Hitachi

JP1 Version 12 JP1/Performance Management Planning and Configuration Guide


3.3.2 Issuing alarm events

Organization of this subsection

(1) How to collect the alarm event data

The Agent Collector service of PFM - Agent or the Remote Monitor Collector service of PFM - RM issues alarm events, when the performance data of a monitoring agent exceeds a threshold. Thresholds are preset in the alarm definition of the monitoring template provided by the Performance Management system.

The threshold that triggers the alarm event can also be set for a group agent in PFM - RM. If you set the threshold for a group agent, you can use the merged value of the performance data from multiple monitored targets to issue the alarm event. For example, you can use the CPU usage average for multiple monitored targets to issue an alarm event.

Figure 3‒23: Flow of the warning processing when the monitored program has reached a critical state

[Figure]

Flow of processing:

  1. A value over a threshold is detected.

    PFM - Agent or PFM - RM issues an alarm event when the value of the performance data exceeds a threshold.

  2. An alarm event is sent.

    The system sends the alarm event issued by PFM - Agent or PFM - RM to PFM - Manager. The alarm event information sent to PFM - Manager can be checked from the Event Monitor window of PFM - Web Console.

  3. Alarm events are accumulated.

    The Store database of PFM - Manager stores the alarm event data sent from PFM - Agent or PFM - RM. The alarm event information accumulated in the Store database of the PFM - Manager can be checked from the Event History window of PFM - Web Console.

  4. Actions are executed.

    The system executes actions defined in the issued alarm event. The system warns the system administrators by executing actions, such as informing them by icons in the window of PFM - Web Console or by sending emails. Also, a command can be executed to inform the system administrators that an alarm event was issued.

Point:

The monitoring agent executes actions, such as sending emails or executing commands, according to the monitoring agent settings. The monitoring manager can also execute the actions.