8.6.2 Collectable log information and connection methods for remote monitoring
The following table describes remote monitoring log information that can be collected from the remotely monitored hosts, and the connection methods for remote monitoring.
For collecting host information, WMI and NetBIOS (NetBIOS over TCP/IP) connections are used to check connection and collect host information. Therefore, the agents on remotely monitored hosts operate on the premise that they can connect to WMI and NetBIOS (NetBIOS over TCP/IP). Even if you intend to collect only event logs, enable not only WMI connection but also NetBIOS (NetBIOS over TCP/IP) connection.
OS on the host on which JP1/IM - Manager has been installed |
OS on the monitored host |
Log information |
Connection method |
---|---|---|---|
Windows |
Windows |
Log file |
NetBIOS (NetBIOS over TCP/IP) |
Event log |
WMI |
||
UNIX |
Log file |
SSH |
|
UNIX |
Windows |
-- |
-- |
UNIX |
Log file |
SSH |
- Legend:
-
--: Not applicable.
- SSH authentication
-
The public key authentication method is used for SSH authentication.
The figure below illustrates the concept of public key authentication. When JP1/IM - Manager is running on Windows, the keys are actually created on UNIX monitored hosts. This explanation is omitted in the figure.
Figure 8‒45: Concept of public key authentication There are two methods of public key authentication on a cluster system. One method uses a common key on both the primary node and the standby node. The other method uses different keys on the primary node and the standby node.
To use a common key on both the primary node and the standby node, overwrite-copy the key file on the primary node to the key file on the standby node. The following figure illustrates the concept when a common key is used.
Figure 8‒46: Concept of public key authentication (when a common key is used on the primary node and the standby node) To use different keys on the primary node and the standby node, register both key files on the primary node and the standby node in the remotely monitored hosts. The following figure illustrates the concept when different keys are used.
Figure 8‒47: Concept of public key authentication (when different keys are used on the primary node and the standby node)