Job Management Partner 1/Software Distribution Description and Planning Guide
- Initial size = total size of all tables + (total size of all tables x 20%)
- Table size = line size x number of lines
- Line size = line header x (3 x UB1) + total column size including byte length
(UB1 is a variable for an unsigned byte; the system obtains the value from V$type_size.)
- Row header = 3 + number of short columns + (3 x number of long columns)
(A short column has up to 255 bytes; a long column has 256 bytes or more.)
- Size of user table area (bytes) =
- {[156 (number of cabinets + 2)]
- + [460 x (number of remote collection-related jobs x average number of clients per job)]
- + [1729 x (number of remote installation-related jobs x average number of packages per job x average number of clients per job)
- + (number of jobs other than remote installation-related jobs x average number of clients per job)]
- + [1708 x (number of remote installation-related ID group jobs managed by the relay managing the ID x average number of packages per job x average number of clients per ID group)
- + (number of jobs other than remote installation-related ID group jobs x average number of clients per ID group)]
- + [96 x number of ID groups]
- + [202 x (number of ID groups x average number of relays per ID group x average number of clients registered per ID group)]
- + [763 x (number of clients x average number of files to be acquired by searching software inventory)]
- + [496 x (number of clients x average number of system information items to be acquired)]
- + [306 x (number of jobs + number of folders)]
- + [3265 x (number of remote collection-related jobs x number of folders)]
- + [337 x (number of ID group jobs x number of folders)]
- + [585 x ((number of jobs x average number of clients per job) + number of folders)]
- + [2390 x ((number of remote installation-related jobs x average number of packages per job) + number of folders)]
- + [359 x (number of Get software information from client jobs defined + number of folders)]
- + [206 x (number of Transfer user inventory schema to client jobs defined + number of folders)]
- + [355 x (number of jobs + number of folders)]
- + [468 x (number of ID groups managed by the relay managing the ID x total number of ID groups specified in ID group jobs)]
- + [2792 x number of automatic ID group maintenance policies]
- + [1145 x (number of Collect files from client jobs + number of Collect files from client to relay system jobs + number of Acquire collected files from relay system jobs + number of Delete collected files from relay system jobs)]
- + [65622 x (number of software search list items + 1)]
- + [244 x number of hosts in the system configuration when the OpenView Linkage is used]
- + [583 x (number of clients + number of host groups)]
- + [65669 x number of packages]
- + [979 x (number of packages + number of cabinets)]
- + [458 x number of jobs scheduled and executed]
- + [232 x (number of remote installation-related jobs x average number of packages per job x average number of clients per job)]
- + [232 x (number of jobs other than remote installation-related jobs x average number of clients per job)]
- + [1031 x number of clients]
- + [56]
- + [1577 x (number of ID groups x average number of relays per ID group x average number of clients registered per ID group)]
- + [328 x number of clients x number of user inventory items]
- + [64962 x number of user inventory items]
- + [370 x (number of clients x average number of software information items to be acquired)]
- + [438 x (number of all-lower-clients jobs defined x total number of relay managers specified by all-lower-clients jobs)]
- + [273 x number of relay managers/systems in system configuration]
- + [632 x number of hosts x number of registry items to be acquired]
- + [378 x number of registry acquisition items created]
- + [864 x number of hosts in the system configuration]
- + [size of software inventory#1]
- + [1141 x number of system configuration information deletion logs]
- + [465 x number of uninstalled JP1/Software Distribution hosts]
- + [260 x number of conditions set in search host]
- + [286 x number of community names specified in search host settings x number of conditions set in search host]
- + [12]
- + [446 x number of hosts found by search host]
- + [237 x number of software operation monitoring policies]
- + [361 x (number of software operation monitoring policies x 7#2)]
- + [735 x number of programs to be monitored]
- + [370 x number of programs for which operation time is to be acquired]
- + [337 x number of permitted information items for software operation monitoring]
- + [340 x number of filtering conditions specified in operation monitoring policies]
- + [419 x number of Web access log filtering conditions]
- + [397 x number of access suppression exclusion conditions for USB media]
- + [520 x 10000#3]
- + [4713 x (number of domains + number of OUs + number of groups + number of computers + number of users)]
- + [4287 x ((number of OUs x number of items to be collected from OUs) + (number of groups x number of items to be collected from groups) + (number of computers x number of items to be collected from computers) + (number of users x number of items to be collected from users))]
- + [4008 x (number of items to be collected from OUs + number of items to be collected from groups + number of items to be collected from computers + number of items to be collected from users)]
- + [6319 x number of domains]}
- + [64 x number of members belonging to groups]}
- #1: Software inventory size
- = (size of the software inventory dictionary)
- + (size when the client software inventory is obtained)
- + (size of the number-of-clients table)
- + (size of deleted software management table)
- #2: Number of device types
- #3: Maximum number of suppression history events to be saved
Guidelines for calculating the amount of data usage are provided below.
(a) Size of the software inventory dictionary
887 bytes (size of one table) x number of search result files
- Example: When files with *.exe or *.dll extensions are collected
- Suppose that the number of *.exe and *.dll files in a client is 1,000.
- 887 x 1000 = 887000 bytes (about 0.85MB)
(b) Size when client software inventory is obtained
342 bytes (size of one table) x number of destinations to be searched x number of search result files
- Example: When the number of destination clients is 1,000 and each client has 1,000 files
- 342 x 1000 x 1000 = 342000000 bytes (about 326MB)
(c) Size of the number-of-clients table
108 bytes (size of one table) x number of files to be processed by license management
- Example: When 100 of the 1,000 files are to be processed by license management
- 108 x 100 = 10800 bytes (about 0.01MB)
(d) Size of deleted software management table
384 bytes (size of one table) x number of files to be processed by deletion management
- Example: When 100 software programs are not added to the software inventory dictionary
- 384 x 100 = 38400 bytes (about 0.04MB)
Note that no software program is duplicated between the software inventory dictionary and deleted software management table.
The size of the rollback table area is usually 10% of the user table area.
- Initial size = total of all index tables
- Size of one index table = number of bytes per item x number of items
- Number of bytes per item = header size + size of one index line
- Header size = 3 + number of short columns + (3 x number of long columns)
(A short column has up to 128 bytes; a long column has 129 bytes or more.)
- Size of index table area (bytes) =
- {[36 x number of ID groups]
- + [112 x (number of ID groups x number of ID groups per client)]
- + [73 x (number of clients x average number of system information items to be acquired)]
- + [387 x (number of jobs + number of folders)]
- + [168 x (number of ID groups x average number of relays per ID group x average number of clients registered per ID group)]
- + [242 x ((number of jobs x average number of clients per job) + number of folders)]
- + [168 x (number of Get software information from client jobs defined + number of folders)]
- + [168 x (number of Get user inventory information jobs defined + number of folders)]
- + [270 x (number of ID groups managed by the relay managing the ID x total number of ID groups specified by ID group jobs)]
- + [40 x (number of items in the software search list + 1)]
- + [76 x number of hosts in the system configuration when the OpenView Linkage is used]
- + [86 x (number of remote installation-related jobs x average number of packages per job x average number of clients per job)
- + (number of jobs other than remote installation-related jobs x average number of clients per job)]
- + [36 x number of automatic ID group maintenance policies]
- + [76 x number of clients]
- + [133 x (number of Transfer user inventory schema to client jobs defined x number of folders)]
- + [339 x (number of clients x average number of software information items to be acquired)]
- + [321 x (number of all-lower-clients jobs defined x total number of relay managers specified by all-lower-clients jobs)]
- + [173 x number of relay managers/systems in system configuration]
- + [330 x number of hosts x number of registry items to be acquired]
- + [264 x number of registry acquisition items created]
- + [297 x number of hosts in the system configuration]
- + [size of software inventory]#1
- + [35 x number of uninstalled JP1/Software Distribution hosts]
- + [14 x number of conditions set in search host]
- + [14 x number of community names specified in search host settings x number of conditions set in search host]
- + [27 x number of hosts found by search host]
- + [68 x number of software operation monitoring policies]
- + [101 x (number of software operation monitoring policies x 7#2)]
- + [75 x number of programs to be monitored]
- + [377 x number of programs for which operation time is to be acquired]
- + [347 x number of permitted information items for software operation monitoring]
- + [331 x number of filtering conditions specified in operation monitoring policies]
- + [68 x number of Web access log filtering conditions]
- + [68 x number of access suppression exclusion conditions for USB media]
- + [68 x 10000#3]
- + [88 x number of software operation monitoring history information items]#4
- + [109 x number of operation time information items acquired]#5
- + [305 x (number of domains + number of OUs + number of groups + number of computers + number of users)]
- + [36 x ((number of OUs x number of items to be collected from OUs) + (number of groups x number of items to be collected from groups) + (number of computers x number of items to be collected from computers) + (number of users x number of items to be collected from users))]
- + [25 x (number of items to be collected from OUs + number of items to be collected from groups + number of items to be collected from computers + number of items to be collected from users)]
- + [38 x number of domains]
- + [69 x number of members belonging to groups]}
- #1: size of software inventory
- = (size of the software inventory dictionary)
- + (size when the client software inventory is obtained)
- + (size of deleted software management table)
- = (292 x number of search result files)
- + (331 x number of destinations to be searched x number of search result files)
- + (292 x number of files to be processed by deletion management)
- #2: Number of device types
- #3: Maximum number of suppression history events to be saved
- #4: number of software operation monitoring history information items =
- number of clients subject to software operation monitoring
- x size of operation information acquired for 1 client per day
- x number of days operation information is to be retained
- #5: Number of operation time information items acquired =
- 220 x number of clients x number of programs for which operation time is to be acquired
The size of the temporary table area is usually 60% of the user table area.
- Size of a software operation monitoring log table space (bytes) =
- [1861 x number of software operation monitoring log information entries]#1
- + [80 x number of operation time information items acquired]#2
#1: To determine the number of software operation monitoring log entries, use the following formula:
- number of software operation monitoring log information entries =
- number of clients subject to software operation monitoring
- x size of operation information acquired for 1 client per day
- x number of days operation information is to be retained
- #2: number of operation time information items acquired =
- 220 x number of clients x number of programs for which operation time is to be acquired
For clients in a virtual environment, the number of information items collected increases in proportion to the number of login users. Therefore, add the number of expected login users to number of clients.
If you use the dcmmonrst command provided by JP1/Software Distribution, in the database you can also store the operation information whose retention days specified at setup have expired. When you determine the number of days operation information is to be retained, take into account the number of days operation information is stored in the database by the dcmmonrst command.
- Updated program management table area (bytes) =
- [939 x number of patch information items]
- + [4024433 x number of downloaded patches#1]
- + [3403 x number of installed scripts]
- + 280#2
#1: Excludes OS service packs.
#2: Patch management information
All Rights Reserved. Copyright (C) 2009, 2013, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated.