BSM 9.25 Platform Administration
BSM 9.25 Platform Administration
BSM 9.25 Platform Administration
Legal Notices
Warranty
The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
The information contained herein is subject to change without notice.
Copyright Notice
Copyright 2005-2015 Hewlett-Packard Development Company, L.P.
Trademark Notices
Adobe and Acrobat are trademarks of Adobe Systems Incorporated.
AMD and the AMD Arrow symbol are trademarks of Advanced Micro Devices, Inc.
Google and Google Maps are trademarks of Google Inc.
Intel, Itanium, Pentium, and Intel Xeon are trademarks of Intel Corporation in the U.S. and other countries.
iPod is a trademark of Apple Computer, Inc.
Java is a registered trademark of Oracle and/or its affiliates.
Microsoft, Windows, Windows NT, Windows XP, and Windows Vista are U.S. registered trademarks of Microsoft Corporation.
Oracle is a registered trademark of Oracle Corporation and/or its affiliates.
UNIX is a registered trademark of The Open Group.
Documentation Updates
The title page of this document contains the following identifying information:
l
l
l
To check for recent updates or to verify that you are using the most recent edition of a document, go to: https://softwaresupport.hp.com/group/softwaresupport/searchresult?keyword=.
This site requires an HP Passport account. If you do not have one, click the Create an account button on the HP Passport Sign in page.
Support
Visit the HP Software Support web site at: https://softwaresupport.hp.com
This web site provides contact information and details about the products, services, and support that HP Software offers.
HP Software Support provides customer self-solve capabilities. It provides a fast and efficient way to access interactive technical support tools needed to manage your
business. As a valued support customer, you can benefit by using the support web site to:
l
l
Page 2 of 399
l
l
l
l
l
l
Most of the support areas require that you register as an HP Passport user and sign in. Many also require a support contract. To register for an HP Passport ID, go to
https://softwaresupport.hp.com and click Register.
To find more information about access levels, go to: https://softwaresupport.hp.com/web/softwaresupport/access-levels
Page 3 of 399
Contents
Platform Administration Overview
10
12
13
21
24
25
29
37
40
41
42
45
48
54
Creating Databases
55
63
69
76
77
79
81
81
82
82
82
83
91
93
Page 4 of 399
99
104
105
107
112
129
131
141
142
158
161
169
170
172
173
174
178
179
180
183
187
188
191
Permissions
193
195
Roles
197
Operations
198
Security Officer
198
199
201
205
212
How to Export and Import User Information Using the JMX Console
215
217
Superuser
217
Administrator
217
Page 5 of 399
System Modifier
225
System Viewer
229
Customer Superuser
232
Customer Administrator
237
BPM Viewer
242
BPM Administrator
243
RUM Administrator
243
RUM Viewer
243
244
248
267
267
267
Roles Tab
270
Operations Tab
271
272
273
275
275
283
289
297
300
303
303
307
307
308
309
309
312
314
315
318
323
Synchronizing Users
327
333
334
Page 6 of 399
334
335
336
340
341
343
344
345
345
349
357
Alert Logs
358
360
362
363
363
363
364
364
364
369
372
373
Properties Page
386
387
Scheduling Page
387
Action Page
389
Notification Page
391
Preview Page
391
Part 7: Troubleshooting
Chapter 38: Troubleshooting and Limitations
392
393
399
Page 7 of 399
Accessing and Navigating BSM. Describes how to start BSM, how to log into the application,
and a general overview of the user interface.
Setup and Maintenance. Describes basic setup options such as infrastructure settings, time
zones, languages, logs, and backups.
Data Enrichment. This part has the following sections:
n
Content Packs. Describes how to define objects or CIs included in content packs monitored by
BSM.
Users, Permissions, and Recipients. Describes how to control user access to BSM.
Reports and Alerts Administration. Describes how to schedule reports and set up alerts.
Page 8 of 399
Page 9 of 399
Tasks
How to Start, Stop, or Restart BSM
To start or stop BSM in Windows:
Select Start > Programs > HP Business Service Management > Administration > Enable |
Disable Business Service Management.
To start, stop, or restart BSM in Linux:
/opt/HP/BSM/scripts/run_hpbsm <start | stop | restart>
To start, stop, or restart BSM using a Daemon Script: (in Linux)
/etc/init.d/hpbsmd <start | stop | restart>
Note: When you stop BSM in Windows, the HP Business Service Management service is not
removed from Microsofts Services window. The BSM service is removed from the Services
window only after you uninstall BSM.
UI Description
Windows Start Menu
In a Windows environment, the installation process adds an HP Business Service Management menu
to the Windows Start Menu.
Page 10 of 399
Description
Page 11 of 399
Tasks
How to View the Status of Processes and Services
In Windows:
Select Start > Programs > HP Business Service Management > Administration > HP Business
Service Management Status.
In Linux:
Enter the following command: opt/HP/BSM/tools/bsmstatus/bsmstatus.sh
From a remote computer:
In a web browser enter the following URL:
http://<server-name>:8080/myStatus/myStatus.html
The JBoss application server must be running to enable viewing the status of the processes and
services from a remote computer.
If JMX-RMI with basic authentication over SSL was set up using the SYSTEM user in Window or
Linux, the processes and services status page does not display any data. For details on configuring
JMX-RMI with basic authentication over SSL, see Securing JMX-RMI Channel Used for Internal
BSM Communications in the BSM Hardening Guide.
Page 12 of 399
Learn About
Accessing BSM
You can access BSM using a supported web browser, from any computer with a network connection
(intranet or Internet) to the BSM servers.
The level of access granted to a user depends on the user's permissions. For more information, see
"Permissions" on page193.
By default, BSM is configured with Lightweight Single Sign-On (LW-SSO). For more information, see
"Logging into BSM with LW-SSO" on page21.
The following table provides information on how to access BSM based on BSM's LDAP configuration.
User login
APIs/REST
No LDAP only
internal users
No LDAP field.
No LDAP field.
Mixed mode
with one LDAP
No LDAP field.
Page 13 of 399
Several LDAPs
with mixed
mode
User login
APIs/REST
Requirements
For details on browser requirements, as well as minimum requirements to view BSM, see the BSM
System Requirements and Support Matrixes guide.
Tasks
This section includes:
l
Page 14 of 399
Caution: We recommend that the system superuser change this password upon first login to
prevent unauthorized entry. For details on changing the user password, see "Personal
Settings" on page289. The login name cannot be changed.
After you log in, your login name appears at the top right of the page, under the top menu bar.
Note: If Lightweight Single Sign-On (LW-SSO) is disabled, you do not need to add the .<domain_
name> syntax in the login URL. For information on LW-SSO, see "Logging into BSM with LWSSO" on page21.
Days to
Sets the number of days that users can log in automatically without entering a user
remember name and password. The default value is 14.
login
Page 15 of 399
Option
Enable
automatic
login
If this option is set to true, the Remember my login name and password check
box appears in the Login page. Selecting this check box in the Login page enables
the user to log in without opening the Login page when next accessing BSM. For
details see "How to Enable Automatic Login" on the previous page.
If this option is set to false, users cannot bypass the Login page and will always
need to enter a user name and password when opening BSM. The default value is
true.
Maximum
machines
per login
name
Sets the number of machines that can simultaneously access BSM using the
same login name. The default value is 0 which means that the number of logins is
unlimited.
You can also create a URL to access BSM using the Link to This Page window. For further information,
see "Creating a Link to a BSM Page" on page25.
Page 16 of 399
Note: Clicking Logout cancels the Automatic Login option. If a user logs out, the next time the
user logs in, the Login page will open and the user will need to enter a login name and password.
This can be useful if another user needs to log in on the same machine using a different user name
and password.
UI Description
BSM Login Page
User interface elements are described below:
UI Element (A-Z)
Description
LDAP domain
Login Name
Password
Remember my login
name and password for
14 days
Select this option to bypass the Login page the next time you open
BSM. For further information, see "How to Enable Automatic Login" on
page15.
Tips/Troubleshooting
Login Troubleshooting
To resolve login issues, reference the possible login failure causes in the following table using the error
number shown in the error alert dialog box. For additional troubleshooting information, refer to the HP
Software Self-solve Knowledge Base.
Page 17 of 399
Error
No.
Problem/Possible Cause(s)
LI001 BSM failed to connect to the JBoss
application server running on the
Gateway Server. This may be due to:
l
Solution(s)
Solution 1: Close all applications on the Gateway
Server machine and restart the machine.
Solution 2: Ensure that there are no other running
applications on the Gateway Server machine that
use this port (for example, applications that run
from the Startup directory, another instance of
JBoss, an MSDE or Microsoft SQL Server, or any
other process).
Restart BSM.
Page 18 of 399
Error
No.
Problem/Possible Cause(s)
Solution(s)
Page 19 of 399
Error
No.
Problem/Possible Cause(s)
Solution(s)
Forgot Password
To reset your password, contact your system administrator.
For information about assigning passwords, see "Configure BSM Users" on page188 and "Define a
Superuser" on page188.
Page 20 of 399
Learn About
Working with LW-SSO
By default, BSM is configured with Lightweight Single Sign-On (LW-SSO). With LW-SSO, once you log
in to BSM you automatically have access to other configured applications, without needing to log into
those applications.
When LW-SSO Authentication Support is enabled, you must ensure that the other applications in the
Single Sign-On environment have LW-SSO enabled and are working with the same initString. If the
applications are in different domains, the domains must be trusted domains.
Disabling LW-SSO
If you do not require Single Sign-On for BSM, it is recommended that you disable LW-SSO. You can
disable LW-SSO using the SSO Configuration Wizard. For information on how to disable LW-SSO
using the SSO Configuration Wizard, see "How to Disable LW-SSO" on the next page.
Page 21 of 399
The external authentication point is an external URL that performs the actual user authentication. It
obtains the user credentials (usually the user name and password, but it could be something else, such
as the user's class-B certificate, or a proprietary SSO token), validates these credentials, and then
creates an "authentication assertion", a token that states who the authenticated user is. The
authentication assertion usually also provides information about how the user was authenticated.
For information about configuring an external authentication point for secure access to BSM, see
"LDAP General Configuration Page" on page303.
Tasks
How to Disable LW-SSO
1. Select Admin > Platform > Users and Permissions > Authentication Management, and
click Configure.
2. Select Disable to disable SSO.
Page 22 of 399
Tips/Troubleshooting
BSM Login Page Appears after Entering Valid Client Certificate
If the BSM Login page appears after entering a valid client certificate, test the following:
l
SSL Limitation
After configuring the JMX console to work with SSL, it is not possible to access the \<BSM root
directory>\AppServer\webapps\myStatus.war\myStatus.html page to view the availability of BSM.
Unable to Login
If LDAP is configured and you are unable to login:
1. In the JMX Agent View, under the domain name Foundations, click service=users-remoterepository.
2. Locate void disabledLDAPConfiguration() and invoke it to disable all LDAP configurations.
Page 23 of 399
Page 24 of 399
To access
Select Admin > Link to this page.
Learn About
Overview
Depending on which Link to this page option you select, the receiver can access a BSM page using
one of the following:
l
Page 25 of 399
Third-party Portals
To view Service Health or MyBSM pages in a third-party portal, select the Embedded link check box
in the Link to this page window. When the user accesses the generated URL, only the specific page
is displayed, and not the entire BSM application with menus.
Note: In a third-party portal, only one Service Health or MyBSM page can be embedded in each
portal page. If you need to see more information, create a page that uses multiple or tabbed
components. For details, see "How to Set Up the MyBSM Workspace" on page 1 in the BSM User
Guide.
Tasks
How to Create and Send a Link to a User
1. Access the BSM page whose link you want to send to a user.
Page 26 of 399
To create a link with no user name or password, click No credentials. Users will need to enter
their own user name and password.
To create a link with your user name and password, click My credentials.
To create a link with another user's user name and password, click User credentials and in the
login name and password fields, enter a user name and password of a BSM user.
UI Description
Link to This Page Window
User interface elements are described below:
UI
Element
(A-Z)
Description
Cancel
Create link
Creates the URL of the current BSM page. The user enters this URL in their browser
and the specified BSM page is displayed.
Note: If you select this option after selecting No credentials or Use credentials (to
use credentials other than your own) and you want to invoke the login URL on the
same local machine you created it on, you must first log out of BSM.
Confirm
password
Copy to
clipboard
Copies the content of the Link field to the clipboard. This button is only available after
you click Create Link.
Note: If you use the Firefox browser, you must change your security settings for this
option to work. Enter about:config in the browser's search window, locate the
signed.applets.codebase_principal_support option, and set it to true.
Page 27 of 399
UI
Element
(A-Z)
Description
Embedded
link
Generate
HTML
Link
Displays the URL that the receiver uses to access the specified BSM page.
Select this check box to create a URL which can be used in a third-party portal, so that
only the specific page is displayed, and not the entire BSM application with menus.
Note: If you select this option after selecting No credentials or Use credentials (to
use credentials other than your own) and you want to log in using the generated HTML
page on the same local machine you created it on, you must first log out of BSM.
The login user name to be encrypted in the URL the receiver uses to access the
specified page. This must be the user name of an actual user.
My
Select to encrypt the link with your user name and password.
credentials
No
Select if receivers need to use their own user name and password to access the page
credentials specified in the link.
Password
The password to be encrypted in the URL that the receiver uses to access the
specified page. This must be the password of an actual user.
Use
Select to encrypt the link with the login user name and password of another user.
credentials
Page 28 of 399
Learn About
Site Map
The Site Map enables quick access to all top- and second-level contexts in the Applications or
Administration menu. By default, the Site Map is the first page that opens after logging into BSM.You
can also access the Site Map by clicking the Site Map link on the menu bar.
The menu bar enables navigation to the applications, Administration Console pages, help resources,
and a link to the Site Map. For more information, see "UI Description" on page32.
Tabs
Tabs enable navigation to various contexts within a particular area of BSM, such as to different types of
reports within an application, views within a report, or administrative functions within the Administration
Console. In certain contexts, tabs are used to distinguish between functions; in other contexts, tabs
are used to group logically similar functions or features together.
The tab main menus enable navigation from a tab front page to various contexts related to the tab. Tab
main menus appear when selecting a tab that represents a category containing several contexts, such
Page 29 of 399
as report types or administrative settings. Tab main menus include a description and thumbnail image
of each tab context.
Tab controls enable you to navigate from any context related to a tab to any other of the tab's contexts.
To open the tab main menu, click the tab name.
To quickly jump to another context related to the tab, click the down arrow
menu and click a tab menu option to move to that context.
Navigation Buttons
The forward and back buttons,
, positioned in the upper left corner of the window, enable
you to navigate between viewed pages. You can go back to your most recently viewed page or forward
to the page you viewed before you clicked the back button.
Clicking the down arrow adjacent to the forward and back buttons, displays a list of the last 20 pages
that you viewed during the current session. You can click any one of these links to display the desired
page.
The pages are stored in the BSM server. For all reports, if you return to a previously viewed page, the
page opens exactly as you left it with the filters and conditions selected as previously.
There are several pages whose contexts and selections are not saved as previously viewed and when
you return to that page, you may have to make your selections again. For example, if you were working
in a specific context in Infrastructure Settings and return to the Infrastructure Settings page using the
Page 30 of 399
history option, your context has not been saved and you are returned to the default Infrastructure
Settings page.
Tip: You can change the number of pages stored in history (default is 20) by accessing the file
<HPBSM GW root directory>\conf\settings\website.xml and changing the value of the
history.max.saved.pages field. You must restart BSM for the change to take affect. This change
is on the server and, therefore, affects all users.
Breadcrumbs
Breadcrumbs enable you to keep track of your location within the active application. They provide links
back to each page you navigated through to get to the current page.
You can view previous pages within a multi-level context by clicking one of the links in the breadcrumb.
For example, in the following breadcrumb trail, you would click Breakdown Summary to return to the
Breakdown Summary report:
If the breadcrumb is longer than the width of the screen, only the tail of the breadcrumb is displayed.
Click the View
the current tab.
icon to the left of the breadcrumb to display the hidden portion of the breadcrumb in
Tip: The web browser Back function is not supported in BSM. Using the Back function does not
always revert the current context to the previous context. To navigate to a previous context, use
the navigation buttons within BSM or the breadcrumb function.
Tasks
How to Access Full Screen View
Note: When selecting Full Screen View, Menu Bar, Breadcrumbs, and Tabs are hidden.
Click the Full Screen View link to display the current page over the full screen.
To return to the standard view of the page, click Standard View or press Esc on your keyboard.
Page 31 of 399
1. From the upper right corner of the Site Map, click Change the default page.
2. On the Personal Settings page, click the Customization Menu tab.
3. In the left pane, highlight the page you want to display when you log into BSM.
4. Click Set at Default Entry Context.
UI Description
The Menu Bar enables navigation to the following applications and resources:
MyBSM
Opens the MyBSM application, a portal that individual users can customize to display key content
relevant to them. For details, see "Monitoring Your Environment With MyBSM" on page1 in the BSM
User Guide.
Applications Menu
BSM features the business user applications listed below. You access all applications from the
Applications menu, except for the MyBSM application which is accessed from the Menu Bar.
Note: Only applications for which you have a valid license will appear in the Applications menu.
Menu
Option
Service
Health
Description
Opens the Service Health application, a real-time dashboard for viewing
performance and availability metrics from a business perspective. For details, see
"Introduction to Service Health" on page1 in the BSM User Guide.
Page 32 of 399
Menu
Option
CI Status
Description
Opens the CI Status Reports interface. CI Status reports enable you to view and
analyze performance data collected by BSM data collectors and stored in the BSM
database. For details, see "CI Status Reports User Interface" on page1 in the BSM
User Guide.
Service
Opens the Service Level Management application to proactively manage service
Level
levels from a business perspective. Service Level Management provides IT
Management Operations teams and service providers with a tool to manage service levels and
provide service level agreement (SLA) compliance reporting for complex business
applications in distributed environments. For details, see"Working with the Service
Level Management Application" on page1 in the BSM User Guide.
End User
Opens the End User Management application, used to monitor applications from the
Management end user perspective and analyze the most probable cause of performance issues.
For details, see "End User Management Reports Overview" on page1 in the BSM
User Guide.
Operations
Opens the Operations Management application, used to proactively manage events
Management from a business perspective, in order to restore services and minimize service
disruptions. For details, see "Operations Management Overview" on page1 in the
BSM User Guide.
Transaction Displays transaction topology and infrastructure for data collection and report
Management viewing. For details, see "Transaction Management Overview" on page1 in the BSM
User Guide.
System
Opens the System Availability Management application, used for complete system
Availability
and infrastructure monitoring as well as event management. For details, see
Management "System Availability Management Overview" on page1 in the BSM User Guide.
Service
Health
Analyzer
Opens the Service Health Analyzer application, used to view CIs with anomalies.
For further information, see "Service Health Analyzer Overview" on page1
User
Reports
Opens the Report Manager, used for creating and saving user reportscustomized
reports containing user-defined data and formatting that can help you focus on
specific aspects of your organization's application and infrastructure resource
performance. For details on the Report Manager, see "User Reports Overview" on
page1 in the BSM User Guide.
Application Opens the Application Management for SOA reports. Used to monitor your Service
Management Oriented Architecture (SOA) environment, by monitoring the performance of SOA
for SOA
components within the environment. For details, see "Application Management for
SOA Reports" on page1 in Application Management for SOA.
Page 33 of 399
Admin Menu
Administrators use the Admin menu to administer the BSM platform and applications. The Admin
menu consists of several sections, organized by function.
Note: The options available to you depend on your deployment package.
Menu Option
Description
Service Health
Opens the Service Health Administration pages, where you attach health
indicators and Key Performance Indicators (KPIs) to CIs, define the custom and
geographical maps, and customize the repositories. For details, see "ViewSpecific and Cross-View Administration" on page1 in the BSM Application
Administration Guide.
Service Level
Management
Opens the Service Level Management Administration pages, where you create
service agreements (SLAs, OLAs, UCs) and build services that link to the data
that Service Level Management collects. For details, see "Introduction to SLM
Administration" on page1 in the BSM Application Administration Guide.
Operations
Management
End User
Management
Opens the End User Management Administration pages, where you configure and
administer Business Process Monitor and Real User Monitor data collectors, as
well as configure transaction order, color settings, and report filters. For details,
see "End User Management Administration" on page1 in the BSM Application
Administration Guide.
System
Availability
Management
Service Health
Analyzer
Opens the Service Health Analyzer application, used to view CIs with anomalies.
For further information, see "Service Health Analyzer Overview" on page1
RTSM
Opens the RTSM Administration pages, where you build and manage a model of
Administration your IT universe in the Run-time Service Model (RTSM). From RTSM
Administration, you use Data Flow Management and the adapter sources that are
used to populate the IT Universe model with configuration items (CIs), the
templates for creating CIs, and the viewing system for viewing the CIs in BSM
applications. You can also manually create CIs to add to the model. For details,
see the Modeling Guide.
Platform
Page 34 of 399
Menu Option
Description
Integrations
Opens the BSM Integrations administration area, where you can administer the
following:
l
Select to access the Link to this page feature, where you can create a URL that
enables direct access to a specific page in BSM. For details, see "Creating a Link
to a BSM Page" on page25.
By default only administrators have security rights to access this feature.
Personal
Settings
Help Menu
You access the following online resources from the BSM Help menu:
Menu Option
Description
Help on this
page
Opens the BSM Help file to the topic that describes the current page or context.
BSM Help
Opens the BSM Help home page. The home page provides quick links to the
main help topics.
Planning and
Deployment
Guides
Opens a page with links to planning guides, installation and upgrade guides
(including release notes), data collector installation guides, and other resources.
Product News
and Updates
Opens the Product News page on the HP Software Support website (requires
HP Passport login). The URL for this web site is
http://support.openview.hp.com/product_news.jsp.
Page 35 of 399
Menu Option
Description
Troubleshooting Opens the troubleshooting page on the HP Software Support website (requires
& Knowledge
HP Passport login). The URL for this web site is
Base
http://support.openview.hp.com/troubleshooting.jsp.
HP Software
Support
Opens the HP Software Support website. This site enables you to browse the
knowledge base and add your own articles, post to and search user discussion
forums, submit support requests, download patches and updated
documentation, and more. The URL for this web site is
http://support.openview.hp.com/.
HP Software
Web Site
Movies
Opens the Movies panel with links to instructional movies about how to use
BSM.
Site Map
Opens the site map, with links to all top-level contexts in the Applications menu
or the Administration Console.
Note: The Site Map is the default entry page when you log into BSM. To change
the default entry page, see "How to Change the Default Entry Page" on page31.
What's New?
Opens the What's New document, which describes the new features and
enhancements in this version.
HP BPM
Anywhere
About HP
Business
Service
Management
Opens the About HP Business Service Management dialog box, which provides
version, license, patch, and third-party notice information.
Page 36 of 399
Learn About
Section 508 Compliance
BSM is compliant with the accessibility and usability standards for people with disabilities set by the
US Federal Electronic and Information Technology Accessibility and Compliance Act ("Section 508"),
and supports the JAWS screen reader. For more information, see "How to Enable Section 508
Compliance" on the next page.
Personalization
BSM remembers from one session to the next adjustments you made to tables (such as column width
and column visibility) in a variety of applications and features, such as recipient management, reports
management, reports, and report scheduling.
Note: If two or more users are logged in simultaneously with the same credentials, your settings
may not be saved.
Page 37 of 399
Tasks
How to Enable Section 508 Compliance
JAWS users should change the User Accessibility setting to true to comply with the Section 508.
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings.
2. Select Foundations.
3. Select Business Service Management Interface.
4. In the Business Service Management Interface - Display area, locate User Accessibility and
select true.
In the Customized Masthead Application Title, enter the text to use as the title for the
application. Business Service Management appears by default if there is no value defined for
this field. You can use html coding to enter the text but do not include any scripts. If you using
html, verify its validity before saving.
In the Customized Masthead Logo URL, enter the URL of the file containing the logo you
want to appear at the top of the window. The HP logo appears by default if there is no value
defined for this field. It is recommended to use an image with a height of 19 pixels. If the image
is larger, it does not appear correctly in the title bar.
When you modify these settings, the changes appear as soon as the browser is refreshed.
Page 38 of 399
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings.
2. Select Foundations.
3. Select Business Service Management Interface.
4. In the Business Service Management Interface - Timing area, locate Enable Session
Keepalive and select false.
Page 39 of 399
Filtering. BSM tables include various filtering options. For advanced editing of filters, click
Sorting. Click a column heading to sort the table by that column. The sort order toggles between
ascending and descending order each time you click the column heading.
Changing column width. Drag a column heading border to the left or right to modify the column
width. Click
Changing column order. Drag a column heading to the left or right to change the order in which
the columns appear.
Paging. Click the page control buttons
previous, next, or last page.
Exporting. Click the appropriate button to export a table to another format, such as Excel
, or CSV
For details about table functionality in reports, see Common Report and Page Elements in the BSM
User Guide.
Page 40 of 399
Page 41 of 399
To access
Click Admin> Platform > Setup and Maintenance > Downloads
Tasks
How to Download Components
1. Click Admin> Platform > Setup and Maintenance > Downloads.
Note: You can filter the downloadable components either by category or by system.
2. Right-click the component you want to download and select Save Target As.
Note: Since some files run immediately when you click to download them, right-click the file
you want to download, select Save Target As, and select the location in which you want to
save the file.
3. Select the location in which you want to save the file and click Save.
4. Run the component's setup file to install the component.
UIComponents
Download Components Page
This page lists the BSM components available for download, including tools for monitoring your
enterprise and recording business processes.
User interface elements are described below:
Page 42 of 399
UI Element (A-Z)
Description
Resets the table columns' width to its default setting. You
can adjust the width of the table's columns by dragging the
borders of the column to the right or the left.
Opens the Select Columns dialog box enabling you to select
the columns you want to be displayed on the table.
Divides the table of data into pages. You move from page to
page by clicking the relevant button:
l
Page 43 of 399
UI Element (A-Z)
Description
Category
Description
Document
File Name
System
Page 44 of 399
To access
To open the License Management Page, select Admin > Platform > Setup and Maintenance >
License Management.
Learn About
About Managing BSM Licenses
You must have a valid BSM license to run monitors and transactions, and to use various integral
applications in BSM.
The BSM license enables you to simultaneously run a predetermined number of monitors and
transactions for a specified period of time. The number of monitors and transactions that you can run
simultaneously, the specific applications that you can run, and the license expiration date, depend on
the license your organization purchased from HP.
You install the initial license in the configuration wizard, during the installation process.
BSM posts a license expiration reminder after the Login page of the web site (for administrators only) 15
days before license expiration.
Several BSM applications require additional licensing. To use these applications, you must obtain a
license from HP and then upload the license file in BSM. For specific information on the Operations
Manager i (OMi) licensing structure, see Licensing in the BSM Application Administration Guide.
Tasks
How to add a new license to your BSM deployment
1. Select Admin > Platform > Setup and Maintenance > License Management.
2. Click Add license from file to open the Add License dialog box where you can search for the
relevant .dat file. The file is uploaded from the client machine to the BSM server.
3. At the bottom of the License Management page, click the Server Deployment link.
Page 45 of 399
UI Description
License Management Page
UI Element
Description
Add license from file. Opens the Add License dialog box.
From the dialog box browse to and select the license file to upload. The license file is
a data file with a .DAT extension.
Name
The name of the licensed feature. It includes an association to the product resource
with which it was bundled.
License
Type
Days Left
Displays the number of remaining days for which the license is valid.
When green, the expiry time is pending; when red, the license is expired.
Expiration
Date
Capacity
If the license is capacity-based, the amount of capacity available and the amount of
capacity used is displayed as a status bar.
Note: This feature is available when the license is capacity-based. If the license is
not capacity-based, the words Not Applicable appear in the capacity column.
Capacity
Details
If the license is capacity-based, the amount of capacity available and the amount of
capacity used is displayed as a ratio.
Note: This feature is available when the license is capacity-based. If the license is
not capacity-based, the words Not Applicable appear in the capacity column.
Server
When you add a license to BSM, you must enable the application in the Server
Deployment Deployment page. This includes a check to see whether the physical resources of
Link
your deployment can handle the added application.
For details, see "Customizing BSM Server Deployment" on page48.
Page 46 of 399
Tips/Troubleshooting
Manual License Activation
Some licenses are not automatically activated upon installation. These licenses must be activated for
specific use and do not run at all times. To activate such a license, click the Server Deployment link
at the bottom of the License Manager pane.
Page 47 of 399
To access
Select Admin > Platform > Setup and Maintenance > Server Deployment
Learn About
Server Deployment Overview
BSM is composed of many applications and subsystems that consume hardware and software
resources. The available applications answer a variety of use cases, not all of which are required by
every user. You can align the deployment of the BSM servers with your company's business
requirements by enabling or disabling BSM applications according to your business needs..
BSM's Server Deployment page provides a mechanism to deploy only the applications required by your
company. You can determine the required hardware according to the required capacity for your specific
deployment. The Server Deployment feature displays exactly how much hardware capacity you need
for your deployment and enables you to free up unused resources.
The Server Deployment page is available both in the Setup and Database Configuration utility that is
run once BSM servers are installed, and in the Platform Admin area of the BSM interface. This enables
you to update your deployment, enable or disable applications as needed, and adjust your deployment's
capacities even after installation is complete and any time you have adjustments to make to your BSM
deployment. You can enable or disable applications, as needed, so as not to use any unnecessary
resources in your deployment.
Capacity Calculator
You can use the capacity calculator Excel sheet to determine the scope and size of your BSM
deployment. You input the information regarding the scope of your deployment in terms of numbers of
applications running, users, and expected data. The capacity calculator then calculates the required
memory, CPU cores, and determines the size of your deployment. If you are making any change to
your deployment, for example adding a license for an application, you use the information in the
capacity calculator to determine your hardware requirements and deployment configuration.
You can upload a file that has been saved with your data directly into the Server Deployment page. This
enables you to automatically populate the fields in the page with the data as you entered it into the
Excel sheet.
Page 48 of 399
If you used the file when you first installed BSM, use your saved version whenever you need to make
any changes to your deployment. If you do not have your own version, you can download the latest
version from the HP Software Support site (http://h20230.www2.hp.com/selfsolve/manuals).
You enter the information regarding your deployment in the Deployment Calculator sheet of the file. In
the Capacity Questionnaire columns, include information such as applications and size and the
Output tables automatically calculate the hardware and software requirements. Make sure to save the
file in a location from which you can upload it to the Server Deployment page. It is recommended that
you make a copy of the file each time before updating it.
When you update the capacity calculator, you are not making any changes to your deployment. You
use the capacity calculator to update the values in the Server Deployment page. Only changing values
and clicking Save in the Server Deployment page actually updates your deployment.
Tasks
How to Update Your BSM Licenses, Applications, or Deployment Scope
This task describes how to make changes to your server deployment.
1.
2.
Page 49 of 399
3.
Input table. Click the Browse button to upload the saved version of your capacity calculator
Excel file. When you select a file to upload, the values entered in the capacity calculator file
automatically populate the Server Deployment page with the correct information for your
deployment.
Alternatively, you can enter the required information in the upper table manually, but it is
recommended to use the capacity calculator so that it calculates the capacity for you and
determines the scope of your deployment based on the values you input.
4.
Server status table. In the lower table indicating the status of the servers, ensure that the
required memory does not exceed the detected memory on the servers. If it does, you must
either remove selected applications, change the capacity level, or increase the memory on the
servers.
Restart BSM
After you click Save in the Server Deployment page, you need to restart BSM. For details, see
"Starting, Stopping, or Restarting BSM" on page10.
5.
Verify results
Verify that any applications you added to your deployment now appear in the BSM menus. For
example, if you enabled the System Availability Management application, you can now find the
menu option under both the Admin and Applications menu.
Conversely, if you removed any applications from your deployment, they are no longer available in
the applicable menus.
UI Description
Server Deployment Page
This page enables you to update your deployment and determine if your hardware meets the memory
requirements of any change you make. After you save the changes to this page, BSM must be
restarted for the changes to take effect.
User interface elements are described below (unlabeled elements are shown in angle brackets):
Page 50 of 399
UI
Element
Description
<Capacity Use the Browse button to locate and upload your saved capacity calculator Excel file.
Calculator
If you have not yet entered your values into a capacity calculator, it is recommended
file
that you do so prior to making any changes to this page. You can download the latest
name>
version of the capacity calculator from the HP Software Support site
(http://h20230.www2.hp.com/selfsolve/manuals).
<Capacity
table>
The upper table in the page displays the current information regarding deployment and
applications. If you upload a capacity calculator file, this table is automatically updated
with the information in the capacity calculator.
You can change capacity level of your deployment for:
l
You can also enable/disable applications and features, and change their capacity
levels.
After you click Save and restart BSM:
l
If you selected an application that was previously not selected, the application is
available in BSM and applicable menus.
If you cleared an application that was previously selected, the application is no
longer accessible.
Page 51 of 399
UI
Element
<Server
status
table>
Description
The lower table lists all the servers running BSM including:
Status. Whether the machine is up and running.
Required. The required memory for each type of server based on the applications
and capacity levels listed in the upper table.
If the Required memory is higher than the memory in the Detected column, you must
either:
To
disable
machine
Change capacity levels for your deployment, for example: clear applications from
the list of available applications.
Add memory to the physical machines and try to update your deployment again.
Link to page on which you can disable server machines whose installed BSM
components are no longer relevant to the ongoing operation of the system. Before
disabling a machine, verify that it is no longer an operational part of the BSM server
architecture. To re-enable a machine after disabling it here, you need to run the Setup
and Database Configuration Utility on that machine.
If an application is missing from the BSM interface, activate it using the Server Deployment page.
Page 52 of 399
If an application was activated but does not appear in the BSM interface, restart all BSM servers.
If an application was selected in the capacity calculator but was not imported to the Server
Deployment page, ensure that you have a valid license for this application.
Page 53 of 399
SOA data
Diagnostics data
An analytics database stores data for the Service Health Analyzer application.
Microsoft SQL server. This database runs on Windows operating systems only.
Oracle server. This database runs on any BSM supported operating system. An Oracle server
database is referred to as a user schema.
Create a new database. BSM creates a new database and populates it with profile tables.
Assign a default profile database. You must assign a default profile database, to enable BSM to
collect the required data. The first database added on the Database Management page is
designated as the default profile database.
Page 54 of 399
Connect to an existing database populated with tables. BSM connects to a database that was
either manually created and populated with tables, or previously defined in Platform Administration.
For details on creating databases, assigning a default profile database, and connecting to an existing
database, see "Creating Databases" below.
Deploying Databases
To deploy databases on Microsoft SQL server or Oracle server for your organization's particular
environment, follow the instructions in "Introduction to Preparing the Database Environment" in the
BSM Database Guide. We recommend that you review the relevant portions of the BSM Database
Guide before performing profile and analytics database management tasks.
Database Loader
The database loader persister is responsible for storing incoming data samples until the data is
processed by the loader in order to prevent data loss in case of system failure. To learn more, see
"Database Loader Persistence Folders" on page77.
Creating Databases
This section provides information and instructions for creating profile and analytics databases.
Note: It is possible to create multiple profile database. However, HP recommends that you do not
create more than 10 profile databases. Creating more than 10 profile databases can adversely
affect the performance of the metric load in the database and the performance of the Partition
Manager.
Page 55 of 399
To access
l
To create a profile database, select Admin > Platform > Setup and Maintenance > Manage
Profile Databases.
To create an analytics database, select Admin > Platform > Setup and Maintenance > Manage
Analytics Databases.
Tasks
This section includes:
l
"How to Create an Analytics Database on a Microsoft SQL Server" on the next page
Page 56 of 399
schemas, see "Oracle Server Deployment Overview" in the BSM Database Guide
Prerequisites
l
Create a dedicated default tablespace for profile user schemas (and a dedicated temporary
tablespace, if required).
Use a secure network connection if you do not want to submit database administrator connection
parameters over a non-secure connection. If you do not want to submit database administrator
connection parameters using your web browser at all, you can manually create profile user
schemas and then connect to them from the Database Management page.
Make sure you have the following database server connection information: host name, SID, port,
database administrator user name and password, default tablespace, and temporary tablespace.
Page 57 of 399
3. Enter the parameters of your database on the Analytics Database Properties - MS SQL Server
page. For information about the profile database parameters, see "Profile Database Properties
MS SQL Server Page" on the next page.
Create a dedicated default tablespace for SHA user schemas (and a dedicated temporary
tablespace, if required).
Use a secure network connection if you do not want to submit database administrator connection
parameters over a non-secure connection. If you do not want to submit database administrator
connection parameters using your web browser at all, you can manually create SHA user schemas
and then connect to them from the Database Management page.
Make sure you have the following database server connection information: host name, SID, port,
database administrator user name and password, default tablespace, and temporary tablespace.
UI Description
This section includes:
l
Page 58 of 399
UI Element
(A-Z)
Description
Click to edit the properties of the Microsoft SQL server database or Oracle server
user schema.
Disconnects the database or user schema. This button only appears if you have
more than one connected databases or user schema.
Note: You cannot delete the default profile database or a database that is in use.
Add
Adds a Microsoft SQL server database or Oracle server user schema, as specified
in the drop-down database list.
Database
Name
Database
Type
Server Name
Description
l
Database
name
Disconnect
Page 59 of 399
UI Element
(A-Z)
Make this my
default profile
database
Description
Select this check box to make this database the default profile database.
Note:
l
Port
Selecting this check box overwrites the existing default profile database.
Server name
This setting is required if you are collecting Service Health, Real User Monitor,
HP Diagnostics (if installed), Service Level Management, SOA.
You use a non-default port in dynamic mode. In this case, enter port 1434.
Enter the name of the machine on which the Microsoft SQL server is installed. If
you are using a non-default instance in dynamic mode, enter the server name in the
following format: <my_server\my_instance>
SQL server
Select if the Microsoft SQL server is using SQL server authentication.
authentication
Time Zone
If you select the Make this my default profile database option, select the time
zone of the data in this database from the drop-down list.
This option is only available for profile databases.
User name
User
Password
If you are using Windows authentication, this field should remain empty.
If you are using SQL server authentication, enter the user name of a user with
administrative rights on Microsoft SQL server.
If you are using Windows authentication, this field should remain empty. Make
sure that the BSM service is run by a Windows user configured in the database
server as an authorized Windows login.
If you are using SQL server authentication, enter the password of a user with
administrative rights on Microsoft SQL server.
Windows
Select if the Microsoft SQL server is using Windows authentication.
authentication
Page 60 of 399
Description
l
Database
administrator user
name
Default tablespace
Enter the name of the default tablespace designated for use with user
schemas.
For details on creating a dedicated tablespace, see "Oracle Server
Deployment Overview" in the BSM Database Guide.
If you did not create, and do not require, a dedicated default tablespace,
specify an alternate tablespace. The default Oracle tablespace is called
users.
Disconnect
Host name
Enter the name of the machine on which the Oracle server is installed.
Page 61 of 399
UI Element (A-Z)
Description
This setting is required if you are collecting Service Health, Real User
Monitor, HP Diagnostics (if installed), Service Level Management,
SOA.
Selecting this check box overwrites the existing default profile
database.
This option is only available for profile databases.
Port
Enter the Oracle listener port, if different from the default value, 1521.
Retype password
SID
Enter the Oracle instance name that uniquely identifies the instance of the
Oracle database being used, if different from the default value, orcl.
Temporary
tablespace
Enter the name of the dedicated temporary tablespace designated for use
with user schemas.
If you did not create, and do not require, a dedicated temporary tablespace,
specify an alternate tablespace, if different from the default Oracle
temporary tablespace, temp.
Time Zone
If you select the Make this my default profile database option,select the
time zone of the data in this database from the drop-down list.
This option is only available for profile databases.
User schema
password
If you are configuring a new user schema, enter a descriptive name for
the user schema.
If you are connecting to a user schema that was previously created,
enter the name of the existing user schema.
If you are configuring a new user schema, enter a password that
enables access to the user schema.
If you are connecting to a user schema that was previously created,
enter the password of the existing user schema.
Note: You must specify a unique user schema name for each user schema
you create for BSM on the Oracle server.
Page 62 of 399
Tips/Troubleshooting
Timeouts
Database creation can take several minutes. The browser might time out before the creation process is
completed. However, the creation process continues on the server side.
If a timeout occurs before you a confirmation message appears, verify that the database name appears
in the database list on the Database Management page to ensure that the database was successfully
created.
Syntax Rules
l
The database name cannot contain: /, \\, :, *, ?, \",<, >, |, or spaces, and cannot begin with a digit.
To access
On the Gateway Server, double-click the <HPBSM Gateway Server root
directory>\tools\dataMarking\dataMarking.bat file.
Learn About
Data Marking Utility Overview
The Data Marking utility enables BSM users with superuser security privileges to mark specific sets of
data in profile databases as obsolete so that the marked data is not included when generating reports.
While the utility does not physically remove marked data from the database, it renders the marked data
unusable in reports and applications by assigning the marked data a status of unavailable in the
database.
In this way, the Data Marking utility enables you to filter out obsolete data and enables BSM to display
only the most relevant data for the specified time period. After you mark a specific set of data from a
Page 63 of 399
given time period as obsolete, BSM reruns the aggregation process on the remaining raw data for the
relevant time period.
Tasks
This section includes:
l
"How to Configure Data Marking Maximum Time Duration" on the next page
Page 64 of 399
7. Before the Data Marking utility marks the data as obsolete, you can view the SLAs affected by the
marked data by clicking Get Info. For details, see "Data Marking Information Window" on
page67.
8. Click Start. The progress bars display the progress of the Data Marking and Re-aggregation
process.
Note: There is no indication in the user interface of which data is to be marked as obsolete.
Page 65 of 399
UI Description
Data Marking Utility Page
This page enables you to select sets of data as obsolete by application or by location for Business
Process Monitor data, and by the SiteScope target machine for SiteScope data.
User interface elements are described below:
UI Element
(A-Z)
Description
Advanced
Button
This button appears if the re-aggregation only feature has been enabled. It
enables you to run re-aggregation without the data marking process. For more
information see "Running Re-aggregation Only" on page76.
Applications
BTF
Duration
Select the period of time, starting from the specified start time, for the utility to
mark data as obsolete. The default value is 6 hours and 59 minutes.
For details on customizing this value, see "How to Configure Data Marking
Maximum Time Duration" on the previous page.
Page 66 of 399
UI Element
(A-Z)
Description
Get Info
Click before running the Data Marking utility to view the SLAs affected by the
marked data. For details, see "Data Marking Information Window" below.
Locations
Mark data as
obsolete
Mark data as
valid (undo
mark as
obsolete)
Progress
Displays the progress of the data marking process and re-aggregation process.
SiteScope
Targets
Start
Start Time
Transactions
View by
Applications
Locations
SiteScope Targets
Page 67 of 399
UI Element
(A-Z)
Description
Application
Name
Number of
Rows to
Update
The number of data rows per selected criteria to be marked as obsolete. A row
appears for each criterion selected in the Data Marking Utility window.
Total Rows to
Update
The sum of all the number of rows to be marked as obsolete. This number can
differ from the value of the Number of Rows to Update field.
Tips/Troubleshooting
Tips
l
Do not run more than one instance of the Data Marking utility at a time, as this can affect the reaggregation process.
Do not mark data sets for time periods that include purged data (data that has been removed using
the Partition and Purging Manager) as this can affect the re-aggregation process.
Limitations
l
The Data Marking utility does not mark late arriving data.
For example, if a set of data for a specific time period is marked as obsolete and BSM later receives
data from that time period (which arrived late due to a Business Process Monitor temporarily being
unable to connect to the Gateway Server), the late arriving data is not marked as obsolete and is
available for use in reports. Use the Get Info button to check for late arriving data. If any value other
than zero rows are displayed, run the utility again, if required, to mark the data that arrived late as
obsolete.
The Data Marking utility does not mark data as obsolete if it arrives while the utility is running.
For example, if a set of data for a specific time period is marked as obsolete, and during that same
time period (while the utility is running), data arrives and enters the profile database, the rows of
newly arrived data are not marked as obsolete, and are therefore included in the report. In this case,
after the utility finishes running, click the Get Info button to determine whether all rows of data were
marked as obsolete for the selected time period. If rows are displayed, run the utility again, if
required, to mark the data that arrived during the run as obsolete. This is a rare scenario, as you
typically mark data for a previous time period and not for a time period that ends in the future.
While the Data Marking utility is running and removing data, reports that are generated for that time
Page 68 of 399
period may not show accurate results. Therefore, it is recommended to run the utility during off-peak
BSM usage times.
Troubleshooting
Generally, when an error occurs, the Data Marking utility displays the following error message:
The Data Marking utility must shut down due to an internal error. For details see:
<HPBSM Gateway Server root directory>\log\datamarking.log
Reasons for which the utility might display this error include:
l
If an error occurs, check the <HPBSM Gateway Server root directory>\log\datamarking.log file for
error information.
To access
Select Admin > Platform > Setup and Maintenance > Data Partitioning and Purging.
Learn About
Partitioning
The database tables can quickly become very large due to the large amount of data generated by the
BSM data collectors. Over time, this can severely degrade system performance.
The Purging Manager automatically splits fast growing tables into partitions based on internal settings.
Splitting the tables into partitions optimizes database performance.
Page 69 of 399
New partitions are created based on an internal configuration regardless of whether or not the partition
is filled.
New partitions for a table are created in the same Oracle tablespace or Microsoft SQL file group as the
tables last partition. These partitions automatically acquire the storage parameters of this tablespace.
Note: The partitioning method used by the Partition and Purging Manager is Database Native
Partitioning. (Refer to the database support matrix in the release notes for the SQL SERVER and
Oracle Enterprise editions supported for this release). In an Oracle database, the Oracle
Partitioning option must be enabled in order to partition or purge data from an Oracle database.
EPM
The size of each partition is determined by the EPM (Events per Minute) value displayed on the Purging
Manager page. The default EPM value is preset according to the appropriate level for each database
table.
If the data partitions are too large (accumulating much more than 1 million rows), you can raise the EPM
value to create new partitions more frequently.
If the data partitions are too small (accumulating much less than 1 million rows), you can lower the
EPM value to create new partitions less frequently.
Purging
By default, the Purging Manager does not purge data. However, you can configure the Purging Manager
to purge data by defining the amount of time the data in a table's partition is retained.
The Purging Manager runs every hour and purges data older than the defined retention time.
Tasks
This task includes the following topics:
l
"Prerequisites" below
"How to Determine the Events Per Minute for a Database Table" on page72
Prerequisites
Ensure that you have at least one profile database configured in your BSM system.
Page 70 of 399
For details on configuring a profile database on a Microsoft SQL server, see "How to Create a
Profile Database on a Microsoft SQL Server" on page56.
For details on configuring a user schema on an Oracle server, see "How to Create a Profile User
Schema on an Oracle Server" on page56.
Page 71 of 399
Page 72 of 399
3. Locate the line in the statistics section of the data sample that reads:
Insert to DB EPS (MainFlow)
The selected number represents the events per second. Multiply this number by 60 to determine the
number of events per minute.
To determine to which database table in the Purging Manager the sample belongs, follow the
instructions for Generic Reporting Engine API in the BSM Extensibility Guide. The resulting list
displays the database table in parentheses next to the name of the sample. You can then enter the
EPM number for the correct table.
If you have more than one Gateway Server, add the values obtained from each server.
UI Description
Purging Manager Page
User interface elements are described below:
UI Element (A-Z)
Description
Apply to
Change to EPM
Database Specific
This tab displays the configurations for the tables associated with
the database selected in the Select a profile database drop-down
list. From this tab you can change the EPM or data retention time a
specific database table.
Description
Epm Value
The amount of data per minute that arrives in the database tables
from the data collectors. For details on determining this value, see
"How to Determine the Events Per Minute for a Database Table"
on the previous page.
Page 73 of 399
UI Element (A-Z)
Description
The time range for retaining data in the database tables. This
element appears as follows:
l
Selection fields. At the top of the page, set the time period for
how long you want data kept in the selected database tables.
Column heading. Displays the amount of time data remains
in a database table before it is purged. This value is configured
in the Keep Data for selection fields at the top of the page.
Note: The time period configured in the Keep Data for fields
indicates that the data is stored for at least the specified amount of
time; it does not indicate when the data is purged. By default,
retention time is Infinite, meaning that the data is not purged.
Name of Table in Database
Alerts
BPI
Diagnostics
SOA
SiteScope
TV
WebTrace
Page 74 of 399
UI Element (A-Z)
Description
Select a profile database for which you want to modify time range
configurations for purging data.
Note: This field is visible only on the Database Specific tab.
This tab displays the configurations for the templates that are
selected in the Select a profile database drop-down list.
Select this tab to:
l
Tips/Troubleshooting
Raw Data not Aggregated
Prior to purging, the Partition and Purging Manager performs an additional check to ensure that raw data
is not purged before it has been aggregated and reported to BSM.
If a particular set of data is scheduled for purging but its raw data has not yet been aggregated, the
Partition and Purging Manager does not purge the data according to its schedule. The Partition and
Purging Manager automatically purges the data on its next hourly run only after the data has been
aggregated.
For example, if data was scheduled to be purged on Sunday at 8:00 but its data will only be aggregated
on Sunday at 10:00, the Partition and Purging Manager checks the data at 8:00, does not purge the
data, and automatically purges the data on its next hourly run only after Sunday at 10:00 after the data
has been aggregated.
Purging Principle
When defining purging for your raw and aggregated data make sure that the length of time raw data is
kept is shorter than the length of time one-hour chunks of aggregated data are kept, which is shorter
than the length of time one-day chunks of aggregated data are kept.
Page 75 of 399
To access
On the Gateway Server, double-click the <HPBSM Gateway Server root
directory>\tools\dataMarking\dataMarking.bat file
Tasks
Prerequisite
You must enable the re-aggregation feature in the dataMarking.bat file in order to run the data reaggregation process in the Data Marking utility.
1. Open the file <Gateway Server root directory>\tools\dataMarking\dataMarking.bat in a text
editor.
2. Add the DadvancedMode property with a value of true to the SET SERVICE_MANAGER_
OPTS line. For example:
SET SERVICE_MANAGER_OPTS=-DhacProcessName=%PROCESS_NAME % -DadvancedMode=true
3. Save the file. The next time you open the Data Marking utility, the Advanced button appears.
Page 76 of 399
UI Description
Data Marking Utility page
For information see "Data Marking Utility Page" on page66.
Advanced Window
The Advanced window is accessed by clicking Advanced on the "Data Marking Utility Page" on
page66. User interface elements are described below:
UI Element (A-Z)
Description
Run Reaggregation
only
Page 77 of 399
Learn About
Database Loader Persister - Overview
The database loader persister is responsible for storing incoming data samples until the data is
processed by the loader in order to prevent data loss in case of system failure. The data samples are
assigned a unique IDnumber when stored in the database loader persistence folder.This enables the
data samples to be deleted from the database loader persistence folders after the data is processed.
The loader persister stores the data samples in files called partitions on a local disk. Each partition has
a predefined number of data samples it can accommodate. When the limit is reached, a new partition is
created. When removing data samples from the main persister, the corresponding partition is found and
updated accordingly. When all samples from the partition are removed, the partition file is deleted from
the disk.
Upon initialization, the loader persister reads the partition that remained on the disk from the previous
run. After the partitions are fully and successfully read, they are deleted from the disk.
.persist_dir\db_loader\main\dlq contains samples that the system was not able to insert into
the database, for example wrong sample, duplicated samples, or samples with time stamp older
then data purging period.
There is no size limit and no limit of the number of samples in this folder. Old files are not
automatically purged. If these samples were added to this folder due to an error, for example, there
was a data flow problem, you can reinsert these samples into the database.
Page 78 of 399
To access
Select Admin> Platform > Setup and Maintenance > Infrastructure Settings
Learn About
Infrastructure SettingsManager Overview
In the Infrastructure Settings Manager, you can select different contexts from which to view and edit
settings. These contexts appear in the following groups:
l
Applications. This list includes those contexts that determine how the various applications running
within BSM behave. Contexts such as Service Health Application, MyBSM, and Service Level
Management are listed.
Foundations. This list includes those contexts that determine how the different areas of the BSM
foundation run. Contexts such as RTSM (Run-time Service Model) and LDAP Configuration are
listed.
Descriptions of the individual settings appear in the Description column of the table on the
Infrastructure Settings Manager page.
Tasks
How to Modify Infrastructure Settings Using the Infrastructure Settings
Manager
Caution: Modifying certain settings can adversely affect the performance of BSM. It is highly
recommended not to modify any settings without first consulting HP Software Support or your HP
Services representative.
Page 79 of 399
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings.
2. Select a group of contexts: Applications, Foundations, or All.
3. Select a specific context from the drop-down box.
4. All configurable infrastructure settings relating to that context are displayed, along with
descriptions and the current values of each setting. Click the Edit Setting button and modify the
value of a specific setting.
UI Description
Infrastructure Settings Manager Page
User interface elements are described below:
UI Element
(A-Z)
Description
Click to edit the current value of the given setting in the relevant context table.
All
Select to view all the settings for both Applications and Foundations.
Foundations
Name
Note: This field is visible on both the Infrastructure Settings Manager page, and the
Edit Setting dialog box after clicking the Edit Setting
setting.
Restore
Default
Page 80 of 399
UI Element
(A-Z)
Description
Value
Page 81 of 399
Page 82 of 399
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings.
2. Select Foundations.
3. Select Platform Administration.
4. In the Platform Administration - Bus Queues monitor table, locate Maximum number of
messages in Bus Queues. Change the value as needed.
Learn About
This section includes:
l
"Length of Time BSM Keeps Temporary Image Files" on the next page
All Gateway Serversand the machine on which the shared image directory is defined, if different
from the Gateway Serversshould be on the same Windows domain.
The IIS virtual directory should be configured to use the credentials of an account that is a member
of the domain users group.
The account for the virtual directory should be given read/write permissions on the shared image
directory.
Page 83 of 399
Note: If your server configuration requires placing servers on different Windows domain
configurations, contact HP Software Support.
If you set a custom path to temporary images, as defined in the images.save.directory.offline
parameter (for details, see "How to Modify the Directory in Which Temporary Image Files Are Stored"
on page86), you must map the physical directory containing the images to a virtual directory in the web
server on all Gateway Server machines.
Description
remove.files.0.path=
Path to images created when generating
../../AppServer/webapps/site.war/Imgs/chartTemp/offline reports
remove.files.1.path=
../../AppServer/webapps/site.war/Imgs/chartTemp/online
remove.files.3.path=
../../AppServer/webapps/site.war/snapshots
For the above temporary image directories, you can modify the following settings:
l
remove.files.directory.number=<number of directories>
Specifies the total number of directories for which you are defining settings.
remove.files.<num_of_path>.path=<path to directory>
Specifies the path to the directory that contains the files you want to remove. For the default
directories that remove temporary image files, these values must match the
images.save.directory.online and images.save.directory.offline parameters, also defined in the
topaz.config file.
Note: In Windows environments, use UNC path syntax (\\\\server\\path) when defining the
path. In Linux environments, use forward slashes (/) only when defining the path.
Page 84 of 399
Specifies the time, in seconds, that BSM leaves a file in the specified directory. For example, if you
specify "3600" (the number of seconds in 1 hour), files older than one hour are removed.
Leave this setting empty if you want BSM to use only maximum size criteria (see below).
l
remove.files.<num_of_path>.deletePercents=<percent to remove>
Specifies the additional amount by which BSM reduces directory sizeexpressed as a percentage
of the maximum allowed directory sizeafter directory size has been initially reduced according to
the remove.files.<num_of_path>.maxSize parameter. BSM deletes the oldest files first.
If you want BSM to use only the expiration time criterion, leave this and the remove.files.<num_
of_path>.maxSize settings empty .
Page 85 of 399
Tasks
This section includes:
l
"How to Modify the Directory in Which Temporary Image Files Are Stored" below
"How to Configure the Virtual Directory on Apache HTTP Web Server" on page88
"How to Configure the Virtual Directory on Sun Java System Web Server" on page89
"How to Modify Length of Time BSM Keeps Temporary Image Files" on page90
"How to Specify the Directories from Which Temporary Image Files Are Removed" on page90
How to Modify the Directory in Which Temporary Image Files Are Stored
You can modify the path to the directory where BSM stores generated images used in scheduled
reports. For example, you might want to save generated images to a different disk partition, hard drive,
or machine that has a greater storage capacity than the partition/drive/machine on which the Gateway
Server machine is installed.
To modify the path to the directory holding temporary image files:
Page 86 of 399
Page 87 of 399
5. In the Web Site Content Directory dialog box, type or browse to the path of the physical directory
containing the temporary images, as defined in the images.save.directory.offline parameter (for
details, see "Accessing Temp Directories with Multiple Gateway Server Machines" on page83).
Click Next.
6. If the physical directory containing the temporary images resides on the local machine, in the
Access Permissions dialog box, specify Read and Write permissions.
If the physical directory containing the temporary images resides on a machine on the network, in
the User Name and Password dialog box, enter a user name and password of a user with
permissions to access that machine.
7. Click Next and Finish to complete Virtual Directory creation.
8. Restart BSM on the Gateway Server machine.
9. Repeat the above procedure on all Gateway Server machines.
Page 88 of 399
How to Configure the Virtual Directory on Sun Java System Web Server
1. Rename the default physical directory containing the temporary scheduled report images on the
Gateway Server machine.
For example, rename:
<Gateway Server root
directory>\AppServer\webapps\site.war\Imgs\chartTemp\offline
to
<Gateway Server root directory>\AppServer\webapps\site.war\Imgs\chartTemp\old_
offline
2. Open the Sun Java System Web Server configuration file <Sun Java System Web Server
installation directory>\server\<server_nam>\config\obj.conf with a text editor.
3. Add the following line inside the <Object name=default> directive (before the line NameTrans
fn=document-root root="$docroot", and before the line NameTrans fn="pfx2dir"
from="/Imgs" dir="ProductDir/Site Imgs/", if it exists):
NameTrans fn="pfx2dir" from="/topaz/Imgs/chartTemp/offline"
dir="<shared_temp_image_directory>"
Page 89 of 399
How to Specify the Directories from Which Temporary Image Files Are
Removed
By default, temporary image files are removed from the root path of the specified directory. However,
you can also configure BSM to remove temporary image files from the subdirectories of the specified
path.
To configure BSM to remove temporary images files from subdirectories:
1. Open the file <Gateway Server root directory>\conf\topaz.config in a text editor.
2. Insert the following line after the specified path's other settings (described in the previous section):
remove.files.<num_of_path>.removeRecursively=yes
Page 90 of 399
To access
Enter the relevant URL: http://<Gateway or Data Processing Server name>:8080/jmx-console/
where
<Gateway or Data Processing Server name> is the name of the machine on which BSM is running.
Note: By default, for security reasons, the JMX console is accessible only from the localhost. You
can disable this limitation so that you can access the JMX console remotely. See "How to Enable
Accessing JMX Console Remotely" on the next page.
Learn About
JMX Console Overview
The JMX console comes embedded in BSM, and enables you to:
l
The credentials to access the JMX console were configured when you installed BSM. To change your
JMX password, see "How to Change the JMX Password" below.
You can configure the JMX console to work with SSL to encrypt JMX data for added security. For
details, see "Configuring JBOSS to Work with SSL" in the BSM Hardening Guide.
Tasks
How to Change the JMX Password
1. Stop the BSM Gateway or Data Processing Server.
Page 91 of 399
2. Run the appropriate file, depending on the operating system in use, on either the Gateway or Data
Processing Server:
Operating System
File Name
Windows
Solaris
3. The Change Password dialog box opens. Enter and confirm your new password. The operating
system registers and encrypts the password change on either the Gateway or Data Processing
Server.
4. Restart BSM.
Note: The login name cannot be changed.
Page 92 of 399
Learn About
Baseline Overview
An application's status is determined by its transactions' actual performance and availability in relation
to configured performance and availability thresholds. You can use this information in components
such as Service Health, End User Management, Service Level Management, and Service Health
Analyzer.
When you configure an application for monitoring by Business Process Monitor, you can determine
whether its transactions' performance thresholds are static thresholds (specific threshold values that
you configure), or are calculated using baselines based on historical transaction data.
You can configure BSM to calculate baselines from actual performance metrics. Creating a baseline
enables you to learn the normal performance of your applications. Knowing how an application typically
performs enables you to determine whether a performance problem is an isolated incident or a sign of a
trend.
Baselines are updated periodically as new metrics data are received.
Note: A minimum amount of accumulated data is necessary before baselines can be calculated.
This depends on the number of samples collected and takes approximately one week after
baselines are enabled in BSM. You can speed up the process by manually invoking a baseline with
limited data. For details, see "How to Manually Invoke a Baseline" on page96 below.
Baseline Coefficient
When baselining is enabled, BSM collects metric data from incoming samples over a period of time.
After enough data has been collected, BSM creates a baseline for the metric and calculates the mean
and standard deviation.
Mean and standard deviation values for a metric are used to create a baseline sleeve and to identify
metrics that deviate from the baseline. The mean and standard deviation are a statistical way of
estimating the normal behavior of a metric. By default, the baseline sleeve is calculated using a
coefficient of + or - 3 times the standard deviation from a metric's mean value.
This means that a metric is considered abnormal if its value is greater than the mean value plus 3 times
the standard deviation, or less than the mean value minus 3 times the standard deviation.
Page 93 of 399
Seasonality - When a repeated pattern at constant time intervals occurs, a metric has seasonality.
For example a metric might have typical values at 8:00 every day when users log on, and different
values at 12:00 when users take a break.
Trends - When a metric's values have a consistent linear change over time, a trend is identified.
Seasonality and trends are considered to be part of the normal behavior of a metric, and the baseline
sleeve is adjusted accordingly.
Baseline Example
The following example shows the baseline sleeve for the OK, minor, and critical thresholds for a
transaction in the Metrics Over Time report:
Page 94 of 399
Page 95 of 399
Tasks
How to Enable Baselines
1. Select the Baselining option in:
n
The Setup and Database Configuration Utility in a regular deployment (for details, see the
BSM Installation Guide).
The Upgrade Wizard if you are performing an upgrade (see the Upgrade Guide relevant to your
upgrade path).
2. Create an Analytics database (Admin > Platform > Manage Analytics Databases) (see
"Creating Databases" on page55).
Note: You can also enable baselining after BSM has been installed.
Page 96 of 399
Task
Metric
ID
Client Domain
End of period
Next run
33
RUM
idle
Sat Nov 29
00:00:00 IST
2011
Mon Dec 29
00:00:00 IST
2011
Mon Dec 29
00:01:00 IST
2011
34
BPM
idle
Sat Nov 29
00:00:00 IST
2011
Mon Dec 29
00:00:00 IST
2011
Mon Dec 29
00:01:00 IST
2011
3. Record the relevant task IDs and dates, and go back to the baseline JMX page (as listed above).
4. Invoke the calculateNow operation on each of the relevant task IDs.
5. To confirm that the process ran successfully, invoke the showTasks operation again and confirm
that the dates have been updated. The process might take some time.
Tips/Troubleshooting
JVM Often Crashes in Baseline Processes while Running Baseline Tasks
This problem is caused by the Java Virtual Machine. You can identify the problem by the following
errors in the file hs_err_pid.log:
l
EXCEPTION_ACCESS_VIOLATION
guarantee(result == EXCEPTION_CONTINUE_EXECUTION) failed: Unexpected result from
topLevelExceptionFilter
The log file is located in the working directory at the time of process execution.
To resolve this problem, change the baseline process from 64 bit to 32 bit as follows:
1. In the JMX console, stop the service basel_engine as follows:
a. In a browser, enter http://<DPS>:11021/ and enter your user name and password.
b. Under Foundations, click Foundations:type=NannyManager.
c. Under java.lang.String showServiceInfoAsHTML, click Invoke.
d. Next to basel_engine, click Stop.
2. On the Data Processing Server, copy the file \HPBSM\JRE\bin\hpbsm_basel_engine.exe to
Page 97 of 399
the directory \HPBSM\JRE64\bin, overriding the existing file with the copy.
3. Restart the basel_engine service.
Page 98 of 399
To access
Select Admin > Platform > Setup and Maintenance > Audit Log
Learn About
About the Audit Log
You use the audit log to keep track of different actions performed by users in the system, according to
the following specific contexts:
l
Page 99 of 399
information, ticket settings, closed tickets, ticket templates, and subscription information:
notification types (locations or general messages), and recipients.
l
SLA Alert Administration. Displays actions related to creating, modifying, or deleting SLA alerts.
System Availability Manager. Displays actions related to system availability and SiteScope.
User Defined Reports. Displays actions related to the creation and modification of Custom
reports.
User/Group Management. Displays actions related to adding, modifying, and deleting users and
user groups.
View Manager. Displays actions related to KPIs such as adding a KPI, editing a KPI, and deleting
a KPI. Additionally, it displays actions related to changing the Save KPI data over time for this CI
and the Monitor changes options.
Tasks
How to Use the Audit Log
1. Select Admin > Platform > Setup and Maintenance > Audit Log.
2. Select a context.
3. Where relevant, select a profile from the list. BSM updates the table with the relevant information.
4. Optionally, click the Auditing Filters link to open the Auditing Filters pane and specify filter criteria.
The following filters are available:
n
User. Specify a user in the system to view actions performed by only that user.
Containing text. Specify a text string that the action must contain to be displayed.
Start after and End before. Specify a starting and ending time period to view actions for only
that period. Click the More
date.
button to open the Calendar dialog box where you can select a
5. Click Apply. BSM updates the table with the relevant information.
If required, use the Previous Page
page of the Audit Log.
or Next Page
UIDescriptions
Note: For details about the audit log for EUM Alert Administration, see Alerts Log Report in the
BSM User Guide.
UI Element
(A-Z)
Description
Moves to the previous page or next page in the Audit Log.
<Audit log
table>
<EUM
applications>
Select an <EUM application> for which you want to view the actions performed.
Auditing
Filters
Context
For user
Displays the user whose actions are displayed in the Audit Log, as specified in the
Auditing Filters pane.
Note: This field is displayed only if you have chosen the End User ManagementApplications context.
Select a SiteScope for which you want to view the actions performed.
Note: This field is displayed only if you have chosen the System Availability
Manager context.
Time period
Displays the time period whose actions are displayed in the Audit Log, as
specified in the Auditing Filters pane.
Default Value: All
Cancel
Clear All
Specify a text string to filter out all the actions that do not include this text string.
End before
Start after
User
Description
Actions
Additional Information
Modification Date
Displays the date and time that the specified actions were performed.
Modified By
Measure performance by viewing the output from monitors running on the various system
components.
Move Backend Services. You can move backend services from one server to another of the
same type, in case the server machine is not functioning properly or requires downtime for
servicing.
Configure Backup Servers. You can define a backup server in case the server machine is not
functioning properly or requires downtime for servicing.
Manage BSM Processes. You can start or stop various BSM processes.
Learn About
Checking Server Time Against NTP Server
In order to ensure that the BSM server clocks are accurate and synchronized, the BSM servers check
their system clocks against an NTP server every 20 minutes by default.
If no NTP server is reachable, the database clock is used for synchronization instead.
Tasks
How to Add NTP Servers
Several NTP servers are configured by default, but you can manually add one in the configuration file:
<BSM_HOME>\conf\settings\mtime\mtime.xml
Example results:
<entry xmlns="http://www.w3.org/2005/Atom">
<id>timeService:1</id>
<title type="text" xml:lang="en">Time service.</title>
<summary type="text" xml:lang="en">The time is 2011-08-23 08:44:30,858</summary>
<published>2011-08-23T11:44:31.382+03:00</published>
<content type="text">1314089070858</content>
</entry>
Learn About
This section includes:
l
Error. The log records only events that adversely affect the immediate functioning of BSM. When a
malfunction occurs, you can check if Error messages were logged and inspect their content to trace
the source of the failure.
Warning. The log's scope includes, in addition to Error-level events, problems for which BSM is
currently able to compensate and incidents that should be noted to prevent possible future
malfunctions.
Info. The log records all activity. Most of the information is routine and the log file quickly fills up.
The default severity threshold level for log files differs per log, but is generally set to either Warning or
Error.
Note: The names of the different log levels may vary slightly on different servers and for different
procedures. For example, Info may be referred to as Always logged or Flow.
archived log file (with the number corresponding to the maximum number of files to be saved) is
permanently deleted.
The following image shows an example of a log file, topaz_all.ejb.log, and its archived copies:
The maximum file size and the number of archived log files are defined in the log properties files located
in <HPBSM root directory>\conf\core\Tools\log4j. An example is:
def.file.max.size=2000KB
def.files.backup.count=10
jboss_boot.log. Logs startup activities including running the JBoss process, deployment, and
startup status, as well as the number of busy ports.
jboss_server.log. Logs all JBoss activities including JBoss messages, deployment, and startup
status.
jboss_tomcat.log. Logs the Tomcat messages.
Note: You can view the JMX Console at http://<HPBSM server>:8080/jmx-console
*.hprof Files
*.hprof files contain a dump heap of a BSM process's data structures. These files are generated by the
JVM if a process fails with a Java Out Of Heap Memory condition.
You are rarely aware of a problem because the problematic process restarts automatically after a
failure. The existence of many *.hprof files indicates that there may be a problem in one of the BSM
components, and its contents should be analyzed to determine the problem.
If you run out of disk space, you can delete the*.hprof files.
Tasks
How to Delete BSM Logs
You can delete all BSM log files under /opt/HB/BSM/log and *.hprof files under /opt/HP/BSM/bin
after stopping BSM. This enables you to free up disk space. However, from a support perspective, it
may be useful to save older logs.
Caution: Do not delete the log directory.
1. Stop BSM.
2. Delete all files under <BSM>\log. Do not delete the log directory.
3. Delete all .hprof files under /opt/HP/BSM/bin/.
Note: Some files cannot be deleted, because they are owned by IIS or Apache.
Learn About
This section includes:
l
Note: In the following tables, OUTBOUND and INBOUND is windows terminology and
Port Usage
Mandatory/Optional
25
Optional.
Mandatory if SMTP
is used for Alerts
161
Mandatory
383
INBOUND/INPUT
Optional.
Mandatory if HP
Operations Manager
is used
1098
INBOUND/INPUT
Mandatory
1099
INBOUND/INPUT
Mandatory
1433
Optional.
Mandatory if SQL
Server database
used
1434
Optional.
Mandatory if SQL
Server database
used
1521
Optional.
Mandatory if Oracle
database used
2506
INBOUND/INPUT
Mandatory
2507
INBOUND/INPUT
Mandatory.
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
4444
INBOUND/INPUT
Mandatory
4445
INBOUND/INPUT
Mandatory
8009
INBOUND/INPUT
Mandatory
8080
Mandatory, JMX,
JBOSS, Tomcat,
Jetty
8083
INBOUND/INPUT
Mandatory
8093
INBOUND/INPUT
Mandatory
8443
INBOUND/INPUT
Mandatory
11020
INBOUND/INPUT
Mandatory
11021
Mandatory, JMX
21212
Mandatory, JMX
21301
INBOUND/INPUT
Mandatory
29601
INBOUND/INPUT
Mandatory
29602
INBOUND/INPUT
Mandatory
29608
INBOUND/INPUT
Mandatory
29610
INBOUND/INPUT
Mandatory
29612
INBOUND/INPUT
Mandatory
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
29620
INBOUND/INPUT
Mandatory
29622
INBOUND/INPUT
Mandatory
29628
INBOUND/INPUT
Mandatory
29630
INBOUND/INPUT
Mandatory
29700
INBOUND/INPUT
Mandatory
29711
INBOUND/INPUT
Mandatory
29712
INBOUND/INPUT
Mandatory
29713
INBOUND/INPUT
Mandatory
29714
INBOUND/INPUT
Mandatory
29720
INBOUND/INPUT
Mandatory
29800
Mandatory, JMX
29807
INBOUND/INPUT
Mandatory
29811
Mandatory, JMX
29812
Mandatory, JMX
29813
Mandatory, JMX
29820
Mandatory, JMX
29908
Mandatory, JMX
29910
Mandatory, JMX
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
29920
Mandatory, JMX
29922
Mandatory, JMX
29928
Mandatory, JMX
29930
Mandatory, JMX
30020
Mandatory, JMX
3100032999
INBOUND/INPUT
Mandatory
4915265535
INBOUND/INPUT
Dynamic ports are used for intercomponent channels using Java RMI
Mandatory
Port Usage
Mandatory/Optional
25
80
Mandatory.
Optional if you are
accessing console through
HTTPS (port 443)
123
Optional.
Not needed if Network
Time Protocol not used, but
we recommend using this
to keep times between
servers in sync.
383
INBOUND/INPUT
Optional.
Mandatory if HP Operations
Manager is used
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
389
Optional.
Mandatory if LDAP is used
443
Optional.
Mandatory if HTTPS
access is used.
1098
INBOUND/INPUT
Mandatory
1099
INBOUND/INPUT
Mandatory
1433
1434
1521
Optional, Mandatory if
Oracle database used
2507
INBOUND/INPUT
Mandatory
4444
INBOUND/INPUT
Mandatory
4445
INBOUND/INPUT
Mandatory
4504
INBOUND/INPUT
Mandatory
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
5001
INBOUND/INPUT
Optional.
Mandatory if BPM/VuGen
is used.
8009
INBOUND/INPUT
Mandatory
8080
8083
INBOUND/INPUT
Mandatory
8093
INBOUND/INPUT
8443
INBOUND/INPUT
Mandatory
9389
INBOUND/INPUT
Optional.
Mandatory if LDAP is used
11020
INBOUND/INPUT
Mandatory
11021
Mandatory, JMX
21212
Mandatory, JMX
21302
INBOUND/INPUT
Mandatory
21303
INBOUND/INPUT
Mandatory
29601
INBOUND/INPUT
Mandatory
29602
INBOUND/INPUT
Mandatory
Port
Number Type of Traffic
Port Usage
Mandatory/Optional
29603
INBOUND/INPUT
Mandatory
29604
INBOUND/INPUT
Mandatory
29612
INBOUND/INPUT
Mandatory
29616
INBOUND/INPUT
Mandatory
29629
INBOUND/INPUT
Mandatory
29807
INBOUND/INPUT
Mandatory
29903
Mandatory, JMX
29904
Mandatory, JMX
29916
Mandatory, JMX
29929
Mandatory, JMX
3100032999
INBOUND/INPUT
HP Business Service
Management service (Nanny
Manager), uses the first
available port in range
Mandatory
4915265535
INBOUND/INPUT
Mandatory
Tasks
Note: The ports listed above are the ports BSM uses. If you need to change a port assignment, it
is strongly recommended that you first consult with HP Software Support.
This section includes:
"How to Manually Change Ports 1433 and 1521" on the next page
b. Modify the Local Virtual Gateway Server for Data Collectors URL to include the new port.
4. Modify the Open BSM URL
a. Remotely connect to the BSM Gateway server and select Start > All Programs > HP
Business Service Management.
b. Right-click Open HP Business Service Management and select Properties.
c. In the Web Document tab, modify the URL field as follows: http://<Gateway Server>:<new
port>/topaz.
5. Modify the web server settings
Modify the web server settings. This procedure varies depending on your version of Windows and
web server type. They should all be performed in the BSM Gateway server. The following are
examples for Windows Server 2008 using three different web servers:
For IIS 7.x / 8.x with Windows Server 2008 / 2008 R2 / 2012 / 2012 R2:
a. Open Microsofts Computer Management tool by right-clicking My Computer and selecting
Manage.
b. Expand Roles > Web Server and select Internet Information Services.
c. In the right-hand panel you can see the IIS Manager. In the left part of this panel
(Connections), expand the connection of the current machine and expand the Sites node.
d. Right-click Default Web Site and select Edit Bindings.
e. Select the line that listens to port 80 and click edit to change the value to the new port.
For Apache with Windows Server 2008:
a. Open the file <BSM_Gateway_home>\WebServer\conf\httpd.conf in a text editor.
b. Go to the line that begins with Listen, and modify the port value as required.
c. Go to the line that begins with ServerName and modify the port value as required.
6. Restart all BSM servers and update data collectors.
Restart all BSM servers and update any data collectors that were configured before you modified
the port (for example, RUM, BPM, SiteScope). Modify the Gateway Server address in each data
collector to reflect the new port as follows: BSM Gateway>:<new port>.
Note: When you perform a Full Model synchronization in System Health, the JMX port will be
reset to 8080. To avoid resetting this port, see the instructions in the Troubleshooting and
Limitations chapter in Using System Health.
1. Change the Tomcat HTTP connector listening port definition.
a. In a text editor, open the file <BSM_home>\EJBContainer\server\mercury\deploy\httpinvoker.sar\META-INF\jboss-service.xml.
b. Locate the string 8080.
c. Change the port number.
d. In a text editor, open the file <BSM_home>\EJBContainer\server\mercury\deploy\jbossweb.deployer\server.xml.
internalport=<new port>
d. Under the key [HKEY_LOCAL_
MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters], replace the existing
port with the new port.
e. Restart the operating system.
7. Restart all BSM servers.
8. Configure HP BSM to check the availability of the new Tomcat Coyote connector port.
a. In a text editor, open the file <BSM_home>\EJBContainer\bin\mercury_run.bat.
b. Replace the port number in the line that begins with "SET PORTS_LIST=".
Comments
\HPBSM\BLE
\HPBSM\conf
\HPBSM\dat
\HPBSM\dbverify\conf
\HPBSM\EJBContainer\bin
\HPBSM\bin
\HPBSM\lib
\HPBSM\AppServer\GDE
\HPBSM\odb\conf
\HPBSM\odb\lib
\HPBSM\odb\classes
\HPBSM\odb\runtime\fcmdb
\HPBSM\_postinstall
\HPBSM\opr\bin
Resource
Comments
\HPBSM\opr\lib
\HPBSM\opr\webapps
\HPBSM\opr\newconfig
Learn About
Multilingual User (MLU) Interface Support
The BSM user interface can be viewed in the following languages in your web browser:
Language
French
Spanish
Spanish [es-ES]
German
German [de-DE]
Russian
Russian [ru-RU]
Japanese
Japanese [ja]
Korean
Korean [ko]
Simplified Chinese
The following are languages in which BSM can operate but the user interface of only Run-time Service
Model (RTSM)-related pages are presented in the language:
Language
Dutch
Portuguese
Italian
Use the language preference option in your browser to select how to view BSM. The language
preference chosen affects only your local machine (the client machine) and not the BSM machine or
any other user accessing the same BSM machine.
Tasks
How to Display Non-Latin Languages in Service Health Top View
1. Verify that you correctly followed the instructions for installing the JRE on a non-Western
Windows system. See the Oracle web site for details.
2. Make sure that you:
n
(For users installing the JRE on non-Western 32-bit machines) - Select a Custom Setup Type.
In Custom Setup under feature 2 (Support for Additional Languages), select This feature
is installed on local hard drive.
If you use a CJK language in your browser, you must ensure that the Gateway Server machine
running BSM has East Asian languages installed. On the machine on which the BSM Gateway
Server is installed, select Control Panel > Regional & Language Options > Languages >
Install files for East Asian languages.
Note: This configuration will not work for an SQL Server installed in English.
If you installed BSM on a non-English Windows operating system, the command line tool output
may not be displayed correctly because the Windows and OEM code pages differ. This may not be
the case on many Asian language systems, but is often experienced on non-English European
systems.
To fix this, configure the Windows Command Prompt so that a TrueType font is used and the OEM
code page is the same as the Windows code page.
In a Windows Command Prompt window (run cmd.exe):
a. Right-click the title bar, select Properties, and open the Font tab.
b. Change the font from Raster Fonts to a TrueType font, and change the font size if necessary
(for example: select Lucida Console, 12 pt).
c. If prompted, modify the shortcut to make the font change global.
Note: If you use other command line tools, such as PowerShell or Cygwin Bash, change the
font for each of these tools separately.
To change the codeset for the system, open the registry editor (regedit), and go to: Computer\HKEY_
LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Control\Nls\CodePage. If the values of ACP and OEMCP differ, edit
OEMCP to the same value as for ACP, and reboot the system.
Note: If changing the OEM code page for the system is not acceptable, for each newly opened
Comand Prompt window, change the code page value using the command: chcp <APC
value>.
Business Process Monitors and the Gateway Server must be installed on an operating system that
During Business Process Monitor installation, non-Latin characters cannot be used for the host
name and location. If necessary, after installation you can change the names to include non-Latin
characters, in Admin > End User Management > Settings.
The installation path for all BSM components must not contain non-Latin characters.
When content packs are available in more than one language, the language of content packs
automatically loaded during BSM installation depends on the current locale of the host operating
system. If there are matching content packs for the current locale, these are installed. If the locale
does not have localized content packs, English content packs are used. Later, a user can upload
the content pack in another language manually.
At every Gateway Server startup, the contents of the following directory is checked: <HPBSM root
directory>/conf/opr/content/<locale of server>
Any package that has not already been loaded, and that does not have unresolved package
dependencies (references to packages, which are neither already loaded nor in the same folder), is
loaded during this startup.
The following directory is checked next: <HPBSM root directory>/conf/opr/content/en_US
Any content packs that were not uploaded from the first location are uploaded. This can result in
mixed-language content.
The packages are loaded with the standard import mode; already existing artifacts are not changed.
Only new artifacts are added.
Note: Progress can be followed in the admin backend log file. The operation is done in the
background and may still be in progress when a user logs in. The system prevents multiple
content packages from being loaded at the same time.
To work in a non-Latin-character language BSM environment, you can use either an Oracle Server
database or a Microsoft SQL Server database. When using a Microsoft SQL Server database, it
should use the same encoding as you use in your BSM servers. When using an Oracle Server
database, the encoding of the database can also be UTF-8 or AL32UTF-8, which supports both nonLatin-character languages as well as multiple languages. For a list of supported and tested
database servers, refer to the BSM System Requirements and Support Matrixes.
When you create a new Oracle instance in an Oracle database, you must specify the character set
for the instance. All character data, including data in the data dictionary, is stored in the instance's
character set. For details on working with Oracle databases, refer to Deploying and Maintaining the
Oracle Server Database in the BSM Database Guide. For supported and certified Oracle character
sets, refer to Oracle Summary Checklist in the BSM Database Guide.
l
The SiteScope Database Query Monitor can connect to an Oracle database but the Oracle user
names and passwords must contain only Latin characters.
Administration Issues
l
Email alerts sent with ISO-2022-JP encoding are supported only by an SMTP server running on a
Windowsplatform. Use of this encoding affects all BSM servers.
When using the default authentication strategy, Lightweight SSO, to authenticate users logging into
BSM, user names and passwords can be in non-Latin characters.
To support non-Latin characters in BSM databases, the encoding for databases must be defined as
UTF-8 or AL32UTF-8 (Oracle only), or set to the specific language.
Note: This cannot be done for SQL Server.
To support non-Latin characters in log files, set the log4j encoding property on the log4j
configuration files.
To write a specific log in UTF-8 encoding, do the following:
a. Search the specific log name in log4j configuration at conf/core/Tools/log4j.
b. In the properties file where this log file is configured, add the following property:
log4j.appender.<appender name>.Encoding=UTF-8
For example, the jboss_server.log configuration follows:
#######################################
### define appender: jboss.appender ###
#######################################
# jboss.appender is set to be a FileAppender which outputs to log/jboss_
server.log
log4j.appender.jboss.appender=org.apache.log4j.RollingFileAppender
log4j.appender.jboss.appender.File=${merc.home}/${log.file.path}/jboss_
server.log
log4j.appender.jboss.appender.MaxFileSize=${def.file.max.size}
log4j.appender.jboss.appender.Encoding=UTF-8
log4j.appender.jboss.appender.MaxBackupIndex=${def.files.backup.count}
log4j.appender.jboss.appender.layout=org.apache.log4j.PatternLayout
log4j.appender.jboss.appender.layout.ConversionPattern=${msg.layout}
Non-Latin characters may not appear or may be corrupted in the Topology View. If you encounter
this problem, install the Arial Unicode Microsoft font from the Microsoft web site.
By default, BSM only supports English language Siebel. Do not deliver data from a non-English
version of Siebel to BSM. You should use special translation adapters to enable BSM to work with a
non-English version of the Siebel application. For details, contact HP Software Support.
Report Issues
l
BSM does not support Custom Report names that contain more than 50 multibyte characters.
The Page Component Breakdown report does not support URLs that contain multibyte characters.
When specifying a URL and a location from which to run the breakdown, you must enter Latin
characters in the URL box.
Excel reports must have Latin-character file names when uploading to BSM running on a Chinese
Simplified operating system. To view Excel reports, select Applications > User Reports >
Report Manager.
Reports downloaded from BSM to Excel cannot be displayed properly on an operating system
whose language differs from the data language.
To download Excel files with multibyte data when BSM is installed on an English-language
machine, set the user.encoding entry in the <HPBSM root
directory>\AppServer\resources\strings.properties file to the correct encoding.
If the Business Process Monitor (BPM) log files contain non-Latin-character data, you must open
them in a viewer that supports UTF-8 format parsing, for example, Notepad, rather than from the
View BPM Files window in the BPM Admin Console.
Log files that are saved in the default encoding of the server on which the BPM Admin Console is
installed are shown correctly in the View BPM Files window.
All BPM instances (such as application, scripts, and parameters) should be named with Latin
characters or BPM Server locale characters only.
Real User Monitor supports non-Latin characters in UTF-8 format. For details on configuring the
RUM probe to support non-Unicode encodings, see Configuring the HP Real User Monitor Probe for
I18N in the Real User Monitor Administration Guide.
To support non-Latin characters from Real User Monitor, the encoding for BSM databases must be
defined as UTF-8, or set to the specific language. For further details, see "Database Environment
Issues" on page135.
The Real User Monitor Probe Windows installation screens are in English only and are not
translated. For details on installing the Real User Monitor Probe, see Installing the HP Real User
Monitor Probe in the Real User Monitor Administration Guide.
Multilingual Issues
l
The SNMP notification method does not support multilingual text, and can only send a notification in
the character set of the Gateway Server machine. This is because BSM uses SNMP version1.0,
which does not support multilingual data.
Error messages in the Failed Transactions report do not display correctly when BSM runs on an
English operating system and the Business Process Monitor runs on a Japanese operating system.
To access the Failed Transactions report, select Applications > End User Management >
Business Processes > Error Summary. Locate the General Errors table, and click a link to open
the Failed Transactions window.
BSM can store multilingual data only when Oracle is used and is set up as UTF-8 encoding.
However, a regular executable cannot usually accept multilingual data on the command line.
The following table describes the procedures that you must perform to add multilingual data to the
command line when running an executable file upon alert:
Platform
Procedure
Windows
To prevent multilingual data from being lost, write the application with a wmain
function instead of a main function. You can also use another main-type function that
can take command line parameters of type wchar instead of type char.
Note: When you use the SubAlerts command line option, the created XML file does
not include an encoding attribute, and the encoding is different from the default UTF-8
encoding.
Solaris
Inform the writer of the application that the parameters passed to the application must
be encoded in UTF-8.
For details on Using a Custom Command Line When Running an Executable File upon Alert, see
"Run Executable File Dialog Box" in the BSM Application Administration Guide.
l
An executable file that was created for a previous version of BSM is compatible with a multilingual
version.
There is no language pack installation. All translated languages are integrated into the BSM
Multilingual User Interface (MLU).
Data remains in the language it is entered in, even if the language of the web browser changes.
Changing the language of the web browser on your local machine does not change the language of
any data that was entered by a user.
You cannot deploy a package if the server locale is different from the client locale and the package
name contains non-Latin characters. For details, see "Package Manager" in the RTSM
Administration Guide.
You cannot create a package that contains resources (for example, views and TQLs) having nonLatin characters in their names, if the server locale is different from the client locale. For details, see
"Package Creation and Deployment in a Non-English Locale" in the RTSM Administration Guide.
In the Modeling Studio, you cannot create a new view if the view's name contains more than 18
Japanese characters. For details on creating new views, see "Modeling Studio" in the Modeling
Guide.
In Location Manager, all geographical locations are in English, regardless of the UI language
selected. Logical locations may be named in any language you choose, and remain in that language
even if the UI language is subsequently changed.
The BSM server status HTML page appears only in English. It is not translated into any other
language. For details, see Post-Deployment in the BSM Installation Guide.
To access
l
Learn About
Location Manager Overview
The Location Manager is used to define geographical and logical location CIs and assign them ranges
of IP addresses. Location CIs can be attached to any other CI. They are used, for example, to attach a
location to a Business Process Monitor (BPM) agent or a page discovered automatically by Real User
Monitor (RUM).
Location Manager is accessible to users who have Administrator or System Modifier predefined
permissions. Permissions are configured in Admin > Platform > Users and Permissions.
Location Entity. An entity that describes a place in the world. It may be a geographical location,
such as a country or a city, or a logical location, such as a building. The location entity may be
connected to devices and logical CIs representing end-users or data center locations.
Geographical Location. An absolute location in the world, selected from a predefined list of
cities/states/countries, and assigned specific geographical coordinates.
Logical Location. A user-defined virtual location, which may or may not relate to a real location in
physical space. If you assign geographical coordinates to a logical location, these coordinates can
be changed or deleted.
Note: All geographical locations are in English, regardless of the UI language selected. Logical
locations may be named in any language you choose, and remain in that language even if the
UI language is subsequently changed.
Hierarchy. Locations may be nested under other locations, creating a hierarchical tree with a
maximum of seven levels under the root.
Geographical Coordinates. Longitude/latitude values, in degrees (expressed as decimal
fractions). Coordinates are assigned to individual locations.
Default Container. The parent location for all locations discovered automatically by Real User
Monitor (RUM). By default, the Default Container is World (the root of the Locations tree), but any
location on the tree can be set as the Default Container.
IP Ranges. Each location may be assigned a set of IP ranges. An IP range is a range of IP
addresses that have been designated for use by devices in a certain geographical area.
Using the Location Manager in Platform Admin. For details on the user interface, see "Location
Manager Page" on page148.
Mass upload from an XML file. BSM enables you to create and define location CIs using an XML
file external to the user interface. Mass upload is an alternative to using the user interface, and
better suited for defining a large number of locations.
For details, see "How to Create Location Hierarchy of using XML File" on the next page.
Using Real User Monitor (RUM). When RUM encounters an IP address for which the location is
unknown, that IP is propagated to the Location Manager for location discovery. The Location
Manager then searches in the Hexasoft IP2Location repository for a geographical location that
matches the given IP address. If a match is found, new locations are created in the Location
Manager for the IP address. Depending on the information in the IP addresses repository, at most
three locations (country, state, and city) may be created for each IP address.
Note: If End User Management (EUM) is enabled after being disabled, it may take a few hours
until automatic discovery of locations starts to work. This is the time that it takes for the IP-tolocation information to load into the database.
Tasks
This section includes the following tasks:
l
"How to Create Location Hierarchy of using XML File" on the next page
<?xml version="1.0" encoding="UTF-8"?> This states that this is an XML file with UTF-8
character encoding.
<!DOCTYPE locations_manager SYSTEM "./locations.dtd"> This is the document type
declaration. The locations.dtd file is located in the HPBSM/conf/locations folder. The path to
locations.dtd must be specified relative to the location of your XML file, and may need to be
updated. If your XML file is saved in the same location as locations.dtd, no path is necessary.
The XML file is validated using the locations.dtd file. If the XML structure is incorrect, you get a
SAXParseException and the operation fails. If the DOCTYPE line does not correctly reference the
path of the locations.dtd file, validation and the entire operation fails.
Note: Populating the location manager through XML results in deletion of all locations that were
previously defined in the Location Manager.
Los Angeles; latitude 34.0396, longitude -118.2661; ISPv4 address range 4.38.41.136 to
4.38.80.152 (ISP = Level 3 Communications); ISPv6 address range
2002:0C19:8B00:0000:0000:0000:0000:0000 to 2002:0C19:B28F:0000:0000:0000:0000:0000 (ISP
location_2
o
location_2a
location_2b
location_3
location_4
For information on each of the XML elements and attributes, see "XML Tag Reference" on page155.
Create locations with the user interface. Use the Locations Manager user interface to create,
edit, and manage locations and assign them IP ranges. For details about the user interface, see
"Location Manager Page" on page148.
Populate the Location Manager using an XML file. Upload location CIs to the Location Manager
using an XML file external to the user interface. Mass upload is an alternative to using the user
interface, and better suited for populating the Location Manager with a large number of locations.
For details on this task, see "How to Update Locations Using Mass Upload" below.
No two locations on the same hierarchical level (having the same parent) may have the same name.
A location directly under customer_hierarchy (that is, directly under the root location, World) and a
location in another place in the hierarchy may not have the same name unless one instance refers to
a geographical location and the other to a logical location; or they refer to different types (country,
state or city) of geographical locations, such as the country Mexico and city Mexico, or the state
New York and city New York.
All location ID values in the XML must match an existing location with that ID.
Or
1. Export the current hierarchy as XML using the JMX console, as described in the steps below.
2. Open the JMX console on this machine. (For detailed instructions, see "JMX Console" on
page91.)
3. Under the BSM-Platform section, select service=Locations Manager.
4. Invoke the convertLocationsHierarchyToXML method with the following values:
n
customerId. By default, use 1 for customerID. If you are an HP SaaS customer, use your HP
SaaS customer ID.
target path. The location where you want to save the XML file.
Check that the list of existing locations looks accurate. The World root location is not included
in this XML file.
To modify a location, change the fields, but do not change the real ID.
To delete a location, delete all its details from the XML file.
To change a location's position in the hierarchy, move the location with its real ID to another
position in the XML file.
6. Save the XML file you created to a network location accessible to the BSM server.
Save the XML file into the same directory as the locations.dtd file so you do not have to
reference a different path in the document type declaration line of the XML file. The
locations.dtd is located in the <HPBSM root directory>\conf\locations directory.
7. To upload your edited XML file, in the JMX service=Locations Manager, invoke the
buildLocationsHierarchyFromXML method.
a. In the xmlFilePath parameter, enter the path to the location where you saved the XML file.
b. In the saveInFile parameter, select True to save the existing locations hierarchy in the file
<HPBSM root directory>\conf\locations\current_locations_hierarchy.xml.
The locations have now been uploaded to the Location Manager. They are visible on the Locations Tree
of the user interface and through the JMX console.
UI Descriptions
This section includes:
l
UI
Element Description
Delete location. Click to delete a location and its children locations.
If you delete a location, any IP ranges assigned to it or its children can be moved to its
parent location. To do this, select the Move IP Ranges to the Parent Location check
box in the Confirmation window that appears.
Cut location. Click to cut a location. The location is copied to the clipboard, and can be
pasted below another element in the locations tree.
Note: When a location is cut, it remains visible, grayed out, in its former place on the tree,
until it has been pasted in a different position. To deselect a cut location before it has
been pasted to a different position, and return it to its original position, click Cut location
again.
Paste location. Available when a location has been cut and the user has navigated to
another part of the tree.
Set as default container. Click to set a particular location as the default container. This
is the parent location for all automatically discovered locations.
For more information, see "Location Manager Overview" on page142.
Note: Geographical location can be set only from a predefined list. If you manually enter the name
of a location, it is created as a logical location.
User interface elements are described below:
UI Element
Description
<Country or
Use the first and third drop-down controls to select country or area and city.
Area>/<State>/<City> When USA is selected as country, the middle dropdown becomes
available, and can be used to select a particular state.
UI Element
Description
Set geographical location. Click to locate the geographical coordinates
(longitude and latitude) of the selected country/state/city and automatically
enter name and coordinates into the appropriate fields under Location
Properties, defining the location as a geographical location.
Select Location Coordinates. Click to launch the Geographical Map
dialog box, which can be used to select the geographical coordinates of
any location.
For more information, see "Geographical Map Dialog Box" on page154.
Get coordinates from nearest parent. Click to copy the geographical
coordinates of the closest parent location with coordinates, to the selected
location.
Name
Longitude/Latitude
IP Ranges Area
You can use the IP Ranges area to assign IP ranges to a location. Real User Monitor (RUM) then uses
these ranges to assign newly discovered pages and other CIs to particular locations.
The table of IP ranges may contain thousands of pages. To view the table in a single file, you can
export it in Excel or Adobe Acrobat (PDF) formats.
User interface elements are described below:
UI
Element Description
New IP Range. Click to create a new IP range. Opens the New IP Range dialog box.
Note: A particular IP range can be assigned to only one location.
If you try to assign an IP range that overlaps with a parent IP range, a message displays,
warning that this action will remove the IP range from the parent location. (Only the area
of overlapping ranges is removed, and the parent IP ranges are adjusted accordingly.)
Click Remove from Parent to remove the overlapping IP range from the parent and
reassign it to the selected location, or Cancel.
If you try to assign an IP range that overlaps with a range already assigned to another
location (not a parent), an error message is displayed and you must select a different IP
range.
Edit IP Range. Click to edit a selected IP range. Opens the Edit IP Range dialog box.
See "New/Edit IP Range Dialog Box" on the next page.
Delete IP Range. Click to delete one or more selected IP ranges.
Export to Excel. Click to export IP range information for the selected location to an
Excel spreadsheet.
Export to PDF. Click to export IP range information for the selected location to an Adobe
Acrobat file.
Find
Range
of IP
IPv4 (Internet Protocol version 4) for addresses consisting of four numbers, each
ranging from 0 to 255, in dot-decimal notation)
UI
Element Description
From
IP/To
IP, ISP,
IP
Version
To filter the IP ranges for a particular string of text in their lower and upper IP range limits,
ISP names, or IP versions, enter the string in the From IP, To IP, ISP, or IP Version
boxes.
These boxes may be used in combination with each other. An asterisk (*) may be used as
a wildcard to represent one or more characters.
For example:
l
under IP Ranges.
From
IP/To IP
Internet Protocol version 4 (for IP addresses consisting of four numbers, each ranging
from 0 to 255, in dot-decimal notation)
Internet Protocol version 6 (for IP addresses consisting of eight hexadecimal
numbers, each ranging from 0 to FFFF, in colon-separated notation)
Use the From IP and To IP boxes to set the range of IP addresses for the location.
l
For IPv4, as you enter an IP address in the From IP box, a corresponding address
ending with 255 is automatically entered into the To IP box. All values in both boxes
may be changed to any permissible value (0-255), but the address in the To IP box
must be the same or higher than the address in the From IP box.
The IPv4 range must not exceed 50,000,000 IP addresses.
ISP
For IPv6, as you enter an IP address in the From IP box, the same address is
automatically entered into the To IP box. All values in both boxes may be changed to
any permissible value (0-FFFF), and the address in the To IP box may be higher, the
same, or lower than the address in the From IP box.
To access, from the Location Properties area of the Locations page, click
Description
Zoom In. Click to zoom in on the map.
Note: This icon is located on the toolbar. Another Zoom In icon with
identical functionality appears on the map.
UI Element
Description
Zoom Out. Click to zoom out on the map.
Note: This icon is located on the toolbar. Another Zoom Out icon with
identical functionality appears on the map.
Reset. If you open the Geographical Map at a particular set of coordinates
and then pan elsewhere, clicking Reset recenters the map to the starting
coordinates.
Pin/Drag radio
buttons
Select Pin to move the pin to any location on the map by clicking on that
location. Double-clicking moves the pin and zooms in on the location.
Select Drag to drag the map.
<Country or
Use the first and third drop-down controls to select country or area and city.
Area>/<State>/<City> When USA is selected as country, the middle drop-down becomes
available, and can be used to select a particular state.
Find location on map. Click to locate the selected country or area and
city on the map.
Pan in Any Direction. Click and hold on this control and drag to pan
across the map.
Road View
Aerial View
Bird's Eye
Labels
In Aerial View, click to display or hide map labels. This is disabled in Road
View.
Enter Coordinates
Elements Table
Element
Description
locations_
manager
Attributes
Element
Description
Attributes
customer_
hierarchy
customer_
id
locations_list
location
latitude
longitude
ip_ranges
ip_range
start_ip
location_
name
ip_v6
Upper limit of IP address range. For supported IPv4 and IPv6 notation
formats, see start_ip, above.
Note: IPv4 range must not exceed 50,000,000 IP addresses.
isp
l
Attribute Table
Attribute
Parent
Element
Description
Example
<customer_
hierarchy
customer_
id="1">
Attribute
Parent
Element
Description
Example
location_
name
location
ip_v6
ip_range
<ip_range ip_
v6="true">
The following attributes are exported when exporting the current hierarchy as XML but are not required
when defining new locations in the XML. When updating an existing location through XML, these
attributes need to be preserved:
Attribute
Parent Element
Description
original_geo_location_id
location
location_type
location
Possible values:
location_id
location
"undefined" (default)
"country"
"state"
"city"
Example:
<location_name="UNKNOWN" location_type="undefined" location_
id="47a3711c334fd8577858c6da60b3e0e6" original_geo_location_id="Unknown_Unknown">
Learn About
This section includes:
l
Define the contents of a content pack and save the definition. For details, see "Defining Content
Packs" on page161.
Manage dependencies between content packs. For details, see "Dependencies in Content Packs"
on page169.
Export a content pack (definition and content) and the data it references to a file called a content
pack. For details, see "Exporting Content Packs" on page172.
Import a content pack (definition and content) and the data it references. For details, see "Importing
Content Packs" on page170.
Content Types
Content types are referred to using the following terminology:
l
Predefined Content
Predefined content is usually content provided by HP or HP Partners and is designed to provide the
initial configurations for a BSM installation.After installing a predefined content pack, you may
change these initial artifacts to suit your environment and management needs. Any modified
predefined artifacts are labeled as Predefined (Customized).It is not possible to remove
predefined artifacts, but you can revert any customized artifacts to their original, "predefined"
values.
Custom Content
Custom content is content that is created by the customer, for example for managing a custom, inhouse application, and is labeled as Custom.
Customized Content
Modified predefined artifacts are labeled as Predefined (Customized).You can revert any
customized artifacts to their original, "predefined" values.
Predefined content packs must contain unique content. It is not possible to include identical
content in more than one predefined content pack. This is checked on export and an appropriate
error message displayed.
Predefined content packs cannot be modified or directly deleted (as opposed to artifacts which
can be modified). If you want to make changes to a predefined content pack, you must create a
new version. When you import a new predefined content pack version, it overwrites the old
version.
Note: To modify a predefined content pack, select Create a New Version of the Selected
Content Pack Definition and specify a new version number. For more details, see "How to
Create a New Version of a Predefined Content Pack Definition" on page163.
It is only possible to delete a predefined content pack in Content Pack Development mode
(enabled in the Infrastructure Setting: Operations Management - Content Manager
Settings).
A Content Pack Definition is identified by its name and version. It is not possible to have two Content
Pack Definitions in the system with same name and version. It is possible to duplicate any definition by
specifying either different name or different version. A new or duplicated content pack definition is
labeled as a custom definition.
Only one Content Pack Definition with a given name can be predefined. If a Content Pack with
predefined content based on a Content Pack Definition with the same name is imported, its definition
does replace the existing definition.
Predefined content packs with predefined content from HPare imported during the BSM product
installation. You can change the predefined artifacts, which then are marked as Predefined
(Customized). You can also revert customized artifacts to their original predefined values, but you
cannot delete them.
For details, see "Content Pack Auto Upload Command-Line Interface" on page183.
To access
l
Select Admin > Operations Management > Setup > Content Packs
Learn About
Defining Content Packs - Overview
A content pack definition contains a list of the data and the relationships between them to be included in
a content pack which you can export to another BSM installation.
Creating a content pack is a two-step process. First you create the content pack definition in the
Content Manager, and then you use the definition to export selected content to a content pack file.
Note: The content pack definition does not include the CI types themselves. To exchange CI
types, use the features provided by the Run-time Service Model (RTSM).
Tasks
This section includes the following tasks:
l
"How to Create and Edit Content Pack Definitions" on the next page
"How to Create a New Version of a Predefined Content Pack Definition" on the next page
2. In the General page of the wizard, or the General tab of the dialog box, enter information in the
Display Name, Name, and Version fields.
n
The Name field is limited to a maximum length of 255 characters. The first character must be a
letter (A-Z, a-z) or an underscore (_). All other characters may be letters, numbers, or
underscores. No leading or trailing spaces are allowed. When you export the content pack, the
contents of the Name field is the default file name for the file, with OMi Content Pack - as a
prefix.
The Display Name is the name displayed in the Content Pack Definitions list, and need not be
unique. It is limited to a maximum length of 255 characters.
The Version is a free text field. Use Version in combination with Display Name to manage
version control of your content packs.
3. Continue to follow the wizard pages or edit the tabs of the dialog box to select content, set
dependencies, and view a summary of your content pack definition's contents and any problems
found.
For details on the user interface and all the available options, see "New Content Pack Definition
Wizard" on page168.
b. Select Applications and from the Applications drop-down list, select Operations
Management.
c. From the Operations Management - Content Manager Settings pane, set Enable Content
Pack development to true.
2. Click Admin > Platform > Content Packs to open the Content Packs page and select the
predefined content pack definition for which you want to create a new version.
3. Click
to open the Create New Content Pack Definition Version dialog box.
4. Change the version number of the content pack and click OK.
The new version of this content pack is saved as a custom content pack.
5. Open the new version of the content pack definition, make the changes that you need, and save
the changes.
For details on the user interface and all the available options, see "New Content Pack Definition
Wizard" on page168.
This section typically reports inconsistencies between your Content Pack Definition and the
available content. You must solve the reported problems before exporting the Content Pack. For
example, your Content Pack Definition references content or dependent content that does not exist
in the system. You must either remove the referenced content or dependency from your Content
Pack Definition or make sure that the referenced content dependency is "installed".
l
If you are not the owner, set a dependency to the Content Pack Definition that owns the referenced
content. For details, see "How to Set a Dependency" on the previous page.
l
Make sure that you have completed the steps described above.
UI Description
This section includes:
Definitions Pane
The Content Pack Definitions pane displays a list of all the content pack definitions that are available
for your environment.
UI elements are listed in the following table.
UI
Elements Description
Refresh. Refreshes the contents of the displayed list. Use if new content becomes
available while you are working or you uploaded new contents (for example, from the
command-line interface).
New Item. Opens the Create New Content Pack Definition wizard. For details about
the wizard, see "New Content Pack Definition Wizard" on page168.
Create a New Version of the Selected Content Pack Definition. Opens the Create
New Content Pack Definition Version dialog box from which you can create a new
version of the selected content pack definition.
Alternatively, double-click a section in the Details pane to open the appropriate tab in
the Create New Content Pack Definition Version dialog box or the Content Pack
Definition in the Definitions pane (not valid for content packs that are not predefined).
For details, see "How to Create a New Version of a Predefined Content Pack Definition"
on page163.
Edit Item. Opens the Edit Content Pack Definition dialog box, which enables to you edit
the name, version, and description, content to be included, and dependencies for the
selected content pack. This dialog box presents the same screens as the Create New
Content Pack Definition wizard, but in tab format.
Alternatively, double-click a section in the Details pane to open the appropriate tab in
the Edit Content Pack Definition dialog box or the Content Pack Definition in the
Definitions pane (not valid for content packs that are not predefined).
For details, see "New Content Pack Definition Wizard" on page168.
UI
Elements Description
Delete Item. Deletes the selected content pack definition (but not referenced content
such as indicators and KPIs) from the list of definitions displayed.
Import Content Pack Definitions and Content. Opens the Import Content Pack
dialog box, which enables you to specify or browse to a file that contains the definition
details for import.
For details, see "Importing Content Packs" on page170.
Export Content Pack Definitions and Content. Opens the Select Location for
Download dialog box, which enables you to specify or browse to a file location where
you want to export the definition details.
Export Content Pack Definitions and Content (Predefined). Opens the Select
Location for Download dialog box, which enables you to specify or browse to a file
location where you want to export the definition details as a predefined content pack.
l
Details Pane
The Details pane provides high-level information concerning the properties of the selected content
pack definition and a short summary of the content pack definition's content and any problems found.
User interface elements are described below:
UI
Elements
General
Description
Displays the name, display name, version, dependent content packs, a description of
the selected content pack definition, and its origin (whether it is predefined or not).
UI
Elements
Description
Summary Displays a summary of the selected content pack definition's contents, divided into the
following subsections. Each subsection contains a list of content and for each item in
the list, the following information is displayed:
l
Expanding the content group displays the artifacts contained within that group, the CI
Type of the artifact, and the origin of the artifact (Predefined, Predefined (Customized),
Custom).
l
Selected Content. Displays a list of the content, grouped by content type, selected
for inclusion in the selected Content Pack Definition.
Referenced Content Included in This Content Pack. Displays a list of the
referenced content, grouped by content type, included in this content pack.
Referenced Content from Other Content Packs. Displays a list of the dependent
content, grouped by content type, referenced from other content packs.
Problems Displays information on any problems, such as unresolved dependencies (content that
Found
is included in the selected content pack definition but no longer exists in BSM), found in
the selected content pack definition.
Setting Dependency
If dependent content is included in more than one other content pack, you can select which content
pack to reference. This is called setting dependency.
For example, if Content Packs A and B both include the indicator CPU Load and you select the
correlation rule Database Affects WebApp (which depends on CPU Load) for inclusion in Content
Pack C, you can set the dependency in Content Pack C to reference CPU Load in either Content Pack
A or B.
To access
l
Admin > Operations Management > Setup > Content Packs and click
Learn About
Predefined or Custom Content Packs
The content of a content pack is either predefined or custom depending on how the content pack was
exported. When importing a content pack, you generally overwrite any existing data and add any new
data. If you are importing a predefined content pack, only predefined content is overwritten with new
data. Customized content is left untouched. Importing a custom content pack always overwrites
existing data.
Tasks
How to Import Content Packs
When you import a content pack, existing items with the same ID are generally overwritten. If you are
importing a predefined content pack, only predefined content is overwritten with new data. Customized
content is left untouched. Importing a custom content pack always overwrites existing data.
Unresolved references in the imported definition (for example, to unknown CI types) are not allowed.
Note: In SaaS installations, predefined content packs can only be imported by a SaaS Admin
(Super User).
1. Click Admin > Platform > Content Packs to open the Content Packs page.
2. From the Content Pack Definitions pane, click
3. In the Import Content Pack dialog box, click Browse (...) and locate the content pack you want
to import.
The default location for content packs is:
<HPBSM root directory>/conf/opr/content/<locale>
In a distributed deployment, this directory is located on the Data Processing server.
4. Optional: You can click Test to run the import in test mode. In test mode, changes are not
committed, so you can see if any problems exist before running an actual import.
5. Select Import to start the import or test operation.
Note: It is not possible to start an import if an import is already running.
To access
l
Admin > Operations Management > Setup > Content Packs and click
Learn About
Configuration Data
Using the Content Packs Manager, you can export configuration data to a file. The contact pack
contains references to the configuration data and the referenced data.
The configuration data in a content pack makes references to configuration items stored in the Runtime Service Model (RTSM) used by the system from which the content pack was exported. If these
configuration items are not present in the RTSM used by the system into which you want to import the
content pack, the configuration data in the content pack cannot work.
Export Modes
You can export a Content Pack definition and included content. There are two modes:
l
Normal Mode
Content of exported content packs is labeled as custom.
Tasks
How to Export Content Packs
Note: It is not possible to export predefined content packs.
1. Click Admin > Platform > Content Packs to open the Content Packs page.
2. In the Content Pack Definitions pane, select the content pack that you want to export.
3. To export the selected content pack to a file, click
the content pack, and select Save.
UI
Elements
ID
Description
No action required. The content pack ID is assigned automatically when the content
pack is first created.
Note: ID field is only displayed in the General tab of the Edit Content Pack Definition
dialog box, not on the General page of the Create New Content Pack Definition
wizard.
Display
Name
Name displayed in Content Pack Definitions list. This name does not have to be
unique. It is limited to a maximum length of 255 characters.
Name
Name of the content pack definition, which is limited to a maximum length of 255
characters. The first character must be a letter (A-Z, a-z) or an underscore (_). All
other characters may be letters, numbers, or underscores. No leading or trailing
spaces are allowed.
Note: The name and version combination must be unique.
When you export the content pack, this is the default file name for the file, with OMi
Content Pack - as a prefix.
Version
Required, free text field. Use to control versions of your content packs. It is limited to
a maximum length of 255 characters.
Description Brief description (limited to 1024 characters) of the content pack definition you want to
add to (or have selected in) the Content Pack Definitions pane. Use the Description
box to remind other users of the scope and content of the content pack.
Predefined
UI
Elements
(A-Z)
Description
Refresh: Refreshes the contents of the displayed list. Use if new content becomes
available while you are working or you have uploaded new contents (for example,
from the command-line interface).
Add to Included Content: Adds the selected item(s) to the list of included content.
If included content has already been included in another content pack, it is listed in
the Content in Other Content Packs pane, and can safely be excluded from the
content pack you are creating. It is not necessary to include content in multiple
content packs.
Tip: Selecting a CI type automatically selects all assigned content of the CI type and
also all assigned content for child CI types. Selecting specific content, such as an
individual indicator or KPI, automatically selects the reference to the CI type to which
the content is related.
Expand Selection: Expands the Available Content or Included Content list to
display items belonging to the selected group.
Collapse Others: Collapses all open branches except for the selected branch.
Expand: Expands the Filter pane to display available filters.
Collapse: Collapses the Filter pane.
Expands the selected folder.
Collapses the selected folder.
Include Referenced Content: Adds the selected item(s) to the list of included
content.
Exclude: Removes the selected item(s) from the list of included content.
Exclude All: Removes all items from the list of included content.
Display All Selected Content Pack Items: Expands the Included Content list to
display all items selected for inclusion in the content pack.
UI
Elements
(A-Z)
Description
Search Content: Use the Search field to find the content in the Available Content
or Included Content pane. Enter a search string in the Search box and click
.
The first content to match the specified string is highlighted. If that content is not
initially visible, the tree expands to display it.
To find the next occurrence of content matching the specified string, click
again.
The search string must be at least three characters long. Searching is automatically
started as soon as the third character is entered and the first match is highlighted.
This prerequisite avoids searches being started too often and resources being
blocked. Names with less than three characters can be found by clicking
Available
Content
Filter:
Show only
CI types
with
assigned
content
Filters the CI Types tree to display only CI types that have content assigned to them.
UI
Elements
(A-Z)
Description
Included
Content
List of content selected for inclusion in a content pack, along with any dependent
content.
Tip: To exclude an item, select an item (or group of items) and select the Exclude
button.
Color coding:
Content in
Other
Content
Packs
If content selected for inclusion is included in other content packs, it is listed here to
indicate that it can be removed from this content pack. It is not necessary to include
the same content in multiple content packs, and the recommended practice is not to
do so.
Shortcut Menus
BSM provides many shortcut menus. The shortcut menus enable quick and direct access to
information about selected elements and actions that you can perform on them.
You display a shortcut menu by right-clicking an element in the user interface. The information available
and the actions that are possible from a shortcut menu depend on the element you right-click and the
context in which it exists.
The shortcut menu in the Content page includes the following elements:
UI Elements (A-Z)
Description
Collapse Others
Expands the Included Content list to display all items selected for
inclusion in the content pack.
Exclude
Exclude All
UI Elements (A-Z)
Description
Expand Selection
Include Referenced
Content
Description
Refresh. Refreshes the contents of the displayed list of dependencies. Use if new
content becomes available while you are working or you have uploaded new contents
(for example, from the command-line interface).
Set Dependency. If referenced content is also included in other content pack
definitions, a message indicating this is displayed, and one of these was automatically
set for you.
To specify a different content pack definition for this content, use the Set Dependency
action. To include the referenced content in your content pack definition, use the Add
to Included Content action.
The dependent content in the referenced content pack is displayed in bold, indicating
that dependency has been set on it.
Add to Included Content. Adds the selected dependent content to the list of content
included in this content pack.
<Color
coding>
Color coding:
l
<Version If there is more than one version of a content pack that could be specified for referenced
dropdown content, the version dropdown box becomes active and displays the selected content
box>
pack version.You can select an alternative version and set the dependency to it.
Expanding the content group displays the artifacts contained within that group, the CI Type of the
artifact (where applicable), and the origin of the artifact (Predefined, Predefined (Customized),
Custom).
For example, indicators, mapping rules, and indicators, also show CI type, that is, the type of
configuration item to which the indicator is assigned (for example: Application, Host, or
OracleSystem).
UI Elements
Description
Selected Content
Displays a list of the selected content, grouped by content type, included in the
selected content pack definition.
Referenced
Content Included
in This Content
Pack
Referenced
Content from
Other Content
Packs
Displays a list of the dependent content referenced from other content packs,
including the display name and version of each referenced content pack.
Problems Found
Location
<BSM_Root_Directory>/bin/ContentManager
Synopsis
ContentManager <Operation> [Connection] <UserCredentials> [Option]
l
-version
l
User Credentials:
-username <login name> [-password <password>]
[-customer <customer Id>]
Option:
-verbose
Options
Option
Description
-asPredefined
-cpv,-contentPackVersion
<version>
-cu-customer <customer
Id>
-d,-delete <content_pack_
name>
-e,-export <content_pack_
name>
Exports the named content pack definition and its content to the file
specified using the -output option.
-h,-help
-i,-import <input_file>
Imports the content pack definition and its content from the specified
file.
Option
Description
-l,-list
-o,-output <output_file>
Specifies the name of the file to which you want the command to
write during the export operation.
-p,-port <port>
Sets the port number. The default port numbers are 80 for HTTP and
443 for HTTPS. Do not specify this option in conjunction with the url option.
-password <password>
-sc, -smartcard
-server <gateway_server>
-skipCheck
-snapshot
-ssl
-t,-test
Specifies the URL of the BSM gateway server to access. The default
value is:
http://<Gateway Server DNS name>:<port>/opr-admin-server
Do not specify this option in conjunction with the -server option.
-username <login_name>
The name of the user, whose account is being used for authentication
purposes.
Option
Description
-v,-verbose
-version
-wc, -winCrypto
Exit Status
Exit Status
Description
Successful completion
300-399
400-499
500-599
The exit status numbers (300-599) reflect a standard HTTP-status category (and number), for example:
Redirection (300-399). For more information about a specific HTTP error status, for example: 307,
which signifies a temporary HTTP re-direct, see the publicly available HTTP documentation.
Restrictions
The user running the ContentManager command-line interface must be a BSM user with permission to
create content packs.
The user executing the ContentManager command-line interface must have read access to the file:
<BSM_Root_Directory>/conf/TopazInfra.ini
<BSM_Root_Directory>/conf/TopazInfra.ini
Usage
ContentAutoUpload <Operation> [Option]
Operation (one of the following)::
Import Operations:
-autoUpload [-uploadFolder <directory>]
[-forceReload]
Miscellaneous Operations:
-version
Options:
-verbose
The following table gives more information about the arguments recognized by the
ContentAutoUpload command:
Option
Description
-a,autoUpload
Automatically uploads the Content Pack Definition files from the default content
pack directory on the Data Processing Server:
<BSM Root Dir>/conf/opr/content/<locale>/
Windows:
C:\HPBSM\conf\opr\content\<locale>\
Linux:
/opt/HP/BSM/conf/opr/content/<locale>/
If you want to upload content pack definitions from an alternative directory on the
Data Processing Server, specify the directory location using the -uploadFolder
<directory> option.
If you have more than one Data Processing Server, you must keep the content pack
folders synchronized because it is not possible to specify from which Data
Processing Server content packs may be imported.
All predefined content pack definition files in the specified directory are imported in
the order of their dependencies. If a content pack definition is already uploaded to
the repository, it is not uploaded again.
For information about import errors, see the following log file:
<BSM Root Dir>/log/EJBContainer/opr-webapp.log
Windows:
C:\HPBSM\log\EJBContainer\opr-webapp.log
Linux:
/opt/HP/BSM/log/EJBContainer/opr-webapp.log
-forceReload
Enforces the reload of all content packs located in the default directory (<BSM Root
Dir>/conf/opr/content/<locale>/) or the directory specified using the uploadFolder <directory> option. Non-customized content is overwritten.
-h,-help
-skipCheck
Omits the content pack consistency check. The content pack consistency check
verifies if dependent content that is not part of another content pack is either in the
content pack itself or already imported.
Caution: This option should only be used when upgrading to a newer version of the
Content Pack.
If you want to upload content packs from an alternative directory, specify the
uploadFolder directory location using the -uploadFolder <directory> option.
<directory>
For example:
ContentAutoUpload -a -uploadFolder c:\temp
Option
Description
-v,-verbose
-version
The ContentAutoUpload command displays the following values to indicate the exit status of the
requested operation:
Exit
Status
Description
SUCCESS (At least one content pack was imported and no errors occurred.)
NO_PERMISSION (User does not have appropriate permissions to execute this tool.)
To access
Select Admin > Platform > Users and Permissions > User Management
Learn About
Configure BSM Users
Groups and Users Permissions enable you to restrict the scope of a user's access to predefined areas.
You can grant permissions directly to an individual user or to a user group. User groups make managing
user permissions more efficient; instead of assigning access permissions to each user one at a time,
you can group users who are assigned the same permissions levels on the same resources.
To create users and groups, see "Configuring Users and Permissions - Workflow" on page201.
You may want to create different groups based on how users access the different resources in BSM.
For example:
Functions Within the Organization
System administrators
High-level management
You can change a user's parameters, including username and password, on the General tab. For
details, see "Create Users" on page202.
Tip: To obtain more user management capabilities and security, we recommend using external
LDAPs or Active Directory user management. For details about how to configure BSMto work
with LDAP, see "LDAP Authentication and Mapping" on page323
Define a Superuser
One superuser is defined for every installation of BSM. This superuser's login name is admin and the
initial password for this account is specified in the Setup and Database Configuration utility. This
original superuser is not listed among the users in User Management and therefore, this user's
password can be changed only on the General Settings page in Personal Settings (Admin >
Personal Settings).
You can apply superuser permissions to other users in the system. These users with superuser
permissions can be modified in User Management.
UI Description
User Management Page
When you first access the User Management page or the cursor is located on the All node, the page
displays:
l
General
Groups/Users Pane
The Groups/Users pane appears on the left side of the page, and is visible on all tabs of the User
Management application. This pane displays the list of users and groups of users configured to access
BSM.
Note: When selecting more than one user or group and modifying parameters, the changes take
effect only for the first selected user. The exception is the Delete option, which deletes multiple
users at once.
User interface elements are described below:
UI
Element Description
Creates a user or group.
Depending on whether you select to create a user or group, the Create User or Create
Group window opens.
When you create a new group or user, the Groups/Users pane refreshes and the newly
created group or user is selected.
When creating a group, the access permissions are automatically inherited by the group's
users.
When creating users with the cursor on a group, the users are automatically nested within
that group.
Note: In Firefox, after refresh, the All node is selected.
Clones the settings of an existing user or group to a new user or group
Deletes the selected user or group.
Note: When you delete a user, the linked recipient is also deleted.
Collapses or expands the groups selected in the hierarchy tree.
Note: Only previously loaded nodes are expanded.
Click Delete Obsolete Users to delete BSM users no longer configured on the LDAP
server. After selecting Delete Obsolete Users, choose a unique domain name. You can
remove multiple users at once by holding the Ctrl button while selecting users.
Click Group Mappings and select the unique domain name to map local groups to
groups configured on the LDAP server.
For details, see "Group Mappings Dialog Box" on the next page.
Note: This button is displayed only if LDAP Configuration was added using the LDAP
Configuration Wizard and enabled. For details, see "LDAP Configuration Wizard" on
page303.
Click to assign or view the Security Officer. The security officer is a user who can
configure certain sensitive reporting information in the system, such as which RUM
transaction parameters to include or exclude from certain reports (such as Session
Details or Session Analyzer).
There can be only one security officer assigned in the system. Only a user with superuser
permissions can assign the security officer for the first time. Only the security officer
himself can assign it to another user or change his own password once it has been
assigned. For details on this topic, see "Security Officer" on page198.
UI
Element Description
A configured user
A configured group
Security officer
Root node
Browse
Displays a list of configured users and groups, and enables you to create or delete users
and groups.
Search
Displays a table view of users and groups, and enables you to search for a user or group
by any of the following criteria:
l
Group name
Login name
User name
You can sort the columns by clicking the column headers above the boxes.
You can include wildcards (*) in your search.
To access
Select Admin > Platform > Users and Permissions > User Management. In the
Groups/Users pane, click the Group Mappings
domain name.
Important
Note: This dialog box is accessible only if LDAP Configuration was added by the
information LDAP Configuration Wizard and enabled. For details, see "LDAP Configuration
Wizard" on page303.
If you are switching from one LDAP server to another, ensure that you remove all
existing group mappings from the original LDAP server before mapping to the new
one.
Important
information
To synchronize LDAP groups with BSM groups, click Assign Groups to open the
Select Local Groups for Remote Group dialog box.
To view the list of users associated with the respective LDAP groups, click List
Users.
You can also select either of these options by right clicking on the group.
Once the LDAP groups have been mapped to the BSM groups, the BSM groups
are managed only from the LDAP interface. This means that the following are
fields are affected on the Users and Permissions interface:
The Hierarchy tab is enabled only for groups and not for users.
To remove groups, select the group you want to remove and click
Remove Groups.
You can remove multiple groups at once by holding the Ctrl button while
selecting groups.
Permissions
You can assign permissions to the groups and users defined in your BSM platform, enabling access to
specific areas of BSM.
Learn About
Granting Permissions
Granting permissions has the following components:
User
Resource
For details on assigning permissions, see "Assign Permissions to Groups or Users" on page203.
Permissions Tab
The Permissions tab includes the following areas:
l
The resource tree area in the center of the page, containing the contexts, resources, and resource
instances on which permissions are assigned. For details, see "Understanding Permissions
Resources" on the next page.
The roles and operations area on the right side of the page. For details on roles, see "Roles" on
page197. For details on operations, see "Operations" on page198.
Additionally, the Groups/Users pane is continually visible on the left side of the page.
The following is an example of Granting Permissions:
Resources that are functions or options within the system that do not have any other instances or
types.
Example:
The Outlier Value resource determines whether the user can edit the outlier threshold value. It
has no instances.
Resources that do have instances; permissions can be applied only on the resource type and affect
all instances of the resource.
Example:
The Category resource includes all categories defined in End User Management
Administration. Change permissions granted on the categories resource enables a user to
modify all the categories defined in the system. You cannot grant or remove permissions for
specific categories, only for every category defined in End User Management Administration.
Examples of Resources and Instances:
An example of how resources and instances are displayed in the permissions hierarchy is the
Applications resource collection within the End User Management context. The Applications
resource includes instances only if applications have been defined in the system. Some
instances may be defined by default, but others only exist if defined by the user. If there are
applications defined in the system, each of these appears as an instance of the Applications
resource.
Because BPM, RUM, and alerts are defined in your platform per application, the BPM, RUM, and
Alerts resources appear under each of the instances of the application resource.
You can apply permissions to the Applications resource level. This provides the user with access
to all applications created in the system. If you want to restrict a user's access to specific
applications that relate to the user's tasks, you can apply permissions to those specific
applications, and can also apply or removed permissions to specific resources per application.
Roles
BSM enables you to apply permissions using roles for specific users or groups in your organization.
These roles include a preconfigured collection of resources and a set of operations that apply to those
resources.
Roles are organized by context, which define what resources and operations have been preconfigured
and included in the roles. For details on how each operation applies to a specific resource, see
"Operations" on the next page.
Roles can be applied only to specific resources:
Roles that include resources from several contexts can be applied only to the Business Service
Management resource. Business Service Management appears as the first resource collection in
every context.
Roles whose resources are all within one context can be applied to specific resources within that
context.
For a description of each role, including details of the resources on which roles can be applied, see "
User Management Roles Applied Across BSM" on page217.
Operations
When working with operations, keep the following in mind:
l
All of the operations that can be applied to a resource collection can also be applied to any instance
of that resource. The one exception is the Add operation which cannot be applied to an instance of
a resource.
The Full Control operation automatically includes all the other operations available on the
resource. When applied, the other operations are automatically selected.
When the Full Control operation is applied to any resource, the user also has permissions to grant
and remove permissions on that resource, or resource instance, for other users or groups.
When the View operation is one of the resource's available operations and you select one of the
other available operations, the View operation is also automatically selected.
For details on the available operations in BSM, see "User Management Operations" on page248.
Security Officer
The security officer is a user who has security privileges to view sensitive information in the system.
The security officer is typically not a regular BSM user and receives access to configure certain
sensitive reporting information. In RUM, the security officer can configure settings for masking
sensitive data. For details, see Sensitive Data Area in the BSM Application Administration Guide.
This user does not generally access the other areas of BSM.
There can be only one user in the system assigned as security officer. Only the user with superuser
permissions can assign the security officer for the first time. Thereafter, only the user assigned as
security officer can pass on the security office designation to another user, or change their own
password. The superuser can no longer assign security officer status.
The security officer is designated by highlighting a user in the User Management tree and clicking on
the Security Officer icon. For details on the user interface, see "Groups/Users Pane" on page189.
No other user in the system can delete the user assigned as security officer. The security officer
designation must be assigned to a different user by the security officer before the user who is the
current security officer can be deleted from the system.
In unforeseen circumstances, when the security officer is no longer able to access the system and
reassign the security officer designation to another user, the administrator can use the JMX console to
clear the security officer designation from the user. For details on how to perform this task procedure,
see "How to Remove Security Officer Status Using the JMX Console" below.
Tasks
How to Remove Security Officer Status Using the JMX Console
This task describes how use the JMX console to remove security officer status from a user. This may
be necessary if under unforeseen circumstances, the security officer cannot remove the status
himself. Once the security officer is assigned, there is no other user authorized to make this change
within the User Management interface. For details on this topic, see "Security Officer" on the previous
page.
To remove a security officer:
1. In a browser, enter the URL of the JMX console:
http://<Gateway or Data Processing Server name>:8080/jmx-console/
2. Enter your JMX console authentication credentials. If you do not know your authentication
credentials, contact your system administrator.
3. Locate:
n
Setting: setSettingValuePerCustomerId
Note to HP BSM SaaS customers: You need to enter the relevant customer ID at the top
of the page. For assistance, please contact HP Support.
5. Click Invoke.
direct parent.
When nesting groups, note the following:
l
Group_A and Group_B inherit the permissions of Group_C and indirectly inherit the
permissions of Group_E.
When permissions are added to, or removed from, a parent group, the changes are
automatically implemented in the parent group's immediate children and continue to propagate
onward. For example, if delete permission in Group_D is removed, Group_B's permissions
become add + change + view + execute.
A circle of nested groups is not permitted. For example, Group_A is a member of Group_B,
and Group_B is a member of Group_C. Group_C cannot be a member of Group_A.
Note: All permissions in the previous example refer to the same resource.
For details on setting up nested groups, see "Configure User and Group Hierarchy" on page203.
Prerequisites
Before you configure User Management, you should map out the required users and groups and their
relevant permission levels. For example, enter the following information in an Excel page:
1. A list of users required to administer the system, as well as the end users who are to access
Service Health and reports. Gather appropriate user details such as user names, login names,
initial passwords, and user time zones. Although not needed to define users, at this stage it might
be useful to also collect user contact information such as telephone numbers or email addresses.
(Contact information is required for HP Software-as-a-Service customers.)
2. If categorization of users into modes (operations and business) is required, specify into which user
mode to categorize each user. For details, see Create KPIs for Operations and Business User
Modes in the BSM Application Administration Guide.
3. If multiple users require similar system permissions, create a list of groups, and the users that
should belong to each group.
4. The permissions that each user or group requires. To aid in this process, review the Permissions
Management page to learn about the different contexts and resources for which permissions can
be granted. For details, see "Understanding Permissions Resources" on page195.
Create Groups
You can create groups as sub-groups nested under other groups. Sub-groups have the same access
restrictions as the parent group.
1. Select Admin > Platform > Users and Permissions > User Management.
2. In the Groups/Users pane, select a location for the group, for example you may want to create the
group as a sub-group under another group.
3. Click the New Group/User
4. In the Create Group dialog box, enter the group name and, if required, a group description.
Note:
n
The group name must be unique, cannot exceed 40 characters, and cannot contain any of
the following special characters: " \ / [] : | < > + = ; , ? * % &
Create Users
You create users and then place them in the appropriate groups.
1. In the Groups/Users pane select the group that the user should belong to, click the New
Group/User
2. In the Create User dialog box, on the User Account tab, enter the following information:
n
User name. Cannot exceed 40 characters and cannot contain any of the following special
characters: " \ / [] : | < > + = ; , ? * % &
Login name. The name that the user uses to log into the system. The Login name must be
unique, cannot exceed 40 characters, and cannot contain special characters.
Unspecified. Leaves the user without a particular mode. Select this option if your system
does not work with user modes, or if the system works with user modes but you want this
user to see KPIs for both modes in Service Health views.
Operations User. Enables the user to view the operations version of KPIs.
Business User. Enables the user to view the business version of KPIs.
3. (Optional) On the Recipient tab, enter required information. For information about the fields on this
tab, see "New or Edit Recipient Dialog Box" on page278.
After creating a user, you can modify user information in the Groups/Users page. For user interface
details, see "Groups/Users Pane" on page189.
section
The setting should contain a string such as: ACT or Africa/Accra or Asia/Jerusalem
Note:
l
When deleting a parent group, the child groups and users are not deleted.
If BSM groups have been synchronized with groups on an external LDAP server, BSM users
cannot be moved between groups, and only groups appear on the interface. For details on
synchronizing groups, see "Synchronizing Users" on page327.
1. Ensure that you have configured at least one group and one user in the Groups/Users pane.
2. Select a group or user in the Groups/Users pane, and select the Hierarchy tab on the right side of
the page to view the parent and child groups of the group or user.
3. In the Hierarchy tab, click the Edit Child Groups and Users button.
4. Use the
or
buttons to add or remove groups or users from the list of nested items.
Select the default context that is displayed for specific users or groups when they log into BSM.
Specify the first page that is displayed for specific users or groups in each of the different parts of
BSM.
Select contexts, applications, tabs, and options that are available for users or groups.
You can customize settings for individual users or for all users in a group, including all members of subgroups that are part of a parent group. If you restrict access to a feature or report for a group, all
members of that group do not have access to the feature and you cannot override the setting for
individual users.
Users who are members of more than one group, assume the restrictions of both groups. For example,
the members of Group A are restricted from accessing all applications except App1 and App2, and the
members in Group B are restricted from accessing all applications except App2 and App3. Therefore,
users who are members of both Group A and Group B only have access to App2.
If you add users or sub-groups to a group that has group settings applied, the users or members of the
sub-groups automatically get the access restrictions that were applied to the parent group.
Note: For the Service Health and Operations Management applications, you cannot define user
access to specific pages; you can only enable or disable user access at the application level.
For a use-case scenario related to this task, see "How to Customize User Menus Use-Case
Scenario" on page212.
1. Select a group or user in the Groups/Users pane, and select the Customization tab on the right
side of the page.
2. Select a context from the Contexts pane that you want to be the default entry context that this
user or all users in a group see when they log into BSM, and click Set as Default Entry Context.
3. In the Contexts pane, clear the check boxes of the contexts and applications that you want hidden
from the user or all members of the group.
4. In the Pages and Tabs pane, select the pages and tabs that you want to be visible on the
selected context for the user or group.
5. If required, select a default page or tab for each context that appears by default when the user
opens that context.
1.
User names
Login names
Initial Passwords
Contact Information (for example, telephone number, pager, and email address)
Note: Contact information is mandatory only for HP Software-as-a-Service customers.
With this information, she then decides to create one group with the permission level of System
Modifiers, and another with the permission level of System Viewers. Further, one of the users is
assigned additional roles of SiteScope Administrator.
2.
Creating Groups
Jane groups users together according to the level of permissions they are to be granted. She
clicks the New Group/User
groups:
n
System Viewers
System Modifiers
3.
4.
Creating Users
Jane must now create users to nest within the groups, based on the required permission levels of
the individual users. She clicks the New Group/User button
in the Groups/Users pane and
while on the Root group, (All), she selects Create User and configures settings for each new
user. The Groups/Users pane appears as follows:
5.
Jane clicks the Edit Child Groups and Users button to open the Edit Child Groups and Users
dialog box:
She then selects the relevant users from the Groups/Users pane and clicks the right arrow to
move them to the Child Groups and Users pane. The Hierarchy tab indicates that these users
are nested within the System Modifiers group, as follows:
After following the same procedure to nest the relevant users in the System Viewers group, the
Groups/Users pane is displayed as follows:
Since Steve has the added permission level of SiteScope Administrator, Jane selects the
username of the user in the Groups/Users pane whom she wants to give the added permission
level of SiteScope Administrator, and in the Permissions tab, selects the System Availability
Management context. After selecting a resource, she then selects SiteScope Administrator
from the Roles tab, and clicks Apply Permissions. The resulting screen appears as follows:
6.
The entry context that the user sees when logging into BSM. For example, Admin - End User
Management.
The page within the entry context that the user sees on the selected context. For example,
Reports.
The pages and tabs that are to be visible on each BSM page by selecting or clearing the
relevant check boxes. For example, the Transaction Topology and User-created reports
pages are cleared to ensure that they are not visible on the Applications - Transaction
Management context when the user logs in.
The login page that the user sees according to the customized configurations is as follows:
1.
Choosing a User
Mary, the administrator of ABC Insurance Company, is creating several users in the User
Management section of BSM. She decides that the user John Smith should be able to view only
certain pages and tabs in BSM, and that a specific page should appear on his screen when he logs
into BSM.
2.
3.
4.
Results
The context that opens when John Smith logs into BSM is the Service Level Management
context on the Applications menu. The SLA Reports page opens, and the Status Snapshot,
Alerts, and SLA Management pages are also available to him.
The configured Customization tab in User Management appears as follows:
Export
Use JMX Console to create a .zip file that contains .xml files with user, role, and permission
information.
1. In a browser, enter the following URL:
http://<SOURCE_Server>:8080/jmx-console/HtmlAdaptor?action=inspectMBean&
name=Topaz%3Aservice%3DAuthorization+Service+Data+Import+Export
2. On the JMX MBean View page, click the Invoke button below void loadExportedContexts() and
then click the Browser's Back button to return to the JMX MBean View page.
3. Below void exportAllTasEntities(), in the ParamValue field, enter a location and file name for
the export file on the source server. The file name must have a .zip extension for example:
C:\HPBSM\export.zip
4. Click the Invoke button below void exportAllTasEntities().
Transfer
You need to copy the export .zip file from the source server to the target server.
1. On the source server, browse to the export file as defined above.
2. Copy the file to the target server.
Import
Import the users, roles and permissions from the .zip file to the target BSM system.
Caution: Before you import user and group information, make sure that the target server does not
have any created resources, such as reports, profiles, and monitors, that have user information
that is not compatible with the information that you are importing.
1. In a browser, enter the following URL:
http://<TARGET_Server>:8080/jmx-console/HtmlAdaptor?action=inspectMBean&
name=Topaz%3Aservice%3DAuthorization+Service+Data+Import+Export
2. Enter your JMX Console user name and password.
3. Below void importAllTasEntities(), in the ParamValue field, enter the location and file name of
the export file and click the Invoke button.
"Superuser" below
"Administrator" below
Superuser
The Superuser role can be applied only to the Business Service Management resource.
This role includes all available operations on all the resources in all the contexts. Only a superuser can
apply the Superuser role to another user.
Caution: The default superuser does not have permissions to write to Business Service
Management from the UCMDB WS API. Specific roles exist for that purpose. For details, see
"User Management Roles Applied to Specific Contexts" on page244.
Administrator
The Administrator role can be applied only to the Business Service Management resource.
Administrators have a collection of permissions that enable them to add profiles to the system and
manage the resources related to those profiles. After a profile has been added, the administrator has full
control privileges on all resources within that profile instance.
Allowed Operations
View
Full Control
Diagnostics
Resource
Allowed Operations
Diagnostics
Change
View
Execute
Full Control
Allowed Operations
Change
Applications
Add
View
BPM Agents
View
RUM Engines
View
Script Repository
Add
Change
View
Delete
Full Control
MyBSM
Resource
Allowed Operations
User Pages
Full Control
Resource
Allowed Operations
Predefined Pages
View
Full Control
User Components
Full Control
MyBSM (Legacy)
Resource
Allowed Operations
Modules
Full Control
Portlet Definitions
Full Control
Operations Management
Resource
Allowed Operations
Work On/Resolve
Close
Reopen
Assign To
Launch Operator Action
Launch Automatic Action
Transfer Control
Close Transferred
Add/Remove Event Relations
Change Severity
Change Priority
Change Title
Change Description
Change Solution
Add/Delete/Update Annotations
Add/Delete/Update Custom Attributes
Resource
Allowed Operations
View
Work On/Resolve
Close
Reopen
Assign To
Launch Operator Action
Launch Automatic Action
Transfer Control
Close Transferred
Add/Remove Event Relations
Change Severity
Change Priority
Change Title
Change Description
Change Solution
Add/Delete/Update Annotations
Add/Delete/Update Custom Attributes
Health Indicators
Reset
Administrative UIs
View
Tool Categories
Execute
Allowed Operations
Administration
Add
Change
View
Delete
Full Control
Execution
Execute
Full Control
Platform
Resource
Allowed Operations
Audit Log
View
Full Control
Resource
Allowed Operations
Users
Add
Change
View
Delete
Full Control
User Groups
Add
Change
View
Delete
Full Control
Data Collectors
Change
View
Scheduled Reports
Add
Change
View
Delete
Full Control
Recipients
Add
Change
View
Delete
Full Control
Add
Change
View
Delete
Full Control
Downtime
View
Full Control
Databases
Add
Change
View
Delete
Full Control
RTSM
Resource
Allowed Operations
Views
Add
Change
View
Delete
Full Control
RTSM
Full Control
CI Search
Full Control
Data Modifier
Full Control
Get Related
Full Control
ITU Manager
Full Control
Modeling Studio
Full Control
Allowed Operations
Administration
Full Control
Application
Full Control
Allowed Operations
SLAs
Add
Change
View
Delete
Full Control
Allowed Operations
Administration
Add
Change
View
Delete
Full Control
Execution
Execute
Full Control
Allowed Operations
SiteScopes
Add
Transaction Management
Resource
Allowed Operations
Change
Full Control
TransactionVision Analyzers
Change
Execute
Full Control
Change
Execute
Full Control
Change
Execute
Full Control
Administration
Change
Full Control
User Data
View
Full Control
Applications
Add
Allowed Operations
Custom Reports
Add
Change
View
Full Control
Trend Reports
Add
Change
View
Full Control
Custom Links
Change
View
Full Control
Excel Reports
Change
View
Full Control
Default Footer/Header
Change
Full Control
Favorite Filter
Change
View
Delete
Full Control
Annotation
Change
Delete
Full Control
Service Report
Change
Delete
Full Control
Add
View
Full Control
System Modifier
The System Modifier role can be applied only to the Business Service Management resource.
A system modifier can view and change any resources in BSM. There are some resources on which
the view or the change operation is not applicable. A system modifier has permissions for only those
operations that are available in BSM.
Allowed Operations
View
Full Control
Diagnostics
Resource
Allowed Operations
Diagnostics
Change
View
Allowed Operations
Change
View
Change
Applications
Change
View
BPM Agents
View
RUM Engines
View
Script Repository
View
Full Control
MyBSM
Resource
Allowed Operations
Pre-defined Pages
View
User Pages
Full Control
User Components
Full Control
Allowed Operations
Administration
Change
View
Execution
Execute
Platform
Resource
Allowed Operations
Audit Log
View
Users
Change
View
User Groups
Change
View
Data Collectors
Change
View
Scheduled Reports
Change
View
Recipients
Change
View
Change
View
Change
Change
Change
Resource
Allowed Operations
Downtime
Full Control
Databases
Change
View
Change
View
RTSM
Resource
Allowed Operations
Views
Change
View
CI Search
Full Control
Get Related
Full Control
ITU Manager
Full Control
Modeling Studio
Full Control
Allowed Operations
Administration
Full Control
Application
Full Control
Allowed Operations
SLAs
Change
View
Allowed Operations
Administration
Change
View
Execution
Execute
Allowed Operations
SiteScopes
Change
View
Transaction Management
Resource
Allowed Operations
Change
TransactionVision Analyzers
Change
Execute
Change
Execute
Change
Execute
Administration
Change
Applications
Change
View
Allowed Operations
Custom Reports
Add
Change
View
Resource
Allowed Operations
Trend Reports
Add
Change
View
Custom Links
Change
View
Excel Reports
Change
View
Default Footer/Header
Change
Favorite Filter
Change
View
Delete
Annotation
Change
Delete
Service Report
Change
Delete
Add
View
System Viewer
The System Viewer role can be applied only to the Business Service Management resource.
A system viewer can only view resources within BSM and does not have permission to change, add, or
delete any resources or resource instance with the exception of the RUMEngine resource. There are
some resources on which the view operation is not applicable, a system viewer has no access to those
resources.
Allowed Operations
View
Diagnostics
Resource
Allowed Operations
Diagnostics
View
Allowed Operations
View
Applications
View
BPM Agents
View
RUM Engines
View
Edit
Script Repository
View
MyBSM
Resource
Allowed Operations
Predefined Pages
View
Allowed Operations
Administration
View
Platform
Resource
Allowed Operations
Audit Log
View
Users
View
User Groups
View
Data Collectors
View
Scheduled Reports
View
Recipients
View
View
Downtime
View
Resource
Allowed Operations
Databases
View
View
RTSM
Resource
Allowed Operations
Views
View
CI Search
Full Control
Get Related
Full Control
ITU Manager
Full Control
Modeling Studio
Full Control
Allowed Operations
Administration
Full Control
Application
Full Control
Allowed Operations
SLAs
View
Allowed Operations
Administration
View
Allowed Operations
SiteScopes
View
Transaction Management
Resource
Allowed Operations
Applications
View
Allowed Operations
Custom Reports
Add
View
Edit (only if you are the user who created the report)
Delete (only if you are the user who created the report)
Trend Reports
Add
View
Edit (only if you are the user who created the report)
Delete (only if you are the user who created the report)
Custom Links
View
Excel Reports
View
Favorite Filter
View
Add
View
Customer Superuser
Note: This role can be applied to HP Software-as-a-Service customers only.
The Customer Superuser role can be applied only to the Active Customer resource instance. The
Active Customer resource instance is available only to HP Software-as-a-Service customers and
represents the customer level in the permissions resource tree. It is available in all contexts and applies
to all contexts (like the Business Service Management resource).
Allowed Operations
View
Full Control
Diagnostics
Resource
Allowed Operations
Diagnostics
View
Execute
Allowed Operations
Change
Full Control
Applications
Add
Change
View
Delete
Execute
Full Control
BPM Agents
View
RUM Engines
View
Script Repository
Add
Change
View
Delete
Full Control
MyBSM
Resource
Allowed Operations
Predefined Pages
Full Control
User Pages
Full Control
User Components
Full Control
MyBSM (Legacy)
Resource
Allowed Operations
Modules
Full Control
Portlet Definitions
Full Control
Platform
Resource
Allowed Operations
Audit Log
View
Full Control
Users
Add
Change
View
Delete
Full Control
User Groups
Add
Change
View
Delete
Full Control
Data Collectors
Change
View
Add
Change
View
Delete
Execute
Full Control
Notification System
View
Execute
Full Control
Change
Full Control
Resource
Allowed Operations
Scheduled Reports
Add
Change
View
Delete
Full Control
Recipients
Add
Change
View
Delete
Full Control
Add
Change
View
Delete
Full Control
Add
Change
View
Delete
Full Control
Downtime
View
Full Control
RTSM
Resource
Allowed Operations
Views
Add
Change
View
Delete
Full Control
RTSM
Full Control
CI Search
Full Control
Data Modifier
Full Control
Get Related
Full Control
ITU Manager
Full Control
Modeling Studio
Full Control
Allowed Operations
Administration
Full Control
Application
Full Control
Allowed Operations
SLAs
Add
Change
View
Delete
Full Control
Allowed Operations
SiteScopes
Add
Change
View
Delete
Execute
Full Control
Allowed Operations
Custom Reports
Add
Change
View
Full Control
Trend Reports
Add
Change
View
Full Control
Resource
Allowed Operations
Custom Links
Change
View
Full Control
Excel Reports
Change
View
Full Control
Default Header/Footer
Change
Full Control
Favorite Filter
Change
View
Delete
Full Control
Annotation
Change
Delete
Full Control
Service Report
Change
Delete
Full Control
Add
View
Full Control
Customer Administrator
Note: This role can be applied to HP Software-as-a-Service customers only.
The Customer Administrator role can be applied only to the Active Customer resource instance.
The Active Customer resource instance is available only to HP Software-as-a-Service customers and
represents the customer level in the permissions resource tree. It is available in all contexts and applies
to all contexts (like the Business Service Management resource).
The customer administrator is granted full control on a selection of resources, as well as either view,
execute, or both on other resources. This user can add profiles of any type, and has full control on the
created profile. However, the user is not granted permissions for profiles that were created by other
users, even if these profiles are for the same customer. In the case of the MyBSM resources, any user
with this role can make changes to resources defined by other users.
Allowed Operations
View
Full Control
Diagnostics
Resource
Allowed Operations
Diagnostics
View
Execute
Allowed Operations
Change
Full Control
Applications
Add View
BPM Agents
View
RUM Engines
View
MyBSM
Resource
Allowed Operations
Predefined Pages
View
User Components
Full Control
User Pages
Full Control
MyBSM (Legacy)
Resource
Allowed Operations
Modules
Full Control
Portlet Definitions
Full Control
Platform
Resource
Allowed Operations
Audit Log
View
Full Control
Users
Add
Change
View
Delete
Full Control
User Groups
Add
Change
View
Delete
Full Control
Add
Change
View
Delete
Execute
Full Control
Notification System
View
Execute
Full Control
Change
Full Control
Scheduled Reports
Add
Change
View
Delete
Full Control
Resource
Allowed Operations
Recipients
Change
View
Delete
Full Control
Add
Change
View
Delete
Full Control
Add
Change
View
Delete
Full Control
Downtime
View
Full Control
RTSM
Resource
Allowed Operations
Views
Add
Change
View
Delete
Full Control
RTSM
Full Control
CI Search
Full Control
Data Modifier
Full Control
Get Related
Full Control
ITU Manager
Full Control
Modeling Studio
Full Control
Allowed Operations
Administration
Full Control
Application
Full Control
Allowed Operations
SLAs
Add
Change
View
Delete
Full Control
Allowed Operations
SiteScopes
Add
Allowed Operations
Custom Reports
Add
Change
View
Full Control
Trend Reports
Add
Change
View
Full Control
Custom Links
Change
View
Full Control
Resource
Allowed Operations
Excel Reports
Change
View
Full Control
Default Header/Footer
Change
Full Control
Favorite Filter
Change
View
Delete
Full Control
Annotation
Change
Delete
Full Control
Service Report
Change
Delete
Full Control
Add
View
Full Control
BPM Viewer
The BPM Viewer role can be applied only to the Business Service Management resource.
These users have view permissions, but cannot modify transaction threshold settings and transaction
descriptions.
Any regular user who was added as a user on a specific application in the previous version is upgraded
to the BPM Viewer role for that application.
Resource
Allowed Operations
Applications
View
BPM Agents
View
Script Repository
View
BPM Administrator
The BPM Administrator role can be applied only to the Business Service Management resource.
The BPM Administrator can manage all of the platform's BPM applications, including permissions.
Any administrator who was added as a user on a specific BPM application in the previous version is
upgraded to the BPM application administrator role for that application. This is in addition to being
assigned the administrator role as described above (for details, see "Administrator" on page217).
Resource
Allowed Operations
Applications
Add
Change
View
Delete
Execute
Full Control
BPM Agents
View
Script Repository
Add
Change
View
Delete
Full Control
RUM Administrator
The RUM Administrator role can be applied only to the Business Service Management resource.
Resource
Allowed Operations
Applications
Add
Change
View
Delete
Execute
Full Control
RUM Engines
View
RUM Viewer
The RUM Viewer role can be applied only to the Business Service Management resource.
These users have view permissions, but can modify transaction threshold settings and transaction
descriptions.
Any regular user who was added as a user on a specific RUM profile in the previous version is
upgraded to the RUM Viewer role for that profile.
Resource
Allowed Operations
Applications
View
RUM Engines
View
BPIAdministrator
The BPIAdministrator role can be applied only to the Business Process Insight Administration
resource in the Business Process Insight context.
Context
Resource
Allowed Operations
Full Control
Full Control
BPIUser
The BPIUser role can be applied only to the Business Process Insight Application resource in the
Business Process Insight context.
Context
Resource
Allowed Operations
View
View
BPIRestrictedViewUser
The BPIRestrictedViewUser role can be applied only to the Business Process Insight Application
resource in the Business Process Insight context.
Context
Resource
Allowed Operations
Business
Process
Insight
Resource
Allowed Operations
RTSM
View
Resource
Allowed Operations
RTSM
Change
Resource
Allowed Operations
RTSM
View
Resource
Allowed Operations
RTSM
View
SiteScope Administrator
The SiteScope Administrator role can be applied only to the SiteScopes resource in the System
Availability Management context or specific instances of the resource.
When granted this role at the resource collection level, the SiteScope administrator can manage all of
the platform's SiteScopes, including permissions on the SiteScopes. When granted this role at the
instance level, the administrator can manage only those resources associated with the specific
SiteScope instance.
Any administrator who was added as a user on a specific SiteScope in the previous version is upgraded
to the SiteScope administrator role for that SiteScope.
Context
Resource
Allowed Operations
System Availability
Management
SiteScopes
Add
Change
View
Delete
Execute
Full Control
Default
The Default role is automatically assigned if no other role was selected. It allows very limited
permissions.
Note: To create meaningful reports, the user will likely need additional permissions to specific
applications or configuration items.
Context
Resource
Allowed Operations
Custom Reports
Add
Edit (only if you are the user
who created the report)
Delete (only if you are the
user who created the report)
Trend Reports
Add
Edit (only if you are the user
who created the report)
Delete (only if you are the
user who created the report)
TransactionManagementOperator
The TransactionManagementOperator role can be applied only to the TransactionVision Analyzers
resource in the Transaction Management context.
Context
Resource
Allowed Operations
Transaction Management
TransactionVision Analyzers
Execute
Execute
Execute
Administration
Change
Applications
View
TransactionManagementAdministrator
The TransactionManagementAdministrator role can be applied only to the TransactionVision
Processing Servers resource in the Transaction Management context. The
TransactionManagementAdministrator role is useful in providing added security by enabling users to
have Full Control access of TransactionVision administration, but not enabling access to the User Data
resource.
Context
Resource
Allowed Operations
Transaction Management
Change
Full Control
TransactionVision Analyzers
Change
Execute
Full Control
Change
Execute
Full Control
Change
Execute
Full Control
Administration
Change
Full Control
Applications
Add
Change
View
Full Control
TransactionManagementUser
The TransactionManagementUser role can be applied only to the Applications resource in the
Transaction Management context.
Context
Resource
Allowed Operations
Transaction Management
Applications
View
Every resource
Operation Description
Business Process
Insight Application
View
Business Process
Insight
Administration
Full
Control
Business Process
Insight Process
Definition
View
Diagnostics
The Diagnostics context enables you to define operations permitted for the Diagnostics application.
Resources
Operation Description
Diagnostics
Change
View
Execute
Full
Control
Operation Description
Alert - Notification
Template
Change
View
Full
Control
Resources
Operation Description
Alert - Create
dependencies
Change
Full
Control
Applications
Add
Change
View
Delete
Execute
Full
Control
Add
Change
View
Delete
Execute
Full
Control
Applications
(specific
instances)
BPM
Resources
Operation Description
RUM
Add
Change
View
Delete
Execute
Full
Control
View
Full
Control
BPM Agents
View
RUM Engines
View
Script Repository
Add
Change
View
Alert
Full
Control
MyBSM
The MyBSM context enables you to define the operations permitted for user pages, predefined pages,
and user components
Resources
Operation Description
User Pages
Add
Change
View
Delete
Locked
Full
Control
View
Full
Control
Add
Change
View
Predefined
Pages
User
Components
Note: If you are viewing a page and don't have permission for a
component in it, the page will appear without the component.
Delete
Full
Control
RTSM
The RTSM context enables you to define the operations permitted for the views defined in IT Universe
Administration and viewed in the Model Explorer, Service Health, and Service Level Management.
Tip: If a user has permissions on a view in RTSM, all the profiles that are in that view are visible to
the user, even if the user does not have permissions on the profile. To prevent a user from viewing
profiles for which the user does not have permissions while enabling the user to access a view,
create a view for the user including only those configuration items for which you want the user to
have permissions and grant the user permission on that view.
Resources Operation Description
Views
Add
Change
View
Delete
Full
Control
RTSM
Full
Control
CI Search
Full
Control
Data
Modifier
Full
Control
Enables the Data Modifier option from any location in the RTSM.
Get
Related
Full
Control
Enables the Get Related CIs option from any location in the RTSM.
ITU
Manager
Full
Control
Allows the user to enter the ITU Manager. Once inside, the available
functionality within the ITU Universe Manager depends on permissions
the user has been granted on views.
Modeling
Studio
Full
Control
Allows the user to enter the Modeling Studio. Once inside, the available
functionality within the ITU Universe Manager depends on permissions
the user has been granted on views.
RTSM
Open API
Change
View
Operations Management
Note: The Operations Management context is available only if you have installed OMi on your
BSM machine. For details on the OMi context, see User Context Pane in the BSM User Guide.
The Operations Manager i (OMi) context enables you to assign permissions to work with the
Operations Manager context. For details on the operations available for the Operations Manager i (OMi)
context, see User Operations Tab in the BSM User Guide.
Resources
Operation
Description
Events
assigned to
user
Work On / Resolve
Enables the user to set the life cycle status for events that are
assigned to them to Work On or Resolve.
Close
Enables the user to set the life cycle status for events that are
assigned to them to Closed.
Reopen
Enables the user to set the life cycle status for Closed events
that are assigned to them to Open. The events can now be
reassigned for further investigation and resolution.
Note: Reopening symptom events with a closed cause is not
possible.
Assign To
Launch Operator
Action
Resources
Operation
Description
Events
assigned to
user
Launch Automatic
Action
Transfer Control
Close Transferred
Add/Remove
Event Relations
Change Severity
Change Priority
Change Title
Change
Description
Change Solution
Add/Delete/Update Enables the user to create, modify and delete annotations for
Annotations
events assigned to them.
Add/Delete/Update Enables the user to create, modify and delete custom
Custom Attributes attributes for events assigned to them.
Resources
Operation
Description
Events not
assigned to
user
View
Work On / Resolve
Enables the user to set the life cycle status for events not
assigned to them to Work On or Resolve.
Close
Enables the user to set the life cycle status for events not
assigned to them to Closed.
Reopen
Enables the user to set the life cycle status for Closed events
not assigned to them to Open. The events can now be
reassigned for further investigation and resolution.
Note: Reopening symptom events with a closed cause is not
possible.
Assign To
Launch Operator
Action
Launch Automatic
Action
Transfer Control
Resources
Operation
Description
Events not
assigned to
user
Close Transferred
Add/Remove
Event Relations
Change Severity
Change Priority
Change Title
Change
Description
Change Solution
Add/Delete/Update Enables the user to create, modify and delete annotations for
Annotations
events not assigned to them.
Add/Delete/Update Enables the user to create, modify and delete custom
Custom Attributes attributes for events not assigned to them.
Health
Indicators
Reset
Resources
Operation
Description
Administrative View
UIs
Custom Actions
Execute
Custom
Actions
Execute
Operation Description
Administration Add
View
Change
Delete
Full
Control
Resources
Operation Description
Execution
Execute
Full
Control
Platform
The Platform context includes all the resources related to administering the platform.
Resources
Operation Description
Authentication Change
Strategy
Audit Log
Users
User Groups
View
Full
Control
View
Full
Control
Enables viewing the audit log, and granting and removing permission
to view the audit log.
Add
Change
View
Delete
Full
Control
Add
Change
View
Delete
Full
Control
Resources
Operation Description
Data
Collectors
Change
View
Delete
Full
Control
View
Execute
Full
Control
Add
Change
View
Delete
Full
Control
Add
Change
View
Delete
Full
Control
Add
Change
View
Delete
Full
Control
Notification
System
Scheduled
Reports
Recipients
Custom Data
Types
Resources
Operation Description
Send SNMP
trap
Change
Full
Control
Run
Change
executable file
Full
Control
Change
Full
Control
View
Full
Control
Add
Change
View
Delete
Full
Control
Add
Change
View
Delete
Full
Control
Log To Event
Viewer
Downtime
Databases
System
Recipient
Template
Resources
Operation Description
Customer
Recipient
Template
Add
Change
View
Delete
Full
Control
Change
View
Delete
Full
Control
Package
Work
Manipulation
(HP Softwareas-a-Service
only)
Service Health
Resources
Operation
Description
User Pages
Add
Change
View
Delete
Full
Control
View
Predefined
Pages
Resources
Operation
Description
User
Components
Add
Change
View
Delete
Full
Control
Add
Change
View
Delete
Full
Control
Resources
Operation Description
SiteScopes
Add
Change
View
Delete
Execute
Full
Control
Transaction Management
Resources
Operation Description
TransactionVision Change
Processing
Full
Servers
Control
TransactionVision Change
Analyzers
Execute
Full
Control
TransactionVision Change
Job Managers
Execute
Full
Control
Resources
Operation Description
TransactionVision Change
Query Engines
Execute
Administration
User Data
Applications
Full
Control
Change
Full
Control
View
Full
Control
Add
Change
View
Full
Control
Operation Description
Custom
Reports
Add
Change
View
Full
Control
Resources
Operation Description
Trend Reports
Add
Change
View
Full
Control
Change
View
Full
Control
Change
View
Full
Control
Custom Links
Excel Reports
Default
Change
Header/Footer
Favorite Filter
Annotation
Service
Report
Enables modifying the default header and footer for custom and trend
reports.
Full
Control
Change
Delete
Full
Control
Change
Delete
Full
Control
Change
Delete
Full
Control
Select Admin > Platform > Users and Permissions > User Management >
Permissions tab.
The Permissions tab is divided into the following areas:
l
Important
information
Groups/Users pane on the left side of the page. For details, see "Groups/Users
Pane" on page189.
Resource tree pane in the center of the page. For details, see "Resource Tree
Pane" below.
Roles tab on the right side of the page. For details, see "Roles Tab" on page270.
Operations tab on the right side of the page. For details, see "Operations Tab" on
page271.
You can grant permissions to only one user or group at a time.
Assigning Add permissions on the Operations tab does not automatically grant
View permissions on the given resource.
If you have many users for whom you have to grant permissions, it is
recommended that you organize your users into logical groups using the Hierarchy
tab.
Relevant
tasks
See also
"Permissions" on page193
To access
Select Admin > Platform > Users and Permissions > User Management >
Permissions tab.
The types of resources displayed in the Resource Tree pane are:
l
Instances of a resource
Note: When a user defines or creates an instance of a resource, for example
creates a Business Process profile, that user has Full Control permission on that
resource instance and all of its child resources.
Important
information
Relevant
tasks
See also
Select a BSM context for which to configure permissions. For details on BSM contexts,
see "Resource Contexts" on the next page.
UI
Element
(A-Z)
Description
Settings Applies specific permissions settings for configurations in your User Management
session. Select from the following options:
l
Note: When you select the settings for applying permissions, the options selected apply
only to the current BSM session.
Resource Contexts
The following contexts are included:
UI Element (A-Z)
Description
Business Process
Insight
Diagnostics
End User
Management
Includes all the resources relating to operating and administering the End
User Management application.
MyBSM
MyBSM (Legacy)
Operations
Management
Operations
Orchestration
Integration
Platform
UI Element (A-Z)
Description
RTSM
Includes all the resources for the Run-time Service Model (RTSM).
Service Health
Analyzer
Service Level
Management
SiteScope On
Demand Monitors
Includes all the resources relating to the Service Health Analyzer to manage
SiteScope monitors on demand.
System Availability
Management
Transaction
Management
User Defined
Reports
Includes the custom report, trend report, custom link, and Excel report
resources.
Roles Tab
Displays the roles configurable for groups and users in BSM.
To access
Select Admin > Platform > Users and Permissions > User Management >
Permissions tab
Relevant
tasks
See also
Description
Apply
Applies the permissions configured for the roles
Permissions
Grant
Select the check box to assign the specified roles to the group or user.
Roles
The roles that can be assigned to a group or user for the selected resource or
instances. For a description of the available roles, see " User Management Roles
Applied Across BSM" on page217.
Operations Tab
Displays the predefined operations configurable for groups and users in BSM.
To access
Select Admin > Platform > Users and Permissions > User Management >
Permissions tab
Relevant
tasks
See also
Description
Apply Permissions
Grant
Select the check box to assign the specified operation to the group or user.
Granted from
Displays those permissions that have been granted from either a group, a
Group/Roles/Parent role, or a parent resource.
Note:
l
Inherit
You cannot remove any of these permissions individually, but you can
grant additional permissions.
If you want to remove permissions that are granted from a group, role or
parent resource, you must make the change at the group, role or parent
resource level.
Select the check box in the Inherit column for the operation to be inherited to
all the child resources within the selected resource.
Note:
l
Operation
The operations that can be assigned to a group or user for the selected
resource or instances. For details on the available operations, see "User
Management Operations" on page248.
Select Admin > Platform > Users and Permissions > User Management, select
a group or user from the Groups/Users pane, and click the Hierarchy tab.
The Hierarchy tab displays:
l
Important
information
Parent Groups. The groups that the selected group is nested under.
Child Groups and Users. The groups and users that are nested directly beneath
the selected group.
To nest a user, you must select the group into which you want to nest it and click
the Edit Child Groups and Users button.
When removing a nested group from its parent, the group itself is not deleted.
When deleting a parent group, the child groups and users are not deleted.
If BSM groups have been synchronized with groups on an external LDAP server,
BSM users cannot be moved between groups, and only groups appear on the
interface. For details on synchronizing groups, see Synchronizing Users.
Relevant
tasks
See also
Description
Denotes a group that the selected group or user is nested under.
Denotes a user that is nested beneath the selected group.
Displays the groups and users that are nested directly beneath the group
selected in the Groups/Users pane.
UI Element (A-Z)
Description
Edit Child
Groups and
Users
Opens the Edit Child Groups and Users window enabling you to nest or
remove groups and users from the selected group.
Parent Groups
Displays the groups that the group or user selected in the Groups/Users pane
is directly nested under.
Description
Moves the group or user to the Child Groups and Users pane and nests the
group or user under the specified group.
Moves the group or user to the Groups/Users pane and removes the group or user
from being nested beneath the specified group.
Child Groups
and Users
Select a group or user you want to remove from the specified group.
Groups/Users
Select a group or user you want to nest under the specified group.
Select Admin > Platform > Users and Permissions > User Management, select
a node from the Groups/Users pane, and click the Customization tab.
Important
Properties are inherited based on the hierarchy of the nodes. If a context is deselected
information (hidden) for a group node, it cannot be selected for any child nodes.
Relevant
tasks
UI Element
(A-Z)
Description
Contexts
Select a BSM context. You can perform the following actions on the context:
l
Select contexts and applications in the Contexts pane to be visible for the
specified user or group. To hide a context or application, clear the check box. By
default, all contexts are visible.
Select pages and tabs in the Pages and Tabs pane to be visible for the specified
user or group. By default, all pages and tabs are visible.
Click the Set as Default Entry Context button to make it the context that is
displayed when the user logs into BSM.
Select the pages and tabs you want to be visible for the BSM context selected in
the Contexts pane.
Assign a page or tab as the default page that opens for the context selected in the
Contexts pane.
Note: For the Service Health and Operations Management applications, you cannot
define user access to specific pages; you can enable or disable user access only at
the application level.
Set as
Default
Entry
Context
Sets the selected context in the Contexts pane as the entry context that is displayed
when a user logs into BSM.
Set as
Default
Entry Page
Assigns the specified page or tab as the default page that opens for the context
selected in the Contexts pane.
Alerts. For each recipient, you define one or more notification methods (email, pager, or SMS) and
the template to use for alert notices. You can configure alerts so specific recipients receive
information about the alerts when they are triggered. For details about alerts, see "Setting Up an
Alert Delivery System" on page343.
Scheduled reports. In the Report Manager, you can schedule the time intervals when recipients
can receive reports or report items. Only those recipients who have been configured to receive
email can be selected to receive scheduled reports. These recipients are listed in Available
Recipients when configuring scheduled reports. For details about scheduled reports, see "Report
Schedule Manager" on page341.
For details on where to configure and manage recipients, see "Recipients Page" on page277.
For more information about groups and users, see "Group and User Hierarchy" on page199
To access
Select Admin > Platform > Recipients > Recipient Management
Learn About
Creating Recipients
You create recipients by defining:
l
You create recipients and manage existing recipients in the Recipients page. For user interface details,
see "Recipients Page" on page277.
You can also create recipients while you are configuring users. Those recipients are automatically
added to the list of recipients in the Recipients page in Admin > Platform > Recipients > Recipient
Management.
The recipients you create in the Recipients page are automatically listed as available recipients when
you configure users in Admin > Platform > Users and Permissions > User Management.
Tasks
This section includes:
l
4. Complete the fields in the New Recipient dialog box. For information, see "New or Edit Recipient
Dialog Box" on page278.
5. Click Save.
3. Select a recipient in the table and click the Attach user to selected recipient
Recipient page.
button in the
4. Complete the fields in the Attach user to selected recipient dialog box. For information, see
"Attach Recipient to a User Dialog Box" on page282.
5. Click Save.
UI Description
This section includes:
l
Recipients Page
User interface elements are described below:
UI
Element
(A-Z)
Description
Add new recipient. Opens the New Recipient dialog box. For details, see "New or Edit
Recipient Dialog Box" on the next page.
Edit selected recipient. Opens the Edit Recipient dialog box. For details, see "New or
Edit Recipient Dialog Box" on the next page.
Delete the recipient attached to the selected user. Detaches the recipient and
deletes the current recipient.
Attach user to selected recipient. Select a recipient in the list of and click this button
to open the Attach Recipient to a User dialog box where you can select the appropriate
user. For details, see "Attach Recipient to a User Dialog Box" on page282.
Detach user from selected recipient. Detaches the current recipient from the
corresponding user (listed in the page). A confirmation message is issued.
Update selected recipients email address from LDAP. This icon appears only if
LDAP is connected to the BSM application. Click to synchronizes the user data,
meaning that the email information stored in the User Repository for the specific user
updates the email recipient information corresponding to the user linked to the recipient.
UI
Element
(A-Z)
Description
Linked
User
Pager
The following characters are not supported: @ & " ' ...
The following characters are not supported: @ & " ' ...
UI Element
(A-Z)
Description
Attach user to selected recipient. Select a recipient in the list of and click the
button to open the Attach Recipient to a User dialog box where you can select the
appropriate user. For details, see "Attach Recipient to a User Dialog Box" on
page282.
Note: This button is displayed only when you access the dialog box from Admin
> Platform > Users and Permissions > User Management.
Detach user from selected recipient. Detaches the current recipient from the
corresponding user (listed in the page). A confirmation message is issued.
Note: This button is displayed only when you access the dialog box from Admin
> Platform > Users and Permissions > User Management.
Delete the recipient attached to the selected user. Detaches the recipient from
the user and deletes the recipient.
Note: This button is displayed only when you access the dialog box from Admin
> Platform > Users and Permissions > User Management.
Update selected recipients email address from LDAP. This icon appears only
if LDAP is connected to the BSM application. Click to synchronize the user data,
meaning that the email information stored in the User Repository for the specific
user updates the email recipient information corresponding to the user linked to the
recipient.
Communication This area enables you to define the communication methods. For information, see
Method Area
"Recipient Management Communication Methods" on page283.
UI Element
(A-Z)
EUM Alert
notification
template
Description
Select the template you want to use for the EUM alert notification, or any custom
template already created.
Note: When you change the selection in the EUM Alertnotification template
field in the top part of the page, the changes are propagated to the Email, Pager,
and SMS tabs in the same page. If you modify the selection in the EUM
Alertnotification template field in the Email, Pager, or SMS tabs, the Schedule
for receiving alerts changes to Mixed Value. When you change once more, the
selection in the EUM Alertnotification template field in the top part of the page,
the changes are propagated to the Email, Pager, and SMS tabs in the same page
and the Mixed Value button is cleared.
For details on EUM alert notification templates and creating custom templates,
see "How to Configure EUM Alerts Notification Templates" on page363.
Note: This field is relevant only for event-based alerts.
For details on alert notification templates and creating custom templates, see
"Notification Templates Page" on page369.
Note:
l
Link to user
This field is displayed only when you access this page from:
l
Recipient
name
Admin > Platform > Users and Permissions > User Management, select
a user in the tree and click the Recipient tab.
Admin > Personal Settings > Recipient.
UI Element
(A-Z)
Schedule for
receiving
alerts
Description
Enabled if you selected the Per notification method scheduling option for the
recipient in the Schedule for Receiving Alerts in the General tab.
Select:
l
Mixed value. When you change the selection in the EUM Alertnotification
template field in the top part of the page, the changes are propagated to the
Email, Pager, and SMS tabs in the same page. If you modify the selection in
the EUM Alertnotification template field in the Email, Pager, or SMS tabs,
the Schedule for receiving alerts changes to Mixed Value. When you
change once more, the selection in the EUM Alertnotification template field
in the top part of the page, the changes are propagated to the Email, Pager, and
SMS tabs in the same page and the Mixed Value button is cleared.
All Day. If you want the recipient to receive email messages all day.
From... to. If you want the recipient to receive email messages during the
specified time period.
The time range is calculated based on the GMT offset selected for the recipient.
Scheduled reports are sent based on the schedule configured in the Scheduled
Reports page and not on the schedule configured for the recipient. For details, see
How to Schedule a Report in the BSM User Guide.
UI Element
(A-Z)
Time zone
Description
Select the time zone for the recipient. Business Service Management uses the
time zone to send alert notices and HP Software-as-a-Service notifications to the
selected recipient.
Note:
l
The time zone selected for the recipient is the time zone specified in the alert
notifications that the recipient receives. For example, if an alert is triggered
anywhere in the world and a notification is sent, the date and time of the alert
are converted to the recipient local time. The alert also specifies the GMT
offset of the recipient.
If you defined a notification schedule for the recipient, the time zone selected
for the recipient is also the time zone that BSM uses for calculating when to
send the recipient notifications. For example, if you configure a recipient to
receive pager alerts from 9:00AM - 9:00 PM, and select a GMT offset of -5
hours, the recipient receives alerts through a pager only from 9:00 AM - 9:00
PM Eastern Time.
Scheduled reports are sent based on the schedule configured in the Scheduled
Reports page and not on the schedule configured for the recipient. For details,
see How to Schedule a Report in the BSM User Guide.
When you modify the time zone of the user to which the recipient is assigned,
a confirmation message is issued to verify that you also want to propagate the
time zone change to the recipient's offset from GMT. If you change the
recipient's offset from GMT, the time zone of the user to which the recipient is
assigned is not affected.
Half time zones (also known as offset time zones)are not supported.
Description
User Login
User Name
Select
To assign a user to the selected recipient, select the user and click Select.
To access
Select Admin > Platform > Recipients > Recipient Management and click
Learn About
Communication Method Email
You can specify multiple email addresses for a recipient, the type of notification template (which
overrides the notification template selected in the global level in the page), the schedule for sending
email notifications, and the security certificate if necessary.
The text displayed in email messages can only be in Latin characters except for the contents of fields
inserted by the user that can be in any supported and relevant language. Those fields can include, for
example, Alert Name, Alert description, and KPI name.
Note: You can use a pager or an SMS service provider that does not appear on the default list. For
details, see "How to Add a Custom Pager or SMS Service Provider" below.
Tasks
How to Add a Custom Pager or SMS Service Provider
1. Open the NOTIFICATION_PROVIDERS table in the management database.
2. In the NP_NOTIFICATION_PROVIDER_NAME column, add the name of the provider to the
bottom of the list. Add the name exactly as you want it to appear in the provider list that opens in
the SMS tab of the Recipient Properties wizard. For details, see "Communication Method Area SMS Tab" on page286. Note the ID number that is automatically assigned to the provider.
3. Close the NOTIFICATION_PROVIDERS table, and open the NOTIFPROVIDER_NOTIFTYPE
table.
4. In the NN_NOTIF_PROVIDER_ID column, add the ID number that was assigned to the new
provider.
5. In the NN_NOTIF_TYPE_ID column, assign the provider one of the following notification types:
n
add the following new property names and values for the provider, one beneath the other (for
examples, see existing entries):
Property Property
Name
Value
Description
EMAIL_
SUFFIX
<email_
suffix>
The gateway's email suffix. For example, if the gateway email address
is [email protected], enter xyz.com as the property value for EMAIL_
SUFFIX.
EMAIL_
MAX_
LEN
<max_
length>
UI Description
Communication Method Area - Email Tab
User interface elements are described below:
UI Element
(A-Z)
Email
Addresses
Description
Enter one or more email addresses. Separate multiple entries with a semi-colon (;).
Only those recipients who have been configured to receive email can be selected to
receive scheduled reports and are listed in Available Recipients when configuring
scheduled reports.
UI Element
(A-Z)
Enable
secure mail
Description
Select this option if you want the recipient to receive encrypted mail. You must then
copy, into the text box below the option, the contents of the certificate that the
recipient uses to secure incoming email messages.
Note:
l
EUM Alert
notification
template
The encrypted mail option is supported only for alerts. Encrypted mail is not
supported for scheduled reports or subscription notification (HP Software-as-aService customers only).
The encrypted mail option is supported only when the BSM Data Processing
Server is installed on a Windows machine.
Select the template you want to use. For details, see "EUM Alerts Notification
Templates" on page363.
Note: When you change the selection in the EUM Alert notification template field
in the top part of the page, the changes are propagated to the Email, Pager, and SMS
tabs in the same page. If you modify the selection in the EUM Alert notification
template field in the Email, Pager, or SMS tabs, the Schedule for receiving alerts
changes to Mixed Value. When you change once more, the selection in the EUM
Alert notification template field in the top part of the page, the changes are
propagated to the Email, Pager, and SMS tabs in the same page and the Mixed
Value button is cleared.
Schedule
Select the schedule you want to use for receiving emails. For details, see Schedule
for
for receiving alerts in "New or Edit Recipient Dialog Box" on page278.
receiving
Email
notifications
UI Element
(A-Z)
Description
EUM Alert
notification
template
Select the template you want to use. For details, see "EUM Alerts Notification
Templates" on page363.
Provider
Note: When you change the selection in the EUM Alert notification template
field in the top part of the page, the changes are propagated to the Email, Pager,
and SMS tabs in the same page. If you modify the selection in the EUM Alert
notification template field in the Email, Pager, or SMS tabs, the Schedule for
receiving alerts changes to Mixed Value. When you change once more, the
selection in the EUM Alert notification template field in the top part of the
page, the changes are propagated to the Email, Pager, and SMS tabs in the
same page and the Mixed Value button is cleared.
Genie-UK
Itineris
SFR-France
GoSMS-Israel
MtnSMS-Global
Note: If your provider does not appear on the default provider list, and the
provider uses an email gateway, you can manually add your provider to BSM.
For details, see "How to Add a Custom Pager or SMS Service Provider" on
page284.
Schedule for
receiving SMS
notifications
Select the schedule you want to use for receiving SMS text messages. For
details, see Schedule for receiving alerts in "New or Edit Recipient Dialog
Box" on page278.
SMS numbers
Type one or more SMS access numbers in the box. Separate multiple entries
with a semi-colon (;).
UI Element
(A-Z)
Description
EUM Alert
notification
template
Select the template you want to use. For details, see "EUM Alerts Notification
Templates" on page363.
Pager
Numbers
Enter one or more pager access numbers. Separate multiple entries with a semicolon (;).
Note: When you change the selection in the EUM Alert notification template field
in the top part of the page, the changes are propagated to the Email, Pager, and SMS
tabs in the same page. If you modify the selection in the EUM Alert notification
template field in the Email, Pager, or SMS tabs, the Schedule for receiving alerts
changes to Mixed Value. When you change once more, the selection in the EUM
Alert notification template field in the top part of the page, the changes are
propagated to the Email, Pager, and SMS tabs in the same page and the Mixed
Value button is cleared.
Note: If your pager is numeric only, when creating an alert scheme in the Alert
Wizard, you can only type a numeric user message.
Schedule
Select the schedule you want to use for receiving pager messages. For details, see
for
Schedule for receiving alerts in "New or Edit Recipient Dialog Box" on page278.
receiving
pager
notifications
Type
MetroCall
Arch
AirTouch
PageMci
SkyTel
PageNet
PageMart
AmeriPage
Nextel
PageOne
To access
l
Learn About
User Account Settings
On the User Account tab, you can configure the following personal settings:
l
User name
User mode
Password
For details on the user interface for changing your password and updating other Personal Settings, see
"User Account Page" on page294.
Specify the default context that is displayed when logging into BSM.
Specify the first page that is displayed in each of the different parts of BSM.
Specify the tabs and options that are available on pages throughout BSM.
Customizing your entry page, menu items, and tabs enables your interface to display only the areas of
BSM that are relevant to you. For details on the Menu Customization User Interface, see "Menu
Customization Page" on page295.
Tasks
How to Customize BSM Menus and Pages Workflow
This task describes how to customize the page you see when entering BSM, and select the menu
items available on pages throughout BSM.
Tip: For a use-case scenario related to this task, see "Personal Settings" on the previous page.
1. Assign a Default Context
Select a context from the Contexts pane that you want to be the default entry context you see
when logging into BSM, and click Set as Default Entry Context. For user interface details, see
"Menu Customization Page" on page295.
2. Select Context Pages and Tabs
In the Pages and Tabs pane, select the context of the pages and tabs that you want to be visible
on the selected context for the user. Clear the check boxes of the pages and tabs that you want
hidden from the user.
3. Assign a Default Entry Page
Select a page or tab to be the default entry page for the selected context, and click Set as Default
Entry Page.
4. Results
The default entry icon appears next to the default entry context and page. Pages and tabs visible
to the user are selected in the Pages and Tabs pane. Pages and tabs hidden from the user are
cleared in the Pages and Tabs pane.
Example:
3. Results
The context that opens when John Smith logs into BSM is the Service Level Management
context on the Applications menu. The SLAs Summary Report page is displayed on the SLA
Reports tab:
UI Description
User Account Page
BSM saves these settings per defined user. Any changes you make remain in effect for all future web
sessions for only that user.
User interface elements are described below:
UI Element
(A-Z)
Description
Confirm
Password
Login name
Old
Password
Password
Select the rate at which you want BSM to automatically refresh the browser and
load the most up-to-date data from the database.
Time zone
User mode
Select the user mode for the user, from the following options:
Unspecified. Leaves the user without a particular mode. Select this option if:
BSM is working with user modes and you want this user to see KPIs for both
modes in Service Health views.
Operations User. Enables the user to view the operations version of KPIs.
Business User. Enables the user to view the business version of KPIs.
Note: For details on user modes, see Create KPIs for Operations and Business
User Modes in the BSM Application Administration Guide.
UI Element
(A-Z)
Description
User name
Recipient Page
This page enables you to define recipients, their email, pager, and SMS information, and the template
to use to send alert notices to those recipients.
For user interface details, see "New or Edit Recipient Dialog Box" on page278.
The Personal Settings tab can also be accessed by clicking Change the default page on the Site
Map.
User interface elements are described below:
UI Element (A-Z)
Description
Contexts
Select a BSM context. You can perform the following actions on the context:
l
Select pages and tabs in the Pages and Tabs pane to be visible for the
specified user.
Click the Set as Default Entry Context button to make it the context that is
displayed when the user logs into BSM.
UI Element (A-Z)
Pages and Tabs
Description
l
Set as Default
Entry Context
Select the pages and tabs you want to be visible for the BSM context
selected in the Contexts pane.
Assign a page or tab as the default page that opens for the context selected
in the Contexts pane.
Click to set the selected context in the Contexts pane as the entry context that
is displayed when the specified user logs into BSM.
Note: The Default Entry Context
context.
Set as Default
Entry Page
Click to assign the specified page or tab as the default page that opens for the
context selected in the Contexts pane.
Note: The Default Entry Page
tab.
To access
Select Admin > Platform > Users and Permissions > Authentication Management
Learn About
Authentication Strategies Overview
The default authentication strategy for logging into BSM is the BSM internal authentication service. You
enter your BSM user name and password from the Login page, and your credentials are stored and
verified by the BSM database.
You can define multiple LDAP authentication module configurations under one realm. Although these
additional configurations are visible from the User Management panel, they work in conjunction with the
primary configuration if an initial search for the requesting users authorization is not found. For
example, one realm can define a search through LDAP servers for authentication in two different
domains or it can configure multiple user naming attributes in one domain.
LDAP Mode
Authenticator
Disabled
Disabled
BSM Internal
Enabled
LDAP
Disabled
BSM Internal
Enabled
LDAP
Disabled
IDM-SSO
Enabled
IDM-SSO
LW-SSO
IDM-SSO
UI Description
Authentication Management Page
This page displays the current authentication strategy and Single Sign-on configurations for logging into
BSM.
Access to the Authentication Management page is dependent on the following permission levels:
You configure permissions on the Users and Permissions interface. For details, see "Permissions" on
page193.
User interface elements are described below:
UI Element (A-Z)
Description
Add LDAP
Configure
Delete
Edit
Enable/Disable
Lightweight Directory
Access Protocol
Configuration
Single Sign-On
Configuration
Smart Card
Authentication
Configuration
Learn About
Smart Card Authentication
Smart cards are physical devices used to identify users in secure systems. These cards can be used
to store certificates both verifying the user's identity and allowing access to secure environments.
BSM can be configured to use these certificates in place of the standard model of each user manually
entering a user name and password. You define a method of extracting the user name from the
certificate stored on each card.
When using smart cards with BSM, users can only log in using the smart card. The option of logging in
by manually typing in your username and password is locked for all users unless smart card
configuration is disabled.
Tasks
Enable or Disable Smart Card Authentication
Smart cards are both enabled and disabled on the BSMGateway and Data Processing servers by
using the SmartCard Authentication Configuration Wizard. This wizard is only a part of the overall
workflow for configuring smart card authentication in your BSMenvironment. For more details, see the
Smart Card Authentication Configuration Guide.
Note: Your machine must have the openssl command installed. This is included as part of the
Apache installation included on Windows BSMenvironments. In Linux environments, it is
sometimes included. To check if this is installed on your machine run
/usr/bin/openssl
If you do not have this command, install it and make sure you can execute it from any path before
configuring smart card authentication.
Windows:<BSMInstallation Directory>\bin\RevertHardening.bat
Linux:<BSMInstallation Directory>/bin/RevertHardening.sh
When the batch file is complete, restart all BSMGateway Servers to activate the change.
Smart Card
Authentication
Configuration
Mode
Description
Full CAC
Smart card authentication is required for any access to BSM. This is the default
mode.
Custom
This mode is by default similar to Full CAC. However, if your smart card software
does not allow caching the pin code for the entire BSM session, only per process,
then this mode can be used instead of Full CAC. This will enforce smart card
authentication for users logging into BSM or data collectors accessing BSM. In
addition, Custom mode enables you to define URLs to require Smart card
authentication.
Note: This option is not available in IIS.
Users only
login
Smart card authentication is required for logging in to BSM only. This mode
requires smart card authentication for users logging into BSM, and SSL
authentication for data collectors to access BSM.
UI Descriptions
Smart Card Authentication Configuration Wizard
This wizard guides you through the process of enabling and disabling smart card authentication
configuration with BSM.
To access the Smart Card Authentication Configuration Wizard:
Select Admin >Platform >Users and Permissions >Authentication Management > Smart
Card Authentication Configuration > button
The CA certificate for the client certification must be in Base 64 - .cer format.
The CA certificate issuer for the BSM gateway server must be in Base 64 - .cer format.
Select Admin > Platform > Users and Permissions > Authentication
Management, and click Add LDAP.
Important
If the User Interface does not respond properly after upgrading your version of BSM
information (for example, the page does not load, or an error message is displayed), clean the
Java cache by following this procedure on your client PC:
1. Navigate to Start > Control Panel > Java.
2. In the Temporary Internet Files section, click Settings.
3. In the Temporary File Settings dialog box, click Delete Files.
Wizard
map
Important
information
Select Admin > Platform > Users and Permissions > Authentication
Management, and click Add LDAP for new or Edit for an existing LDAP
Configuration. Navigate to the LDAP General Configuration page.
l
UI Element
(A-Z)
Description
Indicates that the value in the specified field is empty or invalid.
You can view a description of the error in one of the following ways:
Advanced
Hover over the error icon to display a tooltip with the error message.
Opens the LDAP Vendor Attributes dialog box enabling you to modify
configurations for the selected LDAP vendor. For details, see "LDAP Vendor
Attributes Dialog Box" on page307.
UI Element
(A-Z)
Description
LDAP server
URL
Enter the URL of the LDAP server. For Active Directory users, we recommend
using the Global Catalog server (AD GC).
To represent different trees in the same forest, enter multiple DNs, separated by
semicolons.
To allow failover, enter multiple LDAP (AD GC) server URLs, separated by
semicolons.
The required format is: ldap://machine_name:port/scope??sub
LDAP servers typically use port 389. Active Directory Global Catalog Servers
typically use port 3268 or secure port 3269. We recommend using the Global
Catalog server for Microsoft Active Directory.
Possible values of scope = sub, one, or base, and are case sensitive.
BSM ignores the attribute between the two question marks, if one exists.
When the port number and scope value are empty, default values are used.
n
Examples:
Single DN, single LDAP server:
ldap://my.ldap.server:389/ou=People,o=myOrg.com??sub
You can configure multiple domains by entering LDAP server URLs separated by a
semicolon (;).The server names must be the same in order to search users in both
LDAP servers.
Multiple DNs: ldap://my.ldap.server:389/ou=People,o=myOrg.com??sub;
ldap://my.ldap.server:389/ou=Staff,o=my2ndOrg.net??sub
You can configure failover by entering different LDAP server URLs separated by a
semicolon (;). For failover, the domain names must be the same.
Failover LDAP servers:
ldap://my.ldap.server:389/ou=People,o=myOrg.com??sub;
ldap://my.2ndldap.server:389/ou=People,o=myOrg.com??sub
Note: If you receive a red X after entering the URL with the following popup text:
ERROR - sun.security.validator.ValidatorException: PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid
UI Element
(A-Z)
Description
certification path to requested target
This means that you need to establish trust to the LDAPserver. For details, see
"How to Secure Communication Between the LDAP Server and BSM Server Over
SSL" on page325.
Note: The server names must be the same in order to search users in both LDAP
servers.
LDAP vendor
type
Common LDAP
Other
Note: If you click Advanced and modify the LDAP Vendor Attribute settings, the
value of this field automatically changes to Other.
Password of
Search
Entitled User
Defines the password of the user entitled to search the LDAP server entities for
groups.
Unique
domain
Enter a name for your LDAP configuration. This name should be unique in your
BSM system.
Description
Password The password of the user whose credentials are entered in the UUID field.
Note: This field is optional. If left empty, anonymous user is used.
Test
Tests the LDAP configuration and user credentials validity. A message is displayed
indicating whether or not the validation was successful.
UUID
The actual login name (Unique User ID) of the LDAP user you want to verify.
Important
information
If you modify the LDAP Vendor Attribute settings, the value of the LDAP Vendor
Type field on the LDAP General Configuration page automatically changes to
Other.
Description
Group class
object
Defines which LDAP entities are to be considered groups on the LDAP server.
Groups
member
attribute
Defines the specific attribute that determines which of the LDAP group's entities
are to be considered members of the LDAP group.
Restore
Restores the LDAP vendor attributes to their state upon logging into the current
session of BSM.
Users filter
Users object
class
Defines which LDAP entities are to be considered users on the LDAP server.
Users unique
ID attribute
The attribute you want to log into BSM with, as it appears on the LDAP server.
Example: uid, mail
Select Admin > Platform > Users and Permissions > Authentication
Management, and click Configure. Navigate to the LDAP Group Mapping
Configuration page.
Important
information
This page is enabled only if the LDAP General Configuration page has been
configured correctly.
Description
Indicates that the value entered in the specified field is invalid.
Groups base
DN
The Distinguished Name (DN) of the LDAP entity from which you want to start your
groups search.
You can configure multiple domains by entering domains separated by a semicolon
(;).
For example: dc=devlab,dc=ad;dc=BSF_RND
Groups
search filter
Enter the relevant parameters to indicate which attributes are to be included in the
groups search.
Root groups
base DN
The Distinguished Name (DN) of the LDAP groups that are to be first on the
hierarchical tree of mapped groups. This value must be a subset of the Groups
base DN.
Root groups
filter
Enter the parameters to determine which LDAP entities are to be the hierarchical
base for the LDAP groups. The specified entities are then available to be mapped to
groups in BSM.
Test
Verifies that the parameters entered to define the LDAP groups structure are valid.
This button is disabled if the Test DN Resolution UUID field is empty
Test Groups
Displays the groups available for mapping with BSM groups and the LDAP groups'
Configuration hierarchical structure. The displayed groups are determined by the parameters
Pane
entered into the fields on the LDAP Users Synchronization Configuration page.
The maximum number of groups that can be displayed is 1000. If there are more
than 1000 groups, this list will be empty. If the list is empty, try to change the group
search filter.
For example, if the group search filter was (objectclass=groupOfUniqueNames)
change it to (&(objectClass=groupOfUniqueNames)(cn=BSM*))
or reduce the search range: ou=groups,dc=devlab,dc=ad
To
Select Admin > Platform > Users and Permissions > Authentication Management,
access and click Add LDAP. Enter information in the LDAP pages, and navigate to the Summary
page.
User interface elements are described below:
UI Element (A-Z)
Description
Select Admin > Platform > Users and Permissions > Authentication
Management, and click Configure.
Important
If the User Interface does not respond properly after upgrading your version of BSM
information (for example, the page does not load, or an error message is displayed), clean the
Java cache by following this procedure on your client PC:
1. Navigate to Start > Control Panel > Java.
2. In the Temporary Internet Files section, click Settings.
3. In the Temporary File Settings dialog box, click Delete Files.
Wizard
map
Important information
Hover over the error icon to display a tooltip with the error message.
Description
Disabled
Description
Indicates that the value in the specified field is empty or invalid.
Hover over this icon to view a tooltip describing the error.
Header
Name
Enter the header name for the token name passed by the Identity Management Single
Sign-On.
Example: sso_user
Note: Ensure that the Identity Management Single Sign-On strategy is securing BSM
resources before you enter this information.
UI
Element
(A-Z)
Description
Logout
URL
Enter an alternate logout URL, to view a page other than the main login page when
logging out of BSM.
Example:\<alternativeLogoutURL>.jsp
Note: This field is optional.
Description
Indicates that the value in the specified field is empty or invalid.
Hover over this icon to view a tooltip describing the error.
Add
Enable SAML2
authentication
schema
HPBusiness
Service
Management
Domain
Enter the relevant BSM domain, to be used for token creation. This field may be
needed for multi-domain support and normalized URLs when the domain cannot
be parsed automatically, for example when using aliases.
Parse
automatically
SAML2
Settings
Token Creation
Key (initString)
Enter an initString value, used for encryption and decryption of the LW-SSO
token. If changing this value, remember to set initString to the same value in all
HP products participating in LW-SSO integration.
Example: devlab.ad
Example: Xy6stqZ
UI Element
Description
Trusted
Displays the list of trusted hosts and domains that are participating in an LWHosts/Domains SSO integration.
List of trusted hosts can contain DNS domain name (myDomain.com), NetBIOS
name (myServer), IP address, or fully qualified domain name for the specific
server (myServer.myDomain).
To add a host or domain to the list of trusted hosts/domains, click the Add icon
, enter the name of the host or domain in the text box under Trusted
Hosts/Domains, and select the type of host or domain name from the Type dropdown box.
Examples: mercury.global, emea.hpqcorp.net, devlab.ad
To remove a host or domain from the list of trusted hosts/domains, select it and
click the Remove button
In the SSO Configuration Wizard, navigate to the Single Sign-On page, select
Lightweight, and select the Enable SAML2 authentication schema check box.
Click SAML2 Settings to open the SAML2 Configuration dialog box.
The SAML2 Configuration dialog box consists of the following sections:
l
Important
information
Description
Restores the SAML2 configuration attributes to their state upon logging into the current
session of BSM.
Description
The filename of the keystore in BSM.
l
When Look for keystore in classpath is not selected, this value must be the
full path of the keystore's location, for example:
C:\mystore\java.keystore.
When Look for keystore in classpath is selected, this value must be just the
file name of the keystore, for example: java.keystore.
Keystore
password
The password which enables access to the keystore containing the private key
used for encryption during the SAML authentication request.
Look for
keystore in
classpath
Select for the Lightweight Single Sign-On framework to search for the keystore in
the classpath.
Private key
alias
Indicates the alias of the private key used for encryption during the SAML
authentication request.
Private key
password
Indicates the password of the private key used for encryption during the SAML
authentication request.
Note: When this option is selected, you enter only the name of the actual keystore
file in the Keystore filename field.
Description
Select for the Lightweight Single Sign-on framework to search for the keystore in
the classpath.
Note: When this option is selected, you enter only the name of the actual keystore
file in the Keystore filename field.
UI Element
(A-Z)
Keystore
filename
Description
The filename of the keystore in BSM.
l
Keystore
password
When Look for keystore in classpath is not selected, this value must be the
full path of the keystore's location, for example:
C:\mystore\java.keystore.
When Look for keystore in classpath is selected, this value must be just the
file name of the keystore, for example: java.keystore.
The password of the public key used for decryption during the SAML
authentication request.
Description
Single Sign-On
Configuration
Learn About
Lightweight Single Sign-On Overview
The default single sign-on authentication strategy for BSM is LW-SSO. LW-SSO is embedded in BSM
and does not require an external machine for authentication. BSM currently uses version 2.4 of LWSSO.
For an overview of Single Sign-On strategies, see "Authentication Strategies" on page297.
Configuring LW-SSO
You can configure LW-SSO in BSM using the SSO Configuration Wizard. For details on the SSO
Configuration Wizard, see "SSO Configuration Wizard" on page309.
LW-SSO can be configured using the JMX console to accept client-side authentication certificates.
Once a certificate is recognized, LW-SSO creates the token to be used by other applications. For
details, see "Using Client-Side Authentication Certificates for Secure User Access to BSM " on
page21.
For details on limitations of working with LW-SSO, see "LW-SSO Authentication General Reference"
on page334.
Example 1:
BSM gateway server is located in emea.hp.com
TransactionVision server is located in cnd.hp.com
Disable automatic domain calculation and set domain name = hp.com
Example 2:
BSM gateway server is in corp.ad.example.com
NNMi server is in sdc.example.com
Load balancer is in example.com
Disable automatic domain calculation and set domain name = example.com
Tasks
How to Configure Unknown User Handling Mode
This task describes how to handle unknown users trying to log into BSMusers that were
authenticated by the hosting application but do not exist in the BSM users repository:
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings, click
Foundations, and select Single Sign On.
2. Locate the Unknown User Handling Mode entry in the Single Sign On - Lightweight (LW-SSO)
field, and select one of the following options:
n
Integration User. A user with the User name Integration User is created in place of the user
who attempted to login. This user has System Viewer permissions.
Allow. The user is created as a new BSM user and allowed access to the system. This user
has System Viewer permissions, and his default password is his login name.
Deny. The user is denied access to BSM, and is directed to the Login page.
The changes take effect immediately.
Note: When User Synchronization is enabled between BSM and the LDAP server, unknown
users are always denied entry into BSM.
1. Enter the URL of the JMX console (http://<server name>:8080/jmx-console/) in a web browser.
2. Enter your JMX console authentication credentials. If you do not know your authentication
credentials, contact your system administrator.
3. Locate the Lightweight Single Sign-On context, as follows:
a. Domain name: Topaz
b. Service: LW-SSO Configuration
4. Modify parameters accordingly.
The changes take effect immediately.
Learn About
This section includes:
l
IDM Server
The IDM server is monitored by a single center Policy Server, and consists of a User Repository, a
Policy Store (both could reside over the same server as the policy server), and a Web Server Agent
installed over each of the application's web servers communicating with the Policy Server. The IDM
server controls users' access to various organizational resources, protecting confidential personal and
business information from unauthorized users. For details, see your IDM vendor's documentation.
IDM Login
Before configuring IDM-SSO in BSM, make sure you see your IDM login dialog box before the BSM
login screen.
If you do not see it, work with your IDM administrator. If the same LDAP was defined in BSM as used
by IDM, you should be able to authenticate through both the IDM and BSM login screens using the
same credentials. If not, verify that LDAP settings in BSM match those used by IDM. Now you are
ready to configure IDM-SSO in BSM. If you need help dumping headers in order to determine the
correct IDM header to use in configuration, you can return to the BSM login screen without closing the
session and append /DumpSession.jsp to the login URL. Look for your user login ID in the resulting
list. Before it should be the header name supplied by IDM. You can verify it using http://<HPBSM
server>/topaz/verifyIDM.jsp in the same user session. Once it is verified as correct, you should be
able to use it in the SSO Configuration Wizard.
Securing BSM Resources Under IDM-SSO
When using IDM-SSO as a Single Sign-On strategy, BSM resources may be protected with form or
basic authentication schemes, or left unprotected.
/filters/*
/hpbsm/*
/mam-images/*
/mcrs/*
/MercuryAM/*
/odb/*
/opal/*
/opr-admin-server/*
/opr-console/*
/opr-gateway/*
/opr-web/*
/ovpm /*
/topaz/*
/topazSettings/*
/tv/*
/tvb/*
/ucmdb-ui/*
/uim/*
/utility_portlets/*
/webinfra/*
Examples of URL with form authentication
n
/topaz/topaz_api/* used by all data collectors to get BSM version, server time, etc.
Example of URL with basic authentication
/opr-admin-server/rest/*
/opr-console/rest/*
/opr-gateway/rest/*
/topaz/bam/*
/topaz/bsmservices/*
/topaz/eumopenapi/*
/topaz/servicehealth/*
/topaz/slm/*
Unprotected Resources
The following resources should remain unprotected:
l
/mam-collectors
/topaz/Charts
/topaz/images
/topaz/Imgs/chartTemp
/topaz/js
/topaz/rfw/static
/topaz/services/technical/time
/topaz/static
/topaz/stylesheets
/tvb/rest
/ucmdb-api
If you are using a Load Balancer, you should also unprotect the following resources:
l
/topaz/topaz_api/loadBalancerVerify_core.jsp
/topaz/topaz_api/loadBalancerVerify_centers.jsp
Example of URL with unprotected authentication
l
Learn About
LDAP Authentication Overview
You can use an external LDAP server to store users' information (usernames and passwords) for
authentication purposes, instead of using the internal BSM service. You can also use the LDAP server
to synchronize BSM and LDAP users. For optimal performance, it is recommended that the LDAP
server be in the same subnet as the rest of the BSM servers. For optimal security, it is recommended to
either configure an SSL connection between the BSM Gateway Server and the LDAP server, or to have
BSM servers and the LDAP server on the same secure internal network segment.
Authentication is performed by the LDAP server, and authorization is handled by the BSM server.
You configure the LDAP server for authentication and user synchronization using the LDAP
Configuration Wizard. For details on the LDAP Configuration Wizard, see "LDAP Configuration
Wizard" on page303
For details on securing communication between an LDAP server and your BSM server over SSL, see
"How to Secure Communication Between the LDAP Server and BSM Server Over SSL" on page325
Mapping Groups
You map groups to enable user synchronization between LD+AP users and BSM users. The Group
Mapping feature is accessible through the Users and Permissions interface, by clicking the Group
Mappings
button and selecting the unique domain name. This button is enabled only if the
following conditions are met:
l
There is at least one enabled LDAP Configuration on the Authentication Management page.
Once user synchronization is enabled, the User Management interface has the following limitations:
l
The User name and Login name fields for individual users are disabled.
You cannot manually assign users to groups using the Hierarchy tab.
Note: Users who are not assigned to any group will appear at the Root (All) level, with the role
defined in Automatically Created User Roles, in Infrastructure Settings, under LDAP
Global Configuration. If this does not give you sufficient control of user permissions, see
"Achieving Finer Control over Default User Permission Assignments" on page333.
Note: Some customers like the concept of automatic user creation but prefer to put users into
the appropriate BSM groups manually. However, as noted above, with user synchronization
enabled, manual group assignment is disabled in BSM.
To manually assign users to the appropriate BSM group when LDAP User Synchronization is
enabled, do the following:
1) Disable User Synchronization in Group Mappings.
2) Assign users to groups manually using the Hierarchy tab.
3) Re-enable User Synchronization in Group Mappings.
You can optionally map an LDAP group to multiple BSM groups, or multiple LDAP groups to a BSM
group.
When enabling the Group Mapping feature, you can log into BSM with any unique user attribute that
exists on the LDAP server (for example, an email address). For details, see "How to Modify the
Attribute Used to Log into BSM" on the next page.
Tasks
How to Modify the Attribute Used to Log into BSM
This task describes how to modify the LDAP attribute with which you want to log into BSM.
1. Navigate to Admin > Platform > Users and Permissions > Authentication Management.
2. Click the Edit button under LDAP Configuration to activate the LDAP Configuration Wizard.
3. Navigate to the LDAP General Configuration page, and click the Advanced button.
4. Modify the User unique ID attribute to the attribute you want to log in with, as it appears on the
LDAP server.
How to Secure Communication Between the LDAP Server and BSM Server Over
SSL
1. If the LDAP server requires a secure connection perform the following steps:
a. Obtain root CA certificate from the Certificate Authority that issued LDAP server certificate.
b. Import it into the truststore of JVM on each BSM gateway (for both JRE and JRE64).
c. Restart the BSMgateway servers.
Example
cd C:\HPBSM\JRE64\bin
keytool -import -trustcacerts -alias myCA -file c:\RootCA.cer -keystore
..\lib\security\cacerts
cd C:\HPBSM\JRE\bin
keytool -import -trustcacerts -alias myCA -file c:\RootCA.cer -keystore
..\lib\security\cacerts:
2. Verify that communication between the LDAP server and the BSM server is valid over SSL, using
the LDAP Configuration Wizard, as follows:
a. Navigate to the LDAP Configuration Wizard by selecting Admin > Platform > Users and
Permissions > Authentication Management, click Edit under LDAP Configuration and
navigate through the LDAP Configuration Wizard to the LDAP General page.
b. Enter the URL of your LDAP server, according to the following syntax: ldaps://machine_
name:port/<scope>??sub.
Ensure that the protocol is ldaps://, and the port number is configured according to the SSL
port, as configured on the LDAP server (default is 636).
c. Test your configuration on the LDAP General Configuration page by entering the UUID and
password of a known LDAP user in the relevant fields. Click Test to authenticate the user. For
details, see "LDAP General Configuration Page" on page303.
Synchronizing Users
The user synchronization feature maps users from an LDAP server to users in BSM.
Learn About
Mapping Users from LDAP Servers to BSM
Mapping users from an LDAP server to users in BSM simplifies the process of managing users for
BSM administrators, as all of the user management functions are done through the LDAP server.
Granting Permissions
It is recommended to grant permissions on the group level in BSM, and then nest users into groups
according to their desired permission level. If users are moved between LDAP groups, they are moved
between their corresponding mapped groups on the BSM server after logging into BSM.
Status of LDAP Users not in BSM
LDAP users who do not exist in, and log into, BSM, are created as BSM users. Their status is
determined as follows:
l
If the user belongs to a mapped LDAP group, she is automatically assigned to the BSM group that
is mapped to their LDAP group.
If their group is not mapped to a BSM group, or if they do not belong to an LDAP group, they are
nested under the Root group and created as a BSM user with System Viewer permissions. Their
permissions and user hierarchy can be modified on the User Management interface.
Obsolete Users
Users that have been removed from the LDAP server are still displayed as BSM users, even though
they are no longer registered as LDAP users and cannot log into BSM. These users are called
Obsolete Users. For details on removing Obsolete Users from BSM, see "How to Delete Obsolete
Users" on page332.
Tasks
How to Map Groups and Synchronize Users
1. Configure Group Filters on the LDAP Server for Mapping Groups
You can configure group filters on the LDAP Server for mapping groups using the LDAP
Configuration Wizard. For task details, see "LDAP Configuration Wizard" on page303.
2. Create BSM Groups and Hierarchy
You create local groups in BSM with the appropriate roles to nest users into, and users adopt the
permission level of the group they are nested in. For task details, see "Groups/Users Pane" on
page189.
3. Map LDAP Groups to BSM Groups
You map user groups on the LDAP server to groups in BSM.
Caution: Administrators must create an account in BSM with superuser permissions after
enabling the LDAP server but before configuring group mapping and user synchronization.
Without a BSM account with superuser permissions, you cannot configure group mapping
and user synchronization because only a user with superuser permission can access the
User Manager page.
a. On the Users and Permissions interface, navigate to the Groups/Users pane, click the Group
Mappings
button and select the unique domain name to open the Group Mappings dialog
box.
b. In the Remote Corporate Directory pane, select a remote LDAP server group and click
Assign Groups.
The BSM groups mapped to the selected LDAP group are displayed in the BSM Local
Directory for Remote Group: <group name> pane.
Existing mapping of all LDAP groups is displayed in the Local Groups to Remote Groups
Mapping pane.
Mapping local groups to remote groups:
Before enabling user synchronization, ensure that you have either created a superuser
account in BSM that matches your own LDAP user login, or mapped an appropriate LDAP
group to a BSM group that has the superuser role assigned to it. If you have not done so,
and log out of BSM after enabling LDAP but before group mapping is completed and user
synchronization is enabled, the designated BSM superuser account will be locked out of
BSM.
n
Ensure that you have mapped LDAP groups to BSM groups before selecting this check
box. If you have not performed Group Mapping, all users are nested under the Root group
and are assigned System Viewer permissions.
To disable user synchronization and enable management of users through the User
Management interface in BSM, clear the Enable User Synchronization check box in the
User Management >Group Mappings dialog box.
For details on synchronizing users, see "LDAP Group Mapping Configuration Page" on page307.
GMT Time
All applications participating in an LW-SSO integration must use the same GMT time with a
maximum difference of 15 minutes.
Multi-domain Functionality
Multi-domain functionality requires that all applications participating in LW-SSO integration
configure the trustedHosts settings (or the protectedDomains settings), if they are required to
integrate with applications in different DNS domains. In addition, they must also add the correct
domain in the lwsso element of the configuration.
Application
Version
Comments
Java
Internet Explorer
FireFox
JBoss
Authentications
JBoss 4.0.3
Tomcat
Authentications
Standalone
Tomcat 6.0.29
JBoss 4.3.0
Standalone
Tomcat 5.0.28
Standalone
Tomcat 5.5.20
Acegi
Authentications
Acegi 0.9.0
Spring Security
Authentication
Spring Security
2.0.4
Web Services
Engines
Axis 1 - 1.4
Acegi 1.0.4
Axis 2 - 1.2
JAX-WS-RI 2.1.1
The initString parameter is confidential information and should be treated as such in terms
of publishing, transporting, and persistency.
The initString parameter should be shared only between applications integrating with each
other using LW-SSO.
Level of authentication security. The application that uses the weakest authentication framework
and issues a LW-SSO token that is trusted by other integrated applications determines the level of
authentication security for all the applications.
It is recommended that only applications using strong and secure authentication frameworks issue an
LW-SSO token.
Symmetric encryption implications. LW-SSO uses symmetric cryptography for issuing and
validating LW-SSO tokens. Therefore, any application using LW-SSO can issue a token to be
trusted by all other applications sharing the same initString parameter. This potential risk is
relevant when an application sharing an initString either resides on, or is accessible from, an
untrusted location.
User mapping (Synchronization). The LW-SSO framework does not ensure user mapping
between the integrated applications. Therefore, the integrated application must monitor user
mapping. We recommend that you share the same user registry (as LDAP/AD) among all integrated
applications.
Failure to map users may cause security breaches and negative application behavior. For example,
the same user name may be assigned to different real users in the various applications.
In addition, in cases where a user logs onto an application (AppA) and then accesses a second
application (AppB) that uses container or application authentication, the failure to map the user will
force the user to manually log on to AppB and enter a user name. If the user enters a different user
name than was used to log on to AppA, the following behavior can arise: If the user subsequently
accesses a third application (AppC) from AppA or AppB, then they will access it using the user
names that were used to log on to AppA or AppB respectively.
Identity Manager. Used for authentication purposes, all unprotected resources in the Identity
Manager must be configured with the nonsecureURLs setting in the LW-SSO configuration file.
Security context. The LW-SSO security context supports only one attribute value per attribute
name.
Therefore, when the SAML2 token sends more than one value for the same attribute name, only one
value is accepted by the LW-SSO framework.
Similarly, if the IdM token is configured to send more than one value for the same attribute name,
only one value is accepted by the LW-SSO framework.
Limitations
Note the following limitations when working with LW-SSO authentication:
l
The application clients must access the application with a Fully Qualified Domain Name (FQDN)
in the login URL, for example, http://myserver.companydomain.com/WebApp.
If a domain is not defined in the LW-SSO configuration: The client can access the application
without a FQDN in the login URL. In this case, an LW-SSO session cookie is created specifically
for a single machine without any domain information. Therefore, the cookie is not delegated by the
browser to another, and does not pass to other computers located in the same DNS domain. This
means that LW-SSO does not work in the same domain.
l
LW-SSO framework integration. Applications can leverage and use LW-SSO capabilities only if
integrated within the LW-SSO framework in advance.
Multi-Domain Support.
n
Multi-domain functionality is based on the HTTP referrer. Therefore, LW-SSO supports links
from one application to another and does not support typing a URL into a browser window,
except when both applications are in the same domain.
The first cross domain link using HTTP POST is not supported.
Multi domain functionality does not support the first HTTP POST request to a second application
(only the HTTP GET request is supported). For example, if your application has an HTTP link to
a second application, an HTTP GET request is supported, but an HTTP FORM request is not
supported. All requests after the first can be either HTTP POST or HTTP GET.
SAML2 token.
n
The SAML2 token's expiration is not reflected in the application's session management.
Therefore, if the SAML2 token is used to access a second application, each application's session
management is handled independently.
Using spaces in Tomcat directories. Using spaces in Tomcat directories is not supported.
It is not possible to use LW-SSO when a Tomcat installation path (folders) includes spaces (for
example, Program Files) and the LW-SSO configuration file is located in the common\classes
Tomcat folder.
Load balancer configuration. A load balancer deployed with LW-SSO must be configured to use
sticky sessions.
Important
You cannot create a new schedule from the Report Schedule Manager. For details on
information creating schedules, see How to Schedule a Report in the BSM User Guide.
Caution: Scheduled reports place pressure on the system and can cause performance issues for
users who are logged on. When possible, you should schedule reports for off hours when fewer
users access the system. If your system does not have off hours, you should stagger reports at
different times of the day to minimize the number of reports running simultaneously.
User interface elements are described below:
UI Element
(AZ)
Description
Opens the Edit Schedule for the <Report Name> dialog box enabling you to edit the
selected schedule. For details, see Creating a New Schedule Dialog Box in the BSM
User Guide.
Note: This dialog box enables you only to edit an existing schedule - you create a new
schedule from the Report Manager interface. For details, see Creating a New
Schedule Dialog Box in the BSM User Guide.
Deletes the selected schedule.
Resumes the selected schedule, this button is only available if the selected report has
been paused.
Pauses the selected schedule.
Refreshes the Report Schedule Manager page.
Resets the width of the columns to the default setting.
Enables you to select columns to be visible in the table.
Generation
Time
The time (in the indicated time zone) that the schedule is to be generated.
UI Element
(AZ)
Recipients
Description
The individuals configured in the Report Manager to receive the report or report item at
scheduled intervals. For details on configuring Schedules, see Creating a New
Schedule Dialog Box in the BSM User Guide.
Report
Type
Status
Active
Paused
Alert Recipients
Alerts can be configured to send notification to specified recipients. For task details on configuring
recipients, see "Recipient Management" on page275.
Notification Template
For each recipient, you can specify the notification method (any combination of email, pager, and/or
SMS) and the template to use for alert notices. You can also create a notification schedule for the
alerts. For details, see "How to Configure EUM Alerts Notification Templates" on page363.
Alert Schemes
In each alert scheme, you define a unique set of alert properties. After you create an alert scheme, you
view and edit it in the appropriate Alerts user interface. For detailed tips and guidelines, see "Planning
for Effective Alert Schemes" on page345.
You can configure alerts and assign recipients to the alerts for:
l
CIs in a view. CI Status alerts are triggered by a pre-defined status change for the selected
configuration item (CI) detected by the Business Logic Engine. For details, see CI Status Alerts
Administration in the BSM User Guide.
HP Service Manager automatically opens incidents when a CI Status alert is triggered in BSM. For
details, see HP Service Manager in the BSMsection of the Integrations tab in the HPSoftware
Integrations site.
SLAs. SLA status alerts are triggered by changes to an SLA's key performance indicator status.
For details, see SLA Alerts Administration in the BSM User Guide.
EUM alerts. EUM alerts are triggered when pre-defined conditions, such as transaction response
time, availability, success or failure, or completion time, are reached. For details, see End User
Management Alerts Administration in the BSM User Guide.
Open Events in OM
You can automatically open events in OM, when a CI Status alert, an SLA alert, or an EUM alert is
triggered in BSM. For details, see Operations Manager in the BSMPlatform section in the HPSoftware
Integrations site.
Alert History
You can view the history of the alerts in the following:
CI Status Alerts Report tab. Enables you to list all of the CI Status alerts that were triggered
during the specified time range. For details, see Configuration Item Status Alerts Report in the BSM
User Guide.
SLA Alerts Report tab. Enables you to list all of the Service Level Management alerts that were
triggered during the specified time range. For details, see Alerts Log Report in the BSM User Guide.
Alert Log report. Enables you to track all the details for the EUM alerts sent by BSM during the
specified time range. For details, see Alerts Log Report in the BSM User Guide.
Alert Count Over Time report. Enables you to display an overview of the frequency of alerts.
For details, see Alerts Count Over Time Report in the BSM User Guide.
Delivery of Alerts
If the online components are experiencing downtime, the Alerts application makes sure that the data is
stored in the bus for one hour by default. After the components are back online, the Alerts engine
generates alerts from data in the bus.
Take no actions
Enforce downtime on Reports and KPI calculations; suppress alerts and close events
Stop active monitoring (BPM & SiteScope); enforce downtime on Reports & KPI
calculations; suppress alters and close events (affects all related SLAs)
CI Status or EUM alerts for CIs that are in a scheduled downtime are not sent for all the options listed
above apart from the Take no action option.
The CI alert is sent even if one of the options listed above is selected (apart from the Take no action
option), if you configured the alert to be triggered when the status of the CI changes to the Downtime
status. For user interface details, see General Page in the BSM User Guide.
For task details, see "How to Set Up an Alert Delivery System" below.
For user interface details, see "Downtime Management Page" on page379.
When creating alert schemes, categorize alerts by severity. Create critical alerts for events that
require immediate corrective action (for example, transaction failure, or excessive response times
for critical transactions). Create non-critical alerts for events that require early notification (for
example, slow response times).
Determine the users that receive the different types of alerts, and consider the alert delivery method
that best suits the alert type. For example, pager delivery as opposed to email delivery might be
more effective for critical alerts. When determining the delivery method, take the time of day into
account as well. For example, email alerts might not be effective during non-business hours.
Set BSM to alert you to a recurring problem, not one-time events. Recurring alerts are the most
accurate indicator of problems with your application. For example, as a rule, you should compare
the number of recurring events to the number of Business Process Monitor locations from which
you are monitoring. For example, if you had three failures, but you were monitoring from 100
locations, it would not be as critical as if you had five failures in all five locations.
List the required recipients of alerts, including contact information and required delivery method to
the recipient (email, SMS, pager). For suggestions on how to proceed, see "Planning for Effective
Alert Schemes" on the previous page.
Map out the types of alerts you plan to deliver. For details on the types of alerts, see "Result - define
the alerts schemes" on page348.
In the End User Management context, select Business Service Management >
Applications > <Application> > Alert
You must also specify the permission for the CEM event template.
n
In the RTSM context, select Business Service Management > Views > <view_name>.
In the Service Level Management context, select Business Service Management > SLAs >
<sla_name> context.
The alert external actions (Run executable, Send SNMP trap, or Log to Event Viewer).
You can specify that a user can have a Change or Full Control permission at the global level.
n
In the Platform context, select Business Service Management > Run executable, Send
SNMP trap, or Log to Event Viewer contexts separately.
In the End User Management context, select Business Service Management > System
Recipient Template context.
Customize the alerts triggering system, alerts system health, and event
handling characteristics optional
Customize the alerts triggering system, system health, and event handling characteristics. For more
information, see "How to Customize Alerts" on the next page.
Define recipients
On the Recipients page, you define system recipients for alerts (except SiteScope alerts). You can
specify email, SMS, or pager delivery methods. If required, enter specific alert delivery schedules (for
example, recipients who receive alerts during business hours as opposed to evenings and weekends).
For more information, see "Recipient Management" on page275.
CI Status Alerts. Define CI Status alerts as required to alert recipients to KPI status changes for
specific CIs and KPIs being monitored in Service Health. For more information, see How to Create
a CI Status Alert Scheme and Attach it to a CI in the BSM User Guide.
SLA Alerts. Define SLA alerts as required to alert recipients to changes in the current and
forecasted status for service agreements. For more information, see How to Define an SLA Alert
Scheme in the BSM User Guide.
EUM Alerts. Define EUM alerts as required to alert recipients to performance variance of Real
User Monitor entities or Business Process Monitor transactions. For more information, see How to
Create EUM Alert Schemes in the BSM User Guide.
Acceptable
event delay
(minutes)
The system discards alerts after the number of minutes defined here.
Alert
persistency
during
Downtime
If this option is set to true, the system does not reset the alert persistent state when an
application goes into Downtime. This means that the system retains data and uses it
when generating alerts after the Downtime ends. Applies to EUM alerts only.
Calculation
persistency
If this option is set to true, if the system goes down, the system retains data and uses
it when creating alerts when the system comes back up.
The maximum number of messages that can wait in the alert queue of the
notification queue monitor. When the maximum is reached the notification
queue monitor status changes to error.
The maximum number of messages that can wait in the alert queue of the alert
queue monitor. When the maximum is reached the alert queue monitor status
changes to error.
Parameter
Warning threshold
for the notification
queue monitor
The maximum number of messages that can wait in the alert queue of the
notification queue monitor. When the maximum is reached the notification
queue monitor status changes to warning.
Warning threshold
for the alert queue
monitor
The maximum number of messages that can wait in the alert queue of the alert
queue monitor. When the maximum is reached the alert queue monitor status
changes to warning.
Command line
execution
timeout
(seconds)
The default timeout for an action (by default 30 seconds) after which a command
line alert action is not executed.
Command line
substitution pairs
When specifying a command in the Executable Files action of an EUM alert, you
can use special tokens that are replaced with actual values when the command
is prepared for execution. Those values might include a double quote (") or other
tokens that may cause the resulting command line to be inappropriately
interpreted by the operating system. To avoid this misinterpretation, you can
modify the default value of the Command line substitution pairs infrastructure
setting, as follows:
l
Default EXE
path
Each pair is written using the |a|b| format, the first character (a) is replaced
by the second (b).
Multiple pairs are separated by a comma (,).
For example: |a|b|,|c|d|,|e|f|.
Parameter
l
Default
SNMP Port
Default
SNMP Target For SNMP v3 traps you must enter the following security settings:
Address
l
Default SNMP v3 user name (HPBSMUSER by default)
Default
SNMP v3
user name
Default
SNMP v3
authenticatio
n protocol
Default
SNMP v3
authenticatio
n passphrase
Default
SNMP v3
privacy
protocol
Default
SNMP v3
privacy
passphrase
You can specify only one SNMP target address. The default host address of the
SNMP trap appears automatically in the Enter host destination box in the
Create New/Edit SNMP Trap dialog box. For details, see Create New/Edit
SNMP Trap Dialog Box in the BSM Application Administration Guide or Create
SNMP Trap/Edit SNMP Trap Dialog Box in the BSM Application Administration
Guide. If, when you create or edit an SNMP trap, you select the default host
address and then modify it afterwards in the Infrastructure Settings, the address
in all the SNMP traps you created are updated to the new default. Any alert that
is sent causes the SNMP trap to be sent to the new default address.
Note to HP Software-as-a-Service customers: You can set the default host
address per customer by selecting a customer when you log in. The updated host
address is defined only for the specific customer. You can also define a global
host address.
Default URL
Enable alert
dependencies
across CIs
If this option is set to true, alert dependencies are allowed between CIs.
Enable alert
timer reset
If this option is set to true, an alert is triggered by a specific condition, then the
condition that triggered the alert does not exist any more. If the condition that
triggered the alert occurs again before the end of time period specified in the
Acceptable events delay parameter ends, the alert is sent because the trigger
condition has reset the notification frequency timer. The default is false.
Enable logging to
DB
If this option is set to true, alerts and notifications are not logged in the Profile
database. The default is false.
Parameter
Enable
notifications and
actions
If this option is set to true, the alert engine is able to perform actions and send
notifications. This customization is available only for EUM alerts. The default is
true.
Legacy
SNMP Port
The default SNMP Trap host address for EUM alerts. Modify the default SNMP
trap host address, by entering the IP address or server name in the Default
SNMP Target Address parameter, and the port number in the Default SNMP
Port parameter.
Legacy
SNMP Target
For SNMP v3 traps you must enter the following security settings:
Address
Legacy
SNMP v3
user name
Legacy
SNMP v3
authenticatio
n protocol
Legacy
SNMP v3
authenticatio
n passphrase
Legacy
SNMP v3
privacy
protocol
Legacy
SNMP v3
privacy
passphrase
You can specify only one SNMP target address. The default host address of the
SNMP trap appears automatically in the Enter host destination box in the
Create New/Edit SNMP Trap dialog box. For details, see Create New/Edit
SNMP Trap Dialog Box in the BSM Application Administration Guide or Create
SNMP Trap/Edit SNMP Trap Dialog Box in the BSM Application Administration
Guide. If, when you create or edit an SNMP trap, you select the default host
address and then modify it afterwards in the Infrastructure Settings, the address
in all the SNMP trap you created are updated to the new default. Any alert that is
sent causes the SNMP trap to be sent to the new default address.
Note to HP Software-as-a-Service customers: You can set the default host
address per customer by selecting a customer when you log in. The updated host
address is defined only for the specific customer. You can also define a global
host address.
Notification
execution retries
Notification URL
Parameter
Recipient
information
format in
template
Use to modify how to display the recipient list in Emails or SMSs.You can assign
the following values:
l
Address. Select this option to display the email address of the recipients in
the To field of Emails and SMS notifications.
For example, if you set Recipient information format in template to
Address and the template includes the following parameters:
To:<<Recipients>>, Profile Name: <<Profile Name>>, Severity:
<<Severity>>, then the Email would look as follows:
To:[email protected];[email protected]
Profile Name: forAlert
Severity: Major
Logical Name. Select this option to display the logical name of the recipients
in the To field of Emails and SMS notifications.
For example, if you set Recipient information format in template to
Logical Name and the template includes the same parameters as the
example above, then the Email is as follows:
To:John Smith, Mary Brown
Profile Name: forAlert
Severity: Major
SNMP alerts
charset
The character set used to send SNMP alert traps. By default, the setting uses
the platform's default character set. If your operating system supports multi-byte
characters, it is recommended to use the "UTF-8" character set.
Symphony
request timeout
(seconds)
Wait interval
between retries
(seconds)
The default user for authorized sending of email alerts. If not set, email
alerts are sent without authorization
The default user for authorized sending pager alerts. If not set, the
system sends pager alerts without authorization.
The default user for authorized sending SMS alerts. If not set, the system
send SMS alerts without authorization.
Used to modify the default sender email address used in emails. Use the
parameter to modify the default value (HP_BSM_Alert_Manager) that
appears in the From field when BSM sends alerts is set when you install the
Data Processing Server.
Alternate SMTP
server, (Windows
only)
Alternate SMTP
server port
(Windows only)
Parameter
Email notifications
charset
When an alert is triggered, recipients for the generated alert can be notified by
email, SMS, or pager messages. You can select one of the following
character sets:
l
ISO-2022-JP.
Note to HP Software-as-a-Service customers: The settings described
in this section are per customer.
Email sender
Enable recipient
notifications
If this option is set to false, the system will not send email notifications.
Notification date
format
Pager notifications
charset
The character set used to send pager notification messages You can select
one of the following character sets:
l
ISO-2022-JP.
Note to HP Software-as-a-Service customers: The settings described in
this section are per customer.
Password for
The default password for authorized message sending. If this option is not
authorized message set, the system sends messages without authorization.
sending
Parameter
SMS notifications
charset
The character set used to send SMS notification messages You can select
one of the following character sets:
l
ISO-2022-JP.
Note to HP Software-as-a-Service customers: The settings described in
this section are per customer.
SMTP server
(Windows only)
The primary SMTP server used. In windows NT, set as <SMTPSVC> if you
want to send using the SMTP service.
SMTP server
socket connection
timeout (seconds)
(Windows only)
The default timeout (60 seconds) after which an SMTP server socket is
disconnected.
The default user for authorized message sending. If this option is not set, the
system sends messages without authorization.
[email protected]>
[email protected]>
email>
For example:
>telnet smtp-xyz.hp.com 25
>ehlo
>mail from: [email protected]
>rcpt to: [email protected]
>data
>Whatever I want to write here (this is the body of the email)
>.
>quit
Alert Logs
You can use the following logs to debug the CI Status, SLA, and EUM alerts.
Alert Type
All alerts
Description
Alerts and notifications handling in the
MercuryAs process
Setup: <BSM_data_
processing_server>\conf\
core\Tools\log4j\EJB\
alerts.properties
Log: <BSM_Gateway_
server>\log\alerts\
alerts.reports.log
Setup: <BSM_Gateway_
server>\conf\core\
Tools\log4j\EJB\
alerts.properties
Alert Type
CI Status alerts
and SLA alerts
Description
Alert init and calculation in the MAR Business
Logic Engine worker process
Setup: <BSM_data_
processing_server>\conf\
core\Tools\log4j\marble_
worker\
cialerts.properties
Log: <BSM_data_processing_
server>\log\
marble_worker_
1\status.alerts.downtime.log
Setup: <BSM_data_
processing_server>\conf\
core\Tools\log4j\marble_
worker\
acialerts.properties
Log: <BSM_Gateway_
server>\log\alerts\
alertui.log
Alert administration
Setup: <BSM_Gateway_
server>\conf\core\
Tools\log4j\EJB\
alerts.properties
Alert Type
EUM alerts
Description
Alert calculation in the MAR Business Logic
Engine worker process
Setup: <BSM_data_
processing_server>\conf\core\
Tools\log4j\marble_worker\
alerts-rules.properties
Log: <BSM_data_processing_
server>\log\alerts\
alerts.rules.init.log
Setup: <BSM_data_
processing_server>\conf\core\
Tools\log4j\marble_worker\
alerts-rules.properties
Log: <BSM_data_processing_
server>\log\alerts\
alerts.downtime.log
Setup: <BSM_data_
processing_server>\conf\
core\Tools\log4j\marble_
worker\
alerts-rules.properties
Note: When you modify a log properties file on one of the BSM processing servers, it affects only
the logs on this BSM processing server.
To access
Important
information
Click
in the Configuration Item Status Alerts page, SLA Status Alerts page, or
Alerts Log reports.
For details about CI Status Alerts, see Configuration Item Status Alert
Notifications Report in the BSM User Guide.
For details about SLA Status Alerts, see SLA Status Alert Notifications in the
BSM User Guide.
For details about EUM alerts, see Alert Details in the BSM User Guide.
The alert definition is not as expected. Check the alert definition in the relevant alert administration.
The data does not behave as expected so the alert triggering condition might not exist. Check the
alert calculation log or check the specific data origin logs and reports. For details, see "Alert Logs"
on page358.
There might be a connection problem with the SMTP email server. To check if the server works,
run telnet <smtp_server_host_name_or_IP_nbr> 25.
The email address of the recipient might not be valid. Examine the recipient definition in the user
interface, and manually send an email to the recipient to check the address's validity.
The recipient considers the alert email as spam. You might have to ask the recipient's administrator
to reconfigure the spam filter.
To access
Admin > Platform > Recipients > End User Management Alerts Notification
Templates
l
Important
Clear alert notifications: To set up a clear alert notification, select the notification
information template to use as the basis for your clear alert template and clone it. Make you
determination based on the notification templates that was selected for users likely to
receive a clear alert notification. Change the name of the template by deleting Copy
of and adding _FOLLOWUP (all caps, one word). Edit the template details as required.
It is recommended that you include in the Subject of a clear alert email, the Header,
the Alert Specific Information, or both.
Example: If you are creating a clear alert template based on the LONG default
template, you would call the clear alert template LONG_FOLLOWUP. If the clear alert
template is based on a user-defined template called MyTemplate, name the clear alert
template MyTemplate_FOLLOWUP.
Default: The _FOLLOWUP string is the default string recognized by BSM as the
template name for a clear alert message.
Customization: You can customize the _FOLLOWUP string. For details, see "How
to Configure a Template for Clear Alert Notifications" on the previous page.
Relevant
tasks
"How to Configure a Template for Clear Alert Notifications" on the previous page
UI
Element
(A-Z)
<Insert>
Description
Select a parameter to add to the section. Repeat to add as many text parameters as you
want from the list.
Add free text before or after the text parameters. The text parameters available for this
section are:
l
Alert Name. The name of the alert, as defined in the alert scheme.
Severity. The severity label assigned to the alert in the alert scheme.
Alert User Description. The description you specified in the alert scheme.
Actions Result. A description of the results of the alert actions specified in the alert
scheme.
Subject
Specify the information that you want BSM to include in the subject of the email, pager
message, or SMS message.
Use the <insert list for Subject / Header / Footer> to add parameters and free text to
create a customized subject. Use as many parameters as you want from the list.
Header Area
Use this area to specify the information that you want to appear at the top of the alert notice. Select
parameters from the <Insert> list and free text to create a customized header. Use as many
parameters as you want from the list.
User interface elements are described below (unlabeled elements are shown in angle brackets):
UI Element
(A-Z)
<Insert>
Description
Select a parameter to add to the section. Repeat to add as many text parameters as
you want from the list.
Add free text before or after the text parameters. The text parameters available for
this section are:
l
Alert Name. The name of the alert, as defined in the alert scheme.
Severity. The severity label assigned to the alert in the alert scheme.
Alert User Description. The description you specified in the alert scheme.
Actions Result. A description of the results of the alert actions specified in the
alert scheme.
Entity ID. The ID of the CI attached to the alert.
Description
Transaction Area
Use this area to specify the BMP transaction details relevant only for the BPM alert type.
User interface elements are described below (unlabeled elements are shown in angle brackets):
UI
Element
(A-Z)
Description
<Insert> Select a parameter to add to the section. Repeat to add as many text parameters as you
want from the list. Add free text before or after the text parameters. The text parameters
available for this section are:
l
Data Collector Name. The name of the data collector running the transaction related
to the alert.
Script Name. The name of the script containing the transaction related to the alert.
Footer Area
Use this area to specify the information that you want to appear at the bottom of the alert notice. Select
parameters from the <Insert> list and free text to create a customized footer. Use as many parameters
as you want from the list.
User interface elements are described below (unlabeled elements are shown in angle brackets):
UI Element
(A-Z)
<Insert>
Description
Select a parameter to add to the section. Repeat to add as many text parameters as
you want from the list.
Add free text before or after the text parameters. The text parameters available for
this section are:
l
Alert Name. The name of the alert, as defined in the alert scheme.
Severity. The severity label assigned to the alert in the alert scheme.
Alert User Description. The description you specified in the alert scheme.
Actions Result. A description of the results of the alert actions specified in the
alert scheme.
Entity ID. The ID of the CI attached to the alert.
Admin > Platform > Recipients > End User Management Alerts Notification
Templates
Important
When configuring alert schemes, you can instruct BSM to automatically follow up the
information alert by sending a clear alert notification. For details on selecting this option while
creating your alert scheme, see "How to Configure a Template for Clear Alert
Notifications" on page364.
The default template for clear alert notifications is automatically used by BSM. If you
do not want to use that default template, you can create your own clear alert template.
It is recommended to clone an existing notifications template and then to modify the
cloned template.
BSM uses the clear alert notification template that you create under the following
circumstances:
l
Relevant
tasks
Description
Click to duplicate notification template. Clones the selected notification template.
The Notification Template Properties dialog box opens where you can edit the cloded
notification. For details, see "Notification Template Properties Dialog Box" on
page364.
Click to modify notification template properties. Click to edit the selected
template. For details, see "Notification Template Properties Dialog Box" on page364.
Click to delete notification template. Delete the selected templates
simultaneously.
To delete multiple templates simultaneously, select their check boxes, and click the
button located at the bottom of the templates list.
New
Template
Click the New Template button to open the Notification Template Properties dialog
box. For details, see "Notification Template Properties Dialog Box" on page364.
UI Element
(A-Z)
Description
Notification Lists the default templates and the custom templates. The default templates are:
Template
l
DEFAULT_LOG_FORMAT. Includes all the elements needed to create a default
Name
long format notification for reports.
l
Note: For details on the parameters displayed in each template, see "Notification
Template Properties Dialog Box" on page364.
To access
Select Admin > Platform > Downtime Management
Learn About
Downtime Management
Downtime or other scheduled events can skew CI data. You may want to exclude these periods of time
from being calculated for events, alerts, reports, views, or SLAs.
Downtimes are configured based on associated CIs. For example, you might want to exclude a
recurring maintenance event or a holiday for a specific host CI whose physical host you know will be
down for that period of time.
When defining downtimes, you configure how often the downtime will occur and select the specific
instances of CIs that are affected by the downtime. You can select CIs of the following CI types:
l
Node
Running software
Business application
CI collection
Infrastructure service
Business service
Downtime Actions
You can select what action is taken during the downtime on the CIs specified in the downtime
configuration. Downtime can impact the following:
l
Alerts and Events. Events are suppressed and no CI Status alerts, EUM alerts, or notifications
are sent for any of the CIs associated with the downtime.
KPIs. KPIs attached to the CI and impacted CIs are not updated and display the downtime for the
CI in Service Health. For details on how downtime configurations affect Service Health, see KPI
Status Colors and Definitions in the BSM User Guide.
Reports. End User Management Reports are not updated and display the downtime for the CI. For
details on how downtime configurations affect reports, see Downtime Information in Reports in the
BSM User Guide.
SLAs. Selected SLAs that are attached to the CI are not updated. You can select which SLAs to
include in the downtime. For details on how downtime configurations affect SLAs, see Retroactive
SLA Data Corrections in the BSM Application Administration Guide.
Monitoring. Business Process Monitor and SiteScope monitoring stops for any of the CIs
associated with the downtime. For details on how downtime configurations affect SiteScope
monitoring, see CI Downtime in the BSM Application Administration Guide.
The options you select in the downtime wizard are combinations of the above actions, grouped in this
order. This means that each option includes the previous options listed. The actions that are taken in
BSM during the downtime depend on the option selected during downtime configuration.
Permissions
To add, edit, or delete downtimes, you must have Full permission on the Downtime resource. In
addition, you should have View permission on the Views to which CIs in the downtime belong. For
details on permissions, see "Permissions" on page193.
Tasks
How to Configure Maximum Number of Downtimes
1. Select Admin > Platform > Setup and Maintenance > Infrastructure Settings. For user
interface details, see "Infrastructure Settings Manager Page" on page80.
2. Select Foundations.
3. From the Foundations drop-down list, select Downtime.
4. From the Fuse for number of downtimes in the System parameter, click the Edit Setting
button
6. Click Save.
7. Restart the server for the new value to take affect.
5. In the Value field, enter the time period from which completed downtimes should be purged .
6. To disable periodic purging, from the Run Periodic Purging parameter, click the Edit Settings
button
7. Click Save.
8. Restart the server for the new value to take affect.
When determining which CIs may need downtimes, take into consideration CIs that impact the
CIs that you selected. In some cases, these CIs are also affected by downtime.
To understand the downtime impact model, see the BSMDowntime_topology TQL in the
RTSM Modeling Studio.
Note: By default, BSMDowntime_topology TQL is hidden. To view this TQL, in the
Modeling Studio go to Admin > RTSM > RTSM Administration > Administration >
Package Manager > Tools > User Preferences > General > Show hidden queries
and set the value to True. The maximum depth that the impact can affect is 15 steps.
You can only select CIs from the following CI types:
o
node
running_software
business_application
ci_collection
infrastructure_service
business_service
Note: Even though SiteScope URL monitors are not included in this list of CI types, you
can define a downtime on a SiteScope URL monitor by using a CI type computer. For
example:
1. In SiteScope, define a SiteScope URL monitor as a Computer named HPSERVER.
2. In Platform Admin, create a downtime on a server name called HPSERVER.
n
UI Description
Downtime Management Page
Information displayed on this page is view only. To edit any of the values, double-click on a downtime
or select a downtime and click the Edit button.
User interface elements are described below.
UI Element
(AZ)
Description
Create new downtime. Opens the New Downtime wizard where you configure a new
downtime. For details, see "New Downtime Wizard" on page381.
Edit downtime. Opens the Edit Downtime wizard, which enables to you edit the
configuration of an existing downtime. This wizard contains the same screens as the
New Downtime wizard. For details, see "New Downtime Wizard" on page381.
Duplicate downtime. Clones the settings of an existing downtime to a new
downtime.
Delete downtime(s). Deletes selected downtime(s). Downtimes that are active now
or were active at any time in the past cannot be deleted. This is designed to prevent
the loss of historical data.
Terminate Active Downtime. Cancels all future occurrences of the selected
downtime and marks the downtime status as Completed.
Export to Excel. Exports the table of configured downtimes to a file in Excel format.
Export to PDF. Exports the table of configured downtimes to a PDF file.
Action
The action that takes place when the downtime is in active status. You configure the
action for the downtime in the New Downtime wizard. For details about the possible
actions, see "Action Page" on page389.
CIs
The CIs associated with the downtime. These are the CIs that are impacted when the
downtime is in active status.
UI Element
(AZ)
Description
Modified
by
Name
Next
The date and time of the next occurrence of the downtime. This field is updated
Occurrence automatically.
Scheduling Displays the:
l
Status
Range of recurrence
Active. The CIs are currently in downtime and the action selected for the
downtime is now taking place.
Inactive. The downtime is configured but it is currently not the time for the
downtime to take place.
Completed. The time for the downtime has passed and the actions configured for
the downtime have occurred.
Optional Columns
Approved
by
Indicates if there was an approval for the downtime and who approved it.
UI Element
(AZ)
Description
Category
Application installation
Application maintenance
Hardware installation
Hardware maintenance
Network maintenance
Other
Security issue
You can also create your own customized categories using Infrastructure Settings.
To add a custom downtime category:
1. Select Admin > Platform > Setup and Maintenance > Infrastructure
Settings.
2. Select Foundations > Downtime.
3. In the Downtime - General settings table, edit the Downtime categories
value to the name you want to use as a customized category for the downtime.
The name you enter will appear as an option in the list of available downtime
categories.
Planned
.
The New Downtime Wizard contains:
"Properties Page " on page386> "Select CIs Page " on page387> "Scheduling
Page " on page387> "Action Page" on page389 > "Notification Page " on
page391> "Preview Page " on page391
If you want to cancel a recurring downtime that already occurred at least once, edit the downtime's
End by date in the Scheduling page.
March 14 2010 -- when 2:00 am arrives, the clock moves forward to 3:00 am. Thus, the period
2:00-2:59 am does not exist.
November 7 2010 -- when 2:00 am arrives, the clock moves back to 1:00 am. Thus, the period
1:00-1:59 am appears twice.
In other time zones, the behavior is the same, but the transition dates and times may vary.
These examples are summarized in the table "DST Changes Affecting Downtime Example
Summary" on page384.
When downtime starts before the DST change and ends the day after the change, its end time is as
expected, but the duration is 1 hour less than defined.
Example 1:
Monthly downtime starting 14th day of month at 1:30 am and ending on 15th day of month at 2:40
am. Duration is 1 day, 1 hour, and 10 minutes.
No DST change: Downtime starts on 14th at 1:30 am and ends on 15th at 2:40 am. Duration is 1
day, 1 hour, 10 minutes.
DST change on March 14 2010: Downtime starts on 14th at 1:30 am and ends on 15th on 2:40 am,
but the duration is 1 day, 0 hours, 10 minutes (1 hour less than defined).
When downtime starts before the DST change and ends the same day as the change, but after the
change, its end time is 1 hour more than defined, but its duration is as defined.
Example 2:
Monthly downtime on 13th day of month, starting at 11 pm (23:00), for a duration of 5 hours.
No DST change: Downtime starts on 13th at 11:00 pm and ends on 14th at 4:00 am.
DST change on March 14 2010: Downtime starts on 13th at 11:00 pm and ends on 14th at 5:00 am,
and the duration remains 5 hours.
When downtime is defined to start during the skipped hour, the start time shifts 1 hour forward and
keeps the defined duration.
Example 3:
Monthly downtime on 14th day of month, starting at 2:30 am, for a duration of 2 hours.
No DST change: Downtime starts on 14th at 2:30 am and ends on 14th at 4:30 am.
DST change on March 14 2010: Downtime starts on 14th at 3:30 am and ends on 14th at 5:30 am,
and the duration remains 2 hours.
When downtime is defined to start before the DST change and end during the skipped hour, the end
time shifts 1 hour forward and keeps the defined duration.
Example 4:
Monthly downtime on 13th day of month, starting at 1:30 am, for a duration of 1 day, 1 hour, and 10
minutes.
No DST change: Downtime starts on 13th at 1:30 am and ends on 14th at 2:40 am. The duration is 1
day, 1 hour, and 10 minutes.
DST change on March 14 2010: Downtime starts on 13th at 1:30 am and ends on 14th at 3:40 am,
and the duration remains as defined -- 1 day, 1 hour, and 10 minutes.
When downtime is defined to start and end during the skipped hour, downtime takes place one hour
later than defined.
Example 5:
Monthly downtime on 14th day of month, starting at 2:00 am, for a duration of 1 hour.
No DST change: Downtime starts on 14th at 2:00 am and ends on 14th at 3:00 am.
DST change on March 14 2010: Downtime starts on 14th at 3:00 am and ends on 14th at 4:00 am,
and the duration remains as defined -- 1 hour.
When downtime starts and ends after the DST change, its end time and duration are as defined.
When downtime starts before the DST change (same day as change or day before) and ends after
the change during the day of the change, the end time is 1 hour less than expected, and duration is
as defined.
Example 6:
Two monthly downtimes, both starting on the 7th day of month at midnight. The first downtime
duration is 1 hour, and the second is 2 hours.
No DST change: The first downtime is on 7th from 0:00 to 1:00 am (1 hour duration), and the second
on 7th from 0:00 to 2:00 am (2 hours duration).
DST change on November 7 2010: The first downtime starts on 7th at 0:00 Daylight Time and ends
on 7th at 1:00 am Daylight Time, with a duration of 1 hour. The second downtime starts on 7th at
0:00 Daylight Time and ends on 7th at 1:00 am Standard Time, and the duration remains 2 hours.
Example 7:
Monthly downtime on 7th day of month, starting at midnight, for a duration of 4 hours.
No DST change: Downtime starts on 7th at 0:00 and ends on 7th at 4:00 am.
DST change on November 7 2010: Downtime starts on 7th at 0:00 and ends on 7th at 3:00 am, and
the duration remains as defined -- 4 hours.
Example 8:
Monthly downtime on 6th day of month, starting at 8:00 pm (20:00), for a duration of 7 hours.
No DST change: Downtime starts on 6th at 8:00 pm and ends on 7th at 3:00 am.
DST change on November 7 2010: Downtime starts on 6th at 8:00 pm and ends on 7th at 2:00 am,
and the duration remains as defined -- 7 hours.
When downtime starts before the DST change and ends the day after the change, the end time is as
expected, and duration is 1 hour more than defined.
Example 9:
Monthly downtime on 7th day of month, starting at midnight (0:00), for a duration of 1 day, 1 hour (25
hours).
No DST change: Downtime starts on 7th at 0:00 and ends on 8th at 1:00 am.
DST change on November 7 2010: Downtime starts on 7th at 0:00 and ends on 8th at 1:00 am, but
the duration is 26 hours.
Downtime as Set/With
Example DST Change
1
End Time
Duration
Set
1 day, 1 hour, 10
minutes
1 day, 0 hours, 10
minutes
Set
13th at
11:00 pm
14th at 4:00 am
5 hours
13th at
11:00 pm
14th at 5:00 am
5 hours
Set
2 hours
2 hours
Set
Set
1 hour
1 hour
1st
Set
7th at 0:00
7th at 1:00 am
1 hour
With DST
Change
7th at 0:00
7th at 1:00 am
1 hour
Set
7th at 0:00
7th at 2:00 am
2 hours
With DST
Change
7th at 0:00
7th at 1:00 am
Standard Time
2 hours
Set
7th at 0:00
7th at 4:00 am
4 hours
7th at 0:00
7th at 3:00 am
4 hours
Set
6th at 8:00
pm
7th at 3:00 am
7 hours
6th at 8:00
pm
7th at 2:00 am
7 hours
2nd
Start Time
Downtime as Set/With
Example DST Change
Start Time
End Time
Duration
Set
7th at 0:00
8th at 1:00 am
25 hours
7th at 0:00
8th at 1:00 am
26 hours
Properties Page
This wizard page enables you to configure the general properties of the downtime. For information
about downtimes, see "Downtime Management Overview" on page373.
This page is part of the "New Downtime Wizard" on page381.
User interface elements are described below:
UI Element
Description
Downtime
name
Downtime This description also appears in the Downtime Information Area in the BSM User
description Guide. The description cannot exceed 2000 characters.
Approved
by
You can enter the person or department who approved this downtime. Cannot exceed
50 characters.
Note: In Oracle, if you are using East Asian Languages (Chinese, Japanese, or
Korean), the maximum number of characters for Downtime Name, Downtime
Description, or Approved by may be less than specified above.
Planned
Select if you want this downtime marked as planned. You can create downtimes that
are unplanned. This is for information purposes only.
Downtime
Category
Select Foundations.
Select Downtime.
In the Downtime - General settings table, edit the Downtime category value to
the name you want to use as a customized category for the downtime. The name
you enter appears as an option in the list of available downtime categories after
you restart BSM.
Description
Available Select from the list the view that contains the CIs to be affected by this downtime. Click
CIs
to browse and search for the CI from the available views.
Highlight a CI from the view to move it to the Selected CIs list. Press the Ctrl key to
select multiple CIs.
You can select any view that you have permission to see. You can select CIs only of the
following CI types:
Selected
CIs
Node
Running software
Business application
CI collection
Infrastructure service
Business service
Once CIs are selected, they appear in the Selected CIs list. To remove a CI from a
downtime, select the CI in the Selected CIs and click the back arrow to move it back to
the Available CIs list.
Scheduling Page
This wizard page enables you to configure the schedule for the downtime. For information about
downtimes, see "Downtime Management Overview" on page373.
Note: You cannot schedule a downtime in the past.
For downtimes that have already occurred, only the following field is editable in the Scheduling page:
Description
l
Start. The drop-down list includes times set for every half hour on the hour and half
hour. To select a different time of day, select the closest half hour and edit the field
to enter the actual time you want the downtime to start. For example, for 2:10 am,
select 2:00 am and edit the minutes to indicate 2:10 am.
End. When you select an end time, the duration field automatically updates. Or
you can select the duration and the end time field automatically updates.
Duration. Includes options from 5 minutes to one week. The downtime duration
must be in increments of 5 minutes and be defined in lengths of minutes, hours,
days, or weeks.
If the length of time you want to specify does not appear, for example 1-1/2 hours,
enter the end time and the duration automatically updates.
To select a time greater than 1 week, select 1 week and edit the field to the correct
number of weeks.
Weekly. Select the day of the week for the scheduled weekly recurrence.
Range of
recurrence
Time zone
Action Page
This wizard page enables you to define the set of actions taken during the downtime. For information
about downtimes, see "Downtime Management Overview" on page373.
You cannot edit fields in teh Action page for downtimes that already occurred.
This page is part of the "New Downtime Wizard" on page381.
User interface elements are described below:
UI Element
Description
Take no actions
Note: During the downtime period, the affected CI may change its
status, and the status change may trigger the relevant CI status alert.
Enforce downtime on
KPI calculations;
suppress alerts and
consider events
KPI calculations are not run and the status in Service Health is not
updated. The downtime for the CI is displayed.
No alerts or their associated notifications or actions are sent for any
of the CIs associated with the downtime.
By default, events are submitted as closed. If OMi is installed, event
handling in downtime can be configured in Admin > Operations
Management > Event Automation > Downtime Behavior, and
overrides this setting.
Reporting and monitoring continue. SLAs are updated.
UI Element
Enforce downtime on
Reports and KPI
calculations; suppress
alerts and consider
events
Description
l
Report data is not updated and the downtime is displayed for the
associated CIs.
Selected SLAs are not updated for the SLAs affected by the CIs
associated with the downtime.
KPI calculations are not run and the status in Service Health is not
updated. The downtime for the CI is displayed.
No alerts or their associated notifications or actions are sent for any
of the CIs associated with the downtime.
By default, events are submitted as closed. If OMi is installed, event
handling in downtime can be configured in Admin > Operations
Management > Event Automation > Downtime Behavior, and
overrides this setting.
Monitoring continues.
Report data is not updated and the downtime is displayed for the
associated CIs.
SLAs are not updated for the SLAs affected by the CIs associated
with the downtime.
KPI calculations are not run and status in Service Health is not
updated. The downtime for the CI is displayed.
No alerts or their associated notifications or actions are sent for any
of the CIs associated with the downtime.
By default, events are submitted as closed. If OMi is installed, event
handling in downtime can be configured in Admin > Operations
Management > Event Automation > Downtime Behavior, and
overrides this setting.
Notification Page
The New Downtime wizard - Notification page enables you to select recipients to receive notification of
the downtime. Notifications are sent by email at the time of downtime occurrence and immediately after
it completes. You can select only those recipients with an email address defined. For information about
downtimes, see "Downtime Management Overview" on page373.
Note: You can edit the Selected Recipients for downtimes that already occurred.
This page is part of the "New Downtime Wizard" on page381.
User interface elements are described below:
UI
Element
Description
Opens the New recipient dialog box that enables you to create a recipient that is not
yet in the list of available recipients. The recipients you create are available as
recipients in all of BSM. For details on creating recipients, see "Recipient
Management" on page275.
Available
Lists the available recipients for downtime notification by means of email, SMS, or
Recipients pager.
Selected
Lists the selected recipients for downtime notification by means of email, SMS, or
Recipients pager. You can select either one, two or all three notification options.
Preview Page
The New Downtime wizard - Preview page enables you to preview a summary of your Downtime
settings. For information about downtimes, see "Downtime Management Overview" on page373.
This page is part of the "New Downtime Wizard" on page381.
User interface elements are described below:
UI
Element Description
Preview
table
Displays a table listing all the values configured for this downtime. You can click the
Back button to return to a page in the wizard that contains a value that should be modified
or deleted.
When you click Finish, the downtime is added to the system and displayed in the
Downtime Manager page.
Part 7: Troubleshooting
Need to change password for access from data collectors (RUM, TV, BPI,
Diagnostics) to RTSM
During deployment, you can optionally set an Access to RTSM password to secure communication
between BSM data collectors (such as Real User Monitor, Business Process Insight, and
TransactionVision), and the Run-time Service Model. This password can be changed later using the
JMX console.
To modify the password for RTSM access using the JMX console:
1. Enter the URL of the JMX console (http://<Gateway or Data Processing Server
name>:8080/jmx-console/) in a web browser. (For detailed instructions, see "JMX Console" on
page91.)
2. Enter your JMX console authentication credentials. If you do not know your authentication
credentials, contact your system administrator.
3. In the Foundations domain, select the service RTSM passwords manager.
4. Modify changeDataCollectorsOdbAccessPwd. The operation gets customer ID and new
password as parameters and changes all data collector passwords to the new one.
Make sure that the BSM Gateway Server is able to access the Default Virtual Server for Application
Users URL. This URL can be found in Admin > Platform > Setup and Maintenance >
Infrastructure Settings. In the Foundations field, specify Platform Administration. The URL is
located in the Host Configuration table.
If you are using a reverse proxy or load balancer, make sure you log in through the URL specified
above.
BSM Login page does not appear when connecting through Load Balancer
l
BSM dialog boxes and applets, such as the Configuration Wizards, do not load
properly
Possible Cause:
Old java files on your client PC.
Solution:
Clear the java cache by following this procedure:
1. Navigate to Start > Control Panel > Java.
2. In the Temporary Internet Files section, click Settings.
3. In the Temporary File Settings dialog box, click Delete Files.
BSM connectivity is down, but the Tomcat servlet engine and jboss
application server appear to be working
Connectivity problems include the inability to log into BSM, and the inability of Business Process
Monitor to connect to the Gateway Server.
Possible Cause:
This can happen if the TopazInfra.ini file is empty or corrupt.
To verify that this is the problem:
1. In the browser, type http://<Gateway Server>:8080/web-console to connect to the JMX Console.
If prompted, enter the JMX Console authentication credentials (if you do not have these
credentials, contact your system administrator).
2. Under System > JMX MBeans > Topaz, select Topaz:service=Connection Pool
Information.
3. Click the showConfigurationSummaryInvoke button toward the bottom of the page. If the
Operation Result page is blank, the TopazInfra.ini file is empty or corrupt.
Solution:
To solve this problem, rerun the Setup and Database Configuration utility and either reconnect to your
existing management database or define a new management database. If you did not discover a
problem with the TopazInfra.ini file, contact HP Software Support.
Inability to log into BSM, and jboss application server fails to initialize
Run the database schema verify program to verify that the database server on which the management
database is located is up and running. For details, see Database Schema Verification in the BSM
Database Guide.
Browser unable to reach BSM and an error about insufficient heap space
A message box opens indicating that BSM is not available and you should try logging in at a later time.
Possible Cause 1:
Check log files in <HPBSM root directory>\log directory for errors.
Microsoft's Security Update 921883 for Windows 2003 Service Pack 1 and for Windows XP
Professional x64 Edition may cause applications using more than 700 MB of contiguous memory to fail.
BSM JVM uses a heap size larger than 768 MB memory. For more information about Security Update
921883, see http://www.microsoft.com/technet/security/Bulletin/MS06-040.mspx.
If the BSM server goes down, look for the following error in <HPBSM server root
directory>\log\jboss_boot.log when the service or process is restarted:
Error occurred during initialization of VM.
Could not reserve enough space for object heap.
Solution:
Although Microsoft has a hotfix available only for Microsoft Support customers, it is recommend to wait
for the next Service Pack release. For more information about this hotfix, see
http://support.microsoft.com/kb/924054.
If Security Update 921883 is already installed, do the following:
If the Security Update is not critical at your site:
Disable Windows Automatic Updates to prevent Security Update 921883 from being installed
again.
If the Security Update is critical at your site, install the hotfix.
Possible Cause 2:
The page file size is too small.
Solution:
Configure the page file size to be at least 150% of RAM size. Restart the server.
Browser unable to reach BSM or the .jsp source code appears in the browser
window
A message box opens indicating that the BSM page does not exist.
Solution:
Ensure that the Jakarta filter path is correct. The path might be incorrectfor example, if you uninstall
BSM servers and then reinstall to a different directory. In this case, the Jakarta filter path is not
updated, causing redirection problems.
To update the Jakarta filter path:
1. Open the IIS Internet Services Manager.
2. Right-click the machine name in the tree and select Properties.
3. With WWW Service displayed in the Master Properties list, click Edit.
4. Select the ISAPI Filter tab.
5. Select jakartaFilter and click Edit.
6. In the Filter Properties box, update the path to point to the drive and directory of the current BSM
installation.
7. Apply your changes and quit the Internet Services Manager.
8. Restart the IIS service.
BSM is sitting behind a proxy and the server name is not recognized by the
proxy
The problem occurs for both Microsoft IIS and Apache web servers.
Possible Cause:
The web server redirects the browser page to a URL that replaces the server name entered by the user.
Solution:
Add the BSM server name to the <Windows system root directory>\system32\drivers\etc\hosts
file on the proxy server machine.
Applets may take longer to open for clients with JRE 7 update 25 and later
This is due to Java security enhancements. Before Java applets and Java Web Start applications run,
the signing certificates are checked to ensure that a signing certificate was not revoked.
If there is a proxy problem or any other network issue, you should disable this Java feature.
To disable Java from performing certificate revocation checks:
1. Click the Start button and select the Control Panel option.
2. Click the Java icon to open the Java Control Panel.
3. Click the Advanced tab.
4. Locate and deselect the option to perform certificate revocation checks.