MonitorSolution User Guide
MonitorSolution User Guide
MonitorSolution User Guide
b. If the aggregation is enabled at this point, then the array of True or False
rule evaluation results for each instance is aggregated to one True or False
rule evaluation result, depending on the aggregation type.
For every True rule evaluation result, an alert is generated in the Event Console
and an action, defined in the rule, is started. If aggregation is not enabled, an alert
is generated in the Event Console for every True rule evaluation result of every
instance.
62 Working with Rules
About metric and rule aggregation
There are the following aggregation modes available for aggregating instances
results within metrics and rules conditions:
This mode does not aggregate the evaluation results, meaning
that a metric an alert is generated for every instance.
Do not aggregate
In this mode one alert is generated if a rule is evaluated as True
for all the monitored instances.
Aggregate with all
In this mode one alert is generated if a rule is evaluated as True
for at least one of the monitored instances.
Aggregate with any
Data of the rule condition can be filtered to prevent the false positive evaluations
of the condition. Monitor Solution supports the following filters:
This is a filtering function, which produces True output when input
variable is True at least the specified number of times in a row.
Counter
This is a filtering function, which produces True output when input
variable is True at least the specified number of times within the
specified time period. This filter can only be used in addition to
the Counter filter.
Overtime
Trigger is the two state element of the rule that stores the state information. This
prevents from sending consequent alerts for a rule, which is already triggered. The
rule trigger behaves like a regular flip-flop circuit. Trigger starts the action, when
the rule condition is reached. After that, it stays in a signalled state with no activity,
even if the rule condition is reached again.
You can reset the trigger, so that the corresponding actions are taken the next time
a rule is evaluated as True. There are two modes that control how the trigger state
is reset:
This mode will reset trigger automatically when input variable is
False. After that the trigger will be reset and will again be able to
execute the action specified for the rule.
Updated metric value
In this mode the rule will not react on the condition values after
the action was triggered, until reset manually.
Updated manually
See Using aggregation to monitor potential hard drive issue on page 64.
See Aggregation input-output matrix on page 102.
63 Working with Rules
About metric and rule aggregation
Using aggregation to monitor potential hard drive
issue
In this example, you will learn how set up rule and metrics aggregation to monitor
two metrics simultaneously.
See About metric and rule aggregation on page 62.
The goal of this sample task is to monitor free space and input-output per second
for two hard drives and send an alert to the Event Console if any of those conditions
exceeds the specified values for any of the drives.
To achieve this goal, the following business rules have to be followed:
Send an alert to the Event Console, if less than 20% of the disk space is free
on any of the hard drives.
Send an alert to the Event Console, if the number of input-output operations per
second (IOPS) exceeds 100 on any of the hard drives.
To make these business rules work, you have to configure the following rules in
Monitor Solution:
Metric 1: Any instance is evaluated as True if free disk space becomes less
than 20% of its capacity. The instances are aggregated using Any option.
Metric 2: Any instance is evaluated as True if the number of IOPS exceeds 100.
The instances are aggregated using Any option.
The logical operator Or is applied to these metrics within this rule.
See Creating a sample rule with aggregation on page 65.
The rule and metrics evaluation works as follows:
When rule is enabled, Monitor Solution measures the actual values of free disk
space and their IOPS. Metric conditions are evaluated for each instance by matching
the actual values fromthe hard drives with the constant values specified in conditions
for these metrics, generating the Boolean value result of this operation: True or
False. In this example, metric conditions are aggregated using Any option, which
means that the metric condition is evaluated as True, if this evaluation result is True
for at least one monitored hard drive.
Since the metric conditions are combined with operator Or, if the metric evaluation
results is True for at least one of the monitored hard drives, the rule is triggered
and one alert is generated in the Event Console.
Note: To receive a separate alert for each drive, disable the metric condition
aggregation.
64 Working with Rules
Using aggregation to monitor potential hard drive issue
Creating a sample rule with aggregation
This topic contains information on how to create a rule with aggregation for an
example, described in the following topic:
See Using aggregation to monitor potential hard drive issue on page 64.
To create a sample rule with aggregation, complete the following steps:
To create a sample rule with aggregation
1 In the Symantec Management Console, on the Home menu, click Monitoring
and Alerting.
2 In the left pane, under Monitoring and Alerting, expand Monitor > Policies,
and then click Rule Library.
3 In the right pane, under the Agent-based list, on the toolbar, click New >
Metric.
4 In the New Metric Rule dialog box, type the rule name and the description,
and then click Select Category.
5 In the Select Category dialog box, choose the metric category, and then click
OK.
6 In the New Metric Rule dialog box, under Metrics, click the New symbol.
7 In the New Metric Evaluation dialog box, click Select metric.
8 In the Select Metric dialog box, choose LogicalDisk % Free Space for the
first of the hard drives, and then click OK.
9 In the NewMetric Evaluation dialog box, in the Statistics drop-down list, click
Average, and then specify 60 minutes as the values for the Time period
setting.
10 In the Condition drop-down list, click Is less than, and then specify 20 as the
value for the Time period setting.
11 Check the Aggregate with check-box, select the ANY radial button, and then
click OK.
12 In the New Metric Rule dialog box, under Metrics, click the New symbol.
13 In the NewMetric Evaluation dialog box, in the Operator drop-down list, click
Or.
14 Click Select metric.
15 In the Select Metric dialog box, choose Logical Disk IO/Sec for the first of
the hard drives, and then click OK.
65 Working with Rules
Using aggregation to monitor potential hard drive issue
16 In the NewMetric Evaluation dialog box, in the Statistics drop-down list, click
Average, and specify 60 minutes as the values for the Time period setting.
17 In the Condition drop-down list, click Is greater than, and then specify 100
as the value for the Time period setting.
18 Check Aggregate with, select the ANY radial button, and then click OK.
19 Specify other required rule settings, and then click OK.
66 Working with Rules
Using aggregation to monitor potential hard drive issue
Working with tasks and
actions
This chapter includes the following topics:
About Monitor Solution tasks and actions
About severity states
Adding tokens to a Send Email task
Adding actions to rules
Adding actions to monitor policies
Monitor client and server token types
About Monitor Solution tasks and actions
In addition to the standard Symantec Management Platform tasks, Monitor packs
include predefined Monitor-specific tasks.
The Monitor task types are as follows:
8
Chapter
Table 8-1 Monitor task types
Description Task type
This task logs the specified NT events events to the
application event log. You can then see the events in the
Event Viewer.
This task contains the following text boxes:
Event Source
This message is displayed in the Event Viewer.
Event Source Name
Event Type
This text box displays the severity level of the event, either
informational, error, or warning.
Category ID
In this text box, you can type a category ID of your choice
or leave it blank. The value you specify for category ID is
displayed in the event information and can be sorted or
searched.
Event ID
In this text box, you can type an event ID of your choice
or leave it blank. The value you specify for event ID is
displayed in the event information and can be sorted or
searched on.
Parameter
This box displays the details of an NT event. When you
type the text in this box, it is always displayed with the
events. If you want to display current Monitor data that is
gathered at runtime, you can enter tokens in this field.
NT Event task
68 Working with tasks and actions
About Monitor Solution tasks and actions
Table 8-1 Monitor task types (continued)
Description Task type
This task logs the events to a UNIX system log. You can see
the events in the syslog file.
The task contains the following boxes:
Indentation
This box displays the string that is prepended to every
message, and is typically set to the program name.
Priority
This list box displays the priority level of the event, either
emergency, alert, critical, error, warning, notice, info, or
debug.
Facility
This is an informational list box that is associated with a
syslog message. The syslog protocol defines it. It is meant
to provide an indication from what part of a system a
message has originated from.
Message
This message displays the details of a syslog event. When
you type text in this box it is always displayed with the
events. If you want to display current Monitor data that is
gathered at runtime, you can enter tokens in this field.
SysLog task
69 Working with tasks and actions
About Monitor Solution tasks and actions
Table 8-1 Monitor task types (continued)
Description Task type
This task performs control operations under specified
processes on client computers. It can terminatea process or
set the priority of a process on a client computer.
For example, you might want to stop notepad.exe fromusing
too many system resources. You can specify the process as
notepad.exe and set the priority for this task to Low. The task
would check for running instances of notepad.exe and save
system resources by setting that process to a lower priority.
With notepad.exe at a lower priority, system resources are
used for higher priority tasks.
The task contains the following boxes:
Command
This list box lets you terminate the process. You can click
Set Priority to adjust the priority level of the process.
Process Name
In this box, you can type the name of the process you
want to terminate or adjust the priority of.
Priority
To enable the Priority drop-down list, in the Command
drop-down list, click Set Priority.
Apply command to all children
If you check this box, the command is applied to all
children. For example, if you run several instances of the
Notepad process from the command line, the command
line (cmd.exe) process is treated as a parent process,
and the Notepad processes are treated as the child
processes. If you do not check this check box, only the
command line process is terminated. Otherwise, the
Notepad processes are also terminated.
Apply command to all instances
If you check this box, the command is applied to all
instances of the process. For example, you can terminate
the Internet Explorer process. If the computer has multiple
instances of Internet Explorer running, all of those
instances are terminated. If you do not check this check
box, only the first discovered instance is terminated.
Process Control task
70 Working with tasks and actions
About Monitor Solution tasks and actions
Table 8-1 Monitor task types (continued)
Description Task type
This task resets the Monitor Plug-in state.
Resetting the Monitor Plug-in state affects Monitor behavior
in the following way:
All of the rules that the plug-in knows about are reset to
a normal severity state.
No rules are triggered.
You may want to run this task if the Notification Server
computer and Monitor Plug-in are not synchronized.
Reset Monitored Resource
This task polls a list of metrics for a monitored resource or
resources. When the task runs, the monitored resource or
resources metrics are polled immediately. You can specify
agent-based or agentless metrics for polling.
Poll metric on demand
You can configure Monitor tasks and actions, run them on demand, or specify a
schedule.
You can run the tasks independently, or add them to rules or policies. You can run
tasks froma task server or you can choose fromseveral Monitor-specific task types.
Adding actions to rules makes the actions more specific by targeting an individual
metric. Adding actions to a policy lets you specify the actions so that they are
executed to respond to multiple sources. The disadvantage in this case is that the
actions may be more general.
When you add actions to a policy, they are assigned a severity state. The actions
are executed when a rule with that same severity that is specified for that policy is
triggered. Within a policy, each severity state can have an action or set of actions
specified for it. For example, you can have rules specified for a policy that have a
Critical severity state. When any of the critical rules are triggered, all of the actions
that are specified for the Critical severity state are executed.
See Adding actions to monitor policies on page 75.
When you add actions to a rule, they are executed when that rule is triggered. Rules
are triggered when monitored metric data reaches a determined value or goes
beyond an acceptable value range. A triggered rule sends an alert, and any actions
or tasks that are specified for that rule are executed.
You can add the same task to multiple rules or policies. Modifying a task in a rule
or policy also changes that task in any other rules or policies that use that task.
You can specify either task server actions or Monitor Plug-in actions for your rules
and policies. Task server actions are run from the task server, and Monitor Plug-in
71 Working with tasks and actions
About Monitor Solution tasks and actions
actions are run fromMonitor Plug-in. Agentless policies can only contain task server
actions.
The advantages of using task server tasks are as follows:
More tokens are available for configuring the tasks than there are for Monitor
Plug-in tasks.
See Adding tokens to a Send Email task on page 73.
You can create jobs from the task server.
You can easily get history information fromtask server tasks by viewing the task
item.
More task types available than there are for Monitor Plug-in tasks.
The features of Monitor Plug-in tasks are as follows:
Tasks can be run even if the Notification Server computer is not reachable,
which may make Monitor Plug-in tasks very useful for critical tasks.
Not as many task types are available as there are for task server tasks.
Not as many tokens are available for configuring the tasks as there are for task
server tasks.
You can only create client tasks.
You cannot create jobs with Monitor Plug-in tasks.
About severity states
Each rule has a severity state that is associated with it. The severity state of a
resource reflects the severity level of rules that have been triggered on that resource.
See About rules on page 58.
The available severity states, from least severe to most severe, are as follows:
Normal
Undetermined
Informational
Warning
Major
Critical
When a rule is triggered, you can see the severity state of that rule in the Event
Console. The state of the resource is set to the most critical severity level of any
triggered rule. For example, two rules can trigger on a resource, one with a severity
72 Working with tasks and actions
About severity states
level of Warning and one with a severity level of Major. In that case, the overall
state of the resource is Major. Normal is the base severity state for a rule when a
rule is not triggered.
When you specify a severity setting for a rule, you also choose how the severity is
reset for the rule. When a rule is triggered, the severity for that rule changes, and
an alert is sent to the Event Console. When the metric data returns to an acceptable
value range, the rule needs to be reset.
You can choose to reset a severity level in one of the following ways:
The alert needs to be manually resolved in
the Event Console.
Updated manually
If the metric for the rule crosses back to
acceptable levels, the alert is resolved
automatically.
Updated metric value
This option is only available for NT Event
Rule and Log Event Rule. These types of
rules do not have a threshold, so the updated
metrics cannot reset them. You can set up
these rules so that the triggering of another
rule of the same type can reset them. For
example, an NT Event Rule can reset
another NT Event Rule.
Updated rule value
You can also specify an action or group of actions that runs for each severity state.
When actions are associated with a policy, they are assigned a severity state. The
actions are executed when a rule with that same severity that is specified for that
policy triggers. For example, you can have rules specified for a policy that have a
severity state of Critical. When any of the critical rules are triggered, all of the
actions that are specified for the Critical severity state are executed.
Adding tokens to a Send Email task
You can add Monitor tokens to a Send Email task. By doing this, you ensure that
you have the events that contain the specific information that you need. In the Send
Email task, you can add tokens to the body of the email or the subject field. Tokens
are included every time the task is executed. You can have the same text appear
when a Send Email task is executed. By adding tokens to a Send Email task, you
can gather monitor information at runtime and display it in the event. Monitor Solution
has a list of the available Monitor tokens that you can add to the tasks.
See Monitor client and server token types on page 77.
73 Working with tasks and actions
Adding tokens to a Send Email task
To add tokens to a Send Email task
1 In the Symantec Management Console, on the Home menu, click Monitoring
and Alerting.
2 In the left pane, under Monitoring and Alerting, expand Monitor > Policies,
and then click Rule Library.
3 In the right pane, double-click a rule that you want to edit.
You can also create a new rule or add an existing one.
4 In the Edit Rule dialog box, under Actions, on the Task server toolbar, click
the New symbol.
5 In the Create New Task dialog box, in the left pane, scroll down, and click
Send Email, in the right pane, configure the email information, and then click
OK.
6 In the Task Configuration dialog box, click Show tokens, from the list of
tokens, copy the tokens that you need, and then click OK.
7 In the Task Configuration dialog box, click Edit task, in the Send E-mail
dialog box, paste the tokens in the body of the email, click Save changes, and
then close the Send E-mail dialog box.
8 In the Task Configuration dialog box, click OK.
9 In the Edit Rule dialog box, click OK.
Adding actions to rules
Rules are triggered when monitored metric data reaches a determined value or
goes beyond an acceptable value range. When a rule is triggered, an alert is raised,
and the severity state of the monitored resource is changed to the severity setting
of the rule that was triggered.
The severity state that you specify for a rule is reflected in the alert that is sent to
the Event Console.
See About severity states on page 72.
Metric Collect Rule and Metric Rule interact with actions differently. Metric Collect
Rule collects and forwards data. Metric Rule collects data and then evaluates it
against the values you have specified in the rule. If the evaluation result is true, the
rule is triggered and any actions specified for that rule are executed. Actions cannot
be added to the Metric Collect Rule because this rule type does not support actions.
With Metric Collect Rule, there is nothing to evaluate, so a rule would never be
triggered.
74 Working with tasks and actions
Adding actions to rules
To add actions to rules
1 In the Symantec Management Console, on the Home menu, click Monitoring
and Alerting.
2 In the right pane, under Monitoring and Alerting, expand Monitor > Policies,
and then click Rule Library.
3 In the left pane, double-click a rule that you want to edit.
You can also create a new rule or add an existing one.
4 In the Edit Rule dialog box, under Actions, do one of the following:
On the Task server toolbar, click the Add symbol.
In the Select Task dialog box, in the left pane, under System Jobs and
Tasks, choose a task, and then click OK.
Task server tasks are run from the Task Server and can be run only if the
Notification Server computer is reachable.
On the Monitor plug-in toolbar, click the Add symbol.
In the Select Task dialog box, in the left pane, under System Jobs and
Tasks, choose a task, and then click OK.
Monitor Plug-in tasks are run from Monitor Plug-in and can be run even if
the Notification Server computer is not reachable. Monitor Plug-in tasks
can only include client tasks.
5 In the Edit Rule dialog box, under Actions, click the newly added task, on the
toolbar, click the Edit symbol, in the Task Configuration dialog box, configure
the task, and then click OK.
See Adding tokens to a Send Email task on page 73.
The tasks are run in the order that they are displayed in the table. To change
the task sequence, click a task, and then click the up and down arrows on the
toolbar to place the tasks in the order that you require.
6 Click OK.
Adding actions to monitor policies
When monitored metric data reaches a determined value or goes beyond an
acceptable value range, rules are triggered. A triggered rule sends an alert and
changes the severity state. A task that is assigned a certain severity state is executed
when a rule in the policy with a corresponding severity state is triggered.
75 Working with tasks and actions
Adding actions to monitor policies
To add actions to monitor policies
1 Create or edit a monitor policy.
See Creating monitor policies with the monitor policy wizard on page 44.
See Configuring monitor policies on page 47.
2 On the policy page, on the Actions tab, on the toolbar, click a severity state
option.
For each severity type, you can add an associated task or tasks that are
executed when a resource changes to each severity type. For example, if a
rule with a critical severity level is triggered, then all the tasks you specify for
the critical severity level are executed.
See About severity states on page 72.
3 Choose a task from one or both of the following:
On the Task Server toolbar, click the Add symbol.
Choose a task, and then click OK.
In the Task Configuration dialog box, click OK.
Task server tasks are run from the Task Server, and
can only be run if the Notification Server computer is
reachable.
Task server
On the Monitor plug-in toolbar, click the Add
symbol. Choose a task, and then click OK.
In the Task Configuration dialog box, click OK.
Monitor Plug-in tasks are run from the Monitor Plug-in
and can be run even if the Notification Server computer
is not reachable. Monitor Plug-in tasks can only include
client tasks.
This section is not available for agentless monitor
policies.
Monitor plug-in
Tasks can be run either from the Task Server or locally, if Monitor Plug-in is
installed on the monitored computer. Agentless monitor policies can only run
Task Server tasks.
Repeat this step to add all of the tasks that you require in the policy.
76 Working with tasks and actions
Adding actions to monitor policies
4 On the policy page, on the Actions tab, click the action, on the toolbar, click
Edit, configure the task, and then click OK.
See Adding tokens to a Send Email task on page 73.
The tasks are run in the order in which they appear in the table. To change the
task sequence, click a task, and then click the up and down arrows to place
the tasks in the required order.
5 On the policy page, turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
6 Click Save changes.
Monitor client and server token types
Tokens let you add additional Monitor information to actions. Specifying tokens for
actions allows the notifications that are sent to the Event Console to include
Monitor-specific information in the event. The tokens are replaced with readable
values after the task is executed.
Monitor Plug-in actions can use the following client tokens:
Table 8-2 Monitor Plug-in client tokens
Description Client tokens
The name of the computer with Monitor
Plug-in installed.
MONITOR_AGENT_NAME
The triggered alert on the plug-in that has the
highest severity. The rule state and agent
state are Monitor-specific and may not reflect
the state of the server in the Event Console.
MONITOR_AGENT_STATE
The rule GUID or ID > Source > Category for
Template rules.
MONITOR_ALERT_ID
The category of the triggered rule. MONITOR_CATEGORY_NAME
The time the rule is triggered. MONITOR_EVENT_TIME
This token reflects whether the plug-in is in a
maintenance window. The value is true if the
plug-in is in a maintenance window, false
otherwise.
MONITOR_IN_MAINTENANCE_WINDOW
The installation directory of Monitor Plug-in. MONITOR_INSTALL_DIR
77 Working with tasks and actions
Monitor client and server token types
Table 8-2 Monitor Plug-in client tokens (continued)
Description Client tokens
An XML fragment that describes the values
that triggered the rule.
MONITOR_METRIC_INFO
The name of the policy of the triggered rule. MONITOR_POLICY_NAME
The overtime setting for a rule. MONITOR_OVERTIME_VALUE
The GUID of the triggered rule's policy. MONITOR_POLICY_GUID
The previous rule state. The rule state and
plug-in state are Monitor-specific and may
not reflect the state of the server in the Event
Console.
MONITOR_PREV_RULE_STATE
The resource that triggered the rule. MONITOR_RESOURCE_GUID
The GUID of the rule that is triggered. MONITOR_RULE_GUID
The name of the rule that is triggered. MONITOR_RULE_NAME
The severity state of the rule. It is displayed
as Normal if the rule is acknowledged. This
rule state and Plug-in and state is
Monitor-specific and does not reflect the state
of the server in the Event Console.
MONITOR_RULE_STATE
Task server tasks can use all of the client tokens that are listed in the previous
table. They also use the following server tokens:
Table 8-3 Monitor Solution server tokens
Description Server tokens
Displays the XML metric information as HTML
for email tasks.
MONITOR_METRIC_INFO_HTML
The resource GUID of the source computer. MONITOR_SOURCE_GUID
The resource GUID of the target computer. MONITOR_TARGET_GUID
The name of the source computer. MONITOR_SOURCE_NAME
The name of the target computer. MONITOR_TARGET_NAME
The domain name of the source computer. MONITOR_SOURCE_DOMAIN
The domain name of the target computer. MONITOR_TARGET_DOMAIN
78 Working with tasks and actions
Monitor client and server token types
Table 8-3 Monitor Solution server tokens (continued)
Description Server tokens
The IP address of the source computer. MONITOR_SOURCE_IP_ADDRESS
The IP address of the target computer. MONITOR_TARGET_IP_ADDRESS
79 Working with tasks and actions
Monitor client and server token types
Viewing Monitored Data
This chapter includes the following topics:
About viewing the monitor data
Viewing historical performance data
Viewing real-time performance data
About viewing the monitor data
Monitor Solution lets you view data about your monitored computers in different
reports to ensure that all monitored computers and applications function properly.
You can view the data on the Monitoring and Alerting page or on the Reports
page.
To view monitor data on the Monitoring and Alerting page, in the Symantec
Management Console, on the Home menu, click Monitoring and Alerting.
The Monitoring and Alerting page includes the following Web parts:
Table 9-1 Monitoring and Alerting page Web parts
Description Web part
You use this Web part to enter the name of a computer and run
the performance viewer.
See Viewing real-time performance data on page 82.
Launch Performance
Viewer
9
Chapter
Table 9-1 Monitoring and Alerting page Web parts (continued)
Description Web part
This Web part shows the monitored resources. The resources are
organized according to severity status. The state of a computer
is the most severe state of any triggered rule on the computer.
For example, if one rule state is warning and another is critical,
the overall state of the computer is critical. If all rule states are
normal, and then one rule state changes to warning, the computer
state is set to warning.
This Web part also shows computers with Monitor Plug-in installed.
You can click a computer, and then, on the toolbar, launch the
Performance Viewer, the Resource Manager, or the Event console.
Monitored Resources
by Status
This Web part shows a list of Monitor Site Servers and their status. Monitor Site Servers
Status
This Web part shows the aggregate health of the devices and
computers in your organizational groups.
Group View -
Aggregate health by
resource
This Web part shows a consolidated view of all alerts that are
raised.
Event Console
To view the data on the Monitoring and Alerting page
1 In the Symantec Management Console, on the Home menu, click Monitoring
and Alerting.
2 In the left pane, under Monitoring and Alerting, expand Monitor > Reports,
and then navigate to the report that you want to view.
To view monitor data on the Reports page
1 In the Symantec Management Console, on the Reports menu, click All
Reports.
2 In the left pane, under Reports, click Monitoring and Alerting, and then
navigate to the report that you want to view.
Viewing historical performance data
The historical performance viewer is a component of Monitor Solution that lets you
view historical performance data. Historical data is available from both Monitor
Plug-in and Remote Monitor Server.
81 Viewing Monitored Data
Viewing historical performance data
To view historical performance data
1 In the Symantec Management Console, on the Actions menu, click Monitor
> Historical.
2 On the Historical Performance Viewer page, on the toolbar, in the Device
box, type the name of the device, or click the Select resource with historical
data symbol, and then choose a device from the resource list.
3 Specify the time period for which you want to view the data.
The time period that you specified in Fromand To boxes, may contain no data
in the beginning or at the end of the period. In this case, Summarized View
shows only the actual time when the data is available. The empty timeline with
no data in the beginning or at the end of the chart is not displayed.
4 On the toolbar, click Metrics.
5 In the Available Metrics dialog box, specify the metric data that you want to
view, and then click OK.
6 In the Summarized Viewdiagram, drag the mouse across the graph to specify
the range that you want to view.
7 In the Detailed View box, choose a point on the graph.
If available, the data that was last gathered for the selected point is displayed
in Processes, Events, Ports, and Text Data Web parts.
The Metrics Web part displays the average, minimum, and maximum values
for the whole range of data that is displayed in the Detailed View. However,
the Last Value and Last Time columns in the Metrics Web part display the
value for the selected point. If the selected point has no value, these columns
display the value that precedes this point. If no value is available for the metric
in the Detailed View, the Last Value and Last Time columns are left blank in
the Metrics Web part.
See Viewing real-time performance data on page 82.
Viewing real-time performance data
The Performance Viewer is a component of Monitor Solution that lets you view
real-time performance data. Performance data is available fromboth Monitor Plug-in
and Remote Monitor Server.
82 Viewing Monitored Data
Viewing real-time performance data
To view real-time performance data
1 In the Symantec Management Console, on the Actions menu, click Monitor
> Real-time.
2 On the Real-time Performance Viewer page, on the toolbar, in the Device
box, type the name of the device, or click the Select resource with historical
data symbol, and then choose a device from the resource list.
3 In the Registered Metrics dialog box, check the metric data that you want to
monitor, and then click OK.
The performance viewer begins monitoring the computer and displays the
following information:
This section displays graphical performance data. The data
is scaled to fit within the limits of the graph. If you place the
mouse pointer over a point on a graph line, the monitored
metric data is displayed next to the mouse pointer. If you
monitor multiple instance metrics, each instance has a
separate graph line. You can use the Select Metrics option
to monitor different metrics.
Graph
This section displays all numeric metric data that is monitored. Metrics
This section displays the processes that are currently running
on a monitored computer.
Processes
This section displays all Windows NT event data. Events
This section displays the status of the monitored ports on the
computer.
Ports
This section displays the retrieved text data for command,
custom DLL, custom COM object, WS-MAN, SNMP, SQL,
and string-type Windows Management Instrumentation (WMI)
metrics. The predefined WMI metrics are the only metrics
that collect this type of data. If you create or use a custom
DLL, COM object, SNMP, or command metric that retrieves
this data, it is also displayed in this section.
Text Data
See Viewing historical performance data on page 81.
83 Viewing Monitored Data
Viewing real-time performance data
Using alert management
This chapter includes the following topics:
About alerts
About alert management
About Event Console alert filters
Configuring alert filter settings
Adding new alert filters
Hiding resolved alerts
Configuring alert rule settings
Creating an alert matching rule
Adding or editing rules to discard alerts
Forwarding alerts to another management system
Running a task in response to an alert
About Event Console tokens
Configuring workflow rules
Configuring alert purging settings
Viewing alerts by network location
Viewing the health of an organizational group
Creating and editing Event Console tasks
10
Chapter
About alerts
Alerts are the status messages that contain information about device or network
health. Status messages are generated using standard monitoring protocols, such
as SNMP.
Each status message that is received is converted into a common format that is
called an alert. During conversion, alerts are associated with the affected resource
in the CMDB and are assigned a severity and a status. Severity ranges fromnormal
to critical, and alert status can be new, acknowledged, or resolved.
Alerts from multiple protocols are displayed using common severity and status. All
received alerts are displayed in the Event Console.
See About Event Console alert filters on page 86.
About alert management
Alert management shows a consolidated viewof device health across your network.
You can viewhealth by network layout, organizational group, or by directly monitoring
the list of received alerts in the Event Console.
The Event Console reduces the need to maintain separate tools to monitor different
devices. The Event Console collects SNMP traps and other status messages and
displays them in a single location. All status messages are converted to a common
format that links each received message to the affected resource in the Configuration
Management Database (CMDB). These formatted messages are called alerts.
See About alerts on page 85.
Advanced search features let you quickly find specific alerts or groups of alerts.
The Event Console also provides a rule-based triggering systemthat lets you create
alert matching rules to process alerts in the following ways:
Discard specific alerts from the database.
See Adding or editing rules to discard alerts on page 91.
Forward alerts to another management system.
See Forwarding alerts to another management system on page 91.
Execute task server tasks in response to specific alerts.
See Running a task in response to an alert on page 92.
Initiate a workflow in response to specific alerts.
See Creating an alert matching rule on page 90.
85 Using alert management
About alerts
Note: If the Notification Server computers and the SQL Server computers are not
set to the same time and the same time zone, then any alerts that have occurred
in the past few hours are not displayed in the Event Console.See Adding new alert
filters on page 88.
About Event Console alert filters
The Event Console in Symantec Management Platform displays alerts in a grid
layout. Alert filters let you sort the alerts so that you can analyze and manage them.
To view the alerts, in the Symantec Management Console, on the Manage menu,
click Events and Alerts.
The Event Console contains several rule types that represent automated,
event-based actions. The rule types include discarding, forwarding, task, and
workflowrules. Discarding rules filter and discard matching alerts. Forwarding rules
forward a Simple Network Management Protocol (SNMP) trap to a downstream
listener. Task rules initiate Symantec Management Platform task server tasks. An
event can automatically start a workflow process. This workflow process can pass
along valuable event data.
See About alerts on page 85.
The advanced filter function lets you use advanced filters to manage alerts.
To filter the alerts, on the Event Console page, in the Select a filter drop-down
list, click an alert type.
The color-coded status bar lets you see the number of alerts by severity level, as
follows:
Undetermined Violet
Informational Blue
Warning Yellow
Major Orange
Critical Red
Normal Green
To view the information about a specific alert type, on the Event Console page,
click the colour section of the status bar, and the grid view below changes. It shows
only those alerts that match the severity level of the color that you clicked. For
example, if you click yellowon the status bar, then the grid shows alerts with severity
86 Using alert management
About Event Console alert filters
Warning. After you filter by severity level, in the Select a filter drop-down list, you
can you can clear the selection to see the complete list of alerts again.
The toolbar on the Event Console page displays the following symbols:
Opens the Alert Details dialog box for the
chosen alert.
Details
Lets you acknowledge a chosen alert. In the
State column, a blue flag indicates an
acknowledged alert.
Acknowledge
Flags the chosen alert with a check mark in
the State column.
When you right-click a resolved alert, you can
view alert details. You can also view the
available rules for discarding the alert or open
the Resource Manager in a new window.
If you click Discarding Rules with a resolved
alert selected, you can create a global discard
filter rule or create a resource discard filter
rule.
Resolve
When you click an alert, and then on the
toolbar, click the Actions symbol, you see
the options that you see when you right-click
a resolved alert.
Actions
When you click an alert, you can manage it by changing its severity to any of the
following:
Undetermined
Informational
Warning
Major
Critical
Normal
On the Alert Filter Settings page, you can create and configure filters. To access
this page, on the toolbar, click the symbol.
See Configuring alert filter settings on page 88.
See Adding new alert filters on page 88.
87 Using alert management
About Event Console alert filters
You can type the custom search criteria in the Search box, on the toolbar.
When you click a different filter in the drop-down list, the grid view displays the
alerts that pertain to the selected filter. You can click any other control on the page,
except Refresh, and the filter that you chose remains active.
Configuring alert filter settings
You can add new filters with specific alert filter conditions, edit existing filters, or
delete filters.
To configure alert filter settings, do the following:
To configure alert filter settings
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Filter Settings.
See About Event Console alert filters on page 86.
See About alerts on page 85.
When you add, edit, and delete alert filters, you may also need to work with alert
rules.
See Configuring alert rule settings on page 89.
See Creating an alert matching rule on page 90.
Adding new alert filters
You can add new alert filters to the list in the Event Console.
See About Event Console alert filters on page 86.
To add new alert filters
1 In the Symantec Management Console, on the Manage menu, click Events
and Alerts.
2 On the Event Console page, on the toolbar, click the Go to Alert Filter
Settings page to manage filters symbol.
3 In the Alert Filter Settings dialog box, on the toolbar, click Add.
4 In the right pane, click the default filter name, and then type a unique descriptive
name.
88 Using alert management
Configuring alert filter settings
5 In the right pane, under the filter name, click New filter description, and then
type the description of the filter.
6 In the right pane, under Filter Condition, on the toolbar, click Add to add
multiple conditions for a single filter to evaluate.
7 Enable the alert.
In the upper right corner, click the colored circle, and then click On.
8 Click Save.
Hiding resolved alerts
Hidden resolved alerts are not displayed on the Event Console alert grid. They
remain in the alert database until they are purged.
See About alerts on page 85.
To hide resolved alerts
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Event Console Settings.
3 On the Event Console Settings page, specify the time for resolved alerts to
remain visible in Event Console. After this interval, the resolved alerts are
hidden automatically.
4 Click Save changes.
Configuring alert rule settings
You can create rules that discard or forward alerts. You can also create some task
rules and rules for initiating workflow tasks.
To configure alert filter settings
To configure alert rule settings
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
The available tabs on this page are as follows:
Discarding Rules
89 Using alert management
Hiding resolved alerts
See Adding or editing rules to discard alerts on page 91.
Forwarding Rules
See Creating an alert matching rule on page 90.
Task Rules
See Creating an alert matching rule on page 90.
Workflow Rules
Creating an alert matching rule
Alert matching rules contain conditions, such as alert type or date received, to
identify specific alerts as the Event Console receives them. These rules are used
when you discard or forward alerts, execute tasks, or initiate a workflow.
See Adding or editing rules to discard alerts on page 91.
See Running a task in response to an alert on page 92.
See Forwarding alerts to another management system on page 91.
You can match alerts by type, severity, affected resource, and many other criteria.
To create an alert matching rule
1 In Symantec Management Console, on the Settings menu, click All Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
3 On the Alert Rule Settings page, click the tab that corresponds to the type of
rule you want to create.
4 On the toolbar, click Add.
5 In the right pane, click the default rule name, and then type a unique name for
the rule.
6 Under the rule name, click the rule description, and then type the description
for the new rule.
7 On the Alert Rule Settings page, in the right pane, under Rule, on the toolbar,
click Add, and then click the criteria for the conditions.
You can re-order conditions and move them up and down or left and right to
create nested evaluations. During evaluation, nested evaluations are performed
first.
8 (Optional) If you create a new workflow rule, define the workflow to run when
a matching alert is received.
90 Using alert management
Creating an alert matching rule
9 Enable the rule.
At the upper right of the page, click the colored circle, and then click On.
10 Cick Save.
Adding or editing rules to discard alerts
You may need to delete incoming or duplicate alerts. You can create an alert
matching rule to discard the alerts that meet your criteria. These alerts are removed
as soon as they are received and are not imported into the Configuration
Management Database.
To optimize performance of the platform and Notification Server, you should create
discard rules to remove redundant alerts. You can configure multiple conditions for
the incoming alerts that the system should discard.
See About alerts on page 85.
See Creating an alert matching rule on page 90.
Filtered alerts are not stored in the alert database, and are unavailable when reports
are generated. If you want to store alerts but do not want to display them in the
Event Console, hide them instead.
See Hiding resolved alerts on page 89.
To add or edit a rule to discard an alert
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
3 On the Alert Rule Settings page, on the Discarding Rules tab, on the toolbar,
click Add.
4 In the right pane, under Rule, define the matching conditions and the workflow
to run when a matching alert is received.
5 Enable the rule.
At the upper right of the page, click the colored circle, and then click On.
6 Click Save.
Forwarding alerts to another management system
Alerts can be forwarded as SNMP traps to other management systems.
91 Using alert management
Adding or editing rules to discard alerts
To forward alerts to another management system
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
3 On the Alert Rule Settings page, click the Forwarding Rules tab, and then,
on the toolbar, click Add.
See Creating an alert matching rule on page 90.
4 In the right pane, define the matching conditions, and add the IP address or
host name of the management system where the alerts that match the rule
should be forwarded.
5 Enable the rule.
At the upper right of the page, click the colored circle, and then click On.
6 Click Save.
Running a task in response to an alert
Event console can perform a task server task in response to a received alert.
A single alert can trigger multiple, independent tasks. If you need to performmultiple
tasks in order, you can combine these tasks into a job.
See Creating an alert matching rule on page 90.
Running a task in response to an alert
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
3 On the Alert Rule Settings page, click the Task Rules tab, and then, on the
toolbar, click Add.
4 On the Alert Rule Settings page, in the right pane, configure the newly created
rule.
You can create a new task, or use an existing one.
5 Enable the rule.
At the upper right of the page, click the colored circle, and then click On.
6 Click Save.
92 Using alert management
Running a task in response to an alert
About Event Console tokens
Event Console tokens provide information when a task is executed in response to
a received alert. When a task is executed, the Event Console tokens are replaced
with readable values.
Note: Every solution has specific tokens that you can use to create a task for that
solution. However, Event Console only resolves tokens to readable values in
response to alerts from the tasks that were created using Event Console tokens.
See Running a task in response to an alert on page 92.
For example, if you have a Monitor task that was created using Monitor tokens, you
can assign it to Event Console. However, when Event Console receives an alert
from that task, it cannot translate the tokens or generate readable values. Instead,
the Monitor token returns its literal value rather than a readable value.
Table 10-1 Readable values that are associated with the Event Console tokens
Description Event Console tokens
The GUID of the alert category. %!ALERTCATEGORYGUID!%
The GUID of the alert definition. %!ALERTDEFINITIONGUID!%
The GUID of the alert. %!ALERTGUID!%
The host name or IP address of the resource
that raised the alert.
%!ALERTHOSTNAME!%
The message text of the alert. %!ALERTMESSAGE!%
The GUID of the product (in the case of a
solution) that raised the alert.
%!ALERTPRODUCTGUID!%
The GUID of the protocol that raised the alert. %!ALERTPROTOCOLGUID!%
The GUID of the NS resource that raised the
alert.
%!ALERTRESOURCEGUID!%
93 Using alert management
About Event Console tokens
Table 10-1 Readable values that are associated with the Event Console tokens
(continued)
Description Event Console tokens
The enumeration value which represents the
severity of the alert.
Critical = 50
Major = 40
Warning = 30
Informational = 20
Undetermined = 10
Normal = 0
%!ALERTSEVERITYLEVEL!%
The date and time the alert was raised. %!ALERTTIMESTAMP!%
The variable name. Each variable fromthe alert
is passed where "variable_name" is the name
of the variable and the value is the variable
value string.
%!ALERTVARIABLE!%
Configuring workflow rules
Event Console provides a complete list of available, deployed workflows, and
specifies which workflow entry points are designed to be launched by process.
Workflow rules let you forward received alerts into a deployed workflow. All
information about alerts and their variables is passed into the workflow.
See Creating an alert matching rule on page 90.
You can enable and disable, edit or delete existing workflow rules, or create new
ones.
The Event Console Workflow Rules tab offers the following rule conditions:
Table 10-2 Workflow rule conditions
Description Condition
The event category.
This field lets Event Console determine if a workflow rule calls the
entry point, by design. Once complete, only the rules that are in
the Process Start category appear in the workflow selection
drop-down list.
Category
94 Using alert management
Configuring workflow rules
Table 10-2 Workflow rule conditions (continued)
Description Condition
The number of deduplicated alerts received (within a period of
time).
Count
The date on which the event occurred. Date
The day of the week on which the event occurred. Day of week
The specific event type name. Definition
The name or IP address of the resource. Host name
The event description text. Message
The event-reporting product source. Product
The protocol that is used to report the event. Protocol
The managed or unmanaged resource. Resource
The resource belonging to a specified group. Resource target
The severity level of the event. Severity
The time of day at which the event occurred. Time of day
All name data pairs or value data pairs that are provided in the
event details.
Alert variable
To configure workflow rules
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Alert Rule Settings.
See Configuring alert rule settings on page 89.
3 On the Alert Rule Settings page, click the Workflow Rules tab, and then, on
the toolbar, click Add to create a new alert matching rule.
See Creating an alert matching rule on page 90.
4 In the right pane, under Rule, on the toolbar, click Add to create a new rule,
or click a rule that you want to edit.
95 Using alert management
Configuring workflow rules
5 In the right pane, under Rule, define the matching conditions for a new rule,
or edit the conditions for an existing rule.
Define the workflow to run when a matching alert is received.
6 Enable the rule.
At the upper right of the page, click the colored circle, and then click On.
7 Click Save.
Configuring alert purging settings
Alert purging is a feature of Event Console that removes alerts from the database.
Age-based purging removes all alerts that are older than the specified number of
days, which is calculated in 24-hour periods from the current time. Age-based
purging removes old alerts regardless of their status or severity.
Alert purging also lets you remove a selected number of stored alerts and offers
the enhanced function of purging unresolved alerts.
Target-number purging decreases the number of stored alerts by prioritizing the
alerts that are based on age, status, and severity. When a target-number purge
occurs, all resolved alerts that are older than the purge age are deleted first, from
the least to the most severe. As soon as the number of stored alerts is less than
the threshold, purging stops.
The unresolved alerts are not purged by default. If the threshold has not been
reached when the purging is complete and you have unchecked Do not purge
unresolved alerts, unresolved alerts begin auto-resolving. Auto-resolved alerts
are purged. If you checko Do not purge unresolved alerts, then the purging is
completed even if the threshold has not been met.
This purging process continues on the alerts that are newer than the specified purge
age. Purging continues as long as needed to bring the number of alerts to less than
the threshold. The system purges alerts by severity. Purging occurs in groups, not
individually.
To remove all the alerts from your database, you first uncheck Do not purge
unresolved alerts. Then, you either set the target number of alerts to purge to zero
(0) or set the age to zero days old for purging.
You should purge alerts periodically to maintain database performance.
96 Using alert management
Configuring alert purging settings
To configure alert purging settings
1 In the Symantec Management Console, on the Settings menu, click All
Settings.
2 In the left pane, under Settings, expand Monitoring and Alerting, and then
click Event Console Purging Maintenance.
3 On the Event Console Purging Maintenance page, check and configure the
purge method that you want to use.
4 Click Save changes.
Viewing alerts by network location
The topology viewer in Symantec Management Console provides a visual
representation of your network layout. Each resource in the topology viewer displays
an aggregate health status that is based on the highest severity alert. This health
status lets you viewdifferent segments of your network and track the health of each
device on that segment.
The topology viewer is installed as part of Server Management Suite.
See About alerts on page 85.
To view alerts by network location
1 In Symantec Management Console, on the Home menu, click Server
Management Suite Portal.
2 On the Server Management Portal page, navigate to the Topology View -
Layer 2 network topology data Web part.
3 On the toolbar, click Select device, and then choose the device to view the
network topology for.
Viewing the health of an organizational group
The group view in Symantec Management Console shows the aggregate health of
the devices and computers in your organizational groups. If a device is not managed,
alerts are not included when group health is displayed.
The group view is installed as part of Server Management Suite.
See About alerts on page 85.
97 Using alert management
Viewing alerts by network location
To view the health of an organizational group
1 In Symantec Management Console, on the Home menu, click Server
Management Suite Portal.
2 On the Server Management Portal page, navigate to the Group View -
Aggregate health by resource Web part.
3 On the toolbar, in the Select Group drop-down list, choose a group of
resources.
Creating and editing Event Console tasks
You can create, modify, and delete Event Console tasks from a single location.
To create and edit Event Console tasks
1 In Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2 In the left pane, under Jobs and Tasks, expand System Jobs and Tasks >
Monitoring and Alerting, right-click Event Console Tasks, and then click
New > Task.
3 In the Create New Task dialog box, in the left pane, under Monitoring and
Alerting, expand Event Console.
Here, you can create the following tasks:
Change Alert Status Task.
Create Resource Task.
Event Console Purge Policy Task.
Raise Message Task.
Reprioritize Alert Task.
98 Using alert management
Creating and editing Event Console tasks
A
agent-based monitor policies
editing 47
agent-based monitoring
preparing computers 28
agentless monitoring 11
about 35
agentless-based monitoring
network discovery 36
Alert Filter Settings page 88
alert filters
creating 88
saving 88
alert management
about 85
alert matching rule
creating 90
Alert Rule Settings page 89
alerts
about 85
forwarding 91
forwarding to another management system 91
running a task 92
viewing 97
application detection
about 48
application detection types 50
C
client tokens
types 77
context-sensitive help 16
D
database maintenance
about 21
documentation 16
E
Event Console
token types 93
Event Console alert filters
about 86
Event Console tasks
working 98
Event Console tokens
about 93
types 93
H
heartbeat
about 23
heartbeat settings
setting up 24
help
context-sensitive 16
historical performance data
viewing 81
historical performance viewer 11
I
import policy
creating 20
M
metric evaluation
about 61
metrics
about 53
creating 55
editing 55
monitor actions
about 67
Monitor Pack for Servers
about 14
monitor packs 14
monitor policies 14
Index
monitor packs 11, 14
importing 20
Monitor Plug-in 11
about 26
configuration policies 33
configuring settings 33
creating settings 32
installing 29
policies 26
profiling 27
uninstalling 31
upgrading 30
Monitor Plug-in settings
configuring 33
creating 32
monitor policies 11
about 27
adding actions 75
adding application detection 48
adding computers 51
adding rules 47
creating 46
creating with the wizard 44
monitor server
configuring 19
preparing 19
monitor server's heartbeat settings
setting up 24
monitor service
about 36
adding to a site server 41
removing from a site server 40
monitor site server
configuring settings 42
reports 43
Monitor Solution
about 10
components 11
monitor tasks
about 67
Monitoring and Alerting
home page 80
Monitoring and Alerting home page
about 80
multiple instance metrics
about 57
O
organizational group
viewing health 97
P
performance data
maintaining 22
Pluggable Protocols Architecture
installing 39
PPA. See Pluggable Protocols Architecture
purging alerts
about 96
R
real-time performance data
viewing 82
real-time performance viewer 11
Release Notes 16
Remote Monitoring Server
configuring 42
remote monitoring site server
setting up 37
resolved alerts
hiding 89
rules
about 58
adding actions 74
adding metric 56
creating 60
editing 60
rules to discard alerts
adding 91
editing 91
S
Send Email task
adding tokens 73
server tokens
types 77
severity states
about 72
W
workflow rule configuration
about 94
workflow rules
adding 94
100 Index
workflow rules (continued)
configuration 94
editing 94
101 Index
Aggregation input-output
matrix
This appendix includes the following topics:
Aggregation input-output matrix
Aggregation input-output matrix
A rule condition can evaluate multiple metrics, for multiple instances at the same
time. Every metric condition instance, which meets the specified value can trigger
a client or server action and raise an alert.
See About metric and rule aggregation on page 62.
See Using aggregation to monitor potential hard drive issue on page 64.
The tables below lists the outcomes for all the possible input aggregation settings.
The combinations of input aggregation settings are as follows:
Rule aggregation using Or operator with disabled metric aggregation.
See Table A-1 on page 103.
Rule aggregation using And operator with disabled metric aggregation.
See Table A-2 on page 103.
Rule aggregation using And operator with enabled metric aggregation.
See Table A-3 on page 104.
Rule aggregation using Or operator with enabled metric aggregation.
See Table A-4 on page 105.
A
Appendix
Table A-1 Rule aggregationusing Or operator withdisabledmetric aggregation
Evaluation result
Rule
Metric
2
Metric
1
Metric 2 Metric 1
Instance 2 Instance
1
Instance 2 Instance 1 Instance 2 Instance
1
False False Or No No 0 0 0 0
True False Or No No 1 0 0 0
False True Or No No 0 1 0 0
True True Or No No 1 1 0 0
True False Or No No 0 0 1 0
True False Or No No 1 0 1 0
True True Or No No 0 1 1 0
True True Or No No 1 1 1 0
False True Or No No 0 0 0 1
True True Or No No 1 0 0 1
False True Or No No 0 1 0 1
True True Or No No 1 1 0 1
True True Or No No 0 0 1 1
True True Or No No 1 0 1 1
True True Or No No 0 1 1 1
True True Or No No 1 1 1 1
Table A-2 Rule aggregation using And operator with disabled metric
aggregation
Evaluation result Rule Metric
2
Metric
1
Metric 2 Metric 1
Instance 2 Instance
1
Instance 2 Instance 1 Instance 2 Instance
1
False False And No No 0 0 0 0
False False And No No 1 0 0 0
False False And No No 0 1 0 0
103 Aggregation input-output matrix
Aggregation input-output matrix
Table A-2 Rule aggregation using And operator with disabled metric
aggregation (continued)
Evaluation result Rule Metric
2
Metric
1
Metric 2 Metric 1
Instance 2 Instance
1
Instance 2 Instance 1 Instance 2 Instance
1
False False And No No 1 1 0 0
False False And No No 0 0 1 0
True False And No No 1 0 1 0
False False And No No 0 1 1 0
True False And No No 1 1 1 0
False False And No No 0 0 0 1
False False And No No 1 0 0 1
False True And No No 0 1 0 1
False True And No No 1 1 0 1
False False And No No 0 0 1 1
True False And No No 1 0 1 1
False True And No No 0 1 1 1
True True And No No 1 1 1 1
Table A-3 Rule aggregation using And operator with enabled metric
aggregation
Evaluation
result
Rule Metric 2 Metric 1 Metric 2 Metric 1
Instance 2 Instance 1 Instance 2 Instance
1
False And All Any 0 0 0 0
False And All Any 1 0 0 0
False And All Any 0 1 0 0
False And All Any 1 1 0 0
False And All Any 0 0 1 0
104 Aggregation input-output matrix
Aggregation input-output matrix
Table A-3 Rule aggregation using And operator with enabled metric
aggregation (continued)
Evaluation
result
Rule Metric 2 Metric 1 Metric 2 Metric 1
Instance 2 Instance 1 Instance 2 Instance
1
False And All Any 1 0 1 0
False And All Any 0 1 1 0
True And All Any 1 1 1 0
False And All Any 0 0 0 1
False And All Any 1 0 0 1
False And All Any 0 1 0 1
True And All Any 1 1 0 1
False And All Any 0 0 1 1
False And All Any 1 0 1 1
False And All Any 0 1 1 1
True And All Any 1 1 1 1
Table A-4 Rule aggregation using Or operator with enabled metric aggregation
Evaluation
result
Rule Metric 2 Metric 1 Metric 2 Metric 1
Instance 2 Instance 1 Instance 2 Instance
1
False Or Any All 0 0 0 0
True Or Any All 1 0 0 0
True Or Any All 0 1 0 0
True Or Any All 1 1 0 0
False Or Any All 0 0 1 0
True Or Any All 1 0 1 0
True Or Any All 0 1 1 0
True Or Any All 1 1 1 0
105 Aggregation input-output matrix
Aggregation input-output matrix
Table A-4 Rule aggregation using Or operator with enabled metric aggregation
(continued)
Evaluation
result
Rule Metric 2 Metric 1 Metric 2 Metric 1
Instance 2 Instance 1 Instance 2 Instance
1
False Or Any All 0 0 0 1
True Or Any All 1 0 0 1
True Or Any All 0 1 0 1
True Or Any All 1 1 0 1
True Or Any All 0 0 1 1
True Or Any All 1 0 1 1
True Or Any All 0 1 1 1
True Or Any All 1 1 1 1
106 Aggregation input-output matrix
Aggregation input-output matrix
AltirisMonitor Solutionfor
Servers 7.5 Symantec
Third-Party Legal Notices
This appendix includes the following topics:
Third-Party Legal Attributions
Expat XML Parser v2.0.1
Net-SNMP v 5.4.1
RegExp
Third-Party Legal Attributions
This Symantec product may contain third party software for which Symantec is
required to provide attribution (Third Party Programs). Some of the Third Party
Programs are available under open source or free software licenses. The License
Agreement accompanying the Software does not alter any rights or obligations you
may have under those open source or free software licenses. This appendix contains
proprietary notices for the Third Party Programs and the licenses for the Third Party
Programs, where applicable.
Expat XML Parser v2.0.1
Copyright (c) Fabasoft R&DSoftware GmbH& Co KG, 2003 Copyright 1989, 1991,
1992 by Carnegie Mellon University Derivative Work - 1996, 1998-2000 Copyright
1996, 1998-2000 The Regents of the University of California. All Rights Reserved
Copyright (c) 2001-2003, Networks Associates Technology, Inc. All rights reserved.
B
Appendix
MIT License
This code is licensed under the license terms below, granted by the copyright holder
listed above. The term copyright holder in the license below means the copyright
holder listed above.
Copyright (c) <year> <copyright holders>
Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the "Software"), to deal in the Software
without restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, sublicense, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITEDTOTHE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT
HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
OTHER DEALINGS IN THE SOFTWARE.
Net-SNMP v 5.4.1
Copyright 1989, 1991, 1992 by Carnegie Mellon University
Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California
All Rights Reserved
Copyright (c) 2001-2003, Networks Associates Technology, Inc
All rights reserved.
Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Copyright 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
California 95054, U.S.A. All rights reserved.
Copyright (c) 2003-2008, Sparta, Inc
All rights reserved.
108 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University
of Posts and Telecommunications.
All rights reserved.
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003
[email protected]
Author: Bernhard Penz [[email protected]]
Various copyrights apply to this package, listed in various separate parts below.
Please make sure that you read all the parts.
---- Part 1: CMU/UCD copyright notice: (BSD like) -----
Copyright 1989, 1991, 1992 by Carnegie Mellon University
Derivative Work - 1996, 1998-2000
Copyright 1996, 1998-2000 The Regents of the University of California
All Rights Reserved
Permission to use, copy, modify and distribute this software and its documentation
for any purpose and without fee is hereby granted, provided that the above copyright
notice appears in all copies and that both that copyright notice and this permission
notice appear in supporting documentation, and that the name of CMU and The
Regents of the University of California not be used in advertising or publicity
pertaining to distribution of the software without specific written permission.
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM
ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT
SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE
LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA
OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
OTHERTORTIOUSACTION, ARISINGOUT OF ORINCONNECTIONWITHTHE
USE OR PERFORMANCE OF THIS SOFTWARE.
---- Part 2: Networks Associates Technology, Inc copyright notice (BSD) -----
Copyright (c) 2001-2003, Networks Associates Technology, Inc
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
109 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of the Networks Associates Technology, Inc nor the names
of its contributors may be used to endorse or promote products derived from
this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 3: Cambridge Broadband Ltd. copyright notice (BSD) -----
Portions of this code are copyright (c) 2001-2003, Cambridge Broadband Ltd.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
The name of Cambridge Broadband Ltd. may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
110 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 4: Sun Microsystems, Inc. copyright notice (BSD) -----
Copyright 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
California 95054, U.S.A. All rights reserved.
Use is subject to license terms below.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered
trademarks of Sun Microsystems, Inc. in the U.S. and other countries.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of the Sun Microsystems, Inc. nor the names of its contributors
may be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 5: Sparta, Inc copyright notice (BSD) -----
Copyright (c) 2003-2008, Sparta, Inc
All rights reserved.
111 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of Sparta, Inc nor the names of its contributors may be used
to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 6: Cisco/BUPTNIC copyright notice (BSD) -----
Copyright (c) 2004, Cisco, Inc and Information Network Center of Beijing University
of Posts and Telecommunications.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of Cisco, Inc, Beijing University of Posts and
Telecommunications, nor the names of their contributors may be used to endorse
or promote products derived from this software without specific prior written
permission.
112 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
---- Part 7: Fabasoft R&D Software GmbH & Co KG copyright notice (BSD) -----
Copyright (c) Fabasoft R&D Software GmbH & Co KG, 2003
[email protected]
Author: Bernhard Penz [email protected]
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list
of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries,
brand or product names may not be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER "AS IS" AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
LOSSOFUSE, DATA, ORPROFITS; ORBUSINESSINTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
113 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
Net-SNMP v 5.4.1
RegExp
Copyright (c) 1986 by University of Toronto. Written by Henry Spencer. Not derived
from licensed software.
RegExp License
// In case this isn't obvious from the later comments this is an ALTERED
// version of the software. If you like my changes then cool, but nearly
// all of the functionality here is derived from Henry Spencer's original
// work.
//
// This code should work correctly under both _SBCS and _UNICODE, I did
// start working on making it work with _MBCS but gave up after a while
// since I don't need this particular port and it's not going to be as
// straight forward as the other two.
//
// used everywhere. Certainly it's doable, but it's a pain.
// What's worse is that the current code will compile and run under _MBCS,
// only breaking when it gets wide characters thrown against it.
//
// I've marked at least one bit of code with #pragma messages, I may not
// get all of them, but they should be a start
//
// Guy Gascoigne - Piggford ([email protected]) Friday, February 27, 1998
// regcomp and regexec -- regsub and regerror are elsewhere
// @(#)regexp.c 1.3 of 18 April 87
//
// Copyright (c) 1986 by University of Toronto.
// Written by Henry Spencer. Not derived from licensed software.
// Permission is granted to anyone to use this software for any
// purpose on any computer system, and to redistribute it freely,
// subject to the following restrictions:
114 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
RegExp
//
// 1. The author is not responsible for the consequences of use of
// this software, no matter how awful, even if they arise
// from defects in it.
//
// 2. The origin of this software must not be misrepresented, either
// by explicit claim or by omission.
//
// 3. Altered versions must be plainly marked as such, and must not
// be misrepresented as being the original software.
// *** THIS IS AN ALTERED VERSION. It was altered by John Gilmore,
// *** hoptoad!gnu, on 27 Dec 1986, to add and for word-matching
// *** as in BSD grep and ex.
// *** THIS IS AN ALTERED VERSION. It was altered by John Gilmore,
// *** hoptoad!gnu, on 28 Dec 1986, to optimize characters quoted with \.
// *** THIS IS AN ALTERED VERSION. It was altered by James A. Woods,
// *** ames!jaw, on 19 June 1987, to quash a regcomp() redundancy.
// *** THIS IS AN ALTERED VERSION. It was altered by Geoffrey Noer,
// *** THIS IS AN ALTERED VERSION. It was altered by Guy Gascoigne - Piggford
// *** [email protected], on 15 March 1998, porting it to C++ and converting
// *** it to be the engine for the CRegexp class
//
// Beware that some of this code is subtly aware of the way operator
// precedence is structured in regular expressions. Serious changes in
// regular-expression syntax might require a total rethink.
115 Altiris Monitor Solution for Servers 7.5 Symantec Third-Party Legal Notices
RegExp