JP1 Version 11 Integrated Management: Getting Started (Integrated Console)
Contents
Glossary
Index
Previous
2 / 75
Next
Cover
Notices
Summary of amendments
Preface
1. Installing and Setting Up JP1/IM
1.1 Overview of a basic configuration system
1.2 Preparation before installation
1.2.1 Preparing the products to be installed
1.2.2 Prerequisite OSs and OS environment configuration
1.2.3 Required amounts of installation memory and disk space
1.2.4 Language settings in prerequisite OSs
1.2.5 Setting ports used by JP1/IM
1.2.6 Setting name resolution
1.3 General procedures for installing and setting up JP1/IM
1.4 Installation and setup (for Windows)
1.4.1 Installing the prerequisite product (for Windows)
1.4.2 Setting up the prerequisite product (for Windows)
1.4.3 Installing JP1/IM (for Windows)
1.4.4 Setting up JP1/IM - Manager (for Windows)
1.4.5 Setting up JP1/IM - View (Windows only)
1.4.6 Starting JP1/IM - Manager (for Windows)
1.5 Installation and setup (for Linux)
1.5.1 Installing the prerequisite product (for Linux)
1.5.2 Setting up the prerequisite product (for Linux)
1.5.3 Installing JP1/IM (for Linux)
1.5.4 Setting up JP1/IM - Manager (for Linux)
1.5.5 Starting JP1/IM - Manager (for Linux)
1.6 Logging in to JP1/IM - Manager from JP1/IM - View
2. Setting Up Monitoring Targets
2.1 What is IM Configuration Management?
2.1.1 Registering the hosts into IM Configuration Management
2.1.2 Using IM Configuration Management to define the system hierarchy
2.1.3 Verifying that the system has been correctly set up by IM Configuration Management
2.2 Settings for executing commands on monitored hosts from JP1/IM - View
2.2.1 Configuring user mapping
2.2.2 Verifying that you can execute a command
2.3 Customizing settings for forwarding events from an agent to the manager
2.3.1 Using IM Configuration Management to set a forwarding filter
2.3.2 Verifying that the forwarding filter has been correctly set
2.4 Using event conversion to monitor log files
2.4.1 What is log file trapping for JP1/Base?
2.4.2 Verifying that records can be converted to events by the log file trap
3. Monitoring a System
3.1 Monitoring only necessary events
3.1.1 Using a view filter to filter events to be displayed
3.1.2 Verifying that the events that match the view filter conditions are displayed
3.2 Removing hosts undergoing maintenance from the items to be monitored
3.2.1 Using common exclusion conditions in a filter to temporarily stop hosts from being monitored
3.2.2 Verifying that events from unmonitored hosts are not displayed
4. Detecting and Investigating System Errors
4.1 Automatically executing a command whenever a specific event is issued
4.1.1 Using the automated action function to execute a command whenever an event is issued
4.1.2 Verifying that a command specified as an automated action was executed
4.2 Searching for events
4.2.1 Using the search events function to search for events that match a specified condition
4.2.2 Verifying that events were found
Appendixes
A. Using the Email Notification Function to Send Emails (Windows Only)
A.1 Setting up the email notification function (Windows only)
A.2 Verifying that the email notification function has been set up correctly (Windows only)
A.3 Example definition for an automated action when using the email notification function (Windows only)
B. Using Visual Monitoring to Understand the Extent of the Impact of a System Error
B.1 Procedure for configuring visual monitoring
B.2 Verifying that you can monitor the extent of impact of events in map format and tree format
C. Port Numbers
C.1 JP1/IM port numbers
C.2 JP1/Base port numbers
C.3 Direction of communication through a firewall
D. List of Services (Windows only)
E. Advanced Use
F. Reference Material for this Manual
G. Glossary
To Page Top