Hitachi

JP1 Version 12 JP1/Integrated Management 2 - Manager Overview and System Design Guide


7.6.2 Collectable log information and connection methods for remote monitoring

The following table describes remote monitoring log information that can be collected from the remotely monitored hosts, and the connection methods for remote monitoring.

For collecting host information, WMI and NetBIOS (NetBIOS over TCP/IP) connections are used to check connection and collect host information. Therefore, the agents on remotely monitored hosts operate on the premise that they can connect to WMI and NetBIOS (NetBIOS over TCP/IP). Even if you intend to collect only event logs, enable not only WMI connection but also NetBIOS (NetBIOS over TCP/IP) connection.

Table 7‒39: Log information and connection methods for remote monitoring

OS on the host on which JP1/IM - Manager has been installed

OS on the monitored host

Log information

Connection method

Windows

Windows

Log file

NetBIOS (NetBIOS over TCP/IP)

Event log

WMI

UNIX

Log file

SSH

UNIX

Windows

--

--

UNIX

Log file

SSH

Legend:

--: Not applicable.

SSH authentication

The public key authentication method is used for SSH authentication.

The figure below illustrates the concept of public key authentication. When JP1/IM - Manager is running on Windows, the keys are actually created on UNIX monitored hosts. This explanation is omitted in the figure.

Figure 7‒45: Concept of public key authentication

[Figure]

There are two methods of public key authentication on a cluster system. One method uses a common key on both the primary node and the standby node. The other method uses different keys on the primary node and the standby node.

To use a common key on both the primary node and the standby node, overwrite-copy the key file on the primary node to the key file on the standby node. The following figure illustrates the concept when a common key is used.

Figure 7‒46: Concept of public key authentication (when a common key is used on the primary node and the standby node)

[Figure]

To use different keys on the primary node and the standby node, register both key files on the primary node and the standby node in the remotely monitored hosts. The following figure illustrates the concept when different keys are used.

Figure 7‒47: Concept of public key authentication (when different keys are used on the primary node and the standby node)

[Figure]