background image

ADM User’s Guide

40

VMware, Inc.

 

Solaris and HP-UX

Solaris

 

and

 

HP

UX

 

systems

 

do

 

not

 

include

 

built

in

 

SNMP

 

agents.

 

You

 

can

 

download

 

and

 

install

 

Net

SNMP

 

from

 

http://net

snmp.sourceforge.net

 

and

 

configure

 

it

 

as

 

in

 

Linux.

BEA WebLogic Agent

The

 

BEA

 

WebLogic

 

application

 

server

 

comes

 

with

 

its

 

own

 

SNMP

 

agent

 

that

 

is

 

built

 

into

 

its

 

installation.

 

To enable the BEA WebLogic application

1

In

 

the

 

WebLogic

 

management

 

console,

 

select

 

Services

 

>

 

SNMP

.

2

Select

 

Enabled

.

 

3

Restart

 

the

 

application

 

server.

WMI

Windows

 

Management

 

Instrumentation

 

(WMI)

 

is

 

a

 

proprietary

 

Microsoft

 

technology

 

for

 

modeling,

 

querying,

 

and

 

managing

 

the

 

configuration

 

of

 

Windows

 

hosts.

 

WMI

 

follows

 

a

 

public

 

modeling

 

and

 

management

 

standard

 

known

 

as

 

Common

 

Information

 

Model

 

(CIM),

 

as

 

well

 

as

 

another

 

related

 

standard

 

called

 

Web

Based

 

Enterprise

 

Management

 

(WBEM).

The

 

WMI

 

software

 

component

 

is

 

built

 

into

 

all

 

Server

 

editions

 

of

 

the

 

Windows

 

operating

 

system

 

since

 

the

 

Windows

 

2000

 

Server.

 

It

 

might

 

or

 

might

 

not

 

be

 

installed

 

by

 

default

 

as

 

part

 

of

 

Windows

 

XP,

 

but

 

it

 

is

 

easily

 

installed

 

there

 

as

 

an

 

add

on.

WMI

 

is

 

modular

 

and

 

extendable:

 

common

 

information

 

about

 

the

 

host

 

is

 

obtained

 

with

 

the

 

basic

 

built

in

 

WMI

 

module.

 

Additional

 

components

 

called

 

WMI

 

providers

 

is

 

installed

 

to

 

model

 

and

 

query

 

in

 

detail

 

the

 

configuration

 

of

 

services

 

such

 

as

 

IIS

 

Server,

 

Active

 

Directory,

 

BizTalk

 

server,

 

and

 

so

 

on.

The

 

WMI

 

component

 

in

 

Windows

 

is

 

based

 

on

 

Microsoft

 

Component

 

Object

 

Model

 

(COM)

 

technology,

 

and

 

is

 

queried

 

both

 

locally

 

and

 

remotely.

 

Remote

 

queries

 

are

 

through

 

RPC

 

access

 

to

 

the

 

WMI

 

component,

 

using

 

the

 

remote

 

access

 

flavor

 

of

 

the

 

COM

 

technology

 

known

 

as

 

Distributed

 

Component

 

Object

 

Model

 

(DCOM).

Detail Discovery with WMI 

ADM

 

can

 

perform

 

Detail

 

Discovery

 

using

 

the

 

WMI

 

protocol.

 

When

 

creating

 

a

 

WMI

 

Detail

 

Discovery

 

policy,

 

you

 

need

 

to

 

specify

 

a

 

user

 

name,

 

password,

 

and

 

domain

 

name.

 

These

 

are

 

used

 

by

 

the

 

WMI

 

component

 

to

 

authenticate

 

and

 

authorize

 

access

 

to

 

the

 

host

 

information.

WMI

 

discovery

 

is

 

used

 

for

 

discovering

 

machines

 

that

 

run

 

the

 

following

 

operating

 

systems:

 

Windows

 

2000

 

Server,

 

Windows

 

Server

 

2003,

 

Windows

 

2008,

 

and

 

Windows

 

XP

 

SP2.

N

OTE

   

If

 

there

 

is

 

another

 

SNMP

 

agent

 

running

 

on

 

the

 

same

 

machine,

 

such

 

as

 

the

 

native

 

agent

 

of

 

the

 

operating

 

system,

 

it

 

is

 

recommended

 

to

 

change

 

the

 

port

 

used

 

by

 

the

 

WebLogic

 

agent.

 

In

 

the

 

same

 

location

 

in

 

the

 

management

 

console,

 

set

 

the

 

port

 

to

 

the

 

desired

 

port.

 

N

OTE

   

When

 

using

 

a

 

non

 

domain

 

user

 

to

 

perform

 

WMI

 

discovery,

 

specify

 

“WORKGROUP”

 

in

 

the

 

domain

 

field.

I

MPORTANT

   

The

 

following

 

steps

 

are

 

new

 

to

 

ADM

 

6.0

 

and

 

later

 

versions

 

as

 

it

 

discovers

 

more

 

information

 

compared

 

to

 

5.3.

 

If

 

you

 

have

 

already

 

set

 

up

 

your

 

servers

 

for

 

WMI

 

discovery

 

using

 

ADM

 

5.3,

 

you

 

need

 

to

 

perform

 

the

 

additional

 

steps

 

listed

 

under

 

“Setting

 

Execute

 

Permissions

 

for

 

Used

 

Executables”

 

on

 

page 43.

I

MPORTANT

   

The

 

permissions

 

required

 

to

 

complete

 

the

 

same

 

WMI

 

operations

 

might

 

vary

 

between

 

different

 

versions

 

of

 

Windows

 

and

 

different

 

Service

 

Packs

 

installed.

 

Some

 

windows

 

versions

 

such

 

as

 

Windows

 

2003

 

Server

 

with

 

SP2

 

require

 

an

 

account

 

with

 

local

 

administrator

 

permissions

 

in

 

order

 

to

 

successfully

 

complete

 

all

 

queries

 

performed

 

by

 

ADM.

 

Содержание VCENTER APPLICATION DISCOVERY MANAGER 6.1.1 - RESPOSITORY

Страница 1: ...scovery Manager 6 1 1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition To check for more recent editions o...

Страница 2: ...his documentation submit your feedback to docfeedback vmware com Copyright 2010 VMware Inc All rights reserved This product is protected by U S and international copyright and intellectual property la...

Страница 3: ...Log In to the ADM Console 15 3 Managing ADM 17 Groups 17 Discovery 17 Application Patterns 18 Changes 18 Fingerprints 19 Identifying Application by Ports 19 Aging 20 Deleting Aging Logs 21 Users 21 Ro...

Страница 4: ...tail Discovery for Dependencies 48 VMware Discovery 49 VMware Terminology Overview 49 VMware Discovery in ADM 49 Use Case 50 Using VI SDK for Detail Discovery 51 Capabilities 52 6 Application Patterns...

Страница 5: ...VMware Inc 5 Contents Complete Synchronize 68 Displaying ADM data in SAM 68 Custom Reports 70 9 Solver 71 Overview 71 Reports in the Solver Tab 71 Index 73...

Страница 6: ...ADM User s Guide 6 VMware Inc...

Страница 7: ...to http www vmware com support pubs Document Feedback VMware welcomes your suggestions for improving our documentation If you have comments send your feedback to docfeedback vmware com Technical Suppo...

Страница 8: ...n the job reference tools Courses are available onsite in the classroom and live online For onsite pilot programs and implementation best practices VMware Consulting Services provides offerings to hel...

Страница 9: ...the relationships and dependencies between these instances in real time The discovery data is stored in the Management Data Repository The map feature in the User Interface UI provides a graphical rep...

Страница 10: ...hange to a CI For example a change to a configuration file on a host is a change Change tracking Change tracking refers to a change in the discovered environment such as a change in the amount of acti...

Страница 11: ...n your data center The following discovery types apply IP discovery Detects hosts or other configuration items with a specific IP address when passive discovery fails to discover them Detail discovery...

Страница 12: ...ps described in VMware vCenter Application Discovery Manager Administration Guide VMware vCenter Application Discovery Manager Administration Guide also describes how to move an existing Single Box se...

Страница 13: ...ote database setup are described in VMware vCenter Application Discovery Manager Administration Guide NOTE Passive and Detail Discovery can run on single or multiple Collectors NOTE Passive and Detail...

Страница 14: ...ADM User s Guide 14 VMware Inc...

Страница 15: ...m using the ADM Console 1 Open Microsoft Internet Explorer 2 Type the IP address of the management appliance into the URL and click Go The Welcome screen appears 3 In the Username field type your user...

Страница 16: ...ADM User s Guide 16 VMware Inc...

Страница 17: ...lows you to classify CIs into logical sets or collections so that actions such as creating reports policies or viewing the inventory is applied to specific groups instead of the entire database of CIs...

Страница 18: ...1 lists and describes the information in the Change Tracking Policies List Click on the top of the column to sort the list by that column To view changes in the environment navigate to Change Tracking...

Страница 19: ...the network from the interface This depends on the network structure and permissions but usually there is no internet access and limited access to other resources on the net Invokes other programs ins...

Страница 20: ...nsole Creating an entity aging policy allows you to view the most updated state of your network since it is a constantly changing environment Aging is performed through aging policies When you create...

Страница 21: ...ns on how to perform these actions Role Based Access Control ADM provides role based access control This allows you to assign permission to a role instead of directly assigning permission to a user AD...

Страница 22: ...uide provides information about adding and configuring an active probe Advanced Configuration Sets parsing of configuration files Use only when an IT Compliance Analyzer Application Edition ITCA AE ap...

Страница 23: ...the license details including the license feature the amount licensed the amount used the expiration date and the serial number from the License properties page To view license details 1 From the ADM...

Страница 24: ...ADM User s Guide 24 VMware Inc...

Страница 25: ...sts There are three types of groups View Business Application and Cluster ADM administrators can perform the following actions in this tab Add Group Adds a new group Copy Group Opens a dialog box to c...

Страница 26: ...will refresh automatically Built In Groups The following groups are built into ADM Microsoft SQL Servers MySQL databases IIS servers VMware ESX Servers Jboss servers VMware virtual machines Routers S...

Страница 27: ...n create a group that consists of both Linux hosts and Oracle databases rule 1 Primary object host service J2EE application J2EE module or database instance rule 2 rule 3 rule 1 rule 2 rule 1 ADM grou...

Страница 28: ...ts hypervisors Service Basic all services running on hosts in scope with incoming protocols connection with outgoing protocols connection being accessed by URL running on host having configuration Ext...

Страница 29: ...E module Basic all J2EE modules deployed on J2EE applications running on services where services running on hosts in scope with incoming protocols connection with outgoing protocols connection Extensi...

Страница 30: ...ADM User s Guide 30 VMware Inc...

Страница 31: ...e Clicking on a host service or device will display its properties Discovery 5 Table 5 1 Types of Discovery Discovery Types Definition Passive Discovery Passive Discovery is the process in which netwo...

Страница 32: ...reate a policy The online help contains procedural information for Passive Discovery tasks Plans You can create a Passive Discovery plan from the Plan tab within the Passive Discovery Policy Definitio...

Страница 33: ...network Using these protocols you can obtain supplementary information about network hosts and add it to the MDR You can view the additional configuration information found by detail discovery in the...

Страница 34: ...scovered only once a week You want to exclude the Detail Discovery of hosts with specific host names or operating systems The Discovery Plan Definition screen is shown below Policies You can initiate...

Страница 35: ...on to all the default directories through which it searches The following is an example in which you would use this page 1 The default Oracle installation on UNIX is located at opt oracle but in your...

Страница 36: ...tributed setup the hosts to be discovered needs to be included in both a Detail Discovery policy and an Active Probe configuration The Detail Discovery policy includes a list of items to include in th...

Страница 37: ...IP address assigned to the ADM appliance The relevant ports are typically For SNMP UDP 161 For Telnet TCP 22 for SSH and TCP 23 For WMI access WMI Deployment Recommendations on page 41 and Firewall S...

Страница 38: ...these are stored by ADM internally in an encrypted form SSH Server Deployment Recommendations Firewall Settings SSH queries are normally performed on TCP port 22 on the server If a firewall exists be...

Страница 39: ...nformation Base MIB The core MIB which is available in most agents is called MIB 2 and it supplies system and hardware information Detail Discovery with SNMP ADM can act as an SNMP manager and collect...

Страница 40: ...eried both locally and remotely Remote queries are through RPC access to the WMI component using the remote access flavor of the COM technology known as Distributed Component Object Model DCOM Detail...

Страница 41: ...all problems you can deploy the Collector appliance in the same network as the managed hosts without a firewall between them If your environment requires a firewall between the Aggregator appliance an...

Страница 42: ...ne either locally on that host or remotely To configure WMI access on the managed hosts 1 If you are configuring a remote machine use a domain administrative account A local administrative account wil...

Страница 43: ...Group or user names list select the user who will be performing the Detail Discovery 4 Select Read Execute and Read from the Permissions for user list to grant the necessary permissions 5 Click OK to...

Страница 44: ...tart TlntSvr To log in to a machine using Telnet you need to be listed as a member of either the local TelnetClients group on that machine or as a member of the domain s TelnetClients group To modify...

Страница 45: ...o discover configure and monitor all aspects of VMware ESX servers and Virtual Center VI SDK on Virtual Center accesses information about the entire Virtual Infrastructure deployment whereas VI SDK on...

Страница 46: ...e clients ADM allows you to correctly identify dependencies using Detail Discovery only without relying on Passive Discovery The Process of Dependency Discovery Using Only Detail Discovery To discover...

Страница 47: ...covery only Discover the open ports that the services running on the interrogated host are using to listen for incoming connections service endpoints Both netstat and SNMP tables expose listening port...

Страница 48: ...ne IP are merged to appear as a single host Second Detail Discovery policies will be tailored to match the discovery protocol with the OS of the hosts in their scope This less frequent DEEP policy cre...

Страница 49: ...UI used to connect to the Virtual Center Server VMware Discovery in ADM ADM can discover VMware environment track changes in the environment and find dependencies within that environment ADM can disc...

Страница 50: ...plication One of the following protocols is allowed in the VMware Infrastructure environment SSH Telnet SNMP on the VMware ESX Server VI SDK with either Virtual Center or all of the ESX Server in the...

Страница 51: ...Discovery Policies page When entering the protocol type during detail discovery policy creation use any or all of the following protocols SSH SNMP on the ESX Server included in the VMware Infrastruct...

Страница 52: ...ory page and click Search This option is shown below Finding Dependencies Between a VMware Infrastructure and Virtualized Business Applications Assumptions You have completed active discovery of the V...

Страница 53: ...hat contains all the virtual machines in the VMware Infrastructure environment 2 To view the VMware Infrastructure environment do any of the following Automatically extend the group you created to inc...

Страница 54: ...ADM User s Guide 54 VMware Inc...

Страница 55: ...ces of a business application Creating application patterns helps you to easily follow any changes in a specific business application The instance is updated automatically if there are server changes...

Страница 56: ...ource or target of the application pattern Figure 6 3 demonstrates a connectivity rule that includes JDBC and HTTP connections as well as assigns the Apache Server as a source to the Jboss Server targ...

Страница 57: ...e based rule as a unification rule When the rule is applied it results in one instance being detected instead of several that contain all the same components For example you might not know how many AD...

Страница 58: ...instances that match that definition Viewing Application Pattern Definitions and Instances The application pattern definitions and instances are viewed and managed through the Manage tab The VMware v...

Страница 59: ...rs new instances once a day and is cleared by the user Name Name given to the Application Pattern when it was created Description Description of the Application Pattern Definition optional Last Discov...

Страница 60: ...tion Valid A green check mark means the application pattern instance was valid as of the last Refresh Name The name of the Application Pattern Instance ADM provides a default name but you can provide...

Страница 61: ...on pattern definition 1 Navigate to Manage Application Pattern Definitions 2 Click Add Application Pattern from the Actions pane on the left side of the screen 3 Create the node rules for each endpoin...

Страница 62: ...ed Application Pattern Instances page appears displaying the scope of these instances Select the application pattern instances that you would like to store and click Create Step 4 Storing Selected Ins...

Страница 63: ...n Host Inventory Report Device Inventory Report Service Inventory Report Connection Inventory Report Host Operating System Breakdown Report Host CPU Breakdown Report Host Kernel Version Breakdown Repo...

Страница 64: ...e Baseline Behavior Report Host Baseline Comparison Report Service Baseline Comparison Report Most Used Hosts Report Least Used Hosts Report Most Active Host Users Report Least Active Host Users Repor...

Страница 65: ...w the integration screen from the ADM Console click Connectors tab Depending on the applications you have installed and licensed you see the following tabs EMC Smarts Reports The VMware vCenter Applic...

Страница 66: ...Integration Status screen Table 8 1 ADM Smarts Integration Status Screen Information Field Description Last Sync Time Displays the time of the last successful ADM SAM synchronization Registration Sta...

Страница 67: ...opulated from the ADM to the SAM Since the ADM discovery process can result in a relatively large set of server and client resources you must carefully plan on the scope of integration The scope of in...

Страница 68: ...red the ADM and SAM integration the system must be synchronized for the SAM to retrieve the data The following two options are available for synchronizing Schedule the synchronization between the ADM...

Страница 69: ...pen an ADM console in context using the Smarts Launch in Context functionality right click an object and navigate to Client Tools Launch ADM Web Console as shown below As a result of integration the A...

Страница 70: ...the path for the browser running on a Solaris host For example BROWSER usr sfw bin mozilla 4 Save the file to the BASEDIR smarts actions client ADM directory Custom Reports In addition to standard re...

Страница 71: ...ition Reports Application upgrade Before upgrading your applications use this solution to identify applications hosts and services that are heavily utilized and are excellent candidates for upgrading...

Страница 72: ...ons continue functioning without interruption Create a short list of hosts that are being acquired or sold Create a short list of services that are being acquired or sold Show which other hosts and se...

Страница 73: ...stributed appliance solution 12 Distributed appliance with Remote Database solution 13 E Entity Aging 10 F Firewalls 37 G Groups Built in groups 26 User defined groups 26 L License 22 M Management Dat...

Страница 74: ...ADM User s Guide 74 VMware Inc...

Отзывы: