REMOTE_SERVERS\MsPat Attempts to restart the
Restarting a PATROL
PATROL Agent on the
Agent on a remote server rolAgentStatus
remote machine after
recovery action
alarming for 2 collection
cycles.
(PATROL KM for
Windows Domain)
Increase connections to
DFS root recovery action
(PATROL KM for
Windows Domain)
No
No
130
Table 29
Recovery action
Parameter
Description
Increase connections
allowed to share
NT_Shares\ShConnPercent
No
Yes
(PATROL KM for
Windows Domain)
PAWorkRateExecsMin
Recovery Action
(PATROL KM for
Microsoft Windows OS)
Chapter 3
131
2 From the list of recovery actions, highlight the desired recovery action and click
Accept.
3 From the list of recovery action instances, highlight the instance and click Edit. For
information about which instance to select, see Table 30.
Table 30
Purpose
configure the recovery action for all instances (for the recovery action that displays an
example, all monitored processes)
asterisk (*) in the INSTANCE column
4 From the Edit Recovery Action dialog box, choose from the settings described in
Table 31 on page 132.
Table 31
Setting
Description
Run automatically
132
Configuration
variable
Mode
Mode
Table 31
Setting
Description
Do Not Execute
Mode
Suspend Recovery
Action
Suspend
Attended Mode
Dialog Timeout
NOTE
For more information about the recovery action and its configuration options, click the
Help button.
NOTE
The PATROL KM for Event Management also provides you with the ability to configure other
types of notification, such as trouble-tickets or other custom alerts. You can also use it to
forward events to an enterprise console. For more detailed information about the functionality
provided by the PATROL KM for Event Management, see the PATROL KM for Event
Management User Guide.
133
a Windows batch file that you must edit before use, which can send any of the
following types of notification:
SMTP e-mail message by means of a Visual Basic (VB) script (provided)
MAPI e-mail message by means of a Visual Basic (VB) script (provided)
SMTP e-mail message by means of Blat (not provided)
Blat is a free command-line e-mail client, that you can download from the Web.
You can also use any other SMTP-based, command-line e-mail client if you edit the
batch file accordingly. For more information, see Editing scripts on page 136.
NOTE
The PATROL for Microsoft Windows Servers has been tested with Blat version 1.7.
134
Table 32
Script
Name
AS_EVSLocalAlertNotify.bat
SMTP VB Script
sendmail.vbs
This VB script is called from AS_EVSLocalAlertNotify.bat. This
script uses an ActiveX control.
MAPI VB Script
send_mapi.vbs
This VB script is called from AS_EVSLocalAlertNotify.bat. This
script uses an ActiveX control.
Perl Script
AS_EVSLocalAlertNotify.pl
Script requirements
To use these Windows scripts, the server sending the notification must meet the
requirements shown in Table 33 on page 135.
Table 33
Script
Requirement
If Blat is installed in a directory other than C:\Blat, you must move Blat
to this directory or edit AS_EVSLocalAlertNotify.bat to execute Blat
from the directory where it is installed.
Perl Script
The Perl script assumes the use of Blat. If Blat is installed in a directory
other than C:\Blat, you must move Blat to this directory or edit the Perl
script, AS_EVSLocalAlertNotify.pl, to execute Blat from the directory
where it is installed.
Associate the .pl extension with Perl. Otherwise, you must call the script
using the following syntax:
perl C:\PATROL3-4\lib\psl\AS_EVSLocalAlertNotify.pl
SMTP VB Script
MAPI VB Script
Chapter 3
135
Editing scripts
Before using the sample scripts, you must edit them.
If you use a third-party command-line e-mail client or if you want to use the script to
perform other types of notification, such as paging or trouble tickets, you must add
the code to the script that calls the e-mail client or appropriate notification utility.
136
137
Once you have configured a primary and backup notification server, you can use the PATROL
Configuration Manager to copy the settings to the other notification servers. If you use this
method, make sure that you use the same notification script file name and directory path on
all notification servers.
Providing security
To improve security, create an operating system account on the notification server
systems to be used specifically for remote notification. This configuration avoids
having to use the PATROL login, which may be common throughout your
environment. You can configure the notification server so that it is unable to fully
login to the notification server system by using the operating system. For example, on
UNIX, give the notification server login an invalid login shell, such as /bin/false.
138
3 Use the Quick Config - Notification Server dialog box to specify the notification
server properties. These properties are described in Table 34:
Table 34
Property
Description
Notification Command
Chapter 3
139
NOTE
Notification servers are not required. Remote agents can send their own notifications.
However, there are considerable benefits to using notification servers. For more information,
see Why use a notification server? on page 137.
NOTE
You must use the PATROL KM for Event Management to complete this task. This
functionality is not available in PATROL Configuration Manager. However, once you
configure one notification server, you can use the PATROL Configuration Manager to copy
your configuration to other notification servers. The configuration settings are stored in the
following variables:
AS/EVENTSPRING/NOTIFICATION_SERVER1.defaultAccount (primary)
AS/EVENTSPRING/NOTIFICATION_SERVER2.defaultAccount (backup)
AS/EVENTSPRING/NOTIFICATION_SERVER1 (primary)
AS/EVENTSPRING/NOTIFICATION_SERVER2 (backup)
2 Choose the KM menu command Event Management => Quick Config => Remote
Agent.
4 Use the Primary Notification Server Settings dialog box to specify the properties of
the primary notification server for the managed system. The properties are
described in Table 35 on page 141.
140
Table 35
Property
Description
Notification Server Hostname the hostname or IP address of the primary notification server
for the selected managed system
To avoid DNS resolution problems, use the IP address.
Notification Server Agent
Port
the user name that the selected managed system will use to
connect to the notification server
Notification Server Password the password that the selected managed system will use to
connect to the notification server
Verify Password
Use the PATROL Configuration Manager to quickly configure all remote agents at one time.
See the PATROL Configuration Manager User Guide for more information about the PATROL
Configuration Manager.
Chapter 3
141
2 Choose the menu command Event Management => Alert Settings => Notification
Targets => Email => Local Targets ANY STATUS => Set For Parameters.
If a problem occurs
If you have problems configuring e-mail notification, see the PATROL KM for Event
Management User Guide. This document contains detailed configuration instructions,
usage scenarios, and troubleshooting information.
142
replication context
names of the domain controllers that failed to replicate or that did not replicate in a
timely manner
For example:
Replication Context: CN=Configuration,DC=cookies,DC=inc
Domain controllers that failed to replicate data to the local domain controller:
chocolate.factory.cookies.inc
lemon.factory.cookies.inc
pecan.cookies.inc
Chapter 3
143
Task
Page
Loading the PATROL Wizard for Microsoft Performance Monitor and WMI
144
145
146
146
NOTE
After you have created new parameters on a particular PATROL Agent, other PATROL
console users will not be able to see the new parameters that you created until they load the
NT_PERFMON_WIZARD.kml file.
144
2 Choose the Create Parameter menu command to display the Create Performance
Monitor Parameter dialog box.
3 From the Select Performance Object to monitor dialog box, choose a Performance
Object from the list, and click Next.
Counters and instances for the selected performance object display in the Available
Counters and Available Instances tables.
4 Select the counters you want to monitor from the Available Counters table by
clicking the counter names.
Selected counters appear highlighted.
5 Select the instances you want to monitor from the Available Instances table by
clicking the instance names.
Selected instances appear highlighted.
6 Click Create to display the Select Performance Object to Monitor dialog box.
7 Click Done to create the parameters.
The dialog box closes and PATROL creates your new parameters.
If you want to create new parameters over again, click Next. Continue with step 3.
Chapter 3
145
2 Set a border range for an alarm or warning in the following fields, for the
parameters that need thresholds:
Border Minimum
Border Maximum
3 Click OK.
If a problem occurs
When monitoring a Performance Monitor counter whose value is normally less than
1, you cannot specify meaningful alarm ranges since alarm ranges must be integers.
However, you can customize the parameter so that the value displayed in PATROL is
an integer.
146
EXAMPLE
select NumberOfProcesses from Win32_OperatingSystem
or
select CurrentSize from Win32_Registry
For WMI classes that begin with Win32_PerfRawData, the query must return a
number for a single WMI property. For more information, see WMI queries for
the WMI classes that begin with Win32_PerfRawData on page 148.
EXAMPLE
select VirtualBytes from Win32_PerfRawData_PerfProc_Process where Name=Idle
5 Select the Formatted Data check box to normalize and display formatted
performance data.
NOTE
You can select this check box only for Win32_PerfRawData WMI classes. See
Performance counters supported through Win32_PerfRawData WMI class on page 148.
6 In the Scaling Factor text box, enter a value between 0 and 2147483647 to scale down
values that cannot be directly set to parameters, such as WMI queries that return
64-bit integer values.
EXAMPLE
If you specify the Select CommittedBytes from Win32_PerfRawData_PerfOS_Memory
WMI query for a parameter specific to memory, enter a scaling factor of 1024. Thus, the
returned value is divided by the specified scaling factor.
Similarly, if the parameter is specific to time, you can enter a scaling factor of 1000 to
convert a return value in milliseconds to seconds.
NOTE
By default, the scaling factor is 1. For 64-bit performance counters, if the return value of the
WMI query is greater than 32-bit, you must scale down the values to get appropriate
results.
7 Click Next to set alarm thresholds for the parameter that you are creating.
The Set Alarm Thresholds dialog box is displayed.
Chapter 3
147
9 Click Create to create the parameter according to the SQL Query that you entered
and close the dialog box.
PERF_COUNTER_COUNTER
PERF_COUNTER_BULK_COUNT
PERF_COUNTER_LARGE_RAWCOUNT |
PERF_COUNTER_LARGE_RAWCOUNT_HEX
PERF_COUNTER_RAWCOUNT_HEX | PERF_COUNTER_RAWCOUNT
PERF_100NSEC_TIMER
PERF_100NSEC_TIMER_INV
PERF_ELAPSED_TIME
PERF_PRECISION_100NS_TIMER
PERF_COUNTER_100NS_QUEUELEN_TYPE
148
EXAMPLE
Valid WMI Query:
Select VirtualBytes from Win32_PerfRawData_PerfProc_Process where Name=Idle
This returns the result for VirtualBytes for Idle process.
Invalid WMI Queries:
If the PATROL KM for Microsoft Windows OS is loaded and the PATROL KM for
Log Management is loaded, the PATROL KM for Log Management will begin
collecting data immediately.
Chapter 3
149
The default list of monitored files may be added to or removed completely depending
on your needs. The PATROL KM for Log Management supports the following five
types of files:
Text Files Text files are only read if they have been modified since the last scan.
Command Scripts Command scripts are executed each scan cycle and the
resulting output is treated as a log file.
Named Pipe (or FIFO) Named pipes are opened and kept open for reading.
Only blocking pipes are supported. The data is read from the pipe a line at a time
and accumulated in a secondary log file. This secondary file is treated like a normal
log file.
Binary Files Binary files are read with the use of a user-specified filter program.
Binary files are only read if they have been modified since the last scan.
XML files XML files are only read if they have been modified since the last scan.
XML files are always read from the beginning.
This section describes how to configure the PATROL KM for Log Management so
you can begin monitoring log files in your environment. The following table lists the
topics covered in this section.
150
Task
Page
151
151
152
158
159
162
166
NOTE
The Default Monitoring dialog box only enables and disables monitoring for the log files
that the PATROL KM for Log Management monitors by default. This dialog box does not
control monitoring for log files that you add to the list of monitored files. To add or remove
log files to the list of monitored files, see Start monitoring a log file on page 152 and
Stop monitoring a log file.
1 Access the LOGT application menu for the log file that you no longer want to
monitor, as described in Accessing KM commands and InfoBoxes on page 216.
Chapter 3
151
4 Click Accept.
5 In the Add File for Label: instanceName dialog box, enter the full path and file name
for the text file you want to monitor, in the File/Pipe Name text box.
NOTE
To monitor log files that have dynamic names, use the * and ? regular expressions to
define the file name.
For example, if a log file is named backup_date.log, where date changes each day,
enter the log file name as backup_*.log.
6 Enter a logical name for the LOGMON instance that you want to monitor, which
appears in the event manager.
7 Select the Contains Environmental Variables check box to enter a path defined by an
environment variable that is resolved at runtime. If you select this check box,
environment variables in the text file path are resolved. Otherwise, the text file is
treated as a pure file name.
8 Select either of the File Type options: Text File, Script, Named Pipe, or Binary File.
9 In the Filter Program text box, enter the path and name of the filter program that is
reading the file specified in the File/Pipe Name field.
152
NOTE
In case of a Binary file type, PATROL KM for Log Management does not accept arguments.
10 (Optional) If you want to scan the entire text file on each scan, rather than scanning
only the new content, choose the Always Read at Beginning check box.
NOTE
The text file will only be scanned if the file changes.
11 (Optional) If you are monitoring a dynamically named file and you want to
monitor all of the files using the dynamic name specified in the File/Pipe Name
field, rather than just the latest file, choose the All option.
12 (Optional) Select the Generate Alarm if File not modified in check box if you want
the LOGMON instance to ALARM if the monitored file is not modified
periodically. Specify the time in minutes after which you want the KM to alarm if
the file is not modified, in the Minutes text box.
13 Specify the default settings for a search criterion. In the Threshold # 1 text box,
specify the minimum number of text search string matches in a polling cycle
required to produce a specified state.
To search for a minimum number of text strings across a number of polling cycles,
enter values in the x:y format; x represents the minimum number of text string
matches, and y represents the total number of polling cycles.
14 In the Threshold # 2 text box, specify the minimum number of text search string
matches required to produce a specified state. You can specify a different state and
a different number of matches from Threshold # 1. Threshold # 2 should be higher
than Threshold # 1. To search for a minimum number of text strings across a
number of polling cycles, enter values in the x:y format.
15 Select the state that you want the KM to exhibit when a threshold is
reachedNone, OK, Warn, or Alarm.
EXAMPLE
If you want the KM to go into Alarm when the search string is found 3 times in the
monitored file, then you would set the value of Threshold # 1 to 3 and select Alarm from
the State list.
Chapter 3
153
16 (Optional) In the Custom Event Message text box, specify the message that you want
displayed in the events when your search string conditions are satisfied.
17 In the Custom Event Origin text box, specify the customized origin for events. If you
do not specify the origin, the product uses the instance name as the default origin
of events, which is APPCLASS.INSTANCE.textFileName.
You can use built-in macros (except the %x[-%y] macro) as the customized origin
for events.
18 In the Number of Lines in Log Entry text box, specify the number of lines that you
want to be displayed when a match is found.
EXAMPLE
If you want to determine when a disk is full and where the disk is mounted, you would
enter Error: Disc Full as the search string and 2 as the value of Number of Lines in Log
Entry so that when a disk is full, the product displays a message similar to the following
one in LOGMatchString text parameter:
Id=id1
031605: Error: Disc Full
Id=;MatchedLines
/hd001 mounted as /opt
SUMMARY:id1=1;
NOTE
If either, the search string or the nullify string, occurs again within the number of lines
selected to be displayed, the KM does not find the instances of the search strings for all the
search identifiers.
19 In the Nullify Alarm/Warn String text box, specify the string that is used to nullify
the alarm for the dual search feature. You can configure dual search for an instance
so that the KM goes into the alarm state when any of the search criteria is found in
the monitored file and nullifies the alarm when the nullify string is found in the
monitored file.
You must specify the first string in the String1 text box (in the Configure Search
Criterion: instanceName dialog box) and the nullify string in the Nullify Alarm/Warn
String text box. For nullified customized events, the default custom event message
is used (as provided in the Custom Event Message text box).
EXAMPLE
If you specify Alarm up in the String1 text box and Alarm down in the Nullify
Alarm/Warn String text box, the KM goes into an alarm state when Alarm up is found in
the monitored file and the alarm is nullified when Alarm down is found in the monitored
file.
154
20 If the KM goes into an alarm or a warning state because the search string is found
and you want the KM state to return to OK if the search string is not found on the
next scan, select the Return to OK if no match found on next scan check box.
21 From the Scan Priority list, select a scan priority: Normal, Medium, or Low.
22 Click Continue.
23 (Optional) In the Configure Search Criterion: instanceName dialog box, in the Search
Criterion area, define a search criterion, specify a unique label in the Search
Identifier text box, and configure a search string to define what type of messages
24 In the String text boxes, enter the regular expression for the first search string that
you want to search in the text instance (4096-byte limit).
25 (Optional) If you want the KM to alarm if a string is not present in the file, select
the Not check box.
NOTE
This option displays all the lines in the file that do not match the search string.
26 In the First Number text box, specify a number to specify a starting position of a
search range in the matched file.
32 You can custom-define a search criterion with settings that are different from the
default settings in the Add File for Label: instanceName dialog box. To do so, select
the Override default setting check box and custom-define the settings for each
search criterion as described in step 13 through step 17 on page 154.
Chapter 3
155
33 Select the Add option and click Update for the KM to populate the search criteria in
the Search list.
34 Click Done.
Once the search string is found in the file, the KM generates an alarm.
NOTE
If you do not specify a search string, the LOGErrorLvl parameter will not be set. When the
LOGErrorLvl parameter is not set for a period of time, no data for specified range
messages are displayed in BMC PATROL history. If you did not specify a search string, this
message is benign.
35 PATROL adds the new log file name to the list of monitored files and displays the
new log instance in the Desktop tree tab.
36 (Optional) If you want to further configure the log file, access the LOGT
application menu as described in Accessing KM commands and InfoBoxes on
page 216.
38 (Optional) Select Advanced Features => Schedule Log Scan to configure the KM to
scan the file at different schedules.
NOTE
This option is not available if you are monitoring an XML file.
156
42 Click Accept.
PATROL adds the new log file name to the list of monitored files and displays the
new log instance in the Desktop tree tab.
For more information about monitoring text log files, see the BMC PATROL
Knowledge Module for Log Management User Guide.
4 Click Accept.
5 In the Add File for XML Monitoring dialog box, enter the full path and file name
for the XML file you want to monitor against XML elements that you provide, in
the XML File text box.
NOTE
To monitor log files that have dynamic names, use the * and ? regular expressions
to define the file name.
For example, if a log file is named backup_date.log, where date changes each day,
enter the log file name as backup_*.log.
6 Optional) If you are monitoring a dynamically named file and you want to monitor
all of the files using the dynamic name specified in the XML File field, rather than
just the latest file, choose the All file disposition option to monitor all of the files.
7 (Optional) In the Search Criteria area, enter an identification label for the XML
search criterionin the Search Identifier text box. This must be unique for an XML
instance. You can use the same search identifier in other XML instances, but not in
the same XML instance.
9 Define thresholds and states for each search XML search string.
Chapter 3
157
Once the search string is found in the file, and the match count is greater than or
equal to the threshold, the KM generates an alarm. For more information about
configuring search strings, see see Filter log file messages (create a search string)
on page 159.
10 In the Custom Event Message text box, define how you want the product to respond
when the specified search criteris is satisfied.
The custom event must consist of string literals and the elements in the XML
search string.
13 (Optional) Select Advanced Features => Schedule Log Scan to configure the KM to
scan the file at different schedules.
14 From the Scan Priority drop-down list, select a scan priority: Normal, Medium, or
Low.
158
1 Access the LOGT application menu for a text or XML instance, as described in
Accessing KM commands and InfoBoxes on page 216.
4 Click Update.
String attributes
The search string can consist of one or two regular expressions and/or a numeric
comparison. The results of these criteria are combined to determine a match. The
maximum length for a string is 400 characters.
Chapter 3
159
If you are adding a new log file to be monitored, follow the steps in Start
monitoring a log file on page 152.
If you want to define a search string for an existing log file, follow the steps in
Change the setup of a monitored file on page 158.
1 On the Add File for Label: instanceName dialog box or the Change File for Label:
instanceName dialog box, click Continue to go to the Configure Search Criterion:
instanceName dialog box.
2 Enter a unique identification label for a search criterion in the Search Identifier text
box.
3 Enter a search string or regular expression in the String 1 text box. Select the NOT
check box next to the String 1 field if you want to identify file entries in which the
string is not found.
You can search for a literal word or phrase or you can use regular expressions to
search for a type of message that has an identifiable format or pattern.
4 If desired, in the String 2 text box, enter a search string or regular expression. Select
the NOT check box next to the field if you want to identify files in which the string
is not found.
160
The first number encountered is used. If no numbers are found, the numeric
portion of the search string is ignored. The converted number is used as variable X
in this mathematical statement:
A op1 X op2 B
A and B are fixed, user-supplied base 10 numbers. A is required, B is optional. 'op2'
only applies when B is supplied. 'op1' and 'op2' can be one of these operators:
6 Fill out or modify the rest of the dialog box fields as described in To monitor a text
log file on page 152.
1 In the Add File for XML Monitoring dialog box or the Change File for XML
Monitoring dialog box, enter an identification label for the XML search criterion in
the Search Identifier text box. This label appears in the search list and helps you
identify the search criterion.
The label must be unique for an XML instance. You can use the same search
identifier in other XML instances, but not in the same XML instance. You can only
use aplha-numeric characters such as a-z, A-Z, 0-9, and up to a maximum of 20
characters.
2 In the XML Search String text box, enter the combination of XML elements and
values that you want to find in the monitored file.
3 Fill out or modify the rest of the dialog box fields as described in To monitor an
XML file on page 157.
Chapter 3
161
1 On the Add File for Label: instanceName dialog box, click Continue to navigate to
the Configure Search Criterion: instanceName dialog box.
Text entered in the Custom Event Message field can also be included in the event. Part
or all of the matching log entries can be included in the custom event message.
162
The words of the message (represented by tokens separated by white space) will be
identified by their ordinal position in the matched log file line, numbered left to right
starting with 1. Word substitution will be identified in the custom event message text
by using the % character. Ranges of words can be included, and are entered following
a single % (for example, %2-5 would identify tokens 2 through 5 inclusive).
NOTE
If you want to have the % character appear in the message, enter %%. For example, entering
Disk %3 is %5 %% full displays the 3rd and 5th strings in the match line, such as Disk
/dev/sd0 is 45 % full.
For example, you might want to create a custom event message that would display
when a service fails to initialize. To see how you would set up a custom event
message for this example, see Example: defining a search string for print queue
length on page 162.
NOTE
If you do not create a custom event message, you will still receive the standard event
generated by the LOGErrorLvl parameter when your search string is found.
Specify a custom origin for the events in the Custom Event Origin text box. If you do
not specify an origin, the KM uses the default origin, which is
APPCLASS.INSTANCE.textFileName.
You can use built-in macros (except the %x[-%y] macro) as the customized origin for
events.
If you are adding a new log file to be monitored, follow the steps in Start
monitoring a log file on page 152.
If you want to set up a custom message for an existing log file, follow the steps in
Change the setup of a monitored file on page 158.
Chapter 3
163
1 Depending on whether you are adding a new log file to be monitored or changing
an existing log file, access the either of the following:
Add File for Label: instanceName dialog box or the Change File for Label:
instanceName dialog box
Add File for XML Monitoring dialog box or the Change File for XML
Monitoring dialog box
2 In the Custom Event Message text box, enter the text that you want to display when
your search string conditions are satisfied.
3 In the Custom Event Origin text box, enter the origin for the events.
4 (Optional) For a text instance, in the Number of Lines in Log Entry text box, enter the
number of lines to include from the log file in the message returned when a search
string is found.
EXAMPLE
If you were searching for Disc Full errors, you could configure the KM to return two lines
so that when the string Error: Disc Full is found, the KM returns the line matching that
string and the next line, in the LOGMatchString parameter:
Id=id1
031605: Error: Disc Full
Id=;MatchedLines
/hd001 mounted as /opt
SUMMARY:id1=1;
NOTE
If either, the search string or the nullify string, occurs again within the number of lines
selected to be displayed, the KM does not find the instances of the search strings for all
the search identifiers.
For example, if you specify that the KM returns four lines when it finds the search
string Disc Full, and Disc full occurs in the first and third lines of the file, the KM
counts only the first instance of Disc Full as a match.
If you want to ensure that all matches are found, leave the Number of Lines in Log
Entry field blank.
5 In case of a text instance, if you want to define custom messages specific to a search
criterion, on the Add file for Label: instanceName dialog box, click Continue.
164
9 Specify an origin for the events in the Custom Event Origin text box.
10 Complete the remaining fields as described in Start monitoring a log file on
page 152.
The sample log file entry looks similar to this (with the exception that a real log file
entry would fit on one line):
"20030508_124352 <ITD> ExecInitialize failed (szServicesEntry:
it_execd, szAccessControlList:\opt\GX6\etc\it_execd.acl, szLogFile:
\var\opt\GX6\log\it_execd.log, usllSrv: 7)"
To create the custom event message, in the Custom Event Message Field, enter:
GX6 component %2 failed initializing service %6. See logfile %10 for details.
Chapter 3
165
The LOGGeneral and NOTIFY_EVENT Event Class will display the following Event
Origin:
LOGMON.inst1PN0.id1
reduce the log file to 0 MB by deleting all the messages in the log file when the file
reaches the size limit
backup the file into the pmg_backup subdirectory located in the same directory as
the monitored log file and reduce the log file to 0 MB
Each time the file is backed up, the backup file is written to the same directory with
an incremental number appended to the log file name. For example, the first time that
the error_log.txt reaches its size limit, PATROL creates a backup file named
error_log.txt1. The next time that it reaches its limit, PATROL creates a backup file
named error_log.txt2 and so on.
NOTE
BMC Software recommends that you periodically move the backup files to another location.
The PATROL recovery action checks to make sure that the backup file name is not already in
use. If hundreds or even thousands of backup files exist in the log directory, PATROL may
take some time to complete this recovery action.
Recovery actions run automatically by default; however, you can configure them to
require user confirmation if the Run Attended option button is set to Yes.
166
If you are adding a new log file to be monitored, follow the steps in Start
monitoring a log file on page 152.
If you want to configure a recovery action for an existing log file, follow the steps
in Change the setup of a monitored file on page 158.
1 Access the LOGT application menu for a text or XML instance, as described in
Accessing KM commands and InfoBoxes on page 216.
4 Select an Action option to specify a recovery action for PATROL to take when the
log file reaches the specified size limit:
NothingPATROL continues monitoring the log file but does not attempt to
reduce its size.
DeletePATROL reduces the log file to 0 MB by deleting all the messages in the
log file when the file reaches the size limit.
Backup and Delete PATROL backs up the existing log file and reduces the log
file to 0 MB
5 Click the Yes or No button to indicate whether PATROL runs attended (prompt an
operator for confirmation before performing a recovery action).
For more information about the features and functionalities in PATROL KM for
Log Management, see the BMC PATROL Knowledge Module for Log Management
User Guide.
Chapter 3
167
1 From the PATROL Console, add the managed system that corresponds to your
cluster by choosing Host => Add.
2 From the PATROL Console, load MCS_Load.kml. For instructions on how to load
KMs, see Loading the PATROL for Microsoft Windows Servers KMs on page 93.
3 If the KM is not already configured, Microsoft Clusters - Setup appears as the label
under the MCS_Clusters application instance icon.
5 In the Authorized Account dialog box, enter an account that is a member of the
Administrators group on the local computer or cluster node. This account allows
the cluster-level agent and external executables to access the cluster nodes you
want to monitor. For internal cluster-level agents configurations, when
requirements are met, the KM can use the PATROL agent default account.
For more information about setting up the Cluster account, see PATROL KM for
Microsoft Cluster Server account on page 50.
168
Page
169
170
170
To start the PATROL Adapter for Microsoft Office from Microsoft Excel
1 Start Microsoft Excel.
2 Choose File => New.
3 Choose the Spreadsheet Solutions tab.
4 Choose the Patrol Report.xlt template.
5 Click OK.
Chapter 3
169
The New dialog box is dismissed and the Microsoft Excel macros message appears.
7 See the PATROL Adapter for Microsoft Office User Guide for instructions on
generating a report.
NOTE
History reports are not available for PATROL Agents that are version 3.2.09. Please see the
PATROL Adapter for Microsoft Office User Guide for more information regarding requirements
and limitations of PATROL Adapter for Microsoft Office.
Report Name
170
Description
percentage of time that a processor is busy executing the threads of a
process (the value reported by the parameter
CPUprcrProcessorTimePercent)
Table 37
Report Name
Description
Logical Disk - Weekly History percentage of free space available on the selected logical disk drive (the
Logical Disk - Daily History
value reported by the parameter LDldFreeSpacePercent)
Memory - Weekly History
Memory - Daily History
Report name
Description
Chapter 3
171
Table 38
Report name
Description
Report name
Description
Report name
Description
172
Table 40
Report name
Description
Chapter 3
173
To unload KMs with the PATROL Console for Microsoft Windows Servers
1 From the KM tab of the tree view, right-click the application class name that you
want to delete and choose Delete from the pop-up menu.
3 Repeat Step 1 and Step 2 until you have deleted all of the application classes
associated with the KM that you want to delete.
4 From the console menu bar, choose File => Save KM to save your changes.
174
3 From the List of Application Classes menu bar, choose Edit => Delete.
The application class is removed from your cache directory and your console
session file. The PATROL Console removes the application class name from the
List of Application Classes.
4 Repeat Step 2 and Step 3 until you have deleted all of the application classes
associated with the KM that you want to delete.
5 From the List of Application Classes menu bar, choose File => Save KM to save
your changes.
5 Click Finish.
Chapter 3
175
1 From the Managed Systems page, click the Load/Unload KMs button.
The Load KMs page opens, listing each computer on which a PATROL Agent has
been installed.
2 Select the computers from which you want to unload .km files, and click Next.
The Load KMs page displays a list of .km files. Currently loaded .km files are
highlighted in the list.
3 Cancel the selection of the .km files that you want to unload.
4 Click Finish.
The console removes the .km files that you specified. These .km files will no longer
be in the current management profile.
176
Chapter
This chapter provides you with information that you will need to use the PATROL
Cluster Configuration Wizard (also referred to as PCC). The following topics are
discussed:
Using the PATROL Cluster Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preparing to use the PCC Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Access requirements for running the PCC Wizard . . . . . . . . . . . . . . . . . . . . . . . .
Starting the PCC Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How to use the PCC Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Post-PCC configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manually configuring the PATROL Agent for clustering . . . . . . . . . . . . . . . . . . . . . .
Install the application on each cluster node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Install the PATROL Agent on each cluster node . . . . . . . . . . . . . . . . . . . . . . . . . .
Assign a unique port number . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Distribute license file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Define the PATROL cluster-specific environment variables . . . . . . . . . . . . . . . .
Create and register a new service for the PATROL Agent . . . . . . . . . . . . . . . . . .
Define the PATROL Agent as a member of the group . . . . . . . . . . . . . . . . . . . . .
PATROL cluster-specific environment variables for history and configuration . . .
Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Example. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Unattended configuration of Cluster Configuration Wizard . . . . . . . . . . . . . . . . . . .
178
178
179
179
179
180
185
185
185
186
186
186
186
187
188
191
191
192
193
193
177
Overview
The PCC Wizard allows you to easily configure the PATROL Agent to monitor
cluster-aware applications such as Microsoft Exchange Server. It does this by
configuring the agent to operate on a virtual server name and separate port
Thus, in the event of a node failure, the agent will failover to another node with the
monitored application, while providing a consistent view of the data being collected.
For example, the history data is kept intact.
The Wizard does not enable the monitoring of clustered resources. That functionality
is handled by the PATROL Agent and the PATROL KM for Microsoft Cluster Server.
The Wizard automates and simplifies cluster configuration of the PATROL Agent,
and eliminates configuring the agent manually.
178
NOTE
The node that you run the PCC Wizard from should be the current owner of the group you
select. This recommendation prevents some caution pop-up windows from appearing.
For information about how the PATROL Agent supports an application in a cluster
environment and what type of failover tolerance it provides, see the PATROL Agent
Reference Manual.
From Windows Start menu, choosing Start => Programs => BMC PATROL =>
PATROL Cluster Configuration Wizard.
179
Required information
Your information
PCC
Cluster Name
Group Name(s)
Resource Name
Service Name
Network Name
Port Number
sets the port number that the PATROL Agent is using and
that is referenced by all environment variables. Each
PATROL virtual Agent must have a unique port number.
Shared Drive
History Path
180
Table 41
Required information
Your information
PCC
Config DB Path
RTSERVERS variable
Node(s)
181
Dialog box
Notes
1. Click Next.
182
Action
4. Enter the appropriate
information and click
Node List.
Dialog box
Notes
If you do not know what
names to use, accept the
defaults.
The port number must be a
port that is not in use by
any other process.
183
Action
Dialog box
Notes
Your configuration of the PATROL Agent using PCC performs the following actions:
184
Registers the PATROL Agent service with a new service name within the Service
Control Manager.
Sets the registry parameters and port number.
Sets the service startup to manual.
Creates the resource of type Generic Service in the cluster.
Sets the Generic Service resource properties to restart without affecting the cluster
group; remaining properties have default values.
Sets the service name parameter of the Generic Service and enables use Network
Name for computer name.
Creates PATROL Agent history and configuration files on shared disk.
Creates environment variables for cluster nodes.
Brings the newly created resource online if the selection box is checked.
Sets resource dependencies on the specified Physical Disk and Network Name.
Post-PCC configuration
Post-PCC configuration
Now that you have finished using PCC to configure multiple PATROL Agents, you
must perform some post-wizard configuration.
Each of the group agents in the cluster need to monitor resources that are a only part
of that group. The node agents should not monitor group resources. This generally
requires using wpconfig to modify the disabledKMs list for each group agent, and
configuring the remaining KMs to monitor only resources that are instances of that
group. This also means that you only need to modify the preloadedKMs list using
wpconfig to preload KMs that are appropriate for that node or group agent.
The information in this section provides a general idea of the processes involved in
setting up a Windows cluster environment and integrating PATROL into that
environment. Procedures and steps describing how to set up third-party software are
intended as a general outline of the process for that product and are not intended as
step-by-step instructions.
Setting up PATROL to run in a Windows cluster environment consists of several
standard tasks. The standard cluster administration tasks and the PATROL-specific
tasks are described in general terms. This section provides a high-level overview of
building a Windows cluster and integrating PATROL into that environment.
The manual process defined in this chapter requires you to run multiple PATROL
Agent executables on your CPU to monitor more than one application on the cluster.
185
Install the agent once. Include only those Knowledge Modules that support the
application and the operating system. Then see Create and register a new service for
the PATROL Agent on page 187 for information about setting up a second agent to
monitor the cluster application.
186
1 From the Windows Taskbar, select Start => Settings => Control Panel.
2 Double-click the System icon and select the Environment tab.
3 Enter the variable name and value in the appropriate fields and click Set. The
variables and their values are listed below. Repeat this step for the remaining
variables.
PATROL_VIRTUALNAME_PORT=VirtualServerName
PATROL_HISTORY_PORT=Drive:\History_Directory
PATROL_CONFIG_PORT=Drive:\Config_Directory
For more information about specific variables, see PATROL cluster-specific
environment variables for history and configuration on page 191.
PatrolAgent-application_name.exe
187
NOTE
The PatrolAgent COM Server can be registered only once. Additional attempts to register it
will fail; however, the multiple agent processes will run.
5 From the Windows Taskbar, select Start => Settings => Control Panel.
6 Double-click the Services icon and select application_name service from the list box.
Click Startup.
7 In the Startup Type pane, select the Manual radio button and click OK. The service
displays Manual in the Startup column.
NOTE
This task description uses Windows Cluster Management Software as an example. The steps
describing how to set up the software are intended as a general outline of the process and are
not intended as step-by-step instructions.
Perform the following task on only the master node of the cluster. The cluster
software provides two methods for binding a service to a cluster: GUI or command
line. Regardless of the method you choose, you must provide the information listed
in Table 42.
Table 42
Arguments
Description
cluster.exe
clusterName
RES
"PatrolAgent for
MyApplication"
188
Table 42
Arguments
Description
/ADDEP
/Prop:RestartAction
/Priv: ServiceName
/Priv: StartupParameters
/ON
NOTE
For each command, you must reenter the name of the cluster executable, the name of the
cluster, the resource option, and the service name.
1 From the command line, issue the following command to name the service,
designate it as a resource of the cluster, create a group, and assign it a resource
type of Generic Service.
cluster.exe clusterName RES "PatrolAgent for MyApplication" /CREATE
/Group:MyGroup /TYPE:"Generic Service"
2 Add the disk that stores the PATROL Agent configuration and history information
as a dependency. This command instructs the cluster software to bring up the disk
with configuration information before it attempts to start the PATROL Agent.
cluster.exe clusterName RES "PatrolAgent for MyApplication"
/ADDDEP:"Disk MyGroupDisk"
189
3 Set the restart action. This command determines what the cluster does if an
application fails and is unable to restart. A value of one (1) indicates that if the
application is unable to restart, the cluster will continue to run.
cluster.exe clusterName RES "PatrolAgent for MyApplication"
/Prop:RestartAction=1
4 Identify the service name to the cluster software. The service name must be
identical to the service name assigned to the PATROL Agent executable on each
cluster node.
cluster.exe clusterName RES "PatrolAgent for MyApplication" /Priv
ServiceName="PatrolAgent-application_name"
5 Set the port number for the PATROL Agent bound to the cluster application. This
number must be the same as the number assigned as a suffix to the PATROL
cluster-specific environment variables.
For details about the PATROL cluster-specific environment variables, see Define
the PATROL cluster-specific environment variables on page 186.
cluster.exe clusterName RES "PatrolAgent for MyApplication" /Priv
StartupParameters="-p Port#"
190
Variables
Table 43 describes the purpose of PATROL cluster-specific environment variables.
Table 43
Environment variable
Description
PATROL_HISTORY
PATROL_HISTORY_PORTa
PATROL_VIRTUALNAME
PATROL_VIRTUALNAME_PORTa
PATROL_CONFIG
PATROL_CONFIG_PORTa
To manage multiple PATROL Agents running on separate ports, append the port number
to the variable name. This situation occurs when PATROL Agents are bound to individual
applications such as Oracle, Exchange, Sybase, etc. Each agent uses a separate port number.
191
Operation
When searching for configuration information and creating and writing to the history
database, the PATROL Agent uses the following logic to check for the existence of
PATROL cluster-specific variables.
Table 44
Variable type
Exists? Description
Virtual Name
yes
Configuration
File
History
Database
192
no
The agent writes history using the actual host name. If the application fails over,
the agent writes history using the new agents name. Using the actual hostname
creates gaps in the results of any dump_hist commands because the command
does not recognize that the same application ran on different hosts.
yes
no
yes
no
Example
The following example illustrates how the environment variables would be named
for a host using port 8888. It also depicts the directory structure and file location.
Environment variables
PATROL_HISTORY=K:\doc\work\histdir
PATROL_VIRTUALNAME=AliasHostName
PATROL_CONFIG=K:\doc\work\config
Directory structure
For the values provided in the Environment Variables section of this example, the
PATROL Agent stores configuration information and records the history data in the
following directory structure:
K:\doc\work\histdir\AliasHostName\8888\annotate.dat
K:\doc\work\histdir\AliasHostName\8888\param.hist
K:\doc\work\config\config_AliasHostName-8888
If these variables do not exist or they are empty, the PATROL Agent stores
configuration information and records the history data in the following directory
structure:
%PATROL_HOME%\log\history\HostName\8888\annotate.dat
%PATROL_HOME%\log\history\HostName\8888\param.hist
%PATROL_HOME%\config\config_HostName-8888
193
You can edit the pcc.cfg file for the different cluster groups that you want to configure,
for example:
However, you need to specify the full path of the pcc.cfg file in the above commands.
194
Chapter
This chapter provides you with information that you will need to use the PATROL
KM for Microsoft Windows Active Directory Remote Monitoring. The following
topics are discussed:
Using the PATROL KM for MS Windows Active Directory Remote Monitoring . . 196
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
Application classes, menu commands, InfoBox items, and parameters . . . . . . . 196
Chapter 5
Using the PATROL KM for Microsoft Windows Active Directory Remote Monitoring
195
Overview
PATROL KM for Microsoft Windows AD Remote Monitoring allows you to monitor
remote sites, domain controllers in those sites, and FSMO roles from member servers
of a domain in the network.
The managed node must meet a few requirements to display information about
Active Directory objects as described in PATROL KM for Microsoft Windows Active
Directory Remote Monitoring.
For a brief description of product features, see the sections that follow. For more
detailed information about how to use the product and complete descriptions of the
application classes and parameters, see the product online Help.
196
Description
AD_RMT_SERVER_CONT
the AD_RMT_FSMO_ROLE_CONNECTIVITY_CONT
container
an AD_RMT_FSMO_ROLE_CONNECTIVITY
application class instance for each FSMO role
AD_RMT_FSMO_ROLE_
CONNECTIVITY_CONT
AD_RMT_FSMO_ROLE_
CONNECTIVITY
AD_RMT_DOMAINSITE
schema Master
domain naming master
relative ID master
PDC emulator
infrastructure master
AD_RMT_DOMAIN
CONTROLER
Chapter 5
Using the PATROL KM for Microsoft Windows Active Directory Remote Monitoring
197
Description
enables you to select the sites in the domain that you want to
monitor
Application Trace
Remove Instance
Collection Trace
Collection Trace
Collection Trace
Description
198
Forest name
Domain name
Agent Version
InfoBox item
Description
Product Version
Forest Name
Domain Name
Site Name
Global Catalog
Description
AdFsRoleChanged
AdLdFsResponseTime
DcInSite
GcInSite
Chapter 5
Using the PATROL KM for Microsoft Windows Active Directory Remote Monitoring
199
Parameters
Description
200
AdDcCollector
AdDcConnectivity
AdDnsARecordExists
AdDnsDcLdapSrvRecordExists
AdDnsGcLdapSrvRecordExists
AdLdDcResponseTime
Chapter
Chapter 6
201
Paage
202
PATROL Generates Event 560 and 562 in the Windows security event
log
203
203
203
204
204
205
205
Solution
202
Explanation
Solution
To prevent PATROL from generating these events, you can turn off
success auditing for object access. This setting determines whether to
audit user access to an object. An object could be a file, folder,
registry key, printer, or other system object. For more information,
see Microsoft KB article 149401.
Explanation
ELMErrorNotification
ELMFailureAuditNotification
ELMInformationNotification
ELMNotification
ELMOtherTypesNotification
ELMSuccessAuditNotification
ELMWarningNotification
Solution
Chapter 6
203
Explanation
Solution
Solution
Configuration variable
setting needs to be
changed.
To permanently remove Summary instances from the event log applications, set
the value of the agent configuration variable OverrideSummaryAutoCreate to 1.
For more information, see OverrideSummaryAutoCreate on page 226.
Alternatively, you can also permanently remove the Summary instance by
following these steps:
1. Executing the KM menu command Configure Windows Event Monitoring.
2. From the Configure Windows Event Monitoring window, right-click the
Summary instance and select Delete.
Solution
The BMC PATROL Agent default account credentials are stored in the
/AgentSetup/defaultAccount agent pconfig variable.
Set the BMC PATROL default account so that the
/AgentSetup/defaultAccount agent pconfig variable is not blank.
Alternatively, you can also set the account for event log by adding the
/AgentSetup/NT_EVENTLOG.OSdefaultAccount pconfig variable, and
setting the username and password required for the event log KM in the
pconfig variable.
204
EXAMPLE
If you select the ABC process, 123ABCxyz, ABC2, 2ABC, and any other process with a name
that contains ABC are also selected.
Explanation
Solution
If you want the product to add all the processes for monitoring, for which
you have the name of the process selected, select the Process(es) using a
regular expression for monitoring check box.
If you do not select this check box, the product only adds the process
instances for monitoring.
Solution
Verify that the Microsoft Visual C++ 2005 Redistributable Package (x86),
which is part of BPM for Servers installation, is installed correctly.
If it is missing, you can install it from
http://www.microsoft.com/downloads/details.aspx?familyid=32bc1bee-a
3f9-4c13-9c99-220b62a191ee&displaylang=en
Chapter 6
205
Page
206
207
208
208
Solution
If you are receiving alerts because systems are down for maintenance, you
should configure blackout periods that specify when alerts are not
generated. For more information, see the PATROL KM for Event
Management User Guide.
The rule
Set the rule /AS/EVENTSPRING/ALERT/arsAction to 0.
/AS/EVENTSPRING/ALERT/a
rsAction is set to 4.
If the arsAction rule is set to 4 for all PATROL objects, notifications are sent
for all events. Instead, you may want to disable notification for all
PATROL objects, by setting /AS/EVENTSPRING/arsAction to 0 at the
remote agent. Then, enable notification only for the desired applications,
instances, or parameters.
When you enable notification for a specific PATROL object, the following
configuration variable is created:
/AS/EVENTSPRING/ALERT/object/arsAction
206
Solution
Chapter 6
207
Explanation
Solution
On Windows platforms, if the PATROL Agent is installed after the PATROL KM for Event
Management, a PATROL KM for Event Management catalog file is overwritten. The PATROL
KM for Event Management must be installed after the PATROL Agent for the PATROL KM
for Event Management to function.
If you are running PATROL KM for Event Management 2.5.x and you do not want to upgrade
to version 2.6.00, you must ensure that you are using the correct event catalog file. For more
information, see To Ensure the PATROL KM for Event Management 2.5x uses Correct Event
Catalog File.
To Ensure the PATROL KM for Event Management 2.5x uses Correct Event
Catalog File
1 Stop the PATROL Agent service.
2 Rename %PATROL_HOME%\lib\knowledge\StdEvents.ctg to
%PATROL_HOME%\lib\knowledge\StdEvents.ctg.bak
3 Rename %PATROL_HOME%\lib\knowledge\StdEvents.ctg.date_PID to
%PATROL_HOME%\lib\knowledge\StdEvents.ctg ensuring that the correct backup
file that corresponds to the PATROL Agent installation is renamed.
Solution
Availability targets have Add availability targets. For more information, see the PATROL KM for Event
not been added.
Management User Guide. The AS_AVAILABILITY application class instantiates only
when availability targets have been defined.
208
Page
Cannot add performance monitor counters with alarm ranges less than 1
209
Cannot add performance monitor counters with alarm ranges less than 1
209
210
Solution
To resolve this problem, you can manually multiply or divide the PerfMon
counter to get appropriate values for display so that you can set appropriate
alarm ranges. For more information, see Customizing performance monitor
counters.
Chapter 6
209
/Perfmon/NT_PERFMON_WIZARD/object/Counters
where object is the Microsoft Performance Monitor object.
3 Edit the configuration variable value by adding, after the counter name, *multiplier,
where multiplier is the numerical value by which you want to multiply the reported
value.
For example, to multiple the reported value of the counter Active Threads by 100,
add *100 to the variable, as shown: Active Threads*100.
If you are monitoring multiple counters for the object, you can also multiple the
other counters by a multiplier. For example:
counter1*100,counter2,counter3*0.1
WARNING
When entering a multiplier that is less than 1, you must include a leading zero. For
example, you must enter 0.1, and not .1.
Solution
210
Page
211
Even though I select Do not ask me again PATROL prompts before running
recovery action
211
Solution
Assign local administrator rights to the PATROL Agent default account on the host
where you want to execute the recovery action. For more information about the
account rights required, see Accounts on page 46.
Solution
Chapter 6
211
Location
Description
Installation
logs
%USERPROFILE%\Application
Data\BMCINSTALL\
System Output See the documentation for your PATROL The system output window contains messages
Window
console.
relating to the operation of KMs, including error
messages.
PATROL
From the PATROL console, right-click
Event Manager the host and select Event Manager.
PATROL
Diags
Installation logs
One log file is created each time the installer is run. The name of the log file is a
combination of the computer name and a time stamp. The log file is located in the
%USERPROFILE%\Application Data\BMCINSTALL\ directory.
For example, a log file for user bhunter on a Windows Server computer BHUNT_1
could be:
C:\WINNT\Profiles\bhunter\Application Data\BMCinstall\BHUNT_1-1005340189.log.
212
Chapter 6
213
214
Appendix
BMC Software offers several PATROL consoles from which you can view a PATROL
Knowledge Module (KM). Because of the different environments in which these
consoles run, each one uses a different method to display and access information in
the KM. This appendix provides instructions for accessing the KM menu commands,
InfoBoxes, and online Help on each of the PATROL consoles. See the PATROL for
Windows Servers online Help for more detailed information about navigation in the
PATROL Consoles.
Accessing KM commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Accessing online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Appendix A
215
To access
InfoBoxes
In the tree view area, right-click an In the tree view area, right-click a
PATROL object and choose
application icon and choose
Infobox from the pop-up menu.
Knowledge Module Commands
from the pop-up menu.
Console
216
NOTE
If you are trying to access Help from a UNIX console, see the PATROL Installation Reference
Manual for specific instructions about installing and setting up a browser in the UNIX
environment.
Table 46
Console
PATROL Console for
Microsoft Windows
Servers
To access
product help
To access
application class help
Double-click an
application class in the KM
tab of the console. From
the Application Properties
dialog box, click the Help
tab. Then click Show Help.
Right-click a parameter
icon and choose Help
On from the pop-up
menu.
Double-click a
parameter icon; click
the ? icon or Help
button in the
parameter display
window.
Double-click a
parameter in the KM
tab of the console; from
the properties dialog
box, click the Help tab;
then click Show Help.
Right-click a parameter
icon and click Help On.
PATROL Central
Operator - Windows
Edition
PATROL Central
Operator - Web
Edition
In the upper right corner of In the tree view, right-click In the tree view, right-click
an application class and
a parameter and choose
PATROL Central, click
Help.
Help and choose PATROL choose Help.
KM Help.
Appendix A
217
218
Appendix
The variables described in this appendix are PATROL for Windows Servers agent
configuration variables that are set in the PATROL Agent. To view these variables,
use the PATROL Configuration Manager or the wpconfig utility. Information about
using PATROL Configuration Manager is included in this appendix.
This appendix also describes the PATROL Configuration Manager rulesets that are
provided for PATROL for Microsoft Windows Servers.
WARNING
Changing any of these agent configuration variables can prevent some functions from
working properly and can affect your entire installation. Before you change a variable, make a
record of the original setting.
Appendix B
220
220
220
236
239
242
248
249
250
251
252
252
252
253
255
265
265
266
219
NOTE
For information about the PATROL KM for Event Management agent configuration variables,
see the PATROL KM for Event Management User Guide.
220
Table 47
Description
Values
InactiveonMissingPerfObj
Default
empty
(0)
0, 1
AlarmThreshold
greater than 0
NA
AutoDiscoveryTimeLimit
/ProcessMonitoring
integer > = 0
NA
-1 turns off this
feature
CollectionCount
DisablePatrolGroup
NA
empty
0 = instances
are created
1 = instances
are not created
empty
integer > = 0
All
All
StatusSortKey
StatusSelectedColumns/list
NA
comma-separated list of columns the User%,Memory
KM displays in the View Process
Usage,VM
Status dialog box
size,Page
Faults/sec,Handle
s,Threads,Argume
nts
Appendix B
221
Table 47
Description
Values
Default
/ProcessMonitoring/ProcessConfigurationList/instance
EnableAlarmIfProcessDown
Yes, No
Yes
EnableAlarmIfProcessStarts
Yes, No
No
ProcessName
process name
process
name
StartupCommand
directory path
empty
TimeLimitForKillRunAwayProcess
integer > = 0;
a number of
minutes
empty
group names
NA
ArgumentList/list
arguments
NA
UserDefinedProcess
Yes, No
Yes
222
Table 47
Description
Values
Default
/ServiceMonitoring
AutoResetServiceConfig
DisableAnnotation
DisableServiceRestart
DisableServiceMonitoring
MonitorManualServices
removedServiceList
0 = disabled
1 = enabled
empty
0 or blank =
enabled
1 = disabled
empty
0 = yes,
automatic
restart
1 = no
automatic
restart
0 = enable
monitoring
1 = disable
monitoring
empty
0 = enabled
1 or blank =
disabled
empty
NULL
UseBackwardCompatibleName
0 or blank =
prefix
1 = no prefix
NA
Appendix B
223
Table 47
Description
Values
Default
/ServiceMonitoring/ServiceList/service name
Alarm
AutoRestart
IgnoreAutoResetConfig
Monitor
MonitorNotRespond
0 = no alarm
1 = yes, alarm
0 = no restart NA
1 = yes, restart
0 = yes,
automatic
reset
1 = no
automatic
reset
0 = no
monitoring
1 = yes,
monitor
NA
0 = no
1 = yes
0 = no
1 = yes
NotRespondCmd
OverrideGlobalServiceRestart
NA
NA
0 = do not
override
1 = override
NA
0 = do not
override
1 = override
NA
0 = alarm
1 = warning
224
Table 47
Description
Values
Default
directory path
NA
/EventLogMonitoring
BackupDir
Example: D:\temp
Note: If the directory entered for the
backup directory does not exist, the
Backup and Clear Eventlog recovery
action fails.
IncludeAll
OverrideParameterAutoActivate
0 = only
configured
1 = all
0
0 = use auto
configure
1 = do not use
auto configure
0
0 = use auto
configure
1 = do not use
auto configure
0 = do not use
1 = use
greater than 0
300
seconds
InclusionList/list
NA
Appendix B
225
Table 47
Description
Values
Default
ExclusionList/list
NA
DisablePEMInfoEvents
TogglePEMOriginData
0 = do not
disable
information
events
1 = disable
information
events
0 = event log
name format
1 = detailed
format
0 = do not
send
1 = send
0 = do not
send
1 = send
0 = do not
override
(create)
1 = yes,
override (do
not create)
/EventLogMonitoring/event log/
ForwardAllNTEventstoPEM
ForwardFilteredNTEventstoPEM
OverrideSummaryAutoCreate
0
0 = use auto
configure
1 = do not use
auto configure
0 = do not use
1 = use
CheckPoint
greater than 0
EventFilters/child_list
Summar
y
226
Table 47
Description
Values
Default
/EventLogMonitoring/eventlog/EventFilters/filter
FilterEnabled
0 = not
enabled
1 = enabled
0 = not created 1
1 = created
path to valid
PATROL
application
instance
NA
manual,
automatic, or
filtername
automatic
Annotation
ConsolidateEventTypes
0 = do not
annotate
1 = annotate
0 = do not
0
consolidate
1 = consolidate
ConsolidationNumber
ConsolidationTime
EventReport
Appendix B
0 = do not
report
1 = report
227
Table 47
Description
Values
Default
1, 2, 4, 8, 16, 32,
and the sums of
any or all of these
numbers
For
security
event
log: 25
1 = Error
2 = Warning
4 = Information
8 = AuditSuccess
16 = AuditFailure
32= OtherType
All other
event
logs: 1
IncludeAllCategories
no restrictions
NA
1
IncludeAllEventIds
list of event
categories
0 = not
monitored
1 = monitored
NA
IncludeAllSources
228
0 = not
monitored
1 = monitored
NA
Table 47
Description
Values
Default
SourceList/list
list of event
sources
NA
IncludeAllStrings
0 = not
monitored
1 = monitored
NA
IncludeAllUsers
0 = not
monitored
1 = monitored
UserList/list
RetainEventDescriptions
Scheduling
MaxRecords
0 = do not
retain
1= retain
0=
Notification
1 = Polling
2 = Both
Appendix B
NA
3010
229
Table 47
Description
Values
Default
SubscriberList/list
subscribers
empty
DisplayName
NA
/EventLogMonitoring/event log/EventFilters/filterName
ComputerNamesList/list
IncludeAllCompList
230
0 = none of the
computers are
monitored by
default, and
the
ComputerNa
mesList
variable is an
inclusion list
1 = all of the
computers are
monitored,
and the
ComputerNa
mesList
variable is an
exclusion list
empty
Table 47
Description
Values
Default
/EventLogMonitoring/eventlog/Subscribers/subscriber
Enabled
0, 1
Filter
filter name
empty
Function
function name
empty
Library
library name
empty
EventForwardingHeartbeat
number that is
calculated using
valid values:
5000 <= x <=
1800000
30000
EventForwardingRetries
EventForwardingTimeout
number that is
calculated using
valid values:
5000 <= x <=
1800000
30000
MaxFilterRecords
number > 0
3010
ReportAccountName
0, 1
/EventLogMonitoring/_TUNING_/
Appendix B
231
Table 47
Description
Values
Default
/JobObjectMonitoring/
OverrideParameterAutoActivate
ManualAcknowledge
MonitorProcess
IncludeAll
0
0 = auto
configure
1 = do not auto
configure
0 = auto
acknowledge
1 = manually
acknowledge
0 = do not
monitor
1 = monitor
0 = only
configured
objects
1 = all
InclusionList/list
NA
ExclusionList/list
the job objects that are excluded from list of job objects
monitoring
NA
CollectionCount
NA
AnnotateProcStatus
DestroyAcknowledgeProcess
greater than 0
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
/ProcessorMonitoring/
AnnotateTopProcs
AnnotateProcCount
integer greater
number of top processes to include
than 0
when annotating the
NT_CPU/CPUprcrProcessorTimePe
rcent parameter
DisableAnnotation
10
0 or blank =
enabled
1 = disabled
ExclusionList/list
NA
IncludeAll
232
0 = no
1 = yes
Table 47
Description
Values
Default
list of processors
NA
integer
/PagefileMonitoring/
IncludeAll
InclusionList/list
0 = no
1 = yes
list of pagefiles
NA
list of pagefiles
NA
/NetworkInterfaceMonitoring/
IncludeAll
InclusionList/list
0 = no
1 = yes
list of network
interfaces
NA
list of network
interfaces
NA
/PhysicalDiskMonitoring/
InclusionList/list
NA
ExclusionList/list
NA
IncludeAll
list of device
numbers
0 = no
1 = yes
integer > 0
MaxReloadCounters
empty
(no
limit)
RemovedPDList
NA
/NetworkProtocolMonitoring/
FTP/Active
Appendix B
0 = no
1 = yes
233
Table 47
Description
Values
Default
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
0 = no
1 = yes
/LogicalDiskMonitoring/
InclusionList/list
ExclusionList/list
IncludeAll
0 = no
1 = yes
MaxReloadCounters
DeletedLDList
NonAggregateParamValue
integer > 0
LDldFreeSpacePercent
LDldFreeMegabytes
LDldDiskSpaceUsed
1
empty
(no
limit)
1 = values
shown for a
particular
drive instance
do not
consider the
mount drives
0 = value
shown is an
aggregate of a
particular
drive instance
and all of its
mount drives
/RegistryMonitoring/
InclusionList/list
AnnotateValueChange
234
0 = no
1 = yes
Table 47
Description
Values
Default
/PrinterMonitoring/
DisableAnnotation
0 or blank =
enabled
1 = disabled
NA
InclusionList/list
list of printers
NA
ExclusionList/list
list of printers
NA
IncludeAll
TestConnectivity
0 = no
1 = yes
0 = no
1 = yes
/HealthMonitoring/
ProcessorContentionThreshold
0 to 100
30
MemoryContentionThreshold
0 to 100
80
OverrideParameterAutoActivate
whether the
Win32_WMISetting.HighThreshold
OnEvents property is auto-corrected
using the HighThresholdOnEvents
configuration variable
OverrideAutoConfigUpdate
HighThresholdOnEvents
0
0 = auto
configure
1 = do not auto
configure
0
0 = auto
correct
1 = do not auto
correct
greater than 0
2000000
/BlueScreenKM/
ConfigureOptionUsed
Appendix B
1 = Event (ID 3
6008) only
monitors the
event id, 6008.
2 = Crash
Dump only
monitors the
crash, Dump.
3 = Default
monitors crash
dump or event
as per registry
configuration.
235
Table 47
Description
Values
Default
/AgentSetup/
NT_EVENTLOG.OSdefaultAccount allows you to provide a valid user
name and password for the PATROL
Agent default account.
The KM functions without specifying
the PATROL Agent default account.
Except for the Windows event log
KM, the PATROL KM for Microsoft
Windows works with a blank user
name and password for the PATROL
Agent default account.
When you enter a blank user name
and password for the PATROL
Agent default account, XPC
(psx_server.xpc) runs under the local
system account. The Windows event
log KM requires a valid user name
and password to connect to the
PATROL Agent using PEMAPI.
Description
Values
Default
IterationCount
text string
10
ResolveTestList
comma-separated list of IP
addresses to attempt during DNS
test
text string
NA
ServerIPAddress
text string
<Local
PATROL
Agent IP
Address>
ServerPortNumber
text string
53
TCPorUDP
1 = TCP
0 = UDP
/DomainKM/DNS/
236
Table 48
Description
Values
Default
IterationCount
text string
10
ResolveTestList
comma-separated list of IP
addresses to attempt during DNS
test
text string
NA
ServerIPAddress
text string
<Local
PATROL
Agent IP
Address>
ServerPortNumber
text string
53
TCPorUDP
1 = TCP
0 = UDP
SCOPEADD
0 = no
1 = yes
SCOPEDEL
0 = no
1 = yes
DHCPBAK
0 = no
1 = yes
MBREL
0 = no
1 = yes
MBRADD
0 = no
1 = yes
MBRDEL
0 = no
1 = yes
BDCADD
BDCDEL
DHCPADD
DHCPDEL
0 = no
1 = yes
WINSADD
WINSDEL
/DomainKM/DNS2000/
/DomainKM/DHCP/Events/
/DomainKM/Domain/
0 = no
1 = yes
/DomainKM/Server/
Appendix B
237
Table 48
Description
Values
Default
string
string
NA
300
/DomainKM/RemoteServer/
ServerExcludeList
/DomainKM/Shares/
MaxShares
string
NA
string
NA
string
300
string
NA
/DomainKM/Trust/
TrustExcludeList
/DomainKM/Users/
MaxUsers
238
Description
Values
Default
/ActiveDirectory/Configuration/
DbRequiredPercent
DbRequiredSpace
DisableAnnotations
enables/disables parameter
annotation. By default annotation is
enabled. To disable annotation for
all PATROL KM for Active
Directory parameters, add this
variable to pconfig and set the value
to 1.
DisableEventConfig
DisableObsoleteEventFilters
number > 0
(kilobytes)
500000
kilobytes
0=annotate
1=do not
annotate
0 = auto
configure
1 = do not
auto
configure
0 = do not
delete
1 = delete
IncludedCNFObjectTypes
Appendix B
0 = do not
execute
1 = execute
239
Table 49
Description
Values
Default
InfrastructureMasterConnStatus
Sched
LdapGcConnStatusSched
number of
3600
seconds between seconds
collections
(1 hour)
LogRequiredPercent
percentage > 0
but < 100
20
percent
200000
kilobytes
ReplMonDomainNC
SchemaMasterConnStatusSched
240
0 = disabled
1 = enabled
0 = disabled
1 = enabled
Table 49
Description
Values
0 = default
value
1 = include
AlarmPoint
annotation
text in the
alert
message
Default
0
/ActiveDirectory/Configuration/fully-qualified-server-name_
time out in
milliseconds
5,000
PingTimeout
PingCount
number of pings 3
provides a way to configure (on a
greater than 0
per-server basis) the number of
times that a server is pinged to test
its availability - servers that are
connected through a slower link
may need this value increased (a
server is considered available if any
one ping is successful)
/ActiveDirectory/RpcConnection/
DisableCheckPointOverrides
0 = override
do not
override
number > 0
indicates the maximum amount of
time the KM waits in seconds for a
13509 FRS event to occur after a
13508 FRS occurs before considering
the 13508 FRS event an issue
14400
seconds
Appendix B
241
Table 49
Description
Values
Default
prevDCName
prevDCSiteName
contains the name of the last known Do not manually change the
site where the domain controller
value of this variable.
resided
firstNonResponse
contains the UTC time when the KM Do not manually change the
determined that the replication source value of this variable.
was non-responsive
lastChangeTime
origChangeTime
contains the UTC time when the KM Do not manually change the
determined that the replication source value of this variable.
might have failed to replicate
prevObjectVersion
Description
Values
Default
AccountInfo
username/
encrypted
password
NA
ClaInsideCluster
0, 1
/MCS/
242
Table 50
Description
Values
Default
DisableServiceAutoRestart
DisableParmOverrides
0, 1
PingIpTimeout
5000
ServiceCollWaitTime
60
applicationClass_AnnotationMode
NA
MCS_Groups
MCS_Group_Resources
MCS_Nodes
MCS_Performance
directory path
NA
Appendix B
NA
243
Table 50
Description
Values
Default
list of IP
addresses
NA
244
list of resources NA
clusterInstance_UpTimeBaseLine
time in seconds NA
Table 50
Description
Values
Default
the name of
a network
null (the
KM maps
the file
share
resources
to a default
network)
Appendix B
245
Table 50
Description
Values
Default
domain name
NA
246
hostName_LogMonKeyAlarm
hostName_LogMonKeyDate
time in seconds NA
stores the date from which the KM
searches for defined keywords in the
cluster log file. If any of the keywords
are found, the ClusterLogFileError
parameter sends an alarm or
warning. Define the date and
keywords through the PATROL
Admin (MCS_Nodes) => Maintain
Keywords menu command. By
default, no date or keywords are
defined, and the parameter is offline.
NA
Table 50
Description
Values
Default
hostName_LogMonKeyWarn
NA
MenuCmdROMode
True, Fales
stores the read-only setting for the
Cluster Admin Commands. Change
the read-only setting through the
PATROL Admin (MCS_Clusters) =>
Configure Menu Cmd RO Mode
menu command. Read-only is
disabled by default.
NA
MonitoredClusterList
list of clusters
stores the clusters you are
monitoring. Change the list through
the PATROL Admin
(MCS_Clusters) => Select Cluster to
Monitor menu command.
NA
UptimeCollWaitTime
number >0
specifies in seconds the amount of
time that the Uptime Collector spends
waiting for the PATROL Uptime
resource to send data
300
Appendix B
247
Description
Values
Default
QueueMsgCountThreshold
0-999999
450000
QueueMsgSizeThreshold
0-2000000
1600000
ScheduledServers
ServerName1,Ti NA
meInterval|Serv
erName2,TimeIn
terval2...
/MQ_SERVER/
/MQ_QUEUES/
248
JournalMsgCountThreshold
450000
JournalMsgSizeThreshold
0-2000000
1600000
QueueMsgCountThreshold
0-999999
450000
QueueMsgSizeThreshold
0-2000000
1600000
Description
Values
Default
/COM_PLUS/Applications/
ApplicationName
X:Y:Z: <List>where,
1:1:5
X = 0; Do not monitor.
X = 1; Monitor.
Y = 0; Do not restart if the COM+
application is stopped.
Y= 1; Restart the COM+
application if it is stopped.
Z = The number of times the
COM+ application is restarted that
causes an alarm. Z is used only if Y
=1.
<List> Represents a comma
separated list of the methods being
monitored for this application in
format
<MethodName>\<InterfaceName
>\<ComponentName>
Appendix B
249
Description
Values
Default
Name
comma
separated list
NA
Objects
comma
separated list
NA
/Perfmon/NT_PERFMON_WIZARD
/Perfmon/NT_PERFMON_WIZARD/object/
Counters
comma
separated list
NA
Instances
comma
separated list
NA
/Perfmon/NT_PERFMON_WIZARD/object/counter
AlarmMax
NA
AlarmMin
NA
WarnMax
any integer
NA
WarnMin
any integer
NA
Parameters
comma
separated list
NA
ConnectAs32Bit
/Perfmon/NT_WMI/
250
Table 53
Description
Values
Default
Query
string
NA
AlarmMax
NA
AlarmMin
NA
WarnMax
any integer
NA
WarnMin
any integer
NA
Description
Values
Default
/RecoveryActions/application class/instance/parameter/
Description
HelpID
NA
Mode
NA
text description NA
Wait
Appendix B
number of
seconds
NA
NA
251
preloaded KMs
services whose process monitoring is enabled
processes that are monitored
Windows events that are monitored
additional Windows Performance Monitor counters that are monitored (added as
parameters beneath the NT_PERFMON_WIZARD application class)
NOTE
PATROL automatically monitors services whose startup property is automatic. However,
PATROL monitors only whether the service is available. When process monitoring is enabled
for the service, PATROL also monitors how much memory and CPU a service executable
consumes. In the ruleset descriptions in this chapter, the services whose process monitoring is
enabled are noted.
252
For more information about applying rulesets, see Using PATROL Configuration
Manager on page 265.
For more information about the PATROL Configuration Manager, see the PATROL
Configuration Manager User Guide.
Rulesets are provided for the server roles shown in Table 55. Figure 4 on page 255
shows these rulesets as they appear in the PATROL Configuration Manager interface.
Table 55
Role
Ruleset file
Description
PRU_FileServer.cfg
PRU_PrintServer.cfg
Application server
ruleset
PRU_ApplicationServer.cfg
Appendix B
253
Table 55
Role
Ruleset file
Description
PRU_MailServer.cfg
Terminal server
ruleset
PRU_TerminalServer.cfg
provides a full-featured software router and both dialup and virtual private network (VPN) connectivity for
remote computers
PRU_DNSServer.cfg
Streaming media
server ruleset
PRU_MediaServer.cfg
Domain controller
ruleset
PRU_DomainServer.cfg
stores SMS data for the primary site and all the sites
beneath it in a SQL Server database
254
Site_Role.cfg
Figure 4
Ruleset reference
The following section describes the ruleset configuration settings. The rulesets define
monitoring that is enabled beyond what is enabled by default in the KM.
The configuration variables (rules) for each type of ruleset are stored in the agent
configuration database in the location shown in Table 56. For more information about
the specific configuration variables associated with each type of configuration setting,
see the page referenced in Table 56.
Table 56
Configuration setting
See also
Preloaded KMs
\AgentSetup\preloadedKMs
NA
Appendix B
255
Table 56
Configuration setting
Processes monitored
Windows events
monitored
\PSX_P4WinSrvs\PWK_PKMforMSWinOS_config\EventLogMonit
oring\eventlog\EventFilters\filtername
page 225
Additional Windows
PerfMon counters or
WMI objects monitored
\PerfMon\NT_PERFMON_WIZARD\countername
page 250
See also
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NOTE
An asterisk indicates that all KMs that start with the stem are included. For example,
NT_CPU* indicates both NT_CPU and NT_CPU_CONTAINER.
Preloaded KMs
(PRU_ApplicationServer.kml)
256
COM_*
NT_EV*
NT_PERFMON*
Table 57
Processes Monitored
inetinfo.exex
Appendix B
257
Preloaded KMs
(PRU_TerminalServe
r.kml)
Services with
Process Monitoring
Enabled
Processes
Monitored
NT_EV*
NT_PERFMON*
Terminal Services (process monitoring enabled)
Terminal Services Session Directory (process monitoring enabled)
None
Windows Events
Monitored
Additional Perfmon
Counters
Monitored
Preloaded KMs
(PRU_RasVpnServer.kml)
NT_EV*
NT_PERFMON*
Processes Monitored
None
Error and warning events from Remote Access (system event log)
258
Preloaded KMs
(PRU_PrintServer.kml)
NT_EV*
NT_PRINT*
Spooler
Processes Monitored
spoolsv.exe
Error and warning events from Print source (system event log)
Additional Perfmon
Counters Monitored
None
Preloaded KMs
(PRU_DomainServer.kml)
NT_EV*
NT_DOMAIN
NT_MEMBER_SERVER
AD_AD*
Processes Monitored
None
Error and warning events from NT File Replication Service (file replication
service event log)
Error and warning events from source LSASERV (system event log)
Error and warning events from source SAM (system event log)
Error and warning events from source NetLogon (system event log)
Error and warning events from source Windows Time (system event log)
Error and warning events from source KDC (system event log)
Error and warning events from source UserEnv (application event log)
Error and warning events from DNS API (system event log)
None
Appendix B
259
Preloaded KMs
(PRU_FileServer.kml)
Processes Monitored
NT_DFS*
NT_EV*
NT_DOMAIN
NT_MEMBER_SERVER
NT_PHYSICAL_DISKS*
Netlogon
dmserver
services.exe
lsass.exe
svchost.exe (with any argument)
Error and Warning events from DfsSvc (system event log)
Error and Warning events from NtFrs (file replication service
event log)
None
Preloaded KMs
(PRU_MailServer.kml)
260
NntpSvc
Pop3Svc (process monitoring enabled)
RpcSs (process monitoring enabled)
SMTPSVC (process monitoring enabled)
None
NT_EV*
NT_PERFMON*
Preloaded KMs
(PRU_DNSServer.kml)
NT_DNS_2000
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_PERFMON*
Additional Active
Parameters
None
None
Processes Monitored
dns.exe
Additional Perfmon
Counters Monitored
Error and warning events from source DNS (DNS event log)
Error and warning events from source DNS API (system event log)
Error and warning events from source DNS Cache (system event log)
DNS Caching memory
DNS Dynamic Update Received/sec
DNS Total Query Received/sec
DNS Database Node Memory
DNS Dynamic Update Written to Database/sec
Preloaded KMs
(PRU_WinsServer.kml)
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_WINS*
None
WINS
Processes Monitored
None
None
Appendix B
261
Preloaded KMs
(PRU_DhcpServer.kml)
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_DHCP*
None
DHCPServer
Processes Monitored
None
None
Preloaded KMs
(PRU_MediaServer.kml)
Additional Active Parameters
NT_EV*
NT_PERFMON*
None
None
262
Table 68
Preloaded KMs
NT_EV*
NT_PERFMON*
None
MSSQLSERVER
SMS Executive
SMS Site Backup
Services with Process Monitoring SMS Site Component Manager
SMS SQL Monitor
Enabled
Processes Monitored
Appendix B
263
Preloaded KMs
NT_EV*
NT_PERFMON*
None
SMS Executive
Services with Process Monitoring SMS Site Backup
Enabled
SMS Site Component Manager
Processes Monitored
264
NOTE
To use the PATROL Configuration Manager to view or manage a PATROL agent
configuration, the PATROL KM for Event Management must be loaded on the PATROL
Agent machine. For more information about loading KMs, see Loading the PATROL for
Microsoft Windows Servers KMs on page 93.
Appendix B
265
WARNING
When creating rules manually within PATROL Configuration Manager, you must follow the
syntax guidelines discussed here and avoid typos. Failure to do so could result in
unpredictable behavior.
Syntax guidelines
When manually creating rules, you must substitute special codes for certain
characters when those characters are part of a configuration variable name or value.
These characters are used for specific purposes within pconfig. For example, the
comma is used to separate values. For more information, see Table 70.
Table 70
266
Character
Replace with
Example
comma (,)
(CO)
slash (/)
(SL)
(EQ)
double quote
()
(QU)
Appendix B
267
variable_list = FilterEnabled,FilterDescription,EventType,Annotation,EventReport,
RetainEventDescriptions,Scheduling,AcknowledgeBy,ConsolidationNumber,ConsolidationTi
me,ConsolidateEventTypes,IncludeAllSources,IncludeAllEventIds,IncludeAllUsers,IncludeA
llCategories,IncludeAllStrings,CreateInstance
If you are unsure how or when to use the variable_list variable, use a PATROL
console to configure monitoring and then examine the variable_list rules that are
created.
1 Right-click the folder where you want to add the rule and select New => Ruleset.
A new ruleset is created called NewRuleSet.
268
To manually create this configuration, you would create the rules shown in Table 71.
For more information about the configuration variable specified in these rules, see
PATROL for Windows Servers configuration variables on page 220.
Table 71
Rule
Operation
Value
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonitoring/ Replace
ParentDefinedProcessList/child_list
empty
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonitoring/ Replace
child_list
ProcessConfigurat
ionList
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ServiceMonitoring/ Replace
ServiceList/Dhcp/Alarm
Enabled
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ServiceMonitoring/ Replace
ServiceList/Dhcp/Monitor
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ServiceMonitoring/ Replace
ServiceList/Dhcp/variable_list
Alarm,AutoRestar
t,Monitor
terminate the process when the process CPU% exceeds a threshold value (defined
by the AlarmThreshold variable) for 15 minutes
Appendix B
269
To manually create this configuration, you would create the rules shown in Table 72.
For more information about the configuration variable specified in these rules, see
PATROL for Windows Servers configuration variables on page 220
Table 72
Rule
Operation
Value
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/ArgumentList
/list
-service
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/ArgumentList
/variable_list
list
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/ProcessName
rtserver
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/child_list
ArgumentList
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/variable_list
ProcessName,TimeLimi
tForKillRunAwayProce
ss,EnableAlarmIfProces
sDown,EnableAlarmIfP
rocessStarts
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/child_list
RTSERVER_SERVICE
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/EnableAlarmI
fProcessDown
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/EnableAlarmI
fProcessStarts
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/ProcessMonito Replace
ring/ProcessConfigurationList/RTSERVER_SERVICE/TimeLimitFor
KillRunAwayProcess
15
270
create an event filter named Example with the description Event Filter Example
monitor only Warning and Error event types; do not consolidate event types when
reporting. Report Warning and Error events separately.
monitor events that have the test string missing in the event text
choose the option to report multiple events as one event when 5 or more events
occur within 30 seconds
choose the option to notify PATROL immediately when an event filter matches the
filter criteria
Appendix B
271
To manually create this configuration, you would create the rules shown in Table 73.
For more information about the configuration variable specified in these rules, see
PATROL for Windows Servers configuration variables on page 220.
Table 73
Rule
Operation
Value
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/AcknowledgeBy
Manual
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/Annotation
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/ConsolidateEventTypes
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/ConsolidationNumber
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/ConsolidationTime
30
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/CreateInstance
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/EventIdList/list
100-154
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/EventIdList/variable_list
list
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/EventReport
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/EventType
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/FilterDescription
EventFilterExample
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/FilterEnabled
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/IncludeAllCategories
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/IncludeAllEventIds
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/IncludeAllSources
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/IncludeAllStrings
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/IncludeAllUsers
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/RetainEventDescriptions
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/Scheduling
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/SourceList/variable_list
list
272
Table 73
Rule
Operation
Value
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/StringList/list
missing
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/StringList/variable_list
list
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/UserList/list
bhunter
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/UserList/variable_list
list
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/child_list
SourceList,EventIdList,
UserList,StringList
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/Example/variable_list
FilterEnabled,FilterDes
cription,EventType,An
notation,EventReport,R
etainEventDescriptions,
Scheduling,Acknowled
geBy,ConsolidationNu
mber,ConsolidationTi
me,ConsolidateEventT
ypes,IncludeAllSources
,IncludeAllEventIds,Inc
ludeAllUsers,IncludeAl
lCategories,IncludeAllS
trings,CreateInstance
/PSX__P4WinSrvs/PWK__PKMforMSWinOS_config/EventLogMonit Replace
oring/Application/EventFilters/child_list
Example
Appendix B
273
To manually create this configuration, you would create the rules shown in Table 74.
NOTE
When you change parameter thresholds through the PATROL Configuration Manager or
through PATROL KM for Event Management, the changes are stored externally in the pconfig
database, not in the KM. To change parameter thresholds or poll times in this manner, you
must have the PATROL KM for Event Management loaded on the PATROL Agent. For more
information about loading KMs, see Loading the PATROL for Microsoft Windows Servers
KMs on page 93.
For more information about the this rule, see the detailed description in Table 75.
Table 74
Rule
Operation
Value
/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/
NT_CPU/__ANYINST__/CPUprcrProcessorTimePercent
Replace
Item
Description
/AS/EVENTSPRING
variable folder
/PARAM_SETTINGS
variable folder
/THRESHOLDS
variable folder
/NT_CPU
application class
/__ANYINST__
274
Table 75
Item
Description
if the trigger value is non zero, this value specifies the number of
occurrences before triggering an alarm
80
85
if the trigger value is non zero, this value specifies the number of
occurrences before triggering an alarm
85
100
if the trigger value is non zero, this value specifies the number of
occurrences before triggering an alarm
Rule
Operation
Value
/AS/EVENTSPRING/PARAM_SETTINGS/THRESHOLDS/N
T_LOGICAL_DISKS/__ANYINST__/LDldFreeSpacePercent
Replace
Appendix B
275
276
Appendix
Appendix C
278
278
282
283
283
284
284
285
285
286
286
286
287
277
NT_LOAD.kml
NT_BASE.kml
NT_HYPER-V.kml
NT_LOAD.kml
The PATROL KM for Microsoft Windows OS uses the NT_LOAD.kml file, which
loads the application classes shown in Table 77.
Table 77
Application classes
278
Table 77
Application classes
NT_ICMP
NT_IP
NT_IPX
NT_IPX_CONTAINER
NT_JOBS
NT_JOBS_CONTAINER
NT_JOBS_PROCESS_GROUP
NT_JOBS_PROCESS
NT_NETBEUI
NT_NETBEUI_CONTAINER
NT_NETBIOS
NT_NETBIOS_CONTAINER
NT_NET_PROTOCOLS
NT_NETWORK
NT_NETWORK_CONTAINER
NT_PHYSICAL_DISKS_CONTAINER
NT_PHYSICAL_DISKS
NT_PRINTER
NT_PRINTER_CONTAINER
NT_PRINTERJOB
NT_PRINTERJOBS
NT_PROCESS_CONTAINER
NT_PROCESS_GROUP
NT_PROCESS
NT_REGISTRY
NT_REGISTRY_KEYINST
NT_SECURITY
NT_SERVER
NT_SERVICES
NT_SERVICES_CONTAINER
NT_TCP
NT_UDP
Appendix C
279
NT_BASE.kml
The NT_LOAD.kml file includes the NT_BASE.kml file, which loads the application
classes shown in Table 78.
Table 78
Application classes
NT
NT_OS
NT_CACHE
NT_CPU
NT_CPU_CONTAINER
NT_HEALTH
NT_LOGICAL_DISKS
NT_LOGICAL_DISKS_CONTAINER
NT_MEMORY
NT_NTFS_MOUNT
NT_NTFS_MOUNT_CONTAINER
NT_NTFS_QUOTA
NT_NTFS_QUOTA_CONTAINER
NT_PAGEFILE
NT_PAGEFILE_CONTAINER
NT_SYSTEM
PATROL_NT
NT_HYPER-V.kml
Microsoft Windows provides virtualization called Hyper-V. PATROL KM for
Microsoft Windows allows you to monitor and gather information about of Hyper-V
entities by using the application classes and their parameters. The KM allows you to
monitor the following Hyper-V entities:
Hypervisor
The product reports information about the number of monitored notifications
registered with a hypervisor, the bootstrap and deposited pages, and the partitions,
virtual processors, logical processors, and the running partitions present.
280
NOTE
To discover Hyper-V partitions and the data for each partition, the BMC PATROL
Agent default user must be added to the local administrator group.
The PATROL KM for Microsoft Windows OS uses the NT_HYPER-V.kml file, which
loads the application classes shown in Table 79.
NOTE
Ensure that the Hyper-V server role is installed on the computer.
Appendix C
281
Table 79
Application classes
NT_HYPER-V
NT_HYPERV_HYPERVISOR
NT_HYPERV_LOGICAL_PROCESSOR_CONT
NT_HYPERV_LOGICAL_PROCESSOR
NT_HYPERV_PARTITION_CONT
NT_HYPERV_PARTITION
NT_HYPERV_PART_VIRTUAL_PRCR_CONT
NT_HYPERV_PART_VIRTUAL_PRCR
NT_HYPERV_PARTITION_VHD_CONT
NT_HYPERV_PARTITION_VHD
Application classes
MWD_ACTIVE_Directory_MN.kml
AD_AD_SERVER.km
AD_AD_ADDRESS_BOOK.km
AD_AD_AUTHENTICATION.km
AD_AD_CNF.km
AD_AD_CNF_CONT.km
AD_AD_COLLECTOR.km
AD_AD_DNS.km
AD_AD_FRS.km
AD_AD_FSMO_ROLE_CONECTIVITY.km
AD_AD_FSMO_ROLE_CONECTIVITY_CONT.km
AD_AD_FSMO_ROLE_PLACEMENT.km
AD_AD_GPO.km
AD_AD_LDAP.km
AD_AD_LOST_FOUND_OBJECTS.km
AD_AD_REPLICATION.km
AD_AD_SAM.km
282
PATROL KM for Microsoft Windows Active Directory Remote Monitoring .kml file
Application classes
REM_ACTIVE_DIRECTORY.kml
AD_RMT_SERVER_CONT.km
AD_RMT_FSMO_ROLE_CONNECTIVITY_CONT.km
AD_RMT_FSMO_ROLE_CONNECTIVITY.km
AD_RMT_DOMAINSITE.km
AD_RMT_DOMAINCONTROLER.km
Application classes
NT_DOMAIN
NT_MEMBER_SERVER
NT_DFS_LINK
NT_DFS_LINK_REPLICA
NT_DFS_ROOT
NT_DFS_ROOT_REPLICA
NT_DHCP
NT_DHCP_SCOPE
NT_DNS
NT_DNS_2000
NT_RAS
NT_RAS_DEVICE
NT_REMOTE_SERVERS
NT_REPLICATION
NT_REPL_DIR
NT_REPL_SVR
NT_SHARES
NT_TRUST
NT_USERS
NT_USER_ACCOUNTS
NT_WINS
NT_WINS_PARTNER
Appendix C
283
Application classes
MCS_Clusters
MCS_Cluster
MCS_Collectors
MCS_Groups
MCS_Group
MCS_Group_Resources
MCS_Networks
MCS_Network_Interfaces
MCS_Nodes
MCS_Quorum
MCS_Performance
MCS_Shares
(uses MCS_Load.kml)
Application classes
COM_PLUS
COM_APPLICATION
COM_APPLICATIONC
COM_DTC
COM_APP_COMPONENT
COM_APP_INTERFACE
COM_APP_METHOD
(uses COM.kml)
284
Application classes
MQ_CONTAINER
MQ_SERVER
MQ_QUEUES
MQ_QUEUESC
MQ_IS
MQ_ROUNDTRIP
MQ_SESSIONSC
MQ_SESSIONS
(uses MSMQ.kml)
PATROL Wizard for Microsoft Performance Monitor and WMI .kml file
Application classes
(NT_PERFMON_WIZARD.kml)
Appendix C
285
Application classes
LOGT.km
LOGMON.km
LOGTEMP.km
PMGCONVERT.km
PMGDEBUG.km
Application classes
HISTORY_Computer
HISTORY_Propagator
MSSQLSERVER_History_Loader
ORACLE_History_Loader
SYBASE_History_Loader
DB2UDB_History_Loader
(HISTORY.kml)
Application classes
EVENT_MANAGEMENT
AS_AVAILABILITY
AS_EVENTSPRING_ALL_COMPUTERS
(AS_EVENTSPRING.kml)
286
NOTE
An asterisk indicates that all KMs that start with the stem are included. For example,
NT_CPU* indicates both NT_CPU and NT_CPU_CONTAINER.
Table 90
.kml
PRU_ApplicationServer.kml
Application classes
PRU_TerminalServer.kml
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
COM_*
NT_EV*
NT_PERFMON*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_PERFMON*
Appendix C
287
Table 90
.kml
Application classes
PRU_RasVpnServer.kml
PRU_PrintServer.kml
PRU_DomainServer.kml
288
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_PERFMON*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_PRINT*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_DOMAIN
NT_MEMBER_SERVER
AD_AD*
Table 90
.kml
PRU_FileServer.kml
Application classes
PRU_MailServer.kml
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_DFS*
NT_EV*
NT_DOMAIN
NT_MEMBER_SERVER
NT_PHYSICAL_DISKS*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_PERFMON*
PRU_DNSServer.kml
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_DNS_2000
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_PERFMON*
Appendix C
289
Table 90
.kml
Application classes
PRU_WinsServer.kml
PRU_DhcpServer.kml
PRU_MediaServer.kml
290
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_WINS*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_DOMAIN
NT_MEMBER_SERVER
NT_EV*
NT_DHCP*
NT
NT_OS
NT_CACHE
NT_CPU*
NT_MEMORY
NT_PAGEFILE*
NT_SYSTEM
NT_LOGICAL_DISK*
PATROL_NT
NT_SERVICES*
NT_PROCESS*
NT_HEALTH
NT_EV*
NT_PERFMON*
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Index
Symbols
%PATROL_CACHE% 68
%PATROL_HOME% 68
.kml
COM.kml 92, 284
EVENT_MANAGEMENT.kml 93
HISTORY.kml 92, 286
LOG.kml 93
MSMQ.kml 92, 285
MWD_ACTIVE_Directory_MN.kml 93
NT_BASE 280
NT_HYPER-V 282
NT_LOAD.kml 93, 278
NT_PERFMON_WIZARD.kml 93
NTD.kml 93, 283
REM_ACTIVE_DIRECTORY.kml 283
.kml files
list of 92
vs. .km files 91
__ANYINST__ variable 274, 275
_CollectionStatus parameter 202
_DiscoveryStatus parameter 48
Numerics
560/562 events 203
A
account requirements
PATROL KM for Cluster Server 50, 78
PCC 179
AccountInfo variables 242
accounts
requirements 99
setting up for installation 46
Windows 46
AcknowledgeBy variable 227, 272
acknowledging alarms 203
Act as part of operating system (user right) 47, 103
activating parameters 275
Active Directory 22
ActiveX control 135
adding
event filters 271
291
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
NT_IPX 234
NT_LOGICAL_DISK 102
NT_NETBEUI 234
NT_NETBIOS 234
NT_PROCESS 120
NT_REMOTE_SERVERS 171
NT_SERVICES 102
NT_SHARES 171
NT_TCP 234
NT_TRUST 172
NT_UDP 234
NT_WINS 172
application server, rulesets for monitoring 253
arguments, process 124
arsAction variable 206
AS_AVAILABILITY application 208
AS_CHANGESPRING.kml 72
AS_EVSLocalAlertNotify.bat
editing 136
requirements for using 135
AS_EVSLocalAlertNotify.pl 135
Attended Mode Dialog Timeout field 132
auditing, disabling 203
authentication support 24
AutoDiscoveryTimeLimit variable 221
automatic process monitoring 119
AutoRestart variable 119, 224
availability, monitoring 208
B
backing up before migration 71
backup domain controllers, monitoring 30
backup notification servers 137
BackupClusterDatabase parameter 243
BackupDir variable 225
batch file 135
BDCADD variable 237
BDCDEL variable 237
blackouts 206
Blat
defined 134
version tested with 134
blue screen monitoring
crash dump 127
default 127
event id 6008 127
BMC Software, contacting 2
Bourne shell 81
Bypass traverse checking user right 103
C
C shell 81
catalog, event 208
292
changing
account rights 47
security levels 57
system monitoring 104
thresholds and poll times 274
characters, special 266
charting PATROL data 169
CheckIPResourceColl parameter 244
CheckPoint variable 226
child_list variable 267
CluDBBackupPath variable 243
cluster administrator account 50, 78, 179
cluster.exe 78
ClusterLogFileError parameter 246
clusterName_NetworkNameForFileShares variable 245
CollectionCount variable 221, 232
colormap option 80
COM.kml 92, 284
command-line arguments 124
commas, escaping 266
components
KM files 278286
PATROL Adapter for Microsoft Office 35
PATROL Agent for Microsoft Windows Servers 35
PATROL Cluster Configuration Wizard 31
PATROL Cluster Configuration Wizard (PCC) 31
PATROL History Loader KM 35
PATROL KM for Cluster Server 30
PATROL KM for Event Management 34
PATROL KM for Log Management 32
PATROL KM for Microsoft Cluster Server 30
PATROL KM for Microsoft COM+ 31
PATROL KM for Microsoft Message Queue 31
PATROL KM for Microsoft Windows Active
Directory 22
PATROL KM for Microsoft Windows Domain
Services 30
PATROL KM for Microsoft Windows OS 21
composite parameters, creating 125
compressing the DHCP database 101
ComputerNamesList/list variable 230
configuration variables 219252
configurations, component-based
PATROL KM for History Loader 286
PATROL KM for Microsoft COM+ 284
PATROL KM for Microsoft Message Queue (MSMQ)
285
PATROL KM for Microsoft Windows Domain
Services 283
PATROL KM for Microsoft Windows OS 278
PATROL KM for MS Windows Active Directory
Remote Monitoring 283
ConfigureOptionUsed variable 235
configuring
blue screen monitoring 102, 127
composite parameters 125
custom parameters 125
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
e-mail notification 133
event log monitoring 117
event monitoring 106
in PCM, event monitoring 271
in PCM, process monitoring 269
in PCM, service monitoring 268
KM to look for crash dump file 102
monitoring of text files 150
PATROL in a cluster 178
PATROL KM for Microsoft Windows OS 103125
process control 123
process monitoring 119124
quotas 102
remote agents 140141
service monitoring 117??
Windows event monitoring 106
ConnectAs32Bit variable 250
connection, persistent 141
ConsolidateEventTypes variable 110, 227, 272
ConsolidationNumber variable 227, 272
ConsolidationTime variable 227, 272
Core Active Directory service 25
core Active Directory service 26
Counters variable 250
counters, Performance Monitor 209
CreateInstance variable 227
creating
custom parameters 125
event filter to monitor events generated only by a
specified computer 116
rules 268
WMI parameters 34
custom installation option 58
customer support 2
customizations
migrating manually 74
customized PSL, migrating 75
customizing
monitoring of counters 144
scripts 136
text log monitoring 149
thresholds 209
D
database, parameter history 35
deactivating parameters 275
debug programs (user right) 47
default email account 139
defining
notification servers 137
remote agents 137
DeletedLDList variable 234
dependencies 94
deploying settings 138
DestroyAcknowledgeProcess variable 232
E
editing
notification scripts 136
rulesets 253
ELMError parameter 109
ELMErrorNotification parameter 109, 203
ELMEvFileFreeSpacePercent parameter 129
ELMFailureAudit parameter 109
ELMFailureAuditNotification parameter 109, 203
ELMInformation parameter 109
ELMInformationNotification parameter 203
ELMNotification parameter 109, 203
ELMOtherTypes parameter 109
293
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ELMOtherTypesNotification parameter 203
ELMRptOfNotification parameter 111
ELMRptOfOtherTypes parameter 111
ELMStatus parameter 109, 110
ELMSuccessAudit parameter 109
ELMSuccessAuditNotification parameter 203
ELMWarning parameter 109
ELMWarningNotification parameter 109, 203
e-mail notification 133
EnableAlarmIfProcessDown variable 222
EnableAlarmIfProcessStarts variable 222
enabling
event filters 116
event log monitoring 107
parameters 275
environment variables
LANG 81
PATH 81
PATROL_BROWSER 81
PATROL_CACHE 68
PATROL_HOME 68
setting for Help browser 81
setting for the browser 81
equal sign, escaping 266
error messages 212
escaping special characters 266
event catalog 208
event log
windows event log 204
event logs
monitoring, enabling 105
troubleshooting 203
viewing 125
event monitoring
configuring in PCM 271
Core Active Directory service 25
domain controller health 25
file replication service and group policy 25
Kerberos 25
Netlogon 25
time synchronization service 25
EVENT_MANAGEMENT.kml 286
EventLogMonitoring
BackupDir variable 225
ExclusionList/list variable 226
IncludeAll variable 225
InclusionList/list variable 225
EventReport variable 227, 272
events
monitoring 106
reducing 202
EventType variable 110, 228, 272
EvRptOfError parameter 111
EvRptOfFailureAudit variable 111
EvRptOfInformation parameters 111
EvRptOfStatus parameters 111
EvRptOfSuccessAudit parameters 111
294
F
failover, cluster 31
FAT file system 42
file replication service and group policy 26
file server, rulesets for monitoring 253
file systems, supported 42
FileShareExclusionList variable 243
filter, event monitoring 106
FilterDescription variable 228, 272
FilterDisableCase variable 230
FilterEnabled variable 116
first time installation 58
Flexible Single Master Operations (FSMO) 23
ForwardAllNTEventstoPEM variable 226
ForwardFilteredNTEventstoPEM variable 226
FSMO monitoring 23
FTP/Active variable 233
G
graphing PATROL data 169
group policy monitoring 25
H
HighThresholdOnEvents variable 235
history reports 170
HISTORY.kml 92, 286
HPFS file system 42
I
ICMP/Active variable 234
IdleServerTime variable 238
InactiveonMissingPerfObj variable 221
IncludeAll variable 225, 232, 233, 234, 235
IncludeAllCompList variable 230
InclusionList list/variable 233
InclusionList/list variable 225, 232, 233, 234, 235
increase quotas (user right) 47
inetinfo.exe 257
InfrastructureMasterConnStatusSched variable 240
installation
backing up before migration 71
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
custom option 58
log files 212
PATROL KM for Cluster Server account requirements
50, 78
PATROL KM for Cluster Server overview 75
preparing for 52
setting up installation accounts 46
system requirements 41
typical option 57
verifying requirements 41
Windows account requirements 46
Installation logs 212
installing
checking for product patches or fixes 53
clearing cache 73
determining the version of the installation utility 54
extracting downloaded files 54
extraction order 54
extraneous target platforms in the installation utility
user interface 53
for the first time 58
installing PATROL Agent over an existing installation
54
turning off pop-up blocking software 52
unsupported platform in the installation utility user
interface 52
upgrading from an earlier version 66
where to install KMs 55
where to install PATROL Agent 54
Instances variable 250
integration with Blat 134
intrasite/intersite monitoring 23
IP/Active variable 234
IPExclusionList variable 244
IPX/Active variable 234
IterationCount variable 236, 237
J
job objects
missing 202
monitoring 105
JobObjectMonitoring
CollectionCount variable 232
ExclusionList/list variable 232
IncludeAll variable 232
InclusionList/list variable 232
JournalMsgCountThreshold variable 248
JournalMsgSizeThreshold variable 248
K
Kerberos 25, 27
KM configuration variables 219252
KM customizations
migrating manually 74
KMs
deploying 18
determining if migratable 66
determining versions of 213
included with product 277286
installing individual 58
installing QuickStart packages 57
loading 9395
preloading 92
unloading 174
upgrading from an earlier version 66
where to install 55
Korn shell 81
L
LANG environment variable 81
LDAP monitoring 24
LDldFreeSpacePercent parameter 129
license, required 41
loading KMs 9395
log files, monitored by default 151
Log on as a service (user right) 47
Log on as batch job user right 102
LOG.kml 93
LOGErrorLvl
not set if search string is not defined 156
logical disks, monitoring 105
LogicalDiskMonitoring
ExclusionList/list variable 234
IncludeAll variable 234
InclusionList/list variable 234
login accounts
requirements 46
Windows 46
logs
event, monitoring 105
installation 212
lsass.exe 260
M
mail servers, rulesets for monitoring 254
Make Connection Persistent option 141
managed system 22
manual
migration of KM customizations 74
process monitoring 119
ManualAcknowledge variable 232
MAPI scripts 135
MaxRecords variable 229
MaxResourceIdleRetainPeriod variable 225
MaxShares variable 238
MaxUsers variable 238
295
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
MBRADD variable 237
MBRDEL variable 237
MBREL variable 237
media, streaming 254
MemoryContentionThreshold variable 235
MenuCmdROMode variable 247
messages, error log 212
Microsoft Excel 102, 169
Microsoft Message Queue (MSMQ) 31
Microsoft Transaction Server COM+ 31
migrating
customized PSL 75
determining if KM is migratable 66
from an earlier version of the KM 66
KM customizations manually 74
Mode variable 251
monitor requirements 42
Monitor variable 224
MonitoredClusterList variable 247
monitoring
Active Directory 22
availability of agents 208
backup domain controllers 30
clusters 31
domain controllers 30
enabling and disabling 104
event logs 105
events 106, 117
files 117
files with dynamic names 152, 157
job objects 105
logical disks 105
logical or physical disk drives 105
logs 117
network interfaces 105
network protocols 105
pagefiles 105
physical disks 104
printers 105
processes 119
processors 104
service executables 118
services 117
strings 117
text files 150
MonitorManualServices variable 223
MonitorNotRespond variable 224
MonitorProcess 224
MonitorProcess variable 232
MSMQ.kml 92, 285
MsPatrolAgentStatus parameter 130
MWD_ACTIVE_Directory_MN.kml 93
N
Name variable 250
296
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
NTFS file system 42
O
Objects variable 250
operating system, monitoring 103
output window, system 212
OverrideAutoConfigUpdate variable 235
OverrideGlobalServiceMonitoring variable 224
OverrideGlobalServiceRestart variable 119, 224
OverrideParameterAutoActivate variable 225, 232, 235
OverrideParameterFileFreeSpacePctAutoActivate variable
226
OverrideSummaryAutoCreate variable 204, 226
P
PACFG (PATROL Agent Configuration) utility 207
PagefileMonitoring
ExclusionList/list variable 233
IncludeAll variable 233
InclusionList/list variable 233
pagefiles, monitoring 105
parameters 207
_DiscoveryStatus 48
activating and deactivating 275
AdPerfCollector 210
BackupClusterDatabase 243
CheckIPResourceColl 244
ClusterLogFileError 246
composite 125
creating 34
creating e-mail notifications for 133
creating PerfMon-based 145
creating WMI 146
customizing 125
data, storing and analyzing 35
DfsConnectionPercent 130
ELMError 109
ELMErrorNotification 109, 203
ELMEvFileFreeSpacePercent 129
ELMFailureAudit 109
ELMFailureAuditNotification 109, 203
ELMInformation 109
ELMInformationNotification 109, 203
ELMNotification 203
ELMOtherTypes 109
ELMOtherTypesNotification 203
ELMRptOfNotification 111
ELMRptOfOtherTypes 111
ELMStatus 109
ELMSuccessAudit 109
ELMSuccessAuditNotification 203
ELMWarning 109
ELMWarningNotification 109, 203
EvRptOfError 111
EvRptOfFailureAudit 111
EvRptOfInformation 111
EvRptOfSuccessAudit 111
EvRptOfWarning 111
history, viewing 92
LDldFreeSpacePercent 129
MsPatrolAgentStatus 130
NotifiedEvents 208
PAWorkRateExecsMin 131
PROCDown 124
PROCProcessColl 124
PROCProcessorTimePercent 130
PROCStatus 124, 130, 232
RegValueChanged 234
ServiceStatus 118, 130
ShConnPercent 50, 131
SvcNotResponding 118
SvcStatus 118
troubleshooting 207
tuning 202
WMIAvailability 129, 235
WpReplicationFailures 130
Parameters variable 250
ParentInstance variable 227
PATH environment variable 81
PATROL account, creating 46
PATROL Adapter for Microsoft Office
description 35
installation requirements 169
PATROL Agent
configuring in a cluster 178
description 35
installing KMs to 55
installing over an existing installation 54
where to install 54
PATROL Central - Web Edition
loading KMs on 95
PATROL Central - Windows Edition 175
PATROL Configuration Manager
description 18
using 265273
PATROL consoles
and Netscape Navigator 80
installing KMs to 55
PATROL for Microsoft Windows Servers
rulesets 287
PATROL for Windows Operating System Monitor service
35
PATROL History Loader KM
description 35
PATROL KM for Cluster Server
account requirements 50, 78
architecture 76
description 30
installation overview 75
installation requirements 78
297
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
monitoring features 30
overview 75
PATROL KM for Event Management
.kml files 286
configuring 133142
PATROL KM for History Loader
KMs 286
PATROL KM for Log Management
.kml file 286
PATROL KM for Microsoft COM+
report options 172
troubleshooting 103
Windows configuration 284
PATROL KM for Microsoft Message Queue
KMs 285
report options 172
troubleshooting 103
PATROL KM for Microsoft Windows Active Directory
description 22
installation requirements 43, 44
requirements 43, 44
troubleshooting 99
PATROL KM for Microsoft Windows Domain Services
KMs 283
requirements 42
troubleshooting 100
PATROL KM for Microsoft Windows OS
configuring 103125
KMs 278
requirements 42
PATROL KM for MS Windows Active Directory Remote
Monitoring
application classes 197
InfoBox items 198
KMs 283
menu commands 198
overview 196
parameters 199
REM_ACTIVE_DIRECTORY.kml 283
using 196
PATROL KM for Windows Active Directory
required defaultAccount permissions 49
PATROL Perform Agent 40
PATROL security
overview of levels 56
requirements 41
PATROL Wizard for Performance Monitor and WMI
.kml file 285
configuring 144
creating Performance Monitor parameters 145
creating WMI parameters 146
description 34
loading 144
migration 67
performance counters supported 148
queries that begin with Win32_PerfRawData 148
setting alarm thresholds 146
298
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
stopping 124
troubleshooting 202
ProcessMonitoring
StatusSelectedColumns/list variable 221
ProcessName variable 222
ProcessorContentionThreshold variable 235
ProcessorMonitoring
DisableAnnotation variable 232
ExclusionList/list variable 232
IncludeAll variable 232
InclusionList/list variable 233
processors, monitoring 104
PROCProcessColl parameter 124
PROCProcessorTimePercent parameter 130
PROCStatus parameter 124, 130, 232
product
components 20
configuration tasks 103
product support 2
profile system performance (user right) 47
protocols
monitoring 105
troubleshooting 203
PRU_FileServer.cfg 253
PSL, migrating 75
psx_server.xpc 229
Q
Query variable 251
QueueMsgCountThreshold variable 248
QueueMsgSizeThreshold variable 248
quorum configurations
support in a failover cluster 78
quotas, configuring 102
quotes, escaping 266
R
RAS (Remote Access Service) 258
recovery actions
about 128
configuring 128133
troubleshooting 48
variables used for 251
redundancy 137
RegistryMonitoring
InclusionList/list variable 234
regular expressions 120
using to monitor dynamic file names 152, 157
RegValueChanged parameter 234
RelativeIDMasterConnStatusSched variable 240
Remote Access Service (RAS) 258
remote agents, assigning notification servers to 140
RemovedPDList variable 233
S
SAM monitoring 24
SAM NT authentication support 24
ScheduledServers variable 248
Scheduling variable 229
SchemaMasterConnStatusSched variable 240
SCOPEADD variable 237
SCOPEDEL variable 237
scripts
batch file 135
customizing 136
editing 136
using 134137
search string 156
security
event log 102
notification server 138
overview of levels 56
Security Account Manager (SAM) 24
send_mapi.vbs 135
sendmail.vbs 135
ServerExcludeList variable 238
299
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ServerIPAddress variable 236, 237
ServerPortNumber variable 236, 237
servers, deploying settings to 138
ServiceMonitoring
DisableAnnotation variable 223
MonitorManualServices variable 223
removedServiceList variable 223
services
checking status of 118
configuring in PCM 268
monitoring 117
monitoring executables for 118
PATROL for Windows Servers 35
restarting 48, 118
services.exe 260
ServiceStatus parameter 118, 130
setting environment variables for Help browser 81
ShareExcludeList variable 238
ShConnPercent parameter 50, 131
shells
Bourne 81
C 81
Korn 81
Site_Role.cfg 253, 254
sitecomp.exe 263, 264
slashes, escaping 266
SMS (Systems Management Server), rulesets for 253
smsdbmon.exe 263
smsexec.exe 263, 264
SMTP scripts 135
SNMP service 43
SNMP, requirements 42
spoolsv.exe 259
sqlservr.exe 263
starting services 101, 118
startup properties, service 102
StatusNumberofProcessesToDisplay variable 221
StatusSelectedColumns/list variable 221
StatusSortKey variable 221
StdEvents.ctg 208
stopping
event log monitoring 107
monitoring 104
processes 124
services 101
streaming media servers, rulesets for monitoring 254
success auditing 203
Summary instance 204
support, customer 2
Suspend Recovery Action field 132
Suspend variable 251
svchost.exe 260
SvcNotResponding parameter 118
SvcStatus parameter 118
syntax
pconfig 266
system output window 212
300
system requirements 41
system roles 55
T
TCP/Active variable 234
TCPorUDP variable 236, 237
technical support 2
templates, PATROL Adapter for Microsoft Office 171
terminal server 254
terminating processes 48, 124
text files, monitoring 150
thresholds
changing in PCM 274
customizing 209
rule for 274
tuning 202, 206
time synchronization service 25, 27
TimeLimitForKillRunAwayProcess variable 222
TotalMessageSizeThreshold variable 248
troubleshooting 201213
DiscoveryStatus parameter in alarm 205
multiple processes selected 205
windows event log 204
TrustExcludeList variable 238
typical installation option 57
U
UDP protocol 236, 237
UDP/Active variable 234
uninstalling products 84
unloading KMs 175
unresponsive services 118
upgrading 66
backing up current installation before 71
choosing a procedure 67
from an earlier version of the KM 66
UpTimeBaseLine variable 244
UseCheckPoint variable 225, 226
user account 81
user rights, required 47
UserExcludeList variable 238
using PCC 180
V
variable_list variable 267
variables
__ANYINST__ 274
child_list 267
FilterEnabled 116
NOTIFICATION_SERVER1 140
NOTIFICATION_SERVER2 140
PATROL KM for Microsoft Active Directory 239242
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
PATROL KM for Microsoft Cluster Server 242248
PATROL KM for Microsoft COM+ 249
PATROL KM for Windows Domain Services 236239
PATROL KM for Windows Message Queue 248
PATROL KM for Windows OS 220236
PATROL Wizard for Performance Monitor and WMI
250251
PATROL_BROWSER 81
variable_list 267
wpconfig 18
VB (Visual Basic) 134
version, determining 213
View Process Status dialog box 221
viewing
event logs 125
virtual machines, support for 51
Visual Basic (VB) 134
VMware, support for 51
VPN (virtual private network) 254
W
Wait variable 251
warnings, generating 118, 124
WarnMax variable 250, 251
WarnMin variable 250, 251
WBEM_E_INVALID_CLASS error message 210
Win32_PerfRawData
performance counters supported 148
WMI queries for WMI class 148
WIN32_WMISetting 235
Windows 30
Windows account requirements 46
Windows Management Instrumentation (WMI) 34
Windows NT Workstation 135
WINS (Windows Internet Naming Service)
recovery actions 130
reports 172
rulesets for monitoring 254
WINSADD variable 237
WINSDEL variable 237
WMI parameters, creating 146
WMI Wizard 34
WMIAvailability parameter 129, 235
WMServer service 262
wpconfig utility 96
wpconfig variables 18
WpReplicationFailures parameter 42, 130
X
xpconfig utility 96
301
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
302
Notes
*104698*
*104698*
*104698*
*104698*
104698