Configure Veritas File System KM

This section explains the settings required to configure Veritas File System KM via a PATROL console.

Note: Veritas File System KM can only be configured from the PATROL console when running in Classic Mode.

Performing Post-Installation Operations

It is recommended to perform post installation checks once the KM is installed and loaded on the PATROL Console to ensure it properly operates. Post-installation operations include:

  1. Configuring VxFS Nodes Monitoring
  2. Configuring the KM user account
  3. Verifying:
  4. Restarting the PATROL Agent and PATROL Console.

Configuring VxFS Nodes Monitoring

Veritas File System KM allows you to monitor several VxFS systems with one PATROL Agent. The configuration procedure is as follows:

  1. Right-click the Veritas File System main instance > Configuration > VxFS Nodes…

    Configuring VxFS Nodes Monitoring

  2. Specify the VxFS system details:

    • Node ID: Enter an ID for the VxFS node. This information is only required if a unique ID cannot be generated using the hostname provided.
    • (Required) Hostname/IP Address/FQDN: Enter the hostname, IP address, or FQDN of the node to be monitored.
    • (Required) System Type: Select UNIX/Linux for the VxFS system type, since VxFS does not support Windows platforms.
    • (Required) Status: Select Enable to start the VxFS node monitoring; Disable to stop it.
  3. Check the Create a separate device in TrueSight box if you want the VxFS nodes to appear as a separate device in TrueSight OM.

  4. Click Update.

A VxFS Setup node instance (VxFS Setup: <node-id>) appears in the PATROL Console but the monitoring will not start until the appropriate credentials are entered using the Configuration > Login KM Command.

Configuring the KM User Account

A user account with administrative privileges must be configured in BMC PATROL or BMC TrueSight Operations Management to read and execute Veritas File System application programs and access file systems. Depending on the operating systems used, several options will be available. For more information, refer to Security Requirements.

To configure the KM user account:

  1. In the Console, right-click the host instance > KM Commands > Configuration > Login… The Login Configuration dialog box is displayed:

    Login Configuration dialog

  2. To use:

    • the default PATROL Agent Account, check the Use Agent Default Account box and leave the Username and Password fields empty
    • a different user account, enter the login details in the Username and Password fields
  3. If a sudo user account is used:

    • check the Use Sudo box
    • click SUDO Binary File to verify the sudo binary file path
  4. If you are monitoring a remote host, click Remote Connection Settings:

    Remote Connection Settings

    • Connection Timeout (in Seconds): Enter the number of seconds after which the connection to the remote node will timeout.
    • Maximum Connections: Enter the maximum number of simultaneous connections allowed to the remote node.
    • Click Accept.
  5. Click OK.

If the credentials are not valid, the VFSLoginStatus parameter will appear in “suspicious state” after the next data collection.

Verifying the Application Discovery

To verify the application discovery:

  1. Check that the VxFS Setup instance changes to display the server type. If not, check the message in the VxFS Setup instance and in the PATROL Console System Output Window (SOW) or in the log file <PATROL_HOME>/log/VFS_<port>.log. You can force a full discovery by right-clicking the VxFS Setup instance > KM Commands > Force Discovery.

  2. Check that the application class instances are actually instantiated. The initial data collection may take some time depending on the complexity of your environment (up to one hour). If needed, force a data collection by right-clicking the server instance > KM Commands > Refresh Parameters.

If Veritas File System system is configured in a clustered environment, you will have to enable multi-node mode monitoring.

Configuring the Instance Limits

By default, Veritas File System KM monitors all the elements discovered, which may represent an important workload to the PATROL Agents and console. Because the monitoring of some elements may be irrelevant for various reasons, you can apply filters to indicate which elements will be monitored or not.

To modify the default configuration:

  1. In the Console, right-click the server instance > KM Commands > Configuration > Instance Limits…

    Configuring the Default Instance Limits

  2. Enter the number of instances to be displayed in the console for each monitored element

  3. To disable the monitoring of a specific application class, enter 0 (zero) in the relevant field
  4. Click OK.

Verifying the Initial Setup

To check the initial setup of the KM:

  1. Check for any error on the PATROL Console System Output Window (SOW) or in the <PATROL_HOME>/log/VFS_<port>.log.

  2. Check whether the discovered files and directory paths are correct, using the menu Configuration > Paths… from the server instance.

  3. Refer to the label of the server instance to check whether the discovered node type is correct. The node type can be modified, using the menu Configuration > Node Type… from the server instance.

  4. Check the Infoboxes and Parameters of all the Veritas File System KM instances and verify that they are properly set.

  5. Under each container instance, open all detail parameters (text parameters with names in the format VFS<Object>Details), and check for error messages.

  6. Check the new value of the VFSLoginStatus and VFSNodeStatus parameters set after the completion of all data collection. If either is not in OK state, open the annotation point to determine the cause of the error.

  7. After the KM has been running for at least an hour:

    • Right-click the server instance > KM commands > KM Status… from the Veritas File System instance. A report is displayed, detailing information on the managed system. Check through the report for any warning or alarm. If any error is found during any of the above steps (including any incorrect data in Infoboxes or any warning or alarm in the KM Status report), determine the cause(s) and take steps to resolve these errors. You may need to refer to the User Guide, or contact Technical Support, attaching the KM Status report.
    • If needed, click Save As Task to open the report in a task window. You could later save it as a text file or print it.
  8. The KM automatically discovers and monitors all components of the VxFS node. You can disable monitoring selected components by setting their instance limit to 0 (zero), using the menu Configuration > Instance Limits….

Restarting PATROL Agent and PATROL Console

Restarting the PATROL Agent and PATROL Console is optional but often a good practice to confirm that the Veritas File System KM operates correctly.

In addition, the PATROL Agent restart will force all KM discoveries and data collections to start immediately.

Configuring Advanced Settings

Configuring Alerts

Configuring Alerts Rules

The status of an element is determined by the State parameter and by the status mapping rule. This mapping rule indicates which states will trigger a warning or an alarm on the Status parameter. It can be configured as follows:

  1. In the Console, right-click one of the instance for which you want to configure the status and select > KM commands > Configuration > Instance Status…

    File System Mount Status Configuration

  2. In the Warning Filter State Rules list, select the states that will not trigger a warning

  3. If needed, apply a time condition to a specific state. For example, if you want to trigger an alarm when the Mounted/Different Mount Point state of the File System instance lasts more than 600 minutes:
    • From the State list, select 1 (Mounted/Different Mount Point)
    • From the Condition list, select >
    • In the Minutes field, enter 600
  4. In the Alarm Filter State Rules list, select the states that will not trigger an alarm

  5. If needed, apply a time condition to a specific state.
  6. Click Update. The mapping rule will be applied to that specific instance.

    To revert to the default status mapping rule for either filter, select [default] from the list of states and click Update.

  7. Resume the procedure for all the instances for which you wish to apply monitoring filters.

Note: The mapping rule can also be set at the container level. In that case, the mapping rule will apply to all the child instances.

Configuring Alert Acknowledgement

By default, alerts will automatically be acknowledged unless you modified the settings to allow manual acknowledgement.

Please note that manual acknowledgement may impact the performance of the application and of the PATROL Agent if the number of alerts waiting to be acknowledged constantly increases.

Configuring Logs Alert Acknowledgement

By default, log alerts are automatically acknowledged when new ones are detected. To change the default behavior:

  1. In the Console, right-click the Log(s) instance > KM Commands > Configuration > Log(s) Alert Acknowledgement…

    Configuring Log Alert Acknowledgement

  2. Indicate whether the warning and alarm messages will be manually or automatically acknowledged

  3. Click OK.

Configuring the Discovery Overrides

The solution automatically discovers the installation, binary, and library paths. This information can however be overridden.

Warning! Altering these paths may impact the operation of the KM.

To configure paths:

  1. In the Console, right-click the server instance > KM commands > Configuration > Paths…

  2. In the KM section, verify and possibly modify the Home, Temp, and Debug Directory Paths

  3. In the VxFS section, verify and possibly modify the Installation and the Remote Temp Directory (remote nodes only) Paths

  4. In the Binary Paths and Library Paths sections:

    • From the list, select the paths to be removed
    • In the Path field, enter the new path(s) to be included. If several paths are to be entered, separate them with a colon (:).
  5. Click OK.

If you want to rediscover the paths, empty all fields, click OK, and restart the PATROL Agent.

Configuring Logs

By default, the following system log and Windows event logs are monitored. These log file paths are relative to the VxFS installation directory (for example /opt/VRTSvxvm on UNIX and C:\Program Files\Veritas), unless the path is fully pathed.

Log File Description
On Solaris:
/var/adm/messages System Log
On HP-UX:
/var/adm/syslog/syslog.log System Log
On AIX/Linux:
/var/log/messages System Log

Configuring the Log Filter

A log error filter can be configured to specify the regular expressions that will generate a warning or an alarm. Each time the KM finds these expressions in a log file (or in VFSLogText), the error message will be written to the VFSLogAlarmText or VFSLogWarningText parameter. By default, the log filter is configured for the system log file. If you enabled additional log files for monitoring, you will have to customize the log filter by adding appropriate expressions for those log files.

Error Expression Set to Parameter Status
[vV]x.*PANIC VFSLogAlarmText Included
PANIC.*[vV]x VFSLogAlarmText Included
[vV]x.*CRITICAL VFSLogAlarmText Included
CRITICAL.*[vV]x VFSLogAlarmText Included
[vV]x.*ERROR VFSLogAlarmText Included
ERROR.*[vV]x VFSLogAlarmText Included
[vV]x.*FATAL VFSLogAlarmText Included
FATAL.*[vV]x] VFSLogAlarmText Included
[vV]x.*WARNING VFSLogWarningText Included
WARNING.*[vV]x VFSLogWarningText Included
[vV]x.*NOTICE VFSLogWarningText Included
NOTICE.*[vV]x] VFSLogWarningText Included

For more information about the possible error messages, refer to the Veritas File System System Administrator’s Guide and the Veritas File System Troubleshooting Guide.

To configure the log error filter:

  1. In the Console, right-click the Logs instance > KM Commands > Configuration > Logs Filter…

    Configuring Log Error Filter

  2. In the Warning Filter Expressions list, select the expressions that should be removed from the warning filter.

  3. In the Alarm Filter Expressions list, select the expressions that should be removed from the alarm filter.

  4. To add a new regular expression to the warning or alarm filter:

    • In the Expression field, indicate the regular expression to be included. Please note that regular expressions are case-sensitive.
    • Select Include
  5. To exclude a regular expression from the warning or alarm filter:

    • In the Expression field, indicate the regular expression to be excluded. You can also limit the exclusion to a particular expression already listed by using standard wildcard syntax.

    • Select Exclude

  6. Click Update.

To revert to the default settings for either filter, type [default] as a new error expression for that filter, and click Update. If you revert to the default settings when accessed from the log instance level, the settings will revert to the parent or container instance level. To revert to the shipped default settings (as shown above), access this dialog from the log container instance. From this level you will also have the option to reset the configuration of any modified child instance.

Configuring the Log Scan Limit

The Veritas File System KM scans log files by reading the new log entries since the last data collection cycle. By default, 2 MBytes of data is scanned for each log file during each data collection cycle. This log scan limit can however be modified to better suit your requirements.

Warning! Increasing the Log Scan Limit may impact the performance of the data collector (VFSLogCollector), the KM, and the PATROL Agent.

To customize the log scan limit:

  1. In the Console, right-click the Log(s) instance > KM Commands > Configuration > Log(s) Scan Limit…

    Customizing the Log Scan Limit

  2. Indicate the amount of data that will be read by the KM during each data collection cycle.

  3. Click OK.

Filtering Elements to Monitor

By default, the solution monitors all the discovered elements, which may represent an important workload to the agents and servers. Because the monitoring of some elements may be irrelevant for various reasons, you can apply filters to indicate which elements will be monitored or not.

To filter elements to monitor:

  1. In the Console, right-click one of the following instances depending on the elements that you wish to monitor:

    • Logs > KM Commands Configuration > Logs… to filter logs to be monitored
    • File Systems > KM Command > Configuration > File Systems… to filter file systems to be monitored
    • Fragmentations > KM Commands Configuration > Fragmentation… to filter fragmentations to be monitored
    • Quick I/O > KM Commands > Configuration > Quick I/O Files… to filter quick I/O files to be monitored
    • Quotas > KM Commands > Configuration > Quotas… to filter quotas to be monitored
    Note: These menus are also available from the child instances and will apply to all objects created under the child instances.

    Filtering Elements to Monitor

    The [ALL] entry ensures that all the elements found during PATROL discovery are instantiated and monitored.

  2. To enable elements for monitoring:

    • In the current configuration list, select the elements to enable
    • Select Enable
    • Click Update

    A log filter will have to be configured if you enable log files for monitoring.

  3. To disable elements for monitoring:

    • In the current configuration list, select the elements to disable
    • Select Disable
    • Click Update

    Disabled instances will be instantiated in an OFFLINE state. Commands will not be executed, thus leaving parameters not set.

  4. To delete elements for monitoring:

    • In the current configuration list, select the elements to delete
    • Select Delete
    • Click Update
  5. To add a new element to monitor:

    • Type the name of the element to be monitored (as it appears in the PATROL console) or a regular expression to be monitored
    • If needed, enter a description
    • From the Status list, select Enable
    • Click Update.

    To revert to the default monitoring configuration, type [default] as a new entry and click Update.

  6. Resume the procedure for all the application classes for which you wish to apply monitoring filters.

Configuring the Multi-Node Monitoring Mode

When Veritas File System is installed in a cluster environment, i.e. active on one cluster node and passive on others, false alarms and duplicate alerts may occur. To avoid such situation, users need to configure Veritas File System KM for PATROL in multi-node monitoring mode, if VxFS is installed in a supported cluster.

Note: The procedure below is generic. To learn more about all the configuration methods available, see Configuring the Multi-node Monitoring Mode with the VCS KM. Although the article refers to Veritas Cluster Server KM for PATROL, the monitoring concepts and principles remain valid for Veritas File System KM for PATROL.

To configure the multi-node monitoring mode:

  1. In the Console, right-click the server instance > KM Commands > Configuration > Monitoring Mode…

    Configuring the Multi-Node Monitoring Mode

  2. Select Multi-node Mode.

  3. From the Cluster Application pull-down list, select an appropriate cluster application.

  4. In the Failover Group Name field, enter the failover group name, which is online on one cluster node and offline on the others. Leave this field blank if you previously selected Veritas Cluster File System. The Veritas File System KM will then monitor the entire cluster from the active master system, which is identified by the vxdctl -c mode command. This method requires vxconfigd in enable mode with its clustered state active.
  5. Provide the details of all managed nodes of the cluster to be configured in the multi-node mode:

    • PATROL Agent Hostname: host where the PATROL Agent is installed
    • Node ID: the unique ID of the VxFS node as configured in the KM menu Veritas File System instance > KM Command > Configuration > VxFS Nodes
    • Cluster Node Name: the hostname defined in the selected Cluster Application.
  6. Click Update.

  7. Resume the procedure for all the other VxFS nodes and click Update.

  8. Check the Remote PATROL Agent Checking option if there are more than one PATROL Agent involved in the multi-node mode configuration above. If enabled, the KM queries the other PATROL Agents to check the monitoring status of other nodes.

  9. Click Close.

  10. If the Remote PATROL Agent Checking is Enabled, you will have to provide all the information required to communicate with the PATROL Agents (protocol, port number, credentials, attempts and timeout).

  11. Click Close.

The VxFS server will then be monitored through the master or online node in Active Multi-node Mode. The other nodes, which are standing by for a failover, will be in Passive Multi-node Mode, monitoring only the components that are not visible from the active node.

If a managed node is unable to check the monitoring status of the active managed node, it will change to Temporary Single-node Mode allowing full monitoring. It will remain in Temporary Single-node Mode until it finds the active node in full monitoring mode again.

If the Remote PATROL Agent Checking is Disabled, while there are more than one PATROL Agent involved, the managed node on the master or online node will be in Active Multi-node Mode and all others will be in Passive Multi-node Mode, without checking the monitoring status of the active node. In addition, the above procedure to configure Multi-node Mode (server instance > KM Commands > Configuration > Monitoring Mode) needs to be repeated from each PATROL Agent involved.

No results.