Cisco Remote Monitoring Suite Administration Guide Remote Monitoring Suite (RMS) Release 2.1(0) July 2005 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0502R) Cisco Remote Monitoring Administration Guide Copyright © 2001-2005, Cisco Systems, Inc. All rights reserved. CONTENTS About This Guide xi Objective xi Audience xi Organization xi Conventions xiii Other Publications xiii Obtaining Documentation xiii Cisco.com xiii Product Documentation DVD xiv Ordering Documentation xiv Documentation Feedback iv Cisco Product Security Overview xv Reporting Security Problems in Cisco Products xv Obtaining Technical Assistance xvi Cisco Technical Support & Documentation Website xvi Submitting a Service Request xvi Definitions of Service Request Severity xvii Obtaining Additional Publications and Information CHAPTER 1 xvii Remote Monitoring Suite Overview 1-1 Introduction 1-1 Background Information 1-1 Error Reporting 1-2 Network Considerations Security 1-7 1-7 Fault Tolerant Functional Architecture Alarms Database 1-7 1-9 Deployment Considerations 1-12 Distributed Architecture 1-12 Hardware and Software Requirements CHAPTER 2 1-13 Installing and Configuring the RMS Listener 2-1 Installing the RMS Listener Server 2-3 Cisco Remote Monitoring Administration Guide, Release 2.1(0) iii Contents How to Install the RMS Listener Software Beeper.flt Modifications 2-3 2-4 Configuring the RMS Listener Server 2-4 Windows 2003 2-4 Windows 2000 2-8 Configuring ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Using the TCP/IP Protocol 2-10 Specifying General Listener Configuration 2-10 How to access the general Listener configuration settings 2-10 Duplex Configuration Settings 2-11 Options Settings 2-12 Event Log Entries 2-13 Specifying Listener Customer Configuration 2-13 Adding a New Listener Customer 2-13 Editing Customer Configuration Information 2-13 Deleting a Customer from Listener 2-14 Serial Alarm Feed CHAPTER 3 2-14 Installing the LGMapper Server 3-1 Overview 3-1 Backwards Compatibility 3-1 LGMapper and LGArchiver Installation Checklist SQL Server Requirements 3-1 3-2 Installing the LGMapper and LGArchiver Servers The Installation Process 3-2 Installation Procedure 3-3 3-2 Controlling Access to LGMapper - Populating User Groups 3-5 Windows 2003 3-6 Modifying Launch and Activate Permissions 3-6 Modifying Access Permissions 3-7 Windows 2000 3-8 Examining the General Tab 3-9 Examining the Location Tab 3-10 Examining the Security Tab 3-11 Examining the Identity Tab 3-25 Examining LGArchiver Properties 3-26 Troubleshooting the LGMapper Installation 3-27 Post-Installation Inspection Checklist 3-27 Local Account or User Groups Creation Failures Cisco Remote Monitoring Administration Guide, Release 2.1(0) iv 3-28 Contents DCOMCnfg Registry Settings Failure Database Creation Failure 3-32 CHAPTER 4 3-32 LGMapperCnfg and LGArchiverCnfg Tools 4-1 LGMapperCnfg Tool 4-1 Overview 4-1 Clients Tab 4-1 Displaying Current Users 4-1 Disabling/Enabling the LGMapper Server Alarms Database Tab 4-6 Listener Tab 4-8 Log Files Tab 4-9 LGArchiverCnfg Tool 4-10 Overview 4-10 Archiver Database Tab Listener Tab 4-12 Log Files Tab 4-13 CHAPTER 5 4-2 4-10 LGMapperNM and LGArchiverNM 5-1 LGMapper Node Manager (LGMapperNM) 5-1 Overview 5-1 Starting the LGMapper Node Manager 5-1 Windows 2000 and Windows 2003 5-1 Task Bar Icon 5-3 Menu Options 5-3 Event Log Messages 5-5 LGArchiver Node Manager (LGArchiverNM) 5-5 Overview 5-5 Starting the LGArchiverNM 5-5 Windows 2000 and Windows 2003 5-5 Task Bar Icon 5-7 Menu Options 5-7 Event Log Messages 5-8 CHAPTER 6 Alarms Database Maintenance 6-1 Overview 6-1 Re-Indexing the Alarms Database 6-1 Creating and Cloning Databases 6-1 Manually Creating Databases 6-1 Cisco Remote Monitoring Administration Guide, Release 2.1(0) v Contents SQL Server Security CHAPTER 7 6-2 LGCnfg Tool 7-1 Overview 7-1 Starting LGCnfg 7-1 Opening a Database 7-1 Using Server-Side Filters 7-3 Customer Instance Filters 7-4 Setting Customer Instance Filters 7-4 Clearing Customer Instance Filters 7-5 Product Filters 7-5 Setting Product Filters in the OID Nodes Tree View 7-5 Clearing Product Filters in the OID Nodes Tree View 7-5 Setting Product Filters in the Objects View 7-5 Clearing Product Filters in the Objects View 7-6 OID Node Filters 7-6 Setting OID Node Filters 7-6 Clearing OID Node Filters 7-6 Class Filters 7-6 Setting Class Filters 7-7 Clearing Class Filters 7-7 Message ID Filters 7-7 Setting Message ID Filters 7-7 Clearing Message ID Filters 7-7 Instance Node Deletion 7-8 Deleting an Instance Node Creating a New Database Cloning a Database 7-8 7-8 7-8 Modifying the OID Node Hierarchy and Rules CHAPTER 8 Installing the AlarmTracker Client 8-1 Overview 8-1 Installing the AlarmTracker Client Starting the AlarmTracker Client 8-1 8-2 Configuring the AlarmTracker Client Windows XP 8-5 Cisco Remote Monitoring Administration Guide, Release 2.1(0) vi 8-5 7-9 Contents CHAPTER 9 The Exclude Node Feature 9-1 Overview 9-1 Enabling the Exclude Node Feature CHAPTER 10 9-1 Deployment Issues 10-1 System Specification 10-1 Disk Space Requirements for Alarms Database CHAPTER 11 Backwards Compatibility Considerations 11-1 Listener and Grid 11-1 LGMapper Server 11-2 AlarmTracker Clients CHAPTER 12 10-2 11-2 Implementing the IWantHelp Interface 12-1 Overview 12-1 How to Implement IWantHelp 12-2 Interface Definition 12-2 Implementing IWantHelp 12-3 Sample Implementation 12-3 Installation and Setup 12-4 APPENDIX A Alarms Database Schema A-1 Introduction A-1 Table Classes A-1 A Note About Time A-4 Detailed Schema Description VersionInfo Table A-4 Description A-4 Fields A-5 ProductInfo Table A-6 Description A-6 Fields A-6 Objects Table A-7 Description A-7 Fields A-8 OIDNodes Table A-9 Description A-9 Fields A-10 A-4 Cisco Remote Monitoring Administration Guide, Release 2.1(0) vii Contents Attributes Table A-11 Description A-11 Fields A-12 OIDNodeAttributes Table A-13 Description A-13 Fields A-13 HyperlinkInfo Table A-14 Description A-14 Fields A-14 Rules Table A-15 Description A-15 Fields A-15 Customers Table A-17 Description A-17 Fields A-17 InstanceNodes Table A-17 Description A-17 Fields A-19 Uptime Table A-20 Description A-20 Fields A-20 Alarms Table A-21 Description A-21 Fields A-23 Events Table A-25 Description A-25 Fields A-26 Simples Table A-27 Description A-27 Fields A-28 ObjectState Table A-29 Description A-29 Fields A-29 AlarmsSummaryHour Table A-29 Description A-29 Fields A-31 AlarmsSummaryDay Table A-31 Description A-31 Fields A-33 Filters Table A-34 Cisco Remote Monitoring Administration Guide, Release 2.1(0) viii Contents Description A-34 Fields A-34 FiltersProductSpecific Table Description A-35 Fields A-35 How Handles Are Used A-35 A-35 Alarm State Transition Diagram A-37 INDEX Cisco Remote Monitoring Administration Guide, Release 2.1(0) ix Contents Cisco Remote Monitoring Administration Guide, Release 2.1(0) x About This Guide Objective This guide describes the tasks and tools necessary to install, configure, and administer Listener, LGMapper, and AlarmTracker software. Note The AlarmTracker software requires that you also install the Listener and LGMapper software. If you are not installing the AlarmTracker software, you do not need to read Chapter 3 and Chapter 4. Audience This publication is intended primarily for users who configure and administer Listener, LGMapper, and AlarmTracker software. The administrator needs a general understanding of call center operations and management and specific information about the call centers and carrier networks connected to Cisco ICM software. The administrator also needs a good understanding of Windows 2000 and Windows 2003. Organization This guide contains the following chapters. Chapter Description Chapter 1, “Remote Monitoring Suite Overview” Provides a brief description of the utilities you use to configure and maintain Listener, LGMapper, and AlarmTracker. It also provides background information so that you can understand the security and user rights issues when these utilities and your configuration databases work together in a network. Chapter 2, “Installing and Configuring the RMS Listener” Describes how to install and configure the Listener software, including how to set up the processing that occurs when messages arrive at the Listener. Cisco Remote Monitoring Administration Guide, Release 2.1(0) xi About This Guide Organization Chapter Description Chapter 3, “Installing the Explains the process of installing the LGMapper and the LGArchiver servers. Provides information LGMapper Server” on how to use the DCOMCnfg tool and how to troubleshoot the LGMapper installation. Chapter 4, “LGMapperCnfg and LGArchiverCnfg Tools” Provides information on how to use the LGMapperCnfg and the LGMapperCnfg tools. Chapter 5, “LGMapperNM and LGArchiverNM” Discusses the LGMapper Node Manager (LGMapperNM) and the LGArchiver Node Manager (LGArchiverNM). Chapter 6, “Alarms Database Maintenance” Describes maintaining the Alarms Database. Chapter 7, “LGCnfg Tool” Describes how to manage the Alarms Database using the LGCnfg tool. Chapter 8, “Installing the Describes how to install the AlarmTracker client software on your users’ systems. AlarmTracker Client” Chapter 9, “The Exclude Describes the Exclude Node feature of the AlarmTracker Client software. Node Feature” Chapter 10, “Deployment Issues” Discusses deployment issues. Chapter 11, “Backwards Compatibility Considerations” Discusses backward compatibility considerations. Chapter 12, “Implementing the IWantHelp Interface” Describes implementing the IWantHelp interface. Appendix A, “Alarms Database Schema” Provides the Alarms Database schema. Cisco Remote Monitoring Administration Guide, Release 2.1(0) xii About This Guide Conventions Conventions This manual uses the following conventions. Format Example Boldface type is used for user Click OK. entries, keys, buttons, and folder and submenu names. Italic type indicates one of the following: • A newly introduced term • For emphasis • A generic syntax item that you must replace with a specific value • A title of a publication An arrow (>) indicates an item from a pull-down menu. • A skill group is a collection of agents who share similar skills. • Do not use the numerical naming convention that is used in the predefined templates (for example, persvc01). • IF (condition, true-value, false-value) • For more information, see the Cisco ICM Software Database Schema Handbook. The Save command from the File menu is referenced as File >Save. Other Publications For additional information about Cisco Intelligent Contact Management (ICM) software, see the Cisco web site listing ICM documentation. Obtaining Documentation Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems. Cisco.com You can access the most current Cisco documentation at this URL: http://www.cisco.com/techsupport You can access the Cisco website at this URL: http://www.cisco.com You can access international Cisco websites at this URL: http://www.cisco.com/public/countries_languages.shtml Cisco Remote Monitoring Administration Guide, Release 2.1(0) xiii About This Guide Documentation Feedback Product Documentation DVD Cisco documentation and additional literature are available in the Product Documentation DVD package, which may have shipped with your product. The Product Documentation DVD is updated regularly and may be more current than printed documentation. The Product Documentation DVD is a comprehensive library of technical product documentation on portable media. The DVD enables you to access multiple versions of hardware and software installation, configuration, and command guides for Cisco products and to view technical documentation in HTML. With the DVD, you have access to the same documentation that is found on the Cisco website without being connected to the Internet. Certain products also have .pdf versions of the documentation available. The Product Documentation DVD is available as a single unit or as a subscription. Registered Cisco.com users (Cisco direct customers) can order a Product Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace. Cisco Ordering tool: http://www.cisco.com/en/US/partner/ordering/ Cisco Marketplace: http://www.cisco.com/go/marketplace/ Ordering Documentation Beginning June 30, 2005, registered Cisco.com users may order Cisco documentation at the Product Documentation Store in the Cisco Marketplace at this URL: http://www.cisco.com/go/marketplace/ Cisco will continue to support documentation orders using the Ordering tool: • Registered Cisco.com users (Cisco direct customers) can order documentation from the Ordering tool: http://www.cisco.com/en/US/partner/ordering/ • Instructions for ordering documentation using the Ordering tool are at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm • Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387). Documentation Feedback You can rate and provide feedback about Cisco technical documents by completing the online feedback form that appears with the technical documents on Cisco.com. You can send comments about Cisco documentation to bug-doc@cisco.com. Cisco Remote Monitoring Administration Guide, Release 2.1(0) xiv About This Guide Cisco Product Security Overview You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments. Cisco Product Security Overview Cisco provides a free online Security Vulnerability Policy portal at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html From this site, you can perform these tasks: • Report security vulnerabilities in Cisco products. • Obtain assistance with security incidents that involve Cisco products. • Register to receive security information from Cisco. A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products_psirt_rss_feed.html Reporting Security Problems in Cisco Products Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT: • Emergencies — security-alert@cisco.com An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies. • Nonemergencies — psirt@cisco.com In an emergency, you can also reach PSIRT by telephone: Tip • 1 877 228-7302 • 1 408 525-6532 We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x. Cisco Remote Monitoring Administration Guide, Release 2.1(0) xv About This Guide Obtaining Technical Assistance Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.htm The link on this page has the current PGP key ID in use. Obtaining Technical Assistance Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller. Cisco Technical Support & Documentation Website The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, at this URL: http://www.cisco.com/techsupport Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call. Submitting a Service Request Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest Cisco Remote Monitoring Administration Guide, Release 2.1(0) xvi About This Guide Obtaining Additional Publications and Information For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly. To open a service request by telephone, use one of the following numbers: Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227) EMEA: +32 2 704 55 55 USA: 1 800 553-2447 For a complete list of Cisco TAC contacts, go to this URL: http://www.cisco.com/techsupport/contacts Definitions of Service Request Severity To ensure that all service requests are reported in a standard format, Cisco has established severity definitions. Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation. Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation. Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels. Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations. Obtaining Additional Publications and Information Information about Cisco products, technologies, and network solutions is available from various online and printed sources. • Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL: http://www.cisco.com/go/marketplace/ • Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com • Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL: http://www.cisco.com/packet Cisco Remote Monitoring Administration Guide, Release 2.1(0) xvii About This Guide Obtaining Additional Publications and Information • iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL: http://www.cisco.com/go/iqmagazine or view the digital edition at this URL: http://ciscoiq.texterity.com/ciscoiq/sample/ • Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL: http://www.cisco.com/ipj • Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL: http://www.cisco.com/en/US/products/index.html • Networking Professionals Connection is an interactive website for networking professionals to share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL: http://www.cisco.com/discuss/networking • World-class networking training is available from Cisco. You can view current offerings at this URL: http://www.cisco.com/en/US/learning/index.html Cisco Remote Monitoring Administration Guide, Release 2.1(0) xviii C H A P T E R 1 Remote Monitoring Suite Overview Introduction The Remote Monitoring Suite (RMS) includes the following software components: • Listener • LGMapper • LGArchiver • AlarmTracker Client This chapter provides: • Background information so you can understand security and user rights issues when the Remote Monitoring Suite components and your configuration databases work together in a network. • The functional architecture of the Remote Monitoring Suite. • A brief description of the components you use to configure and maintain Listener, LGMapper, LGArchiver, and AlarmTracker Client. Background Information The Distributed Diagnostics and Services Network (DDSN) is a support architecture facility that gathers event and message information from multiple systems at a central point. Service provider personnel can then monitor this system information, react to urgent problems immediately, and examine a system activity history to discover chronic problems. In this scenario, each system runs a facility that detects and reports any unusual conditions or events that occur. These events and messages range from informational messages to reports of serious errors. This information is passed onto a process called the Listener (Figure 1-1). The Listener typically runs stand-alone at the (network) service provider site. A single Listener can receive events from multiple systems. Depending on the installation, the systems might connect to the Listener via a modem and a dial-up connection using the Windows Remote Access Server (RAS) or by using a direct network connection. LGMapper is a server that accepts data from the Listener process and maps Listener objects into a preconfigured object hierarchy. This server also caches managed object attribute data, and updates connected AlarmTracker Client applications with new event and alarm data. This event mechanism gives quick notification to network service provider representatives when a problem occurs. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-1 Chapter 1 Remote Monitoring Suite Overview Background Information Error Reporting Figure 1-1 provides an overview of the Remote Monitoring Suite error reporting process. Figure 1-1 Error Reporting Overview ICM Customer Side Logger CSFS DTP RAS or Network Connection AlarmTracker Client LGMapper Server Listener AlarmTracker Client TAC ISN Customer Side Via Sockets ISN SDDSN RAS or Network Connection AlarmTracker Client LGMapper Server AlarmTracker Client TAC 63914 Listener ICM, CVP, Cisco Media Blender or other Cisco products send event information to the Listener application. These products inform the Listener application of any significant errors or unexpected conditions. Four processes on the ICM Logger (or SDDSN) handle error reporting. The two processes used for remote monitoring and are: • Customer Support Forwarding Service (CSFS) – Receives events, filters them, and forwards the events to other processes that request the data. • DDSN Transfer Process (DTP) – Receives data from CSFS – Transfers the events and export files to the machine running the Listener. The DTP uses either a dial-up connection and the Remote Access Service (RAS) or a direct network connection. The Listener stores the events in a customer-specific directory on its machine. Event messages received by the Listener include information about when and where the error occurred and the full message as reported on the event feed. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-2 Chapter 1 Remote Monitoring Suite Overview Background Information The DTP process keeps EMS events in memory until they are delivered to the Listener. To minimize the traffic to the Listener, and particularly the number of RAS connections needed over time, messages are batched together and sent periodically. However, if the DTP process receives a high priority event, it immediately sends the event to the Listener. If an attempt to establish a RAS connection fails, the DTP process periodically tries to re-establish the RAS connection. The DTP process checks to see if there are EMS events to be processed. When there are new events, the DTP process sends the events to the Listener, establishing a RAS connection if necessary. Note You can configure the time interval for the DTP process to check for EMS events; thirty minutes is the default setting. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-3 Chapter 1 Remote Monitoring Suite Overview Background Information Remote Monitoring Suite Functional Architecture Figure 1-2 illustrates the overall functional architecture of the Remote Monitoring Suite. Figure 1-2 Remote Monitoring Suite Functional Architecture Archived Alarms DB LGArchiver LGArchiverNM Network Boundary Listener LGMapperNM AlarmTracker Client Alarms DB Component Description The major Remote Monitoring Suite components are discussed in Table 1-1. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-4 AlarmTracker Client 63915 LGMapper Chapter 1 Remote Monitoring Suite Overview Background Information Table 1-1 Remote Monitoring Suite Component Description Component Description Listener A Windows service management application that tracks multiple ICM systems. It serves as a receiver and message distributor for customer event data. LGMapper A central COM server that accepts data from the Listener and maps the data into a pre-configured object hierarchy. It also caches managed object attribute data, responds to poll requests from remote clients for updated attribute data, and sends event notifications to clients that represent traps and state changes to managed objects. LGMapperNM A Windows service that controls the lifetime of the LGMapper COM server. When the LGMapper is running, it determines the health of the process by querying the LGMapper for statistics. If it detects that the LGMapper is not processing data, it stops the server and restarts it. The user interface provided as part of the service is also used to disable the LGMapper for maintenance or other reasons. Alarms DB A SQL Server database attached to the LGMapper that stores configuration and alarm information. The configuration information contains tables of OID (ObjectIDentifier) Nodes representing the “class” definitions, and Rules which define the mapping of a Listener message to an OID Node and how to specify the instance of the class to which the object refers. The mappings are created by the LGCnfg tool. This database also contains the set of Alarm Objects visible to LGMapper clients. LGArchiver A central COM server that maps Listener events into the appropriate Alarm Objects and manages the Archived Alarms DB. LGArchiverNM A Windows service that controls the lifetime of the LGArchiver COM server. When the LGArchiver is running, it determines the health of the process by querying the LGArchiver for statistics. If it detects that the LGArchiver is not processing data, it stops the server and restarts it. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-5 Chapter 1 Remote Monitoring Suite Overview Background Information Table 1-1 Remote Monitoring Suite Component Description (continued) Component Description Archived Alarms DB A SQL Server database attached to the LGArchiver that stores configuration and alarm information. The configuration information contains tables of OID (ObjectIDentifier) Nodes representing the “class” definitions, and Rules which define the mapping of a Listener message to an OID Node and how to specify the instance of the class to which the object refers. The mappings are created by the LGCnfg tool. This database differs from the Alarms Database in that it does not process deleted base record messages received from the Listener, and it archives data for a longer time period. This database is intended as a data repository for offline trend analysis reports. The database schema for this database is identical to that of the Alarms Database. LGCnfg Tool A GUI application that creates and manages the mapping of Listener event objects to LGMapper Nodes. Mappings are made by defining Rules which use information contained in the Listener object message to identify the proper LGMapper Node instance. Once the Rules are defined, the LGMapper can apply these Rules at runtime to associate a Listener Object to a specific node instance and attribute whenever an event of that type is received in the Listener event feed stream. This tool compensates for the incomplete managed object description in the current stream of information available to Listener. AlarmTracker Client The client application that displays customer and node status. LGMapper and LGArchiver Differences LGArchiver operation is very similar to LGMapper operation in that they both connect to Listener as a client and the both manage databases containing object mapping and Alarm Objects, but their purposes are quite different. The LGMapper server is designed to serve multiple AlarmTracker Client applications. It processes Listener event messages and manages Alarm Objects in the database, and notifies each active AlarmTracker Client of relevant Listener events. In addition, AlarmTracker Clients make direct queries against the Alarms Database in order to update their displays. The default value for time history of Alarm Objects is 7 days (168 hours). Use the LGMapperCnfg tool to change the value. The value depends on the number of customers and products you need to monitor. The LGArchiver server, on the other hand, has no clients attached to it. Its primary purpose is to process Listener events and manage the Archived Alarms Database. It is intended to archive alarms over a longer period so you can run trend analysis and report against it. For this reason, the default alarms time history setting for the LGArchiver is 30 days. This value can be changed using the LGArchiverCnfg tool. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-6 Chapter 1 Remote Monitoring Suite Overview Network Considerations Samples of web-based reports that can be run against the Archived Alarms Database can be foundon the Operations Support CD-ROM in the Samples > Reporting subdirectory. Network Considerations The system design does not limit LGMappers to a one-to-one relationship with Listener processes. From the Listener point of view, an LGMapper is a client. Thus, the connection between the Listener and the LGMapper can cross a network boundary. There can be no more than two Listener processes. These processes can be distributed in a Local Area Network (LAN) or at different sites connected by a Wide Area Network (WAN) to achieve fault tolerance. The LGMapper processes can also be distributed, but they are not limited to two instances. Judicious placement of LGMapper servers optimizes the use of network bandwidth. For example, if you plan to set up a support center at a site that is remote from the Listener locations, it makes sense to place one or more LGMapper servers in the LAN at the support center so that AlarmTracker Client connections are always in the LAN. That way, only one or two WAN connections are needed from the LGMapper to the Listener, rather than co-locating the LGMapper server with the Listener (which would result in having a WAN connection for each AlarmTracker Client). Security RMS does not support the use of the following security features: • Windows Firewall on Windows 2003 • Security Hardening Script from the ICM CD Fault Tolerant Functional Architecture Figure 1-3 illustrates the overall functional architecture of the system in the context of operating in a fault-tolerant environment. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-7 Chapter 1 Remote Monitoring Suite Overview Fault Tolerant Functional Architecture Figure 1-3 Fault Tolerant Functional Architecture Network Boundary LGCnfg Tool Alarms DB AlarmTracker Client Listener 1 LGMapper 1 AlarmTracker Client Listener 2 LGMapper 2 AlarmTracker Client AlarmTracker Client 63916 Alarms DB Note the following features in Figure 1-3: • Redundant Alarms Databases – They provide fault tolerance when one of the hosts running a Listener/LGMapper/Alarms Database is unreachable. • Each AlarmTracker Client is capable of communicating with two running LGMapper servers, but to conserve network bandwidth, only one of the servers is designated as primary (or active). – If the AlarmTracker Client is connected to the LGMapper servers, the primary LGMapper server performs all communication between the two processes. In the event of a primary server failure, the AlarmTracker Client must then switch over to the backup (or standby) server. Further discussion on the deployment of machines to achieve fault-tolerant performance is found in Fault Tolerant Considerations, page 1-12. The LGArchiver Server is not shown in Figure 1-3. There is no fault-tolerant scheme for it. Install the LGArchiver server on a high-availability server with little or nothing else running on it. Perform standard SQL Server backups on the database to avoid data loss. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-8 Chapter 1 Remote Monitoring Suite Overview Alarms Database Alarms Database Overview The Alarms Database used by the LGMapper and LGArchiver is a Microsoft SQL Server database containing the information needed to map Listener objects to attributes of a node in a hierarchy of product objects. The database also contains a table of Instance Nodes which is populated by the LGMapper at runtime. This table is saved between LGMapper sessions and represents actual Instance Nodes created based on Rules that were successfully applied at runtime. In addition, the Alarms Database contains a history of alarms objects representing the past and current states of the monitored product. Note The schema of the Alarms Database (see Appendix A, “Alarms Database Schema”) connected to the LGMapper and the Archived Alarms Database connected to the LGArchiver are identical. Thus, the discussion of the Alarms Database applies to both databases. The Remote Monitoring Suite lets you monitor products other than the ICM. During installation, the Alarms Database is populated with Object Identifier (OID) Nodes and Rules for supporting the Cisco ICM, CVP, and Cisco Media Blender products. As other products are supported, updates to the tables that manage this information can be provided as hot fixes. The Rule Mapping Process The Alarms Database is installed with a pre-loaded set of OID Nodes and Rules used by the LGMapper and LGArchiver to map incoming Listener objects to a specific attribute in an Instance Node somewhere in the hierarchy. In the current release, OID Nodes and Rules are supplied for the Cisco ICM, CVP, and Cisco Media Blender products. Other products can be added later as hot fixes. This information is stored in the database in the OID Nodes, Attributes, OIDNodeAttributes, and Rules tables. As Listener events are received by the LGMapper, it uses the set of Rules to map the object to an attribute of a particular OID Node. It then uses the Rule contents to determine the Instance Node to which the object applies. Once the Attribute and Instance Node are determined, the LGMapper updates the Alarms Database and it updates the state of the affected node. This, in turn, may result in a state change in other nodes (specifically its parent node) since the Remote Monitoring Suite supports the notion of state roll up in the node hierarchy. Use the LGCnfg tool to modify the set of Rules and to create new OID Nodes for products. The LGCnfg tool can be used to define new products. As previously mentioned, the Alarms Database comes pre-loaded with the OID Nodes and Rules for ICM and CVP. However, if you are interested in creating your own object hierarchy, or modifying the existing one, the LGCnfg tool is provided for that purpose. If you plan to experiment and create your own Rules and/or OID object hierarchy, we strongly suggest you use the LGCnfg tool to create a new database for this purpose. More information on the use of this tool is given in the LGCnfg Tool section. If you detect any Listener object issues that are not mapped (unmapped objects appear in the Unmapped Objects Node under each customer product instance) or Listener Objects that are mapped to the wrong Instance Node, contact Cisco Technical Assistance Center (TAC) to report the problem. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-9 Chapter 1 Remote Monitoring Suite Overview Alarms Database Instance Nodes When a Listener event message is processed, it is mapped by a Rule to an attribute of an OID Node. The Rule, along with the message content, is then used to determine the Instance Node to which it applies. If this Instance Node does not exist, it is created by the LGMapper software. When it is created, an entry in the InstanceNodes table is created and an in-memory copy of the node is created in the proper place in the hierarchy so that its state can be properly tracked. In addition, there is an associated table (the Customers table) which manages the set of known customers. When the LGMapper initializes, the full set of Instance Nodes is read from the InstanceNodes table. Every Alarm Object must be associated with an attribute of an Instance Node. Thus, the Instance Nodes are persisted from session to session. As time goes on, you may find that you may want to prune this information as devices are retired or as customers are deleted. The LGCnfg tool is used to delete Instance Nodes as needed. More information on how to do this is provided in Chapter 7, “LGCnfg Tool”. Note It is important to use the LGCnfg tool to modify the database contents and not SQL Server directly. This is because of the relationships that exist between the tables. Alarm Objects One of the most important purposes of the Alarms Database is to manage a set of Alarm Objects. An Alarm Object is defined as an object that generally indicates some type of failure condition for some component in a system. Typically, an Alarm Object is created by an event that signals or raises the alarm. The Alarm Object has a state consisting of the object being raised (down) or cleared (up), and an Assignment Status indicating the action TAC is taking in response to the alarm. An Alarm Object consists of one or more Listener Events indicating its state transitions. Alarm Objects are persisted in two tables in the Alarms Database: the Alarms table (which stores information about each Alarm Object), and the Events table (which stores information about each Event that makes up the Alarm Object). In addition, a third table (the Simples table) stores a special kind of single-state Alarm Object. The Simples tables stores Simple Events from Listener which are considered to be lower priority events. Since these events are stateless and lower priority, they are separated from the main Alarms tables. Another table (the ObjectState table) is used by LGMapper (but not LGArchiver) to store the current object state of all Listener objects. The ObjectState table contains a cross reference from the Listener ObjectName (qualified by ProductID and CustomerID) to the current Alarm Object referencing it. Alarms History Not only do the LGMapper and LGArchiver maintain the current state of the set of Alarm Objects, they also maintain an archived history of closed Alarm Objects. A closed Alarm Object is one whose state is “up” and whose assignment status is “unassigned”. You can see both closed and open Alarm Objects in the Alarms View display using the AlarmTracker Client. Select a different filter to view just the open Alarm Objects. LGMapper and LGArchiver both have a configuration setting called Alarms Objects History which manages the size of the Alarms Database so that it does not grow unbounded. This setting specifies how long closed Alarms Objects are maintained in the database before being purged. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-10 Chapter 1 Remote Monitoring Suite Overview Alarms Database The Alarms Objects History setting affects only closed Alarms Objects. Open Alarm Objects are never purged, regardless of how old they are. A closed Alarm Object is subject to being purged when the time it is closed is older than the value of Alarms Objects History setting. Purging is done when the LGMapper or the LGArchiver starts up, and at occasional intervals when it is running. For the LGMapper, the initial default value is 7 days (168 hours). Use the LGMapperCnfg tool to change this setting if necessary. Since the LGMapper and AlarmTracker Client are considered to be tactical products, you can determine how long a history you want AlarmTracker Clients to see. The value you use may affect the response time of the AlarmTracker Clients. The larger the value, the longer it takes for each database query because the queries are performed against more data, and more data is returned across the wire in the result set. You must determine what setting is best for you and your environment. For the LGArchiver, the initial default value is 30 days. LGArchiver real-time performance is less critical than that of the LGMapper, thus, it is expected that the Alarms Objects History is longer for the LGArchiver. The value depends solely on how much disk storage you are willing to allocate for the database. As a guideline, monitoring 160 ICM customers for a 30-day history the database size required is approximately 1.3GBytes. The database size is directly proportional to the number of customers and products being monitored. Thus, if your installation is monitoring 40 customers, you could probably set a 120 day history and end up with a database of approximately the same size. The following formula can be used to estimate the SQL Server database MDF file size: [MDF File Size MBytes] = 0.3 X [Number of Customers] X [Time History in Days] Remember, the database is purged so its size does not grow unbounded. In addition, at startup a check is made and once-per-week the database is completely re-indexed using the DBCC DBREINDEX T-SQL command. Alarms Database Schema We have already introduced the names of several of the tables maintained in the Alarms Database. Further documentation on the specific content of all tables in the database can be found in Appendix A (the Alarms Database Schema Description). This schema information is used to create specific queries and reports to perform trend analysis on the LGArchiver Alarms Database. Accessing the LGArchiver Database The LGArchiver Alarms Database is intended to perform longer-term Alarm archiving than the LGMapper Alarms Database. The schema is open and allows you to write customized queries and reports against this database to perform specific analyses or trend reporting. When accessing the database, keep security in mind. By default, the three LGMapper user groups are given access to the database. The LGM Readers are given read access only, LGM Users are given read/write access, and the LGM Administrators group is given administrator rights. Edit this as you see fit, but, make sure the LGMapper account has administrator rights since the LGArchiver Server runs under this account and is doing all the database work. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-11 Chapter 1 Remote Monitoring Suite Overview Deployment Considerations Deployment Considerations Fault Tolerant Considerations Figure 1-3 shows a fault-tolerant deployment of the LGMapper Servers. Each LGMapper Server connects to a single Listener so you can install an LGMapper Server on the same machine as the Listener. To achieve LGMapper fault tolerance, you must use at least two machines (four machines if you do not install LGMapper on the same machine as the Listener). The LGArchiver is not fault tolerant, therefore, you can install it on any machine that meets the requirements indicated in the Cisco Intelligent Contact Manager Release 7.0(0) Bill of Materials. For example, you can install the LGArchiver software on one of the LGMapper machines. If you are supporting a large number of customers, install the LGArchiver on a separate machine so that the LGMapper can provide adequate real-time response for AlarmTracker Clients. Because the LGArchiver is not fault tolerant, schedule database backups to prevent data loss in the event of a system or disk failure. Distributed Architecture The LGMapper is a client of the Listener server. The Listener server can send data to one or more LGMapper processes. The LGMapper processes can be installed on a single machine or can be installed on multiple machines on a Wide Area Network (WAN). The Listener design limits the number of Listener process to two. These processes may be distributed in a Local Area Network (LAN) or at different sites connected by a Wide Area Network (WAN) to achieve fault tolerance. In fact, judicious placement of LGMapper Servers can optimize the use of network bandwidth. For example, to set up a support center at a site that is remote from the Listener locations, install one or more LGMapper Servers in the LAN at the support center so that AlarmTracker Client connections are always in the LAN. In this configuration, only one or two WAN connections are needed from the LGMapper to the Listener. Figure 1-4 shows an example of this type of deployment. If you install the LGMapper server and Listener server on the same machine, each AlarmTracker Client at a remote support center would need a WAN connection. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-12 Chapter 1 Remote Monitoring Suite Overview Hardware and Software Requirements Figure 1-4 Example Separated Support Center Deployment Strategy San Jose Support Center LGMapper 1 AlarmTracker Clients LGArchiver Listener A LGMapper 2 Brussels Support Center LGMapper 1 AlarmTracker Clients LGArchiver LGMapper 2 63917 Listener B Hardware and Software Requirements SQL Server is an integral part of the Remote Monitoring Suite. SQL Server must be installed on every machine running the LGMapper or LGArchiver Server. For complete and current information on the SQL Server, see the Cisco Intelligent Contact Management Software Release 7.0(0) Bill of Material, which is available at: http://www.cisco.com/univercd/cc/td/doc/product/icm/index.htm Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-13 Chapter 1 Hardware and Software Requirements Cisco Remote Monitoring Administration Guide, Release 2.1(0) 1-14 Remote Monitoring Suite Overview C H A P T E R 2 Installing and Configuring the RMS Listener This chapter describes how to install and configure the RMS Listener server. You can set up the processing that occurs when messages arrive at the Listener. This includes specifying the customer-specific directory in which a customer’s messages are stored and designating which representatives or administrators are notified of error messages from a given customer or related to a specific area of the ICM product. The Listener runs as a service so that it can be set to start automatically when the machine starts. A network service provider site can have two Listeners. You can install the Listener on two systems (designate one to be side A and the other to be side B).The Listeners run simultaneously, then synchronize with each other. This provides a duplexed, fault tolerant system. You must install the LGMapper/LGArchiver and Listener servers on separate machines. Note The AlarmTracker Client software requires that you also install the Listener and LGMapper software. Note If you are planning to monitor a product other than the ICM software, you need to install the product specific update on the Listener machine. When installing the update, do not install it into the same directory as the Listener. Refer to the product specific documentation for instructions on how to apply the update. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-1 Chapter 2 Installing and Configuring the RMS Listener Upgrading an RMS Listener Server That Monitors ICM Dialup Connections The RMS 2.1(0) Listener server runs only on Windows 2000 or Windows 2003 Server. The NetBEUI protocol is not available on the Windows 2003 Server. This means that you can only monitor dialup customers who are running ICM 5.0 or later and who have configured their loggers to use TCP/IP. To monitor dialup connections from customers running ICM 4.6.2 or earlier, run the RMS Listener on Windows 2000 Server and enable the NetBEUI protocol. If you are using a direct network connection, this is not an issue. Guidelines Note The RMS installation upgrades RMS software from 2.0 or 2.0 SR1 to 2.1. Upgrade RMS Listener servers that monitor dialup connections from ICM Loggers in the following sequence: Step 1 Upgrade RMS Listener servers running Windows 2000 server to RMS release 2.1 before upgrading the operating system to Windows 2003. For dialup connections, configure Microsoft RAS on the RMS 2.1 Listener server for TCP/IP and NetBEUI protocols. This enables ICM/IPCC 7.0(0) Loggers to dial in to RMS 2.1 Listener servers. The Cisco Remote Monitoring Administration Guide describes how to install and configure RMS components. Refer to the ICM Installation Guide for Cisco ICM Enterprise Edition for instructions on installing ICM/IPCC Logger software. Step 2 Install new message files on AlarmTracker client machines by running the SDDSN (Standalone Distributed Diagnostics and Service Network) setup from the latest ICM setup CD. SDDSN is a sub-component of the ICM system, which provides a mechanism for “phone home” services and generating SNMP traps. It is intended to be integrated into other products (e.g., Cisco ISN) to provide event reporting capability. Refer to the Cisco ICM Enterprise Edition Administration Guide for more information on SDDSN. Step 3 Upgrade ICM Logger systems that send events to RMS Listener servers using one of the following methods: • Install ICM Logger 7.0 on a Windows 2003 server. • Configure ICM Logger 5.0 and 6.0 systems running on Windows 2000 servers to use the TCP/IP protocol to send events to RMS Listener servers. For instructions, refer to “Configuring ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Using the TCP/IP Protocol” on page 10. Step 4 Back up the Alarms database, stop the LGMapper and LGArchiver services, and set these services to either manual or disabled. Step 5 Upgrade RMS 2.1 Listener servers to Windows 2003 Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-2 Chapter 2 Installing and Configuring the RMS Listener Installing the RMS Listener Server Installing the RMS Listener Server Use the following procedure to install the RMS Listener server. How to Install the RMS Listener Software Note The RMS installation upgrades RMS software from 2.0 or 2.0 SR1 to 2.1. Note If the installation detects the Cisco Security Agent (CSA) running on the system, it prompts you to stop the CSA service, then restart this installation. Step 1 Run Setup.exe from the Listener directory of the Operations Support CD-ROM. Step 2 In the Listener Properties dialog box, specify the settings as shown in Table 2-1, then click Next. Table 2-1 Listener Properties Settings Property Settings Node Manager Properties Enable Production Mode and Auto Start at System Startup, unless you are specifically told otherwise by your Cisco ICM/NAM support representative. Enable duplexed Listener if the Listener is duplexed. Side Indicate if this machine is the Side A or the Side B Listener. If the Listener is not duplexed, choose Side A. Drive Choose the disk drive on which you want to install the Listener software. You must choose a local drive. Setup installs the Listener files to the /icr directory on the drive you select. Language Specify either American English or United Kingdom English. Step 3 In the Check Setup Information dialog box, confirm that the settings you have chosen appear correctly. If you want to change any settings, click Back. If the settings are correct, click Next to begin copying the Listener files. Step 4 When the files are copied successfully, the Setup Complete dialog box appears. Step 5 If this is the first time that you are installing the Listener, click Finish. Do not start the Listener until you have configured it. For instructions on configuring the RMS Listener Server, see “Configuring the RMS Listener Server” on page 4. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-3 Chapter 2 Installing and Configuring the RMS Listener Beeper.flt Modifications Beeper.flt Modifications The beeper.flt file contains configuration information used by the Listener server to send events to a beeper or pager. If this file exists in ICR\Listener\filters, Setup renames the file to beeper_1.sav. If beeper_1.sav exists, it renames the file to beeper_2.sav, and so on until beeper_99.sav is created. If you modified the original beeper.flt file, migrate the changes from the.sav version (the pre-existing version) of the file to the new beeper.flt file. Configuring the RMS Listener Server After installing the RMS Listener server, perform the following configuration tasks: Note • Configure the Listener as a RAS server • Define general Listener configuration information • Add customer-specific configuration information You must stop the Listener before editing Listener configuration information. Restart Listener after you have completed your configuration edits. Configuring the RMS Listener Server as a RAS Server Configure the RMS Listener server to act as a remote access server (RAS). A RAS server provides dialup remote access to clients sending notification events from remote sites. The RMS Listener on Windows 2003 server can monitor dialup connections from ICM Logger clients that run ICM release 5.0, 6.0, and 7.0 and have TCP/IP configured. To monitor connections from ICM Logger clients running release 4.6.2 or earlier, run the Listener server on the Windows 2000 server and enable the NetBEUI protocol. After you configure the RMS Listener server as a RAS server, specify a policy for disconnecting idle remote connections. Windows 2003 This section explains how to configure the RMS Listener server as a RAS server on Windows 2003 server. The Windows 2003 server includes the following protocols for transferring information between a computer and the network: • TCP/IP • IPX • AppleTalk The Windows 2003 server does not include the NetBEUI protocol. This means that the RMS Listener server on Windows 2003 can accept dialup connections only from ICM Logger clients that meet the following criteria: • ICM 5.0, 6.0, or 7.0 software is installed Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-4 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server • TCP/IP is configured For instructions on configuring ICM Logger clients for TCP/IP connections, refer to “Configuring ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Using the TCP/IP Protocol” on page 10. Note These instructions apply only to customers using the ICM Listener option. How to Configure the RMS Listener Server as a RAS Server To configure the RMS Listener server as a RAS server on Windows 2003 Server: Caution Consult with your IT department before setting up your Listener server as a RAS device on your network. Step 1 On the RMS Listener machine, select Start > Programs > Administrative Tools > Routing and Remote Access. Step 2 Right-click the server you want to configure and select Configure and Enable Routing and Remote Access. The Routing and Remote Access window displays (Figure 2-1). Figure 2-1 Routing and Remote Access Server Setup Wizard Step 3 Click Next to start the Routing and Remote Access Server Wizard. Step 4 Select Remote access (Dialup or VPN), then click Next. Step 5 Select the Dial-up check box. Leave the VPN check box unchecked. Click Next. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-5 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Step 6 In the IP Address Assignment window, select From a specified range of addresses, then click Next. Step 7 On the Address Range Assignment window, select the range of IP addresses to assign to remote clients. If no IP address ranges are available, click New (Figure 2-2). Figure 2-2 Step 8 Address Range Assignment Window In the New Address Range dialog box, specify a private range of addresses (for example, 192.168.1.1 to 192.168.1.254), then click OK (Figure 2-3). The number of IP addresses in the range must equal at least the number of modems on this server plus an additional address for the host. This range must not be within an address range needed by the host system or any of the ICM logger systems connecting to this Listener server Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-6 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Figure 2-3 New Address Range Window. Step 9 When you finished entering the range of IP addresses, click Next. Step 10 Accept the default settings for the remainder of the wizard. Step 11 When the wizard is finished, right-click the server entry again and select Properties. The Properties window displays. Step 12 Select the General tab. Step 13 Select the Remote access server check box. Step 14 Select the IP tab. Step 15 Select the Enable IP Routing and Allow IP-based remote access and demand-dial connections. check boxes. Step 16 Make sure the static address range is correct. Step 17 Select the Enable Broadcast Name Resolution check box. Step 18 Accept the defaults for the remaining tabs, then click OK. Step 19 When the configuration is complete, the RAS services restart. Note Do not enable RAS Server capability on the Logger, because this might create a conflict with the ICM DTP process using the modem. How to Configure a RAS Policy for Handling Idle Connections You must configure RAS services on the Listener server before configuring a RAS policy. See “How to Configure the RMS Listener Server as a RAS Server” on page 9. Configuring a RAS policy to handle idle connections avoids a potential issue in which the DTP fails to hang up the modem connection and leaves the modem connected to the Listener. To configure a RAS policy for handling idle remote connections: Step 1 On the Listener machine, select Start > Programs > Administrative Tools > Routing and Remote Access. Step 2 Double-click the RAS server you want to configure and select Remote Access Policies. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-7 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Step 3 In the right pane, double click Connections to Microsoft Routing and Remote Access Server. The Connections to Microsoft Routing and Remote Access Server Properties dialog box opens. Step 4 Select Settings, then select Edit Profile. The Edit Dial-in Profile dialog box opens. Step 5 Select Dial-in Constraint, select Minutes server can remain idle before it is disconnected (Idle-Timeout), enter the desired number of minutes (for example, 10), then click OK. Step 6 Click OK again to close the Connections to Microsoft Routing and Remote Access Server Properties dialog box. Windows 2000 This section explains how to configure the RMS Listener server as a RAS server on Windows 2000 Server. The RMS Listener server on Windows 2000 server can monitor dial-up connections from ICM Logger clients with the following configurations: • ICM release 4.6.2 or earlier using the NetBEUI protocol. • ICM release 5.0 or later using either TCP/IP or NetBEUI protocols. For instructions on configuring ICM Logger clients for TCP/IP connections, refer to “Configuring ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Using the TCP/IP Protocol” on page 10. Caution Consult with your IT department before setting up your Listener server as a RAS device on your network. How to Install the NetBEUI protocol (Optional) Step 1 On the Listener machine select Start>Settings>Control Panel>Network and Dialup Connections. The Network and Dialup connection window opens. Step 2 Right click on Local Area Connection and select properties. Step 3 Verify that NetBEUI is installed. If NetBEUI is listed, continue to “How to Configure the RMS Listener Server as a RAS Server” on page 9. If NetBEUI is not listed, click Install and following the remaining steps. Note NetBEUI does not need to be selected in this screen, this is just done to verify it is installed. Step 4 Select protocol and click Add. Step 5 Select NetBEUI protocol and click OK. Step 6 Insert the Windows 2000 Server disk if prompted. The NetBEUI protocol is now listed under Local Area Connections. Step 7 Uncheck NetBEUI for this connection and click Close. The NetBEUI protocol is now installed. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-8 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server How to Configure the RMS Listener Server as a RAS Server Step 1 On the RMS Listener machine, select Start > Programs > Administrative Tools > Routing and Remote Access. The Routing and Remote Access window displays (Figure 2-1). Step 2 Start the Routing and Remote Access Server Setup Wizard by right-clicking on the server you want to configure. Step 3 Select Configure and Enable Routing and Remote Access. Step 4 Select Remote Access Server (RAS) and click Next. Step 5 Select Setup and advanced remote access server, then click Next. Step 6 The Remote Client Protocols windows opens. The TCP/IP and NetBEUI protocols are listed. Select Yes, all the required protocols are present, then click Next. Step 7 In the IP Address Assignment window, select From a specified range of addresses, then click Next. Step 8 On the Address Range Assignment window, select the range of IP addresses to assign to remote clients. If no IP address ranges are available, click New. Step 9 In the New Address Range dialog box, specify a private range of addresses (for example, 192.168.1.1 to 192.168.1.254), then click OK (Figure 2-3). The number of IP addresses in the range must equal at least the number of modems on this server plus an additional address for the host. This range must not be within an address range needed by the host system or any of the ICM logger systems connecting to this Listener server Step 10 Click Next on the remaining dialogs (selecting the default settings) to complete the wizard. Step 11 When the wizard is finished, right-click on the server entry again and select Properties. The Properties dialog appears. Step 12 Select the General tab. Check only the Remote access server check box. Step 13 Select the IP tab. Select Enable IP Routing and Enable Allow IP-based remote access and demand-dial connections. Make sure the static address range is correct Step 14 Select the NetBEUI tab. Use the check box to enable NetBEUI based remote access clients, and select the This computer only option. Step 15 Select the AppleTalk tab. Make sure the Enable AppleTalk remote access check box is unchecked. Step 16 Accept the defaults for the remaining tabs and close the dialog. When the configuration is complete, the RAS services restart. How to Configure a RAS Policy for Handling Idle Connections You must configure RAS services on the Listener server before configuring a RAS policy. For instructions on configuring RAS services, see “How to Configure the RMS Listener Server as a RAS Server” on page 9. Configuring a RAS policy to handle idle connections avoids a potential issue in which the DTP fails to hang up the modem connection and leaves the modem connected to the Listener. To configure a RAS policy for handling idle remote connections: Step 1 On the Listener machine, select Start > Programs > Administrative Tools > Routing and Remote Access. Step 2 Double-click the RAS server to configure and select Remote Access Policies. Step 3 In the right pane, double click Connections to Microsoft Routing and Remote Access Server. The Connections to Microsoft Routing and Remote Access Server Properties dialog box opens. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-9 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Step 4 Select Settings, then select Edit Profile. The Edit Dial-in Profile dialog box opens. Step 5 Select Dial-in Constraint, select Minutes server can remain idle before it is disconnected (Idle-Timeout), enter the desired number of minutes (for example, 10), then click OK. Step 6 Click OK again to close the Connections to Microsoft Routing and Remote Access Server Properties dialog box. Configuring ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Using the TCP/IP Protocol Note ICM 7.0 Loggers use TCP/IP by default. If you are upgrading an ICM Logger from a previous release to ICM Release 7.0 running on Windows 2000, you should follow this procedure. How to Configure ICM Release 5.0, 6.0, and 7.0 Loggers to Connect to an RMS Listener Server Caution Make sure that the Listener you will be dialing into has enabled IP-based remote access and demand-dial connections. Step 1 On the ICM Logger machine, open the.pbk file located in <ICM DRIVE>:\icm\<instance name>\<la or lb>\ CISCO_DDSN_PHONE_HOME.pbk. For example: C:\icm\lg5\la\ CISCO_DDSN_PHONE_HOME.pbk Step 2 Click properties. Select the networking tab. Step 3 Uncheck NetBEUI. Check TCP/IP. Step 4 With TCP/IP selected, click properties. Step 5 Under the general tab, verify that use default gateway on remote network is unchecked. Step 6 Click OK. Click OK again, then click Close. Step 7 Restart the logger process. Specifying General Listener Configuration General Listener settings apply to all customers across the entire Listener process. Note Keep in mind that any settings labeled static will not take effect until you reboot the system. Changes to all other settings take effect when you click OK. Use the following procedure to access the general Listener configuration settings. How to access the general Listener configuration settings Step 1 Run the listencfg.exe tool in the /icm/bin directory. The Listener Configuration dialog box opens (Figure 2-4). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-10 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Figure 2-4 Listener Configuration Dialog Box. Step 2 Select one of the tabs to edit the settings. The following sections describe the settings available in each tab of the Listener Configuration dialog box. Step 3 When finished making changes to the settings, click OK. Duplex Configuration Settings You can install the Listener on two Network Application Manager stand-along ICM systems by designating one as side A and the other as side B. In order for Listeners to operate in duplex mode, you must click Duplex and specify login, system, and domain information about the other Listener in the Duplex section of the Listener Configuration dialog box. Table 2-2 describes Listener Duplex settings. Table 2-2 Listener Duplex Settings Duplex Settings Description User Name (see Note following) The user name to use when accessing the Listener on the other machine Password (see Note following) The password to use when accessing the Listener on the other machine Domain (see Note following) The domain to use when accessing the Listener on the other machine System Name The system name of the Listener on the other machine ICM Root The path where the Listener is installed on the other machine, for example, C:\icm\listener Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-11 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Note Set up an account in USRMGR with Administrator privileges, then log in as Administrator. Options Settings In the Options section of the Listener Configuration dialog box, you can specify configuration parameters, such as, timeout and file purging. Table 2-3 describe the Options settings. Table 2-3 General User Interface Listener Settings User Interface Setting Description Hold Time (minutes) Interval time in minutes used when periodic check is done to determine if an event can be purged from the Listener and any connected clients. Threshold Limit Default number of times an object can change state, within the time specified by ThresholdIntervalMinutes, before a page, Remote Monitoring Suite event, or mail message is sent to designate the event as a toggling event. Threshold Interval (minutes) The time in minutes within which an object can change state. This is based on the number of times specified by the ThresholdLimit before a page, Remote Monitoring Suite event, or mail message is sent to designate the event as a toggling (constantly changing state) event. Customer Log File Max Size (kBytes) The maximum disk space size in bytes for each customer’s logs. Exceeding this limit results in purging of the oldest files first. A value of 0 means that no disk space limit is in effect. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-12 Chapter 2 Installing and Configuring the RMS Listener Configuring the RMS Listener Server Event Log Entries Use the Event Log Entries tab to define events for the Listener to watch for in the local Windows event log, along with actions to take if these events occur. These events deal primarily with system problems with modems; therefore, this facility is not relevant to standard NAM operation. Consult your ICM/NAM support representative before changing the default log entries. Specifying Listener Customer Configuration When you run the listencfg.exe tool in the /bin/icm directory, the Listener Configuration dialog box opens. By default the AALSTN customer is included. The Listener reports notifications of events for all customers to the AALSTN customer. Use the Listener Configuration dialog box to add a new customer or edit the configuration of an existing customer. Adding a New Listener Customer Use the following procedure to add a new Listener customer. How to add a new Listener customer Step 1 In the Listener Configuration dialog box, select the Customers tab. Step 2 Type the name of the new customer as found in the Cisco ICM Setup (the 5 character instance name). Step 3 Click OK. Editing Customer Configuration Information To display the current configuration information for a Listener customer, select the Customers tab. For information about each field, see Table 2-4. The Listen Active box is checked by default. Table 2-4 Listener Customer Configuration Information Customer Configuration Setting Description Drive Letter Drive letter on local listener where the customer’s default directory resides SideA event timeout (minutes) Time after which the Listener will report a Side A send home malfunction. (Heartbeat Timeout) SideB event timeout (minutes) Time after which the Listener will report a Side B send home malfunction. Drive Letter Other Side The drive letter on the other Listener where the customer’s default directory resides. Listen Active Logically enable/disable monitoring for the customer. This option is usually enabled. Enable Thresholds If selected, enables configured thresholds. If an object exceeds the configured thresholds, an alarm is generated. Use the following procedure to edit a customer’s configuration information. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-13 Chapter 2 Installing and Configuring the RMS Listener Serial Alarm Feed How to edit customer configuration information Step 1 Click the customer’s name. Step 2 Edit the fields that you want to change. Step 3 Click OK, or if you want to continue making changes to the information of another customer, click APPLY and select another customer to edit. Step 4 When you have finished making changes, click OK. Deleting a Customer from Listener Use the following procedure to delete a customer from Listener. How to delete a customer from Listener Step 1 Select the customer’s name from the list of Customers. Step 2 Click Delete. Step 3 Click Yes to confirm that you want to delete the customer. Step 4 When you have finished making changes, click OK. Note You must manually delete the customer from LGMapper using LGCnfg.exe (see Chapter 7). Serial Alarm Feed The ICM software provides an optional serial alarm feed that lets you establish your own alarm/event links to the DDSN. The Serial Alarm Feed process (SERIALFD) uses the Customer Support Forwarding Service (CSFC) to communicate alarm information to an external system. The Serial Alarm Feed process receives events and sends alarms in ASCII format to a communications port on the Logger. Once the SERIALFD process is started, alarm messages are sent to the communications port as they occur. The Serial Alarm Feed consists of a series of alarm messages that are sent out over a 9600 baud serial connection. Table 2-5 shows the formats for alarm messages. Table 2-5 Alarm Message Format Alarm Message Meaning Example Trap Number 6 System Name GEOXYZRTRB System Type 2 Process Name rtr Trap Severity 6 Date (format: YYYYMMDD) 20000309 Time (format: hh:mm:ss) 16:08:51 Number of Optional Arguments Following 1 1st Optional Argument pim 1 Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-14 Chapter 2 Installing and Configuring the RMS Listener Serial Alarm Feed Table 2-5 Alarm Message Format (continued) Alarm Message Meaning Example Description Restarting process pim1 after having delayed restart for 60 seconds. End of message sequence (0xD, 0xA) [CR][LF] Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-15 Chapter 2 Serial Alarm Feed Cisco Remote Monitoring Administration Guide, Release 2.1(0) 2-16 Installing and Configuring the RMS Listener C H A P T E R 3 Installing the LGMapper Server This chapter how to install and configure the LGMapper Server. The installation of the LGMapper Server also includes the installation of the LGArchiver Server. Overview The LGMapper and LGArchiver servers are COM servers intended to serve multiple distributed out-of-process clients. The installation consists of four parts: • Verifying that the Microsoft SQL Server is installed on the Server (see SQL Server Requirements, page 3-2). • Running the installation script (see Installing the LGMapper and LGArchiver Servers, page 3-2). • Verifying that the installation succeeded (see Controlling Access to LGMapper - Populating User Groups, page 3-5). • Populating User Groups to control access and user rights for the LGMapper and LGArchiver Servers (see Local Account or User Groups Creation Failures, page 3-28). Backwards Compatibility There are significant changes in the overall architecture of the Remote Monitoring Suite as compared to AlarmTracker release 1.0. However, it is possible to install LGMapper release 2.0 on the same computer as LGMapper release 1.0. For additional information on this topic, refer to Chapter 11, “Backwards Compatibility Considerations” before continuing the installation. LGMapper and LGArchiver Installation Checklist This checklist describes the tasks required to install the LGMapper and the LGArchiver Servers. 1. Log on with administrator rights. 2. Ensure SQL Server is installed on the system (see SQL Server Requirements, page 3-2). 3. Install the LGMapper and LGArchiver Servers (see Installing the LGMapper and LGArchiver Servers, page 3-2). 4. Monitor the installation process (see The Installation Process, page 3-2). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-1 Chapter 3 Installing the LGMapper Server SQL Server Requirements 5. Create or modify the default user groups installed to fit within your administrative environment then populate the user groups with the users you want to have access to the LGMapper Server (see Local Account or User Groups Creation Failures, page 3-28). 6. Tune the LGMapper Server environment by using LGMapperCnfg. A critical part of this configuration is specifying the Listener host for the LGMapper Server to connect to. Refer to Chapter 4, “LGMapperCnfg and LGArchiverCnfg Tools” for additional information. 7. Tune the LGArchiver Server environment by using LGArchiverCnfg. A critical part of this configuration is specifying the Listener host for the LGArchiver Server to connect to. Refer to Chapter 4, “LGMapperCnfg and LGArchiverCnfg Tools” for additional information. 8. Test an AlarmTracker Client installation by starting the AlarmTracker Client on one of the Client systems and verifying the connection to the LGMapper (refer to Starting the AlarmTracker Client, page 8-2). 9. Install the AlarmTracker Client on the end user desktops (refer to Installing the AlarmTracker Client, page 8-1. SQL Server Requirements Microsoft SQL Server must be installed on the LGMapper Server computer prior to running the LGMapper installation program. If SQL Server is not installed, the LGMapper installation will not proceed. For information about SQL Server requirements, see the Cisco Intelligent Contact Manager Release 7.0(0) Bill of Materials. Note When installing SQL Server, specify a Custom installation and select a binary search order during the setup. Installing the LGMapper and LGArchiver Servers If you are upgrading the LGMapper and LGArchiver servers to Windows 2003 server, back up the database prior to upgrading the operating system, stop the LGMapper and LGArchiver services, and either set these services to either manual or disabled prior to the 2003 upgrade. The Installation Process During the installation, the following actions occur: • Files are copied from the installation source to the destination folders. • A local user account LGMapper with Administrator privileges is created. When the LGMapper Server is launched by remote Client users, this is the account that LGMapper runs under. You can change this account to another local account or to a domain account using DCOMCnfg (see Controlling Access to LGMapper - Populating User Groups, page 3-5). • Three local user Groups are created (LGM Readers, LGM Users and LGM Administrators). • The COM Servers and DLLs are registered. • The databases described in the Installation Procedure Step 8 are created. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-2 Chapter 3 Installing the LGMapper Server Installing the LGMapper and LGArchiver Servers Note Due to the installation of shared files, a system reboot may be necessary. Installation Procedure Note The RMS installation upgrades RMS software from 2.0 or 2.0 SR1 to 2.1. Note If the installation detects the Cisco Security Agent (CSA) running on the system, it prompts you to stop stop the CSA service first, then restart this installation. Note The LGMapper server installation also includes installation of the LGArchiver server. Step 1 Log on with administrator rights. Step 2 Insert the Operations Support CD-ROM into the CD_ROM drive (i.e., drive D). Step 3 In the Start menu Run command dialog box enter: D:\Server\Setup.exe, then click OK (Figure 3-1). Figure 3-1 Starting the LGMapper Server Installation Step 4 The InstallShield Wizard starts and the InstallShield Wizard Welcome screen opens. Click Next to start the installation. Step 5 Select a destination for the files You can accept the default location or, by selecting Browse, you can either choose a different existing folder or create and choose a new folder. Then click Next to continue. In the remainder of this guide, the destination folder you select for these files is referred to as the installation folder Step 6 Select the default program folder LGMapper2 then click Next to continue. Step 7 When the files are copied successfully, the Setup Complete dialog box opens. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-3 Chapter 3 Installing the LGMapper Server Installing the LGMapper and LGArchiver Servers Step 8 Specify the names of the SQL Server databases created during the installation process. Use the following default database names (see Figure 3-2): a. Note b. Note c. Note Figure 3-2 LGAlarms_Template - the default name of a template database used by the LGCnfg tool to create a new Alarms Database. You must create this database so do not leave this field blank. LGMapper_Alarms - the default name of the LGMapper Alarms database. If you are not using the target computer as a LGMapper Server (i.e., it is an LGArchiver Server only), leave this field blank. LGArchiver_Alarms - the default name of the LGArchiver Alarms database. If you are not using the target computer as a LGArchiver Server (i.e., it is an LGMapper Server only), leave this field blank. Specify AlarmTracker Databases Step 9 Click Next to install the databases. Messages indicate that each database is being installed. Step 10 When the Installshield Wizard Complete screen opens, click Finish. The installation is complete. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-4 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Note If you are directed to reboot your computer, do so. Do not continue the installation process without rebooting if directed. Controlling Access to LGMapper - Populating User Groups Remote AlarmTracker clients are not authorized to use the LGMapper Server after a default (initial) installation. Security is usually the largest issue to resolve in order for users to have access to the LGMapper Server. Even if you have open security, AlarmTracker clients will not have read/write access to LGMapper unless special Windows user groups exist for the LGMapper to use. These user groups control the privileges that an AlarmTracker client user has. Three types of access to the LGMapper Server are possible: • Read-only access. Users can see the object hierarchy and all messages, but they cannot clear, assign, exclude, or delete alarm objects. Users in this group have db_datareader access to the AlarmTracker SQL Server Alarms databases. • User access. Users can see the object hierarchy and all messages. They can clear, assign and exclude alarm objects. They can only delete single-state alarm objects. In addition, users in this group have db_datareader access to the AlarmTracker SQL Server Alarms databases. • Administrator access. Users have full control. They can see the object hierarchy and all messages. They can Clear, Assign and Exclude Alarm objects, and they can delete Listener Base Records. In addition, users in this group are given db_owner access to the SQL Server Alarms databases. The LGMapper installation creates the following three local Windows user groups. Assigning AlarmTracker client users to these groups grants the user access to the LGMapper server: • LGM Readers - Users in this group have read-only access to alarm objects • LGM Users - Users in this group can perform all operations on alarm objects, except for deleting Listener Base Records • LGM Administrators - Users in group can perform all operations on alarm objects, including deleting Listener Base Records It is important to exactly follow this naming convention because these are the group names the LGMapper Server tries to find when a client connects. If these groups do not exist when you perform the post-installation checklist, use the Windows 2003 or Windows 2000 Computer Management MMC snap in to create them. Whether the groups are local to the machine that the LGMapper is installed on, or a local or global domain group is up to you and your environment. If all your users and machines are part of a single domain, you can create these groups as global domain groups. This means you only have to populate the groups once. If you choose to keep the groups local (maximizing connection performance), you have to populate these groups for each machine you install the LGMapper on. Remember, while the choice of global or local groups is yours, the group names are not. The groups must be named as indicated. If you do not populate these user groups, users will have read-only access (if they can access the LGMapper Server at all, based on the DCOMCnfg Security settings). The following section discusses how to accomplish this. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-5 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups DCOMCnfg Tool DCOMCnfg is a Windows utility used to configure general settings for DCOM and specific settings for individual DCOM servers. Settings for specific DCOM servers include setting the authentication level, the location of where the server will run, security settings (such as access and launch permissions), identity of the account under which the server will run, and the preferred protocols and endpoints for communication with remote clients. DCOMCnfg.exe resides in the System32 directory and is a property-page-based GUI application. Since LGMapper and LGArchiver are DCOM servers, use DCOMCnfg to administer DCOM properties. This is necessary in order to ensure proper server operation. The following sections detail the steps necessary to configure the LGMapper and LGArchiver Servers for distributed access to after a successful installation. Windows 2003 This section applies to customers running the LGMapper server on Windows 2003 systems. Modifying Launch and Activate Permissions Step 1 From the Start menu, select Start > Run. Step 2 In the Run command dialog box, type dcomcnfg and click OK to open the Component Services window. DCOMCnfg is a Windows utility used to configure general settings for DCOM and specific settings for individual DCOM servers. Step 3 Select Computers > My Computer > DCOMConfig to list DCOM services. Step 4 Right click on LGMapper2 and select Properties. The LGMapper2 Properties dialog box opens. Step 5 Under Launch and Activate Permissions, select Customize and then click Edit. The Launch Permission dialog box opens. Step 6 Click Add to display Select Users or Groups dialog box (Figure 3-3). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-6 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-3 Select Users or Groups Window. Step 7 Click Advanced and then Find Now to display users and group. You can type the first letter of the user or group to narrow the search, for example, “L” lists the LGMapper users and groups. Step 8 Select the LGM Administrators, the LGM Readers, and the LGM Users groups, then click OK. Step 9 Click OK to close the Select Users or Groups dialog box. Step 10 Select the Allow check box for Local Launch, Remote Launch, Local Activation, and Remote Activation, then click OK. Modifying Access Permissions Step 1 From the Start menu, select Start > Run. Step 2 In the Run command dialog box, type dcomcnfg and click OK to open the Component Services window. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-7 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Step 3 Select Computers > My Computer > DCOMConfig to list DCOM services. Step 4 Right click on LGMapper2 and select Properties. The LGMapper2 Properties dialog box opens. Step 5 Under Access Permissions, select Customize and then click Edit. The Access Permission dialog box opens. Step 6 Click Add to display Select Users or Groups dialog box. Step 7 Click Advanced and then Find Now to display users and group. You can type the first letter of the user or group to narrow the search, for example, “L” lists the LGMapper users and groups. Step 8 Select the LGM Administrators, the LGM Readers, and the LGM Users groups, then click OK. Step 9 Click OK to close the Select Users or Groups dialog box. Step 10 Select the Allow check box for Local Access and Remote Access, then click OK. Windows 2000 This section applies to customers running the LGMapper server on Windows 2000 systems. Step 1 In the Start menu Run command dialog, type dcomcnfg and click OK. DCOMCnfg is a Windows utility used to configure general settings for DCOM and specific settings for individual DCOM servers. The Distributed COM Configuration Properties window appears (Figure 3-4). The Applications tab displays a list of the registered DCOM servers. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-8 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-4 Step 2 Distributed COM Configuration Properties Window Scroll down to and select LGMapper2 (Figure 3-4). Click Properties. Note If you do not see LGMapper2 listed, a serious installation problem occurred and the LGMapper Server was not properly registered. Manually register the LGMapper Server by opening a DOS command window, navigating to the Programs > Cisco Systems > LGMapper2 > bin directory, and running the LGMapper2 /RegServer command. Examining the General Tab Step 1 Select the General tab. Step 2 Make sure the value of Authentication Level is Default. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-9 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-5 LGMapper2 Properties Window - General Tab Examining the Location Tab Step 1 Select the Location tab (Figure 3-6). Step 2 Make sure that only Run application on this computer is checked and all others are unchecked. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-10 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-6 LGMapper2 Properties Window - Location Tab Examining the Security Tab Step 1 Select the Security tab. The LGMapper2 Properties window Security tab displays client access permissions. After installation, the default settings are Use default access permissions, Use default launch permissions, and Use custom configuration permissions (Figure 3-7). You must customize the access and/or launch permissions so that your AlarmTracker users are able to access the LGMapper Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-11 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-7 LGMapper2 Properties Window - Security Tab Default Settings The Security tab default settings are used when you first started DCOMCnfg. For your environment, the system default settings are not likely to be sufficient to connect a general set of users to LGMapper Server. However, even if they are sufficient, you must create and use the three (3) user groups (LGM Administrators, LGM Readers, and LGM Users) as discussed in the Post-Installation Inspection Checklist, page 3-27 in order for the users to have proper read/write access to the LGMapper Server. Since these user groups are already built and populated, use them to specify the access and launch permissions. Note Step 2 Make sure that the LGMapper User is part of the LGMapper Administrators Group. Modify the access permissions and/or launch permissions as shown in Modifying Access Permissions, page 3-13 and/or Modifying Launch Permissions, page 3-19. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-12 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Modifying Access Permissions a. Check Use custom access permissions to enable the Edit button (Figure 3-8). Figure 3-8 b. LGMapper2 Properties - Editing Access Permissions Click Edit (Figure 3-8). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-13 Chapter 3 Controlling Access to LGMapper - Populating User Groups The Registry Value Permissions dialog appears (Figure 3-9). c. Click Add to add users and/or groups. Figure 3-9 Registry Value Permissions Dialog Box - Blank Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-14 Installing the LGMapper Server Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups The Add Users and Groups dialog appears (Figure 3-10). Figure 3-10 d. Add Users and Groups - Selecting the Local Machine Domain Set the List Names From field to the local machine domain (i.e. Figure 3-10), the same name as the machine name). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-15 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups e. Select the LGM Administrators, the LGM Readers, and the LGM Users user groups (Figure 3-11). Figure 3-11 f. Add Users and Groups - Adding User Groups Click Add (Figure 3-11). Adding all three groups allow all users in these groups access permission to the LGMapper Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-16 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-12 g. Add Users and Groups - User Groups Added When the three (3) user groups appear in the Add Names field, click OK (Figure 3-12). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-17 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups The Registry Value Permissions dialog box appears displaying the user groups and their access permissions (Figure 3-13). Figure 3-13 h. Registry Value Permissions Dialog Box- Completed Click OK to return to the LGMapper2 Properties window. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-18 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Modifying Launch Permissions a. Check Use custom launch permissions to enable the Edit button (Figure 3-14). Figure 3-14 b. LGMapper2 Properties - Editing Launch Permissions Click Edit (Figure 3-14). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-19 Chapter 3 Controlling Access to LGMapper - Populating User Groups The Registry Value Permissions dialog appears (Figure 3-15). Figure 3-15 c. Registry Value Permissions Dialog Box Click Add to add users and/or groups. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-20 Installing the LGMapper Server Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups The Add Users and Groups dialog appears (Figure 3-16). Figure 3-16 d. Add Users and Groups - Selecting the Local Machine Domain Set the List Names From field to the local machine domain (i.e. Figure 3-16 DOCLAB-NT, the same name as the machine name). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-21 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups e. Select the LGM Administrators, the LGM Readers, and the LGM Users user groups (Figure 3-17). Figure 3-17 f. Add Users and Groups - Adding User Groups Click Add (Figure 3-17). Adding all three groups allow all users in these groups launch permission. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-22 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Figure 3-18 g. Add Users and Groups - User Groups Added When the three (3) user groups appear in the Add Names field, click OK (Figure 3-18). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-23 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups The Registry Value Permissions dialog appears displaying the user groups and their launch permissions (Figure 3-19). Figure 3-19 h. Registry Value Permissions Dialog Box- Completed Click OK to return to the LGMapper2 Properties window. All users in these groups can now launch the LGMapper Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-24 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Examining the Identity Tab Step 1 Select the Identity tab. If the LGMapper installation was successful, the Identity page appears as shown in Figure 3-20. During installation a local user account called LGMapper was created and set as the launching user for LGMapper. Setting the account as This user is important since you want to assure that only one instance of the LGMapper is launched for multiple Client invocations. Figure 3-20 Note Step 2 LGMapper2 Properties - Identity Tab You may change the user account the LGMapper Server is launched from. However, it is critical that the selected user account can Log on and has batch job rights. The user account must be a member of the LGM Administrators user group. Click OK to return to the Distributed COM Configuration Properties window. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-25 Chapter 3 Installing the LGMapper Server Controlling Access to LGMapper - Populating User Groups Examining LGArchiver Properties You can also use DCOMCnfg to examine the DCOM settings for the LGArchiver Server. Because the LGArchiver does not have any clients, you do not have to edit the Access and Launch Permissions as you did for LGMapper. In fact, the only client LGArchiver has is the LGArchiverNM service which runs under the SYSTEM account. By default, the SYSTEM account has Launch Permission for all DCOM servers. However, if you want to examine the DCOM settings for LGArvhiver, you can follow the same steps as for the LGMapper (see Controlling Access to LGMapper - Populating User Groups, page 3-5). To do this, select the LGArchiver Server from the list of applications show in Figure 3-21. Figure 3-21 Distributed COM Configuration Properties Window Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-26 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation Troubleshooting the LGMapper Installation If problems occur during the LGMapper and/or LGArchiver Server installations, an error dialog appears informing you of what actions to take to manually resolve the issue. The Post-Installation Inspection Checklist, page 3-27 can also be used to help resolve any problems. Post-Installation Inspection Checklist Perform the following to ensure a successful installation of the LGMapper Server and the LGArchiver Server: • Ensure the databases have been created by running the SQL Server Enterprise manager (Start>Programs>Microsoft SQL Server 7.0>Enterprise Manager). Expand the SQL Server Group, the “Machine Name” (i.e. DOCLAB-NT), and the Databases nodes as in as in Figure 3-22. Figure 3-22 • Remote Monitoring Suite SQL Server Databases Ensure the following four (4) new folders exist under the installation folder (Figure 3-23): – bin - contains most of the files from the installation are in the bin folder – log - stores ASCII log files written when the LGMapper and LGArchiver run – scripts - contains SQL Server script files to create the LGAlarms_Template database – helpsample - contains an example of how to implement the IWantHelp interface (see Chapter 12, “Implementing the IWantHelp Interface”). Figure 3-23 Installation Folder Sub-directories Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-27 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation • Ensure the log folder (Figure 3-24) includes a log file for each SQL Server database (the LGAlarms_Template database, the LGMapper_Alarms database, and the LGArchiver_Alarms database) discussed in the installation procedure. The log files are named utilizing the following syntax: – InitDatabase_<DatabaseName>.log where <DatabaseName> is the name specified in the prompting dialog. Examine the contents of these files to check for any errors. Figure 3-24 Log Files • Select Start>Programs>LGMapper2. Ensure the LGMapper2 menu option (Figure 3-25) contains the following applications: – LGArchiverCnfg – LGCnfg – LGMapperCnfg – Listener Base Records Pruner Figure 3-25 LGMapper2 Applications Local Account or User Groups Creation Failures If the installation process fails to create a local account, or if you decide you want a different account to run the LGMapper Server, you need to create the account using the User Manager or Domain User Manager tool. It is critical that the account created must have the user rights set to “Log on as batch job”. If the account running the LGMapper does not have these rights, LGMapper Server execution fails because of the way DCOM Servers are started by the Service Control Manager (SCM) as requested by Remote Procedure Calls (RPC). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-28 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation Once you have created or identified the user account that you wish to run the LGMapper Server, run DCOMCnfg (see DCOMCnfg Tool, page 3-6) to set the properties for the LGMapper Server. Note If you install the LGMapper Server or the LGArchiver Server on a Primary Domain Controller (PDC) or Backup Domain Controller (BDC), they are domain accounts and groups. Windows 2000 and Windows 2003 Figure 3-26 Step 1 Run Start>Programs>Administrative Tools>Computer Management. Step 2 Expand the Local Users and Groups node. Step 3 Select the Users folder. The LGMapper user account is displayed in the right column (Figure 3-26). Displaying the LGMapper User Account in Windows 2000 Step 4 Double-click LGMapper (Figure 3-26). The LGMapper Properties dialog box opens. Step 5 Select the Members Of tab and double-click on Administrators. Step 6 Continue at Step 1 of Ensuring LGM Administrators, LGM Readers, and LGM Users Were Created, page 3-31. -orStep 1 Under Local Users and Groups, select the Groups folder (Figure 3-27). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-29 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation Step 2 Figure 3-27 In the right column, select the Administrators group (Figure 3-27). Displaying the Administrators Group in Windows 2000 and Windows 2003 Step 3 Double-click the Administrators group (or right-click and select Properties). Step 4 Continue at Step 1 of Ensuring LGM Administrators, LGM Readers, and LGM Users Were Created, page 3-31. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-30 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation Ensuring LGM Administrators, LGM Readers, and LGM Users Were Created Step 1 Ensure LGMapper is a member of the Administrators group (Figure 3-28). Figure 3-28 Windows 2000 Administrators Properties Window Step 2 Select OK to return to the Computer Management window. Step 3 Ensure Groups is selected. If the installation process fails to create the three User Groups, or if you decide to use a different model for creating the User Groups, then you have to use the Windows User Manager or Domain User Manager to create and populate these groups. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-31 Chapter 3 Installing the LGMapper Server Troubleshooting the LGMapper Installation Step 4 Figure 3-29 Ensure three (3) local User Groups (LGM Administrators, LGM Readers and LGM Users) were created (Figure 3-29). Refer to Local Account or User Groups Creation Failures, page 3-28. Displaying LGM Administrators, LGM Readers, and LGM Users in Windows 2000 and 2003 DCOMCnfg Registry Settings Failure If the installation process fails to create a local account, or if it fails to create Registry setting for DCOMCnfg, use DCOMCnfg to complete the LGMapper Server setup. If you do not see LGMapper2 listed, a serious installation problem occurred and the LGMapper Server was not properly registered. Manually register the LGMapper Server by opening a DOS command window, navigating to the Programs > Cisco Systems > LGMapper2 > bin directory, and running the LGMapper2 /RegServer command. If you do not see LGArchiver listed, a serious installation problem occurred and the LGArchiver Server was not properly registered. Manually register the LGArchiver Server by opening a DOS command window, navigating to the Programs > Cisco Systems > LGMapper2 > bin directory, and running the LGArchiver /RegServer command. Database Creation Failure If the installation process fails to create the LGAlarms_Template database, you can create these manually. How this is accomplished is found in Chapter 6, “Alarms Database Maintenance”. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 3-32 C H A P T E R 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Overview The LGMapperCnfg tool provides the capability for you to: • Enable/disable the LGMapper Server • Display the names of the currently connected client(s) • Display and edit the configuration options related to the Alarms database • Specify the location of the Listener to connect to • Select log file options Start the LGMapperCnfg tool using: • Start>Programs>LGMapper2>LGMapperCnfg • the LGMapperCnfg.exe executable found in the bin folder under the installation folder. Since the application is a property-page based GUI application, you can navigate through the tabs to both view the options and change them. Clients Tab The Clients tab (Figure 4-1) shows the current list of connected users and those with active connections to the LGMapper. It also provides a mechanism to enable/disable the LGMapper Server for maintenance. Displaying Current Users The Clients tab (Figure 4-1) contains two list boxes. The Connected list box indicates the user names of the connected users. The Active Connections list box contains the user names of the active users. Be aware that not every connection is an active connection. This is because the LGMapper is duplexed and users may connect to both LGMapper Servers. One of the connections is active (the LGMapper sends Listener messages to the client), while the other connection is a standby (or backup) connection used in the event the active connection is lost. Thus, the number of connections is always greater than or equal to the number of active connections. This display is not dynamic, so to refresh this list, click Refresh. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-1 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Figure 4-1 LGMapper Configuration - Clients Tab Disabling/Enabling the LGMapper Server Disable the LGMapper Server if: • the machine itself is going down for maintenance • the Listener is going down for maintenance • to perform maintenance on the Alarms database Use the Disable Server/Enable Server button (Figure 4-2) to disable the LGMapper Server. The button label changes based upon the current state of the LGMapper. If the LGMapper Server is enabled, the text reads Disable Server. If the LGMapper Server is disabled, the text reads Enable Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-2 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Figure 4-2 Clients Tab - Disable Server Clicking Disable Server pops up the confirmation dialog box as seen in Figure 4-3. Figure 4-3 Disable Server Confirmation Dialog Box Enter a reason for disabling the LGMapper Server (if desired) and click OK. The Server attempts a graceful shutdown and notifies all connected clients that it is disabled and will no longer accept new connections from Clients. The Clients see a message box telling them the LGMapper is disabled and the Reason text. Since the Reason information is stored in the Registry, Clients only see this text if the LGMapper Server machine is actually up and reachable. If it is not, the Client sees a network or RPC related error message. When the LGMapper Server is disabled, you see the text you entered in the Reason edit box (Figure 4-4). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-3 Chapter 4 LGMapperCnfg Tool Figure 4-4 Clients Tab - Reason Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-4 LGMapperCnfg and LGArchiverCnfg Tools Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool To re-enable the LGMapper Server, click Enable Server (Figure 4-5). This provides connecting Clients immediate access to the LGMapper Server. Figure 4-5 Clients Tab - Enable Server Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-5 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Alarms Database Tab The Alarms Database tab (Figure 4-6) provides information about the Alarms database maintained by the LGMapper. This database maintains configuration and Alarm object information while the LGMapper Server is running. Figure 4-6 LGMapper Configuration - Alarms Database Tab On this tab you can observe/modify the: • Database Catalog Name – the name of the SQL Server database used • Alarms Objects History – the number of hours of cached Alarm object history you want the LGMapper to maintain – this value controls how long closed Alarm objects (records in the database) are retained in the Alarms Database before being purged. Note • A higher number means more history is maintained, but it also means that more disk space is required to store the information. The LGMapper Server occasionally purges the Alarms database of any closed Alarm object whose closed time falls outside the time history window. Open Alarm objects are never purged. Maximum Event Count per Alarm – limits the total number of events associated with an Alarm by implementing a form of event suppression, or filtering, to prevent the Alarms database from growing unbounded This type of suppression is useful for an Alarm that has been excluded for a long time. Such an Alarm could see the object going up and down a large number of times, especially for an object that has been excluded for months. This suppression is accomplished by deleting the oldest events first. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-6 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Note • The first event (the event resulting in the creation of the Alarm object) is never deleted until after the alarm is closed. Maximum Event Repeat Count – use to implement a form of event suppression, or filtering, to prevent the Alarms database from growing unbounded by limiting the number of repeat events for an Alarm Some Alarms result in an event being phoned home every 5 minutes or so (up to a maximum of 5 phone homes per hour), indicating the Alarm is still down, and results in a large number of events being associated with the Alarm. There is little additional information contained in these repeat events. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-7 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Listener Tab The Listener tab allows you to specify the location of the Listener machine the LGMapper is connected to. Note The installation procedure does not fill in any values on this tab. You must enter the correct information shown on this page in order for the LGMapper to properly connect to a Listener. On this tab you can observe/modify the following five (5) fields: • Listener Host – the Listener machine name • User Name – a valid user name on that machine – Domain_Name/User_Name required if the LGMapper Server and Listener machines are in different domains • Password – the password for user specified by the User Name • Time Zone Offset – the time zone difference between the location of the Listener machine and the LGMapper machine (in hours) i.e., The Listener machine is in San Jose, CA and the LGMapper Server machine is in Lowell, MA, Since Lowell is three (3) hours ahead of San Jose, you would enter a 3 in this field. This is because both Listener and LGMapper store times in their local time zone. • Use Compression – If this option is checked, the Listener sends data to the LGMapper in compressed form. – Use this option only when the network connection between the Listener and LGMapper is very slow or congested (there are a large number of customers monitored - over 75), or where network service interruption may be frequent. – Leave this option unchecked because compressing and decompressing data is a CPU-intensive process. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-8 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGMapperCnfg Tool Log Files Tab The Log Files tab (Figure 4-7) allows you to select the log files to be generated by the LGMapper Server. Figure 4-7 LGMapper Configuration - Log Files Tab This tab includes the following fields: • Location – the path to the folder containing the log files (the log folder under the installation folder for the LGMapper). • LGMapper Log File – select to create a log file containing LGMapper information named LGMapperddmmyy_nn.log, where ddmmyy is the current date, and nn is a unique number for the file Note • These log files are simple ASCII files and contain information about initialization, connecting Clients, and any errors that occur. Cisco strongly suggests you use this log file since this is the only way you can report problems about the LGMapper to Cisco customer support. These LGMapper Log files are not purged, so periodically delete them. Configuration Database Transactions Log File – select to create a log file named LGMDBTrans.log containing information about additions made to the Configuration database InstanceNodes table when LGMapper is running Note This log file is less important than the LGMapper Log and the Listener Messages Log files. However, when in a “steady state” situation, turn this file on to see if any new Instance nodes are being added to the database. When selected, data is appended to this log file each time the LGMapper Server starts up. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-9 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool • Listener Messages Log File – select to create an ASCII log of all Listener messages received named LGMapperV5.log (or LGMapperV4.log if you are connecting with a Release 4 feed from Listener) Note See Chapter 11, “Backwards Compatibility Considerations” for information about the differences between a Release 4 and Release 5 Listener feed. – overwritten each time you start the LGMapper – useful if you find a logic error in the Client displays and want Cisco customer support to investigate Note This file can be used to “play back” the full set of events to the Client displays in order to recreate the sequence of events seen in real time. If you see a problem, copy this file to another file, save it (remember, the next time LGMapper is restarted, the log file will be overwritten), and notify Cisco customer support. LGArchiverCnfg Tool Overview The LGArchiverCnfg tool provides the capability for you to: • Display and edit the configuration options related to the Archiver database • Specify the location of the Listener to connect to • Select log file options Start the LGArchiverCnfg tool using: • Start>Programs>LGMapper2>LGArchiverCnfg • the LGArchiverCnfg.exe executable found in the bin folder under the installation folder. Since the application is a property-page based GUI application, you can navigate through the tabs to both view the options and change them. Note To start and stop archiving, use the LGArchiverNM Windows Service (refer to Chapter 5, “LGMapperNM and LGArchiverNM”). Archiver Database Tab The Archiver Database property tab (Figure 4-8) provides information about the Alarms database maintained by LGArchiver. This database maintains configuration and Alarm object information while LGArchiver is running. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-10 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool Figure 4-8 LGArchiver Configuration - Archiver Database Tab You can observe and/or modify four (4) fields on this tab: • Database Catalog Name – the name of the SQL Server database Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-11 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool • Alarms Objects History – the number of days of cached Alarm object history you want the LGArchiver to maintain – controls how long closed Alarm objects (records in the database) are retained in the database before being purged Note • A higher number means more history is maintained, however, more disk space is required to store the information. During LGArchiver operation, occasionally purges the Alarms database of any closed Alarm objects whose closed time fall outside the time history window. Alarm objects still open are never purged. Maximum Event Count per Alarm – used to implement a form of event suppression or filtering to prevent the Alarms database from growing unbounded – this value limits the total number of events associated with an Alarm This type of suppression is useful for an Alarm that has been excluded for a long time. Such an Alarm could see the object going up and down a large number of times, especially for an object that has been excluded for months. The suppression is accomplished by deleting the oldest events first. Note • The first event (the event resulting in the creation of the Alarm object) is never deleted. Maximum Event Repeat Count – used to implement a form of event suppression, or filtering, limiting the number of repeat events for an Alarm and preventing the Alarms database from growing unbounded. Some Alarms result in an event being phoned home every 5 minutes or so (up to a maximum of 5 phone homes per hour), indicating the Alarm is still down. This could result in a large number of events associated with the Alarm. There is little additional information contained in these repeat Events. Listener Tab The Listener tab (Figure 4-9) allows you to specify the location of the Listener machine the LGMapper connects to. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-12 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool Figure 4-9 LGArchiver Configuration - Listener Tab This tab allows you to observe/modify the following fields: • Listener Host – the Listener machine name • User Name – a valid user name on that machine – Domain_Name/User_Name required if the LGArchiver Server and Listener machines are in different domains • Password – the password for user specified by the User Name • Time Zone Offset – the time zone difference between the location of the Listener machine and the LGMapper machine (in hours) i.e., The Listener machine is in San Jose, CA and the LGMapper Server machine is in Lowell, MA, Since Lowell is three (3) hours ahead of San Jose, you would enter a 3 in this field. This is because both Listener and LGMapper store times in their local time zone. Log Files Tab The Log Files tab (Figure 4-10) allows you to select the log files to be generated by the LGArchiver Server. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-13 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool Figure 4-10 LGArchiver Configuration - Log Files Tab This tab includes the following fields: • Location – the path to the folder containing the log files (he log folder under the installation folder for the LGArchiver). • LGArchiver Log File – select to create a log file containing LGMapper information named LGArchiverddmmmyy_nn.log, where ddmmyy is the current date, and nn is a unique number for the file Note • These log files are simple ASCII files and contain information about initialization, connecting Clients, and any errors that occur. Cisco strongly suggests you use this log file since this is the only way you can report problems about the LGMapper to Cisco customer support. These LGArchiver Log files are not purged, so periodically delete them. Configuration Database Transactions Log File – select to create a log file named LGADBTrans.log containing information about additions made to the Configuration database InstanceNodes table when LGArchiver is running Note • This log file is less important than the LGArchiver Log and the Listener Messages Log files. However, when in a “steady state” situation, turn this file on to see if any new Instance nodes are being added to the database. When selected, data is appended to this log file each time the LGArchiver Server starts up. Listener Messages Log File – select to create a log of all Listener messages received named LGArchiverV5.log (or LGArchiverV4.log if you are connecting with a Release 4 feed from Listener) Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-14 Chapter 4 LGMapperCnfg and LGArchiverCnfg Tools LGArchiverCnfg Tool Note See Chapter 11, “Backwards Compatibility Considerations” for information about the differences between a Release 4 and Release 5 Listener feed. – overwritten each time you start the LGArchiver – useful if you find a logic error in the Client displays and want Cisco customer support to investigate This file is used to “play back” the full set of events to the Client displays in order to recreate the sequence of events seen in real time. If you see a problem, copy this file to another file, save it (remember, the next time LGArchiver is restarted, the log file will be overwritten), and notify Cisco customer support. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-15 Chapter 4 LGArchiverCnfg Tool Cisco Remote Monitoring Administration Guide, Release 2.1(0) 4-16 LGMapperCnfg and LGArchiverCnfg Tools C H A P T E R 5 LGMapperNM and LGArchiverNM LGMapper Node Manager (LGMapperNM) Overview The LGMapper Node Manager (LGMapperNM) is a Windows Service used to control the lifetime of an LGMapper Server. The LGMapper Server is a DCOM server which continues running as long as there is at least one connected client. If all AlarmTracker clients disconnect, the LGMapper Server exits. If you want the LGMapper Server to run continuously, use the LGMapper Node Manager service to keep it running. The LGMapperNM also tries to check for proper operation of the LGMapper Server. If LGMapperNM detects that the server is hung or not operating properly, it attempts to stop the server and restart it. Starting the LGMapper Node Manager Windows 2000 and Windows 2003 Use the Computer Management application to display Windows services. • Select Start>Programs>Administrative Tools>Services or • Right-click My Computer and select Manage. Expand Services and Applications and select Services. The Services are displayed in the right column of both the Services (Figure 5-1) and Computer Management (Figure 5-2) windows, respectively. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-1 Chapter 5 LGMapperNM and LGArchiverNM LGMapper Node Manager (LGMapperNM) To start the LGMapperNM service: Figure 5-1 Windows Services Window - Starting LGMapperNM Step 1 Select the LGMapper service in the right side of the Services window (Figure 5-1). Step 2 Select the Action menu. Step 3 Select the Start menu option. or Figure 5-2 Windows Computer Management - Starting LGMapperNM Step 1 Select the LGMapper service in the right side of the Computer Management window(Figure 5-2). Step 2 Right-click the selected service. Step 3 Select Start from the pop-up menu. Close the respective window. A new LGMapper tray icon () appears in the task bar. You can also configure the LGMapperNM service so that it starts up automatically when the machine boots. To do this, select the LGMapperNM service, click Properties on the Toolbar, and select Automatic for the Startup Type. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-2 Chapter 5 LGMapperNM and LGArchiverNM LGMapper Node Manager (LGMapperNM) Task Bar Icon The task bar icon indicates the current status of the LGMapperNM Service. The icons that may be seen in the task bar are shown in . Table 5-1 Icon LGMapperNM Service Task Bar Icons Definition The LGMapper is in an unknown state. The LGMapper is disabled. The LGMapper is initializing. The LGMapper is running and processing Listener messages The LGMapper has been stopped. An error has occurred causing the LGMapper to exit. Check the Application Event Log and examine the log files in the LGMapper log folder to determine why the LGMapper server failed. Menu Options Right-clicking on the icon in the task bar brings up a list of menu options to control the operation of the LGMapper Server. The following menu options are available: • Open LGMapperCnfg… – launches the LGMapperCnfg tool to set properties for the LGMapper Server – the default menu option, also launches LGMapperCnfg if you double-click on the tray icon • Show Statistics… – presents a dialog showing statistics for a running LGMapper Server Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-3 Chapter 5 LGMapperNM and LGArchiverNM LGMapper Node Manager (LGMapperNM) The following information is displayed when this menu option is selected: – Listener Messages Processed - the number of Listener messages processed since the Server started – Connected Clients - the number of clients connected to the LGMapper Server – Active Connections - the number of active connections to the LGMapper Server – LGMapper Up Since - the time the LGMapper Server started • LGMapper - Start – starts Listener message processing on the LGMapper Server • LGMapper - Stop – stops Listener message processing on the LGMapper Server Warning Use caution when using this option. Selecting this option forcibly terminates a running LGMapper Server and disconnects all clients. • LGMapper - Disable – disables the LGMapper Server, enter a reason for disabling the Server • LGMapper - Enable – enables the LGMapper Server when it is disabled. Note • This option does not start the LGMapper Server, it merely allows clients connect again Hide Tray Icon – hides the tray icon Note • The tray icon re-appears each time you restart the LGMapperNM Service. Exit Service – exits the LGMapperNM Service Note If no other clients are connected, the LGMapper Server exits. If other clients are connected, the LGMapper Server continues to run until there are no more clients connected. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-4 Chapter 5 LGMapperNM and LGArchiverNM LGArchiver Node Manager (LGArchiverNM) Event Log Messages The LGMapperNM logs messages to the system Application log. This log is viewed in the Windows Event Viewer. Informational messages (such as the time started and stopped) appear, as well as, error messages. The Source and Category of the events are LGMapperNM for quick identification of LGMapperNM related events. LGArchiver Node Manager (LGArchiverNM) Overview The LGArchiver Node Manager (LGArchiverNM) is an Windows Service that is used to control the lifetime of an LGArchiver Server. The LGArchiver Node Manager also checks the proper operation of the LGArchiver Server. If it detects that the server is hung or not operating properly, it attempts to stop the server and restart it. To continuously log messages, make sure the LGArchiverNM Service is running. Configure the Service to auto start when the system boots via the Service Control panel application. Starting the LGArchiverNM Windows 2000 and Windows 2003 On a Windows 2000 machine, the Services are displayed via the Computer Management application. Two ways to display the Services are to: • select Start>Programs>Administrative Tools>Services or • right-click My Computer, select Manage, expand Services and Applications, and select Services. .The Services are displayed in the right column of both the Services (Figure 5-3) and Computer Management (Figure 5-4) windows, respectively. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-5 Chapter 5 LGMapperNM and LGArchiverNM LGArchiver Node Manager (LGArchiverNM) To start the LGArchiverNM service: Figure 5-3 Windows Services Window - Starting LGArchiverNM Step 1 Select the LGArchiver service in the right side of the Services window (Figure 5-3). Step 2 Select the Action menu. Step 3 Select the Start menu option. or Figure 5-4 Windows Computer Management - Starting LGArchiverNM Step 1 Select the LGArchiver service in the right side of the Computer Management window(Figure 5-4). Step 2 Right-click the selected service. Step 3 Select Start from the pop-up menu. Close the respective window. A new LGArchiver tray icon () appears in the task bar. You can also configure the LGArchiverNM service so that it starts up automatically when the machine boots. To do this, select the LGArchiverNM service, click Properties on the Toolbar, and select Automatic for the Startup Type. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-6 Chapter 5 LGMapperNM and LGArchiverNM LGArchiver Node Manager (LGArchiverNM) Task Bar Icon The task bar icon indicates the current status of the LGArchiverNM Service. The icons that may be seen in the task bar are shown in . Table 5-2 Icon LGArchiverNM Service Task Bar Icons Definition The LGArchiver is in an unknown state. The LGArchiver is initializing. The LGArchiver is running and processing Listener messages. The LGArchiver has been stopped. An error has occurred causing the LGArchiver to exit. Check the Application Event Log and examine the log files in the LGMapper log folder to determine why the LGArchiver server failed. Menu Options Right-clicking on the icon in the task bar brings up a list of menu options to control the operation of the LGMapper Server. The following menu options are available: • Open LGArchiverCnfg… – launches the LGArchiverCnfg tool to set properties for the LGArchiver Server • Show Statistics… – presents a dialog showing statistics for a running LGArchiver Server The following information is displayed when this menu option is selected: – Listener Messages Processed - the number of Listener messages processed since the Server started – LGArchiver Up Since - the time the LGArchiver Server started Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-7 Chapter 5 LGMapperNM and LGArchiverNM LGArchiver Node Manager (LGArchiverNM) • LGArchiver - Start – starts Listener message processing on the LGArchiver Server The LGArchiver starts up, goes through its initialization stage (this may take several minutes), and then begins processing Listener messages. • LGArchiver - Stop – stops Listener message processing on the LGArchiver Server • LGArchiver - Exit – stops Listener message processing on the LGArchiver and exits the LGArchiverNM Service (the LGArchiver Server also exits) • Hide Tray Icon – hides the tray icon Note The tray icon re-appears each time you restart the LGArchiverNM Service. Event Log Messages The LGArchiverNM logs messages to the system Application log. This log is viewed in the Windows Event Viewer. Informational messages (such as the time started and stopped) appear, as well as, error messages. The Source and Category of the events are LGArchiverNM for quick identification of LGArchiverNM related events. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 5-8 C H A P T E R 6 Alarms Database Maintenance Overview For the most part, the Alarms Database is set up to take care of itself. Database options are set so that its transaction log file is automatically truncated and shrunk. In addition, database statistics are updated at LGMapper/LGArchiver startup, and the database is completely re-indexed once per week during a restart. To perform other maintenance operations, you use SQL Server Enterprise Manager or other techniques. Note The process of completely re-indexing the database is time-consuming. For a 1 GByte database, re-indexing can take up to 10 minutes, for smaller databases the time required to re-index is less as the re-indexing time requirement is proportional to the size of the database. Re-indexing is done once per week at the most, and occurs when the server restarts. Re-Indexing the Alarms Database If you want to manually re-index the database, you can use the stored procedure reindex_database to do this. Creating and Cloning Databases The LGCnfg tool is used to create new Alarms databases and to clone existing databases. Additional information on how to do this is included in Creating a New Database, page 7-8 and Cloning a Database, page 7-8. Manually Creating Databases To assist you in creating a databases manually, we provide SQL scripts in the DBScripts folder created during the installation process. If you manually create a new database, you can initialize the database with the proper set of tables, data, and stored procedures by running the batch file InitDatabase.bat. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 6-1 Chapter 6 Alarms Database Maintenance Creating and Cloning Databases The InitDatabase.bat file takes a single command line argument using the name of the database to populate. Keep in mind that this batch file does not create the SQL Server database for you. You must first create the SQL database by other means. As an example, if you created an empty database called LGMapper_Test, you could populate it with the following command run from the DBScripts folder: InitDatabase LGMapper_Test Once the database is created and populated, you make LGMapper use it by running the LGMapperCnfg tool and selecting it in the Alarms Database tab. Note The preferred method of creating new databases is to use the LGCnfg tool as described in Creating a New Database, page 7-8 and Cloning a Database, page 7-8. SQL Server Security During installation, the installer creates three local user groups: • LGM Readers • LGM Users • LGM Administrators These groups are added to the Login collection in the Security folder seen in the SQL Server Enterprise Manager. In addition, these groups are added as users to the three (3) databases created during the installation process. The LGM Readers and LGM Users groups are given the db_datareader role for these databases so that they can perform queries against the databases, and the LGM Administrators group is given the db_owner role for these databases. If you create new databases using either LGCnfg or the SQL scripts provided, these groups are added to the database Users as part of the creation process. If you want to give a user access to AlarmTracker, all you need to do is add the user to the appropriate LGM XXX group. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 6-2 C H A P T E R 7 LGCnfg Tool Overview The LGCnfg tool is used to manage the Alarms Databases at your site and provides the following capabilities: • Manage server-side Filters • Delete Instance Nodes • Create new Configuration Databases • Edit existing Configuration Databases • Create and edit OID Nodes and Attributes • Create and edit Rules for mapping Listener Objects This section provides a brief overview of the capabilities of the LGCnfg tool. Starting LGCnfg To start the LGCnfg tool: • Select Start>Programs>LGMapper2>LGCnfg. - or • Run LGCnfg2.exe from the bin folder under the installation folder. Opening a Database When the LGCnfg starts, it initially has no open Alarms Database. To open a database, use the File > Open… menu option (Figure 7-1). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-1 Chapter 7 LGCnfg Tool Starting LGCnfg Figure 7-1 LGCnfg Tool - Opening an Alarms Database Initially, the server is set to the local host (i.e., Kevinm-W2K1) as shown in Figure 7-2. Figure 7-2 Open Database Dialog Box The Open Database dialog box (Figure 7-2) indicates if there is an Alarms Database configured for the LGMapper Server and the LGArchiver Server. If none is specified, the option is grayed out. The Server status is shown to the right of the database name. The status is important because if the LGMapper Server is enabled, the database is opened as read only (Figure 7-3). If the LGArchiver Server is running, its database is opened as read only. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-2 Chapter 7 LGCnfg Tool Using Server-Side Filters Figure 7-3 Database Opens as Read Only In order to make changes to a LGMapper database, the LGMapper Server must be disabled. Similarly, the LGArchiver Server must not be running if you want to make changes to the LGArchiver database. You can alternatively select a database that is not attached to either the LGMapper Server or the LGArchiver Server. Attach to a database on a different server by either selecting a database from a known SQL Server machine from the Server drop down list (or by clicking Other…) and selecting a different server name (refer to Figure 7-2). When the selection is made, the dialog attempts to refresh contents of the LGMapper and LGArchiver databases for the new server. Figure 7-4 shows a sample of the Intelligent Contact Manager (ICM) OID Node hierarchy for an open database: Figure 7-4 LGCnfg Showing the ICM OID Hierarchy Using Server-Side Filters The LGMapper Server and the LGArchiver Server support the filtering of Listener data in order to present a subset of information to the attached AlarmTracker clients. The filters are actually applied to the data before it is updated in the Alarms database so that filtered data is not logged at all. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-3 Chapter 7 LGCnfg Tool Using Server-Side Filters The following types of server-side filters can be applied using the LGCnfg tool: • Customer Instance filters – Filters out specific customer instances. This type of filter is useful for a support center that is responsible for a subset of the customer base tracked by the Listener. For example, an international company has two customer contact centers, one in San Jose and one in Brussels. Assume the customer contact center in San Jose is responsible for monitoring only US-based customers. In this case, the LGCnfg tool can be used to filter out all non-US customers from the set of instance nodes. If the customer contact center in Brussels is responsible for only European-based customers, the LGCnfg tool can be used to filter out all non-European customers. • Product filters – Filters out specific products. This type of filter is used to segment support groups for different product support. For example, one set of LGMapper Servers is dedicated to support for the ICM product, and another set for the ISN product, etc. • OID Node filters – Filters out specific OID Nodes (and implicitly their children). For example, a Network Applications Manager (NAM) customer has two customer contact centers. The first customer contact center supports NICM instances. The second customer contact center supports individual customers. The OID Node filter is configured on the first LGMapper Server to filter out specific kinds of OID Nodes (in this case, NICs). • Class filters – Filter out specific Classes for a given product. • Message ID filters – Filters out specific EMS Message IDs for a given product. These filters are set in the different views that display nodes and objects. Objects filtered out are marked with a red 'X' in the check box associated with the object. Caution When an object filter is set, the LGCnfg tool also deletes all Alarm objects related to the filter setting. This is one reason why the database cannot be attached to a running instance of LGMapper or LGArchiver. Be very sure of your selection before you set any filter. A dialog box is always displayed to confirm any filter setting. Customer Instance Filters Setting Customer Instance Filters Set and clear Customer Instance filters in the Instance Nodes Tree view. Step 1 Select the customer you want to filter. Step 2 Select Edit > Filter Out (or right-click and select Filter Out). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-4 Chapter 7 LGCnfg Tool Using Server-Side Filters The filter setting takes effect the next time the LGMapper or LGArchiver server is started. Clearing Customer Instance Filters Step 1 Select the customer you want to clear. Step 2 Select Edit > Filter Out (or right-click and select Filter Out). This toggles the filter setting and resets the filter. Product Filters Set and clear Product filters in either the OID Nodes Tree View or the Objects View. Setting Product Filters in the OID Nodes Tree View Step 1 Select the Product to filter. Step 2 Select Edit > Filter Out (or right-click and select Filter Out). The Product filter setting takes effect the next time the LGMapper or LGArchiver server is started. Clearing Product Filters in the OID Nodes Tree View Step 1 Select the Product to clear Step 2 Select Edit > Filter Out (or right-click and select Filter Out). This toggles the filter setting and resets the filter. Setting Product Filters in the Objects View Step 1 Select any entry containing the product you want to filter. Step 2 Select Edit->Filter Product Out (or right-click and select Filter Product Out). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-5 Chapter 7 LGCnfg Tool Using Server-Side Filters Clearing Product Filters in the Objects View Step 1 Select any entry containing the Product to clear. Step 2 Select Edit > Filter Product Out (or right-click and select Filter Product Out). This toggles the filter setting and resets the filter. Note When you filter out a Product, the Product node in the OID Nodes Tree View is marked with a red “X”. All objects in the Objects View for that product are also marked with a red “X”. In addition, all Instance Nodes for that product are similarly marked. OID Node Filters Setting OID Node Filters Set and clear OID Node filters in the OID Nodes Tree View. Step 1 Select the OID Node to filter. Step 2 Select Edit > Filter Out (or right-click and select Filter Out). The setting takes effect the next time the LGMapper or LGArchiver server is started. Clearing OID Node Filters Step 1 Select the node to clear. Step 2 Select Edit->Filter Out (or right-click and select Filter Out). This toggles the filter setting and resets the filter. Note When you filter out an OID Node, the node and all of its children are marked with a red 'X'. In addition, all Instance Nodes that refer to that OID and its children are similarly marked. Class Filters Set and clear Class filters in the Objects View. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-6 Chapter 7 LGCnfg Tool Using Server-Side Filters Setting Class Filters Step 1 Select any entry containing the Class to filter. Step 2 Select Edit > Filter Class Out (or right-click and select Filter Class Out). Clearing Class Filters Step 1 Select any entry containing the Class to clear. Step 2 Select Edit > Filter Class Out (or right-click and select Filter Class Out). This toggles the filter setting and resets the filter. Note When you filter out a Class, all Message IDs associated with that Class are marked with a red “X”. Message ID Filters Set and clear Message ID filters in the Objects View. Setting Message ID Filters Step 1 Select any entry containing the Message ID to filter. Step 2 Select Edit > Filter MsgID Out (or right-click and select Filter MsgID Out). Clearing Message ID Filters Step 1 Select any entry containing the Message ID to clear. Step 2 Select Edit > Filter Msg ID Out (or right-click and select Filter Msg ID Out). This toggles the filter setting and resets the filter. Caution Exercise extreme care when filtering on Message IDs. Make sure you filter both the raise and clear messages, or you could end up in a situation where some Alarms are not being cleared, or some Alarms are not seen as raised. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-7 Chapter 7 LGCnfg Tool Instance Node Deletion Instance Node Deletion It may be necessary to delete instance nodes. One possible scenario is when you no longer need to monitor a customer. Another scenario is when certain sub-system instances (such as a PG or a NIC) are no longer valid. For these situations and others, delete the instance nodes and their children from the Alarms Database using the LGCnfg tool. Note As when filtering, if you delete an Instance Node, all associated Alarm objects for that Instance Node are also deleted. Deleting an Instance Node Step 1 Select the node to delete in the Instance Nodes Tree View. Step 2 Select Edit > Delete (or the Delete context menu option, or press the Delete key). Creating a New Database To create a new, completely empty (no OID Nodes or Rules) database: Step 1 Select File > New… Step 2 When prompted provide the Server location and Database Name. This database can now be used to create new product instances and rules. Cloning a Database To clone the currently open database: Step 1 Select File > Clone Database… Step 2 When prompted, select the Server location and new Database Name. Step 3 Select the aspects of the database you want to copy (see Figure 7-5). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-8 Chapter 7 LGCnfg Tool Modifying the OID Node Hierarchy and Rules Figure 7-5 Clone Database Options The Copy Options are as follows: • Include OID Nodes, Rules and Objects – Copy all OID Nodes, Rules and objects to the new database. • Include Customer Instances – Copy all customer instances to the new database. • Include Instance Nodes – Copy all Instance Nodes to the new database. • Include Alarms – Copy all Alarms objects to the new database Any relevant filter settings are always copied. The cloned database can now be used to create or edit any aspect of a database. Cloning a database is a good way to experiment and test out any important changes in a controlled environment before putting it into a production mode. Modifying the OID Node Hierarchy and Rules The Alarms databases created during the installation process contain the proper OID Node hierarchy and Rule set for use by the LGMapper and its clients. If changes need to be made to the OID hierarchy or the Rule definitions, contact the Cisco Technical Assistance Center (TAC) for assistance. Proper Rules definition requires detailed knowledge of Listener message field contents. If you feel the Instance Nodes are improperly defined, or that objects are mapped to the wrong nodes (or not mapped at all), please contact the Cisco Technical Assistance Center (TAC). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-9 Chapter 7 Modifying the OID Node Hierarchy and Rules Cisco Remote Monitoring Administration Guide, Release 2.1(0) 7-10 LGCnfg Tool C H A P T E R 8 Installing the AlarmTracker Client Overview Installation of the AlarmTracker Client software involves running the installation files and starting the Client. The AlarmTracker Client uses DCOM to communicate with the LGMapper Server. The code handles the details of this communication for you. AlarmTracker uses the SQL Server OLE DB provider to gain direct access to the LGMapper Alarms Database in order to perform queries and refresh AlarmTracker displays. Installing the AlarmTracker Client Step 1 Run Setup.exe from the AlarmTracker Client directory of the Operations Support CD-ROM. The AlarmTracker Client Installation Wizard starts. Step 2 Click Next and review information about the installation in the Information window. Step 3 Click Next and choose a destination to install the client software in the Destination Location window. Step 4 Select the destination location for the AlarmTracker Client files. Accept the default location, navigate to another existing location, or create a new location. Throughout the remainder of this chapter, the selected location will be referred to as the installation folder. Step 5 Click Next to start installing the AlarmTracker Client files. When the installation is complete, the COM component registration is finished and the InstallShield Wizard Complete window appears. Step 6 Click Finish to exit the InstallShield Wizard. Note A system reboot may be required for the registration to take effect. Reboot the system if directed. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-1 Chapter 8 Installing the AlarmTracker Client Starting the AlarmTracker Client Starting the AlarmTracker Client Once installation is complete, start the AlarmTracker Client. Step 1 Select Start>Programs>AlarmTracker2 (Figure 8-1). Figure 8-1 Start>Programs>AlarmTracker2 When the AlarmTracker Client starts, it shows the Connect to Servers dialog (Figure 8-2). Figure 8-2 Connect to LGMapper Servers Dialog Box This dialog allows you to specify one or two LGMapper Server locations to connect to.Enter the machine name of, or browse to, the desired LGMapper Server1 and/or LGMapper Server2 name(s). (Refer to Figure 8-3.) Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-2 Chapter 8 Installing the AlarmTracker Client Starting the AlarmTracker Client Figure 8-3 Step 2 Connecting to the LGMapper Server(s) Click Connect (Figure 8-3), the process of connecting to the LGMapper Server begins.The process of connecting and initializing may take a few minutes. The dialog box expands vertically (Figure 8-4) as various progress messages appear during the initialization. Figure 8-4 Connect to Servers Dialog Box Indicating Connection Progress Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-3 Chapter 8 Installing the AlarmTracker Client Starting the AlarmTracker Client During the initialization phase: • The code creates an instance of the SvrMgrObj on the LGMapper Server which manages the communication between the LGMapper Server and the AlarmTracker Client • If this is the first AlarmTracker Client connecting to the LGMapper Server, the LGMapper Server: – Initializes its connection with the Listener process – Initializes its Configuration Database by taking an in-memory snapshot of its contents and building a local object hierarchy – Preprocesses any Alarm objects remaining from the previous invocation of LGMapper – Reads the Listener Base Records – Builds Alarm objects – Updates the object hierarchy • LGMapper Server takes a snapshot of the full object hierarchy and serializes it across the wire to the AlarmTracker Client • AlarmTracker serializes the object hierarchy from LGMapper Server into its local object hierarchy • AlarmTracker Client initializes its displays and begins processing If the AlarmTracker Client is in a different domain than that of the LGMapper Server, and there is not a two-way trust relationship between these domains, the following error message may appear: Failed to open DataSource LGMapper_geonv Client unable to establish connection [DBNMPNTW] ConnectionOpen (CreateFile()). If this occurs, issue a net use command using the following syntax: > net use \\lgmapperhost password /user:domain\username where: Note • lgmapperhost is the name of the machine you are trying to connect to (the LGMapper Server machine) • domain\username is the name of a valid account in the domain of the LGMapper Server machine • password is the corresponding password for this account To auto-connect to the LGMapper Server(s) upon starting the AlarmTracker Client, click Auto-Connect to Servers on Startup (Figure 8-5). Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-4 Chapter 8 Installing the AlarmTracker Client Configuring the AlarmTracker Client Figure 8-5 Automatically Connecting to the LGMapper Server(s) at AlarmTracker Client Startup Configuring the AlarmTracker Client Windows XP This section applies to customers running AlarmTracker clients on Windows XP SP2. Configure the AlarmTracker client to connect to an LGMapper server. Step 1 From the AlarmTracker client machine Start menu, select Start > Control Panel > Network Connections. Step 2 Right click Local Area Connection or the connection used to connect to the LGMapper server and select Properties. Step 3 Select the Advanced tab, then select Windows Firewall Settings. Step 4 Select the Exceptions tab and click Add port. Step 5 Enter the name dcom and port 135. Step 6 Make sure TCP is selected and click OK. Step 7 Click OK on the Firewall Settings dialog box and click OK on the Local Area Connection properties. Step 8 From the Start menu, select Start > Run. Step 9 In the Run dialog, enter dcomcnfg and click OK to open the Component Services window. Step 10 Select Component Services in the left pane and double-click the Computers folder in the right pane. Step 11 Right click My Computer and select Properties. Step 12 Select the COM Security tab In the Launch and Activation Permissions area, you can control the local and remote permissions as well as the computer-wide limits and defaults. Security Settings provide the ability to specify both local and remote activation and launch permissions. Step 13 Under Access Permissions, select Edit Limits and click OK. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-5 Chapter 8 Installing the AlarmTracker Client Configuring the AlarmTracker Client Step 14 In the Access Permissions dialog box, select Distributed COM Users and make sure the Allow box is checked for Local Access and Remote Access, then click OK. Step 15 Under Launch and Activate Permissions, select Edits Limits and click OK. Step 16 In the Launch Permissions dialog box, select Distributed COM Users and make sure the Allow boxes are checked for local and remote activation, then click OK. Step 17 Restart the AlarmTracker Client. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 8-6 C H A P T E R 9 The Exclude Node Feature Overview Initially, the Listener/LGMapper installation sets up the Exclude Node feature so that it is disabled. This is done to provide backwards compatibility with older Grid clients. The Exclude Node feature is incompatible with the Grid application, and would create inconsistent views of Alarm objects in Grid if it were enabled. For this reason, Listener uses a registry setting to determine if the Excluded Node feature is enabled or not. When Exclude Node is disabled (the default), Grid clients and AlarmTracker clients can be used simultaneously. However, when an AlarmTracker user attempts to exclude a node, an error dialog appears indicating that this feature is not enabled. When the Exclude Node feature is enabled, Grid clients connect to the Listener, but receive no data other than Listener heartbeats. An Alarm is also raised in the AALSTN customer node. Enabling the Exclude Node Feature To enable the Exclude Node feature in Listener, you must create a registry value as follows: Key: HKEY_LOCAL_MACHINE\SOFTWARE\Cisco Systems, Inc.\ICM\Listener DWORD Value: SupportExcludeNode = 1 If this value is not present, or has a value other than 1, the Exclude Node feature is disabled. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 9-1 Chapter 9 Enabling the Exclude Node Feature Cisco Remote Monitoring Administration Guide, Release 2.1(0) 9-2 The Exclude Node Feature C H A P T E R 10 Deployment Issues System Specification The processes running as part of the complete Remote Monitoring solution are shown in Figure 10-1. You can run all these processes on a single machine, but dividing the workload among different machines optimizes performance. For hardware and software requirements, refer to the Cisco Intelligent Contact management Software Release 7.0(0) Bill of Materials. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 10-1 Chapter 10 Deployment Issues System Specification Figure 10-1 Remote Monitoring Processes Archived Alarms DB LGArchiver LGArchiverNM Network Boundary Listener LGMapperNM AlarmTracker Client Alarms DB AlarmTracker Client 63995 LGMapper The LGMapper machine must be fastest machine with the most amount of memory because it must update the SQL Server database in real time, and it must service potentially tens of AlarmTracker clients in real time as well. Disk Space Requirements for Alarms Database It is also difficult to accurately estimate disk space required. This again depends on the number of customers and products supported; and for the Alarms Databases, it also depends on the Alarms Objects History setting in LGMapperCnfg Tool, page 4-1 and LGArchiverCnfg Tool, page 4-10. Use the following formula as a guideline to estimate the SQL Server database MDF file size: [MDF File Size MBytes] = 0.3 X [Number of Customers] X [Time History in Days] Examples: Monitoring 150 Customers and maintaining a 30-day Alarms Time History results in an MDF file size of on the order of 1.35 GBytes. Monitoring 30 Customers and maintaining a 60-day Alarms Time History results in an MDF file size of about 540 MBytes. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 10-2 Chapter 10 Deployment Issues System Specification Cisco Remote Monitoring Administration Guide, Release 2.1(0) 10-3 Chapter 10 System Specification Cisco Remote Monitoring Administration Guide, Release 2.1(0) 10-4 Deployment Issues C H A P T E R 11 Backwards Compatibility Considerations Listener and Grid If you are upgrading from an existing Listener/Grid solution, there are some compatibility issues that you should be aware of. The new Listener can be used with old Grid clients provided the following criteria are met: • The Listener's Exclude Node feature is disabled (Enabling the Exclude Node Feature, page 9-1) • Update every Grid client's GridPipe.dll with the new GridPipe.dll found in the Listener executable directory (typically ICR\bin). If this dll file is not updated, the Grid client fails to connect and an Alarm is raised in the AALSTN customer node. When upgrading from an existing Listener/Grid solution, you may want to preserve compatibility during an initial acceptance period. Once you enable the Exclude Node feature, you can no longer use the Grid clients to monitor Alarm data. The Grid client can connect to Listener, but receives no data other than Listener heartbeats. An Alarm is also raised in the AALSTN customer node. Version 2 of the LGMapper and LGArchiver are designed to work with a 4.6 Listener server. This version of Listener now supports multiple products. If you choose not to upgrade Listener to a 4.6 Listener, you can still use the Version 2 LGMapper and LGArchiver by setting a registry key. This key is used by LGMapper and LGArchiver to request an older feed from Listener that does not support multiple products. In this case, only the ICM product can be supported. To use a 4.5 Listener with the LGMapper, create the following registry value: Key: HKEY_LOCAL_MACHINE\SOFTWARE\Cisco Systems\LGMapper2 DWORD Value: ListenerClientVersion = 4 Similarly, to use a 4.5 Listener with the LGArchiver, create the following registry value: Key: HKEY_LOCAL_MACHINE\SOFTWARE\Cisco Systems\LGArchiver DWORD Value: ListenerClientVersion = 4 If you fail to set the registry keys and inadvertently connect to a 4.5 Listener, the initialization will abort. An error message (with an error code of 0x8007000b) is then written to the log file. The error text: An attempt was made to load a program with an incorrect format. may be seen for an AlarmTracker Client. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 11-1 Chapter 11 Backwards Compatibility Considerations LGMapper Server LGMapper Server Version 2 of LGMapper has changed considerably from the initial Version 1 release. The biggest change is the migration to SQL Server from Microsoft Access as the database repository for the configuration information and Alarms data. Because of this major design change, all Server components have been renamed and a '2' has been added to each COM object and interface to distinguish it from its Version 1 counterpart. If you are running the Version 1 LGMapper Server, you must install the Version 2.1 LGMapper Server on a different machine. Note If you are upgrading the LGMapper, ensure no LGMapper Server is currently running. AlarmTracker Clients The Version 2 AlarmTracker Client is specifically designed to connect to the Version 2 LGMapper Server. It is not backward compatible with the Version 1 AlarmTracker client. Therefore, you cannot use the Version 2 AlarmTracker client to connect to a Version 1 LGMapper Server. Since the name of the AlarmTracker executable file is still AlarmTracker.exe, to maintain both a Version 1 installation and a Version 2 installation on the same machine, ensure Version 2 AlarmTracker Client is installed in a different directory than the Version 1 AlarmTracker Client. That way, both versions can run side by side to perform validation checks. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 11-2 C H A P T E R 12 Implementing the IWantHelp Interface Overview The AlarmTracker Client software contains support for an external COM interface called IWantHelp. If implemented, the IWantHelp interface provides the customer with a hook into building a custom help and guidance system, and integrating it with AlarmTracker. If the component is properly registered, it is accessed from the Event Details dialog as a custom button. When clicked, the AlarmTracker code calls a method in IWantHelp which presents custom help information based on the context of the displayed event. A standard implementation is building troubleshooting wizards for specific Alarms via a web-based solution. When the custom IWantHelp button is clicked, the IWantHelp::OnHelp method is called along with the AlarmID, Class, MsgID, and MsgText fields of the event. This information is then used to present a troubleshooting wizard on how to fix a particular problem. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 12-1 Chapter 12 Implementing the IWantHelp Interface How to Implement IWantHelp How to Implement IWantHelp Interface Definition The IWantHelp interface is defined by the following IDL: // WantHelp.idl : IDL source for IWantHelp.tlb // // This file will be processed by the MIDL tool to // produce the type library (IWantHelp.tlb) import "oaidl.idl"; [ uuid(BAA31F1A-1E9F-4876-A99F-E9AF2FEEBBA5), version(1.0), helpstring("IWantHelp 1.0 Type Library") ] library IWantHelpLib { importlib("stdole2.tlb"); [ object, uuid(54D8196C-CDF4-406A-9E65-40B97336137D), dual, helpstring("IWantHelp Interface"), pointer_default(unique) ] interface IWantHelp : IDispatch { [id(1), helpstring("Notification that an Active Connection has been established with an LGMapper Server")] HRESULT ActiveConnectionEstablished([in] BSTR strHostName, [in] BSTR strCatalog); [id(2), helpstring("Notification that an Active Connection with an LGMapper Server has been terminated")] HRESULT ActiveConnectionTerminated(); [id(3), helpstring("Help has been requested by user")] HRESULT OnHelp([in] long nAlarmID, [in] long nClass, [in] long nMsgID, [in] BSTR strMsgText); [propget, id(4), helpstring("Button text in AlarmTracker Event Detail dialog")] HRESULT ButtonText([out, retval] BSTR *pVal); [propput, id(4), helpstring("Button text in AlarmTracker Event Detail dialog")] HRESULT ButtonText([in] BSTR newVal); }; }; This IDL file is named IWantHelp.idl and is included in the bin folder of the LGMapper installation directory along with its corresponding IWantHelp.tlb file. The following properties and methods are defined. Property: ButtonText Type: BSTR Cisco Remote Monitoring Administration Guide, Release 2.1(0) 12-2 Chapter 12 Implementing the IWantHelp Interface How to Implement IWantHelp Description: Button text displayed in the AlarmTracker Event detail dialog. Property: ButtonText Type: BSTR Description: Button text displayed in the AlarmTracker Event detail dialog. Method: ActiveConnectionEstablished Args: [in] BSTR strHostName - Name of the machine where the SQL Server Alarms database is running. [in] BSTR strCatalog - Name of the SQL Server Alarms database. Description: Notification that an Active Connection has been established with an LGMapper Server. The information in this method can be used if you want to create a connection to the Alarms database that the AlarmTracker is connected to. Method: ActiveConnectionTerminated Args: None Description: Notification that an Active Connection with an LGMapper Server has been terminated. Method: OnHelp Args: [in] long nAlarmID - AlarmID in the Alarms database of the Event being viewed in the Event Details dialog. [in] long nClass - Class of the Event being viewed in the Event Details dialog. [in] long nMsgID - EMS Message ID of the Event being viewed in the Event Details dialog. [in] BSTR strMsgText - Message text of the Event being viewed in the Event Details dialog. Description: Help has been requested by the user. You can implement this method to use the arguments to present custom context-dependent help information. Implementing IWantHelp Implement the IWantHelp interface using any programming language that supports COM (e.g., C++, Visual Basic, Java). The interface must be implemented as an in-proc COM server. Once built, the DLL must be copied to all AlarmTracker client machines and registered. More details on this can be found in Installation and Setup. Sample Implementation A sample implementation of the IWantHelp interface is included in the HelpSample directory of the LGMapper installation directory. This is an C++ ATL implementation which simply displays the Microsoft home page in a browser window in a separate process. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 12-3 Chapter 12 Implementing the IWantHelp Interface How to Implement IWantHelp Installation and Setup Once you implement your custom implementation, it can be deployed to AlarmTracker Client systems. Three things need to be done in order for the implementation to be integrated with AlarmTracker: • The DLL must be copied to each AlarmTracker Client machine. The location is not important since it is a COM DLL and the registry contains the right information on how to load it. • The DLL must be properly registered on each AlarmTracker Client machine. This is done by running RegSvr32 with the full path name of the DLL as an argument. • You must add the following registry key to each AlarmTracker Client's machine: HKEY_LOCAL_MACHINE\SOFTWARE\CiscoSystems\AlarmTracker\ProgIDs and add the string (REG_SZ) value IWantHelp. The value of IWantHelp must be the ProgID of the IWantHelp implementation, e.g., “HelpSample5.WantHelp”. When AlarmTracker starts, it looks for this registry value, and, if it exists, the DLL is loaded and used. Cisco Remote Monitoring Administration Guide, Release 2.1(0) 12-4 A P P E N D I X A Alarms Database Schema Introduction Chapter 1, “Remote Monitoring Suite Overview”, presented an overview of the main tables in the Alarms Database. This appendix provides the database map (Figure A-1) and describes all of the tables in the database in greater detail. Table Classes There are four classes of tables maintained in the database: 1. Configuration Tables • These tables store information related to products, Rule mapping and nodes. • Tables in this class include the following: – VersionInfo – ProductInfo – Objects – OIDNodes – Attributes – OIDNodeAttributes – HyperlinkInfo – NodeTypes – Rules – Customers – InstanceNodes 2. Alarms Tables • These tables store information related to the Listener Event stream processed by the LGMapper and LGArchiver Servers. • These tables include: – Uptime – Alarms Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-1 Appendix A Alarms Database Schema Introduction – Events – Simples – ObjectState 3. Summary Statistics Tables • These tables store summary information collected during continuous monitoring of Listener Events. • The information in these tables represent totals or averages of important metrics related to Alarms and Events. • These tables include: – AlarmsSummaryHour – AlarmsSummaryDay 4. Filter Tables • These tables store information related to server-side filtering options. • These tables include: – Filters – FiltersProductSpecific Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-2 Appendix A Alarms Database Schema Introduction Alarms Database Schema Map AlarmsSummaryDay PK CustomerID PK,FK1 ProductID PK Time AlarmsSummaryHour PK,FK1 CustomerID PK,FK2 ProductID Time VersionInfo PK VersionNumber Uptime MasterDB MasterDBFile ModifiedTime ReplicationTime ReindexTime AdminLockCount Samples NewAlarmCount ClosedAlarmCount UnassignedAlarmsAvg AssignedAlarmsAvg ExcludedAlarmsAvg NewAppErrCount ClosedAppErrCount UnassignedAppErrsAvg AssignedAppErrsAvg ExcludedAppErrsAvg AlarmEventCount AppErrCount SimpleCount PK NewAlarmCount ClosedAlarmCount UnassignedAlarms AssignedAlarms ExcludedAlarms NewAppErrCount ClosedAppErrCount UnassignedAppErrs AssignedAppErrs ExcludedAppErrs AlarmEventCount AppErrCount SimpleCount Time State ObjectState PK ObjectName PK,FK1 CustomerID PK,FK2 ProductID AlarmID HyperlinkInfo Objects PK,FK1 ProductID PK MsgID I1 PK,I1 CustomerName Handle CreationTime OIDNodes Rules InstanceNodes NodeID PK ParentID Name ProductID NodeType StateRollup ChildNotifications HyperlinkNodeID AttributeCount Filter ModifiedTime ParentHandle IIDAddress FK1,I1 CustomerID FK2 ProductID NodeName HyperlinkHandle FK3,I2 NodeID ModifiedTime FK3 I1 Filters Alarms PK CustomerID ProductInfo PK RuleID ProductID Class ModifiedTime FK1,I2 OIDNodeID InstanceName FK2,I4 AttributeID Comment FK3 MsgID SystemType Side SystemName ProcName EMSParam1 EMSParam2 EMSParam3 EMSParam4 EMSParam5 PK,I1 InstanceName FormatString ModifiedTime ModifiedTime State Class Timeout Args AlmArgs TrapNo TrapSev Mnemonic PK,I1 PK,I3 NodeID Customers Handle ProductID ProductName ModifiedTime ObjectsParseTime BeeperParseTime Description Attributes PK,I1 OIDNodeAttributes PK,FK1,I2 NodeID PK,FK2,I1 AttributeID ModifiedTime AttributeID Name DataType Rollup DefaultValue ModifiedTime RealAlarm ObjectName OwnerHandle IIDAddress FK1,I2 CustomerID FK4,FK5 ProductID Excluded Active ApplicationError State Assigned AssignedBy AssignedTo TicketID I1 CreationTime ReceivedTime CurrentTime LastEventID EventRepeatCount EventCount FK3 AttributeID AttributeName CategoryName Class DMPID FK5 MsgID ProcessName SystemName Side SingleState TrapSeverity SystemType FK2,I3 Simples PK AlarmID I2 FK1 I2 FK2 ObjectName OwnerHandle CustomerID ProductID Excluded State CreationTime ReceivedTime CategoryName DMPID MsgID ProcessName SystemName Side TrapSeverity SystemType MsgText FiltersProductSpecific I1 PK PK FilterField Criterion AlarmID PK PK PK ProductID FilterField Criterion ModifiedTime ModifiedTime Events PK EventID PK,FK1,I1 AlarmID MsgID MsgType State Assigned Time ReceivedTime MsgText OutcomeText AssignedBy 63918 Figure A-1 Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-3 Appendix A Alarms Database Schema Detailed Schema Description A Note About Time There are many time fields in tables throughout the database. All times recorded in the database are stored relative to the time zone of the LGMapper/LGArchiver Server machine. Some times represent the time the Event actually occurred at the customer site, other times represent the time an Event is received at the LGMapper, and other times represent the time that an AlarmTracker user assigned an Alarm. Note Customers may be located all around the world and when an Event is sent to Listener its Event time is adjusted to be in the time zone of the Listener. When this Event is sent on to LGMapper, the time may be further adjusted if the LGMapper time zone is different than that of the Listener. Detailed Schema Description VersionInfo Table Description The VersionInfo table stores information related to the schema version and relevant times of updates. This table is updated by the LGCnfg tool and by the LGMapper/LGArchiver Servers. This table contains only a single row of information. Note Column_name Type Computed Length Prec Scale Nullable Trim Trailing FixedLen Blanks NullInSource VersionNumber (PK) int no 4 no (n/a) (n/a) MasterDB bit no 1 no (n/a) (n/a) MasterDBFile varchar no 255 yes yes no ModifiedTime datetime no 8 no (n/a) (n/a) ReplicationTime datetime no 8 yes (n/a) (n/a) ReindexTime datetime no 8 yes (n/a) (n/a) 0 (PK) is used throughout this document to indicate the Primary Key of the table. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-4 10 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description VersionNumber Alarms database schema version number. MasterDB Set to 1 if the database is a Master Database, 0 if it is a Slave Database. Database replication is not currently implemented in Version 2 of the product. MasterDBFile If MasterDB is set to 0, this field contains the location of the Master Database. Database replication is not currently implemented in Version 2 of the product. ModifiedTime The time the configuration information in the database was last changed. Changes made using LGCnfg to any of the Configuration Tables except for Customers and InstanceNodes (refer to the Introduction) update this field. ReplicationTime The time the database was last replicated. Database replication is not currently implemented in Version 2 of the product. ReindexTime The time of the last full re index using DBCC DBREINDEX. AdminLocks The count of Admin locks on the Alarms Database. If an instance of LGCnfg2 has the database open with read/write access, it will increment this value. When it exits, it will decrement this value. When LGMapper or LGArchiver starts up, it will check this field. If it is non-zero, it will fail and exit. Note If LGMapper /LGArchiver won’t start and CRulesMgr::InitDatabase AdminLocks=1. Cannot initialize appears in the LGMapper log file, refer to Resetting Admin Locks for LGMapper Version 2.0.x (Document ID: 22153) http://www.cisco.com/warp/public/78/LGMapper_locks.html. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-5 Appendix A Alarms Database Schema Detailed Schema Description ProductInfo Table Description This table contains general information about Products supported by the Rule mapping process. Column_name Type Computed Length Prec Scale Nullable Trim Trailing FixedLen Blanks NullInSource ProductID (PK) int no 4 no (n/a) (n/a) ProductName varchar no 64 no yes no ModifiedTime datetime no 8 no (n/a) (n/a) ObjectsParseTime datetime no 8 yes (n/a) (n/a) BeeperParseTime datetime no 8 yes (n/a) (n/a) Description varchar no 256 yes yes no Column_name Column Description ProductID Product ID. This ProductID field is used as a foreign key in many other tables. ProductName Product name. ModifiedTime Time this record was last updated. ObjectsParseTime Last time the LGCnfg tool updated the Objects table with a new object.flt file. BeeperParseTime Last time the LGCnfg tool updated the Objects table with a new beeper.v4 file. Description General description of the product. 10 0 Fields Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-6 Appendix A Alarms Database Schema Detailed Schema Description Objects Table Description The Objects table stores information about the object.flt and beeper.flt files used at the customer site and at the Listener site to determine which EMS Events are phoned home to Listener and processed by Listener. Information in this table represents the subset of the EMS messages that the Logger tracks. Information in this table represents the basis for the Rule mapping process. The contents of this table can be viewed in the Objects View of the LGCnfg tool. Column_name Type Computed Length Length Scale Nullable Trim Trailing FixedLen Blanks NullInSource ProductID (PK) int no 4 10 0 no (n/a) (n/a) MsgID (PK) int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 yes (n/a) (n/a) State int no 4 10 0 yes (n/a) (n/a) Class int no 4 10 0 yes (n/a) (n/a) Timeout int no 4 10 0 yes (n/a) (n/a) Args int no 4 10 0 yes (n/a) (n/a) AlmArgs int no 4 10 0 yes (n/a) (n/a) TrapNo int no 4 10 0 yes (n/a) (n/a) TrapSev int no 4 10 0 yes (n/a) (n/a) Mnemonic varchar no 128 yes yes no Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-7 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description ProductID Product ID. MsgID EMS Message ID. ModifiedTime Time this record was last updated. State A decimal value (0..9) indicating the internal state to use when tracking the object. A value of 9 indicates the message is a stateless object/alarm.A message with a state value of 9 is sent as an alarm. A value of 0 indicates it is a “clear” (reset) for the object. Other events signal a “raise” for the object. Class A name which allows grouping of EMS message IDs into logical objects. There is one Class ID for each kind of object tracked. Timeout Currently unused by the CSFS process (processes that receive the alarm feed such as a process to generate pager notices, would use the time-out value). Args An argument string (max of 16 characters) composed of single hex values(0..F) indicating the arguments from the EMS event that are used internally by the object tracking process (CSFS) to discriminate the event into a unique object. (E.G. 862) Currently the following values are used: 9 DMP System ID 8 SystemName 7 ProcessName 6 Side 5..1 EMS Arguments AlmArgs An argument string (like Object Argument String above except that 9..6 cannot be used!!) that is passed to clients receiving a feed from the CSFS process to use for their own internal processing. TrapNo A number which (also defined in the MIB definition) indicates the trap number to use when forwarding the alarm. This is passed to clients receiving a feed from the CSFS process when an alarm event is detected. TrapSev A decimal value (0..32767) indicating the severity of the alarm. This is passed onto CSFS clients when an alarm event is detected. Mnemonic Description of the event. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-8 Appendix A Alarms Database Schema Detailed Schema Description OIDNodes Table Description The OIDNodes table stores information about a generalized hierarchy of objects. This table defines the basic template object structure for the Rule mapping process to use to create Instance Nodes. The parent-child relationships are represented in the table by having each record contain a ParentID field which contains the NodeID of the parent node. A graphical representation of this table as a tree view can be seen in the OID Nodes Tree View of the LGCnfg tool. Column_name Type Trim Trailing FixedLen Computed Length Prec Scale Nullable Blanks NullInSource NodeID (PK) int no 4 10 0 no (n/a) (n/a) ParentID int no 4 10 0 no (n/a) (n/a) Name varchar no 64 no yes no ProductID int no 4 10 0 no (n/a) (n/a) NodeType int no 4 10 0 no (n/a) (n/a) StateRollup bit no 1 no (n/a) (n/a) ChildNotifications int no 4 10 0 no (n/a) (n/a) HyperlinkNodeID int no 4 10 0 no (n/a) (n/a) AttributeCount int no 4 10 0 no (n/a) (n/a) Filter int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-9 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description NodeID Primary key and unique node identifier. This is an identity column. ParentID NodeID of the parent node. The root node has a ParentID of zero. Name Node name. ProductID Product ID. NodeType Node Type. StateRollup Defines how the State of this node rolls up to its parent. The possible values are: ChildNotifications • 0 - The State does not roll up to its parent. • 1 - The State rolls up to its parent. Defines how State roll up notifications from child nodes are handled. The possible values are: • 0 - The node ignores State roll up notifications from its children. • 1 - The node processes State roll ups in a functional way. This means that the overall child roll up contribution is computed by ANDing the individual child node States. If all nodes are up, the roll up contribution is up If all nodes are down, the roll up contribution is down. If at least one of the nodes is down, but not all, the roll up contribution is partial impaired. • 2 - The processes State roll ups in a critical path way. This means that the overall child roll up contribution is computed by ORing the individual child node States. Thus, the roll up contribution represents the highest State value of all child nodes that roll up their States. HyperlinkNodeID If the node is a Hyperlink node, this field represents the NodeID of the real node that it refers to. AttributeCount Count of the number of Attributes associated with the Node. All nodes must have a State Attribute so this field will have a minimum value of 1. Filter Filter value indicating whether a server-side filter is set for it. A value of 1 means that the OID Node is being filtered. A value of 2 means that the OID Node is being filtered as a result of one of its parent nodes being filtered. A mask value of 0x10 means that the OID Node is filtered as a result of a ProductID filter being set. ModifiedTime Time this record was last updated. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-10 Appendix A Alarms Database Schema Detailed Schema Description Attributes Table Description The Attributes table contains a mapping of an AttirbuteID value to an Attribute name. It also contains information about the type of Attribute. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks AttributeID (PK) int no 4 10 0 no (n/a) (n/a) Name varchar no 64 no yes no DataType smallint no 2 5 0 no (n/a) (n/a) Rollup int no 4 10 0 no (n/a) (n/a) DefaultValue varchar no 64 yes yes no ModifiedTime datetime no 8 no (n/a) (n/a) FixedLen NullInSource Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-11 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description AttributeID Primary key and identity column containing the AttributeID. Name Attribute name. DataType VARTYPE field. See the MicroSoft Visual C++ documentation for the VARIANT data type for possible values. Rollup Indicates how the value of the Attribute contributes to the node's State value. The possible values are: • 0 - The Attribute value does not contribute to the State value. • 1 - The Attribute value is combined with other Attribute values in a functional way. This means that the overall Attribute contribution is computed by ANDing the individual Attribute values. • 2 - The Attribute value is combined with other Attribute values in a critical path way. This means that the overall Attributes contribution is computed by ORing the individual Attribute values. Thus, the roll up contribution represents the highest Attribute value of all Attributes that roll up their values. DefaultValue Default value for the Attribute. ModifiedTime Time this record was last updated. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-12 Appendix A Alarms Database Schema Detailed Schema Description OIDNodeAttributes Table Description The OIDNodeAttributes table contains the mappings of OIDNodes and the Attributes they contain. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks NodeID (PK) int no 4 10 0 no (n/a) (n/a) AttributeID (PK) int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) Column_name Column Description NodeID NodeID in the OIDNodes table. AttributeID AttributeID in the Attributes table. ModifiedTime Time this record was last updated. FixedLen NullInSource Fields Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-13 Appendix A Alarms Database Schema Detailed Schema Description HyperlinkInfo Table Description The HyperlinkInfo table contains information about Hyperlink nodes including information on how to determine the resulting Instance Node. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks NodeID (PK) int no 4 10 0 no (n/a) (n/a) InstanceName varchar no 255 no yes no FormatString varchar no 255 yes yes no ModifiedTime datetime no 8 no (n/a) (n/a) Column_name Column Description NodeID NodeID in the OIDNodes table. InstanceName A specification of the how the Instance Name will be formed. FormatString If the Instance Name includes parameters, this field includes C-style formatting information. ModifiedTime Time this record was last updated. FixedLen NullInSource Fields Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-14 Appendix A Alarms Database Schema Detailed Schema Description Rules Table Description The Rules table stores the information that maps a Listener message to a specific Attribute and Instance Node based on the message content. Each Rule is associated with a particular OID Node in the OIDNodes table. The set of Rules defined for each OID Node can be seen visually in the Rules View of the LGCnfg tool. Each time a different OID Node is selected, the set of Rules for that OID Node is displayed. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks RuleID (PK) int no 4 10 0 no (n/a) (n/a) ProductID int no 4 10 0 no (n/a) (n/a) Class int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) OIDNodeID int no 4 no (n/a) (n/a) InstanceName varchar no 255 no yes no AttributeID int no 4 no (n/a) (n/a) Comment varchar no 255 yes yes no MsgID varchar no 255 yes yes no SystemType varchar no 255 yes yes no Side varchar no 255 yes yes no SystemName varchar no 255 yes yes no ProcName varchar no 255 yes yes no EMSParam1 varchar no 255 yes yes no EMSParam2 varchar no 255 yes yes no EMSParam3 varchar no 255 yes yes no EMSParam4 varchar no 255 yes yes no EMSParam5 varchar no 255 yes yes no 10 10 0 0 FixedLen NullInSource Fields Column_name Column Description RuleID Primary key and identity column that identifies the Rule. ProductID Product ID. Class EMS message Class. ModifiedTime Time this record was last updated. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-15 Appendix A Alarms Database Schema Detailed Schema Description Column_name Column Description OIDNodeID NodeID in the OIDNodes table associated with this Rule. InstanceName Text string that specifies how the Instance Node name is to be determined from the Listener message content. AttributeID AttributeID from the Attributes table associated with this Rule. Comment Comment field. MsgID EMS Message ID can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression, e.g., = 0xa102c109. SystemType System Type can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression, e.g., = 5'. Side Duplexed side can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression, e.g., ='A'. SystemName System Name can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression, e.g., Like ‘%A’. ProcName Process name that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression, e.g., Like '%Logger%’. EMSParam1 EMS message parameter 1 that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression. EMSParam2 EMS message parameter 2 that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression. EMSParam3 EMS message parameter 3 that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression. EMSParam4 EMS message parameter 4 that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression. EMSParam5 EMS message parameter 5 that can be used as a criteria to select this Rule for a given Listener message. This field can be NULL or empty if not needed as a criterion. If it is present, it must be a valid SQL expression. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-16 Appendix A Alarms Database Schema Detailed Schema Description Customers Table Description The Customers table stores specific Customer instance names. Initially, this table is empty and is populated as the LGMapper/LGArchiver processes Listener messages and encounters new Customers. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks CustomerID (PK) int no 4 10 0 no (n/a) (n/a) CustomerName varchar no 50 no yes no Handle int no 4 no (n/a) (n/a) CreationTime datetime no 8 no (n/a) (n/a) Column_name Column Description CustomerID Primary key. Customer ID. CustomerName Customer name. Handle Unique 32-bit Handle associated with the Customer. The Customer Handle is determined from the CustomerID via the following C++ expression: Handle = 0x40000000 | (CustomerID << 14) CreationTime Time this record was created. 10 0 FixedLen NullInSource Fields InstanceNodes Table Description The InstanceNodes table stores the entire known hierarchy of Instance Nodes created by the LGMapper/LGArchiver at run time. These nodes are created by mapping Listener Events via the Rules and OIDNodes information to specific Instance Nodes. The parent-child relationships are represented in the table by having each record contain a ParentHandle field which contains the Handle of the parent node. A graphical representation of this table as a tree view can be seen in the Instance Nodes Tree View of the LGCnfg tool. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-17 Appendix A Alarms Database Schema Detailed Schema Description Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks Handle (PK) int no 4 10 0 no (n/a) (n/a) ParentHandle int no 4 10 0 no (n/a) (n/a) IIDAddress varchar no 128 no yes no CustomerID int no 4 10 0 no (n/a) (n/a) ProductID int no 4 10 0 no (n/a) (n/a) NodeName varchar no 64 no yes no HyperlinkHandle int no 4 10 0 no (n/a) (n/a) NodeID int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-18 FixedLen NullInSource Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description Handle Primary key, 32-bit Handle that uniquely defines this node. Handle bits are assigned in a particular manner as described in How Handles Are Used, page A-35. ParentHandle The Handle of the parent node. IIDAddress An Instance ID Address string that defines the instance node's place in the object hierarchy. This IIDAddress is in the form 1.2.4.13 and is unique for all Instance Nodes. The Root node has IIDAddress 1. First-level child nodes have IIDAddresses 1.1, 1.2, etc. and so on. CustomerID Customer ID. ProductID Product ID. NodeName Node name. HyperlinkHandle For Hyperlink nodes, this value is the Handle of the real node to which it refers. For real nodes, this value is zero. NodeID The NodeID in the [OIDNodes] table to which this node refers to. ModifiedTime Time this record was last updated. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-19 Appendix A Alarms Database Schema Detailed Schema Description Uptime Table Description The Uptime table indicates the times during which the LGMapper/LGArchiver Server is processing Listener data. The table consists of pairings of Time and State values. Prec Scale Nullable Trim Trailing Blanks FixedLen NullInSource Column_name Type Computed Length Time (PK) datetime no 8 no (n/a) (n/a) State bit no 1 no (n/a) (n/a) Column_name Column Description Time Time the LGMapper/LGArchiver started or stopped processing Listener messages. State 1 - indicates the LGMapper/LGArchiver started processing data. Fields 0 - indicates the LGMapper/LGArchiver stopped processing data. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-20 Appendix A Alarms Database Schema Detailed Schema Description Alarms Table Description The Alarms table is the primary table for storing Alarm object information. A record in the Alarms table represents an Alarm object. Records in the associated Events table make up the Events or state transitions for the Alarm object. Column_name Type Computed Length Prec Scale Nullable Trim Trailing FixedLen Blanks NullInSource AlarmID (PK) int no 4 no (n/a) (n/a) RealAlarm bit no 1 no (n/a) (n/a) ObjectName varchar no 255 no yes no OwnerHandle int no 4 no (n/a) (n/a) IIDAddress varchar no 128 no yes no CustomerID int no 4 10 0 no (n/a) (n/a) ProductID int no 4 10 0 no (n/a) (n/a) Excluded bit no 1 no (n/a) (n/a) Active bit no 1 no (n/a) (n/a) ApplicationError bit no 1 no (n/a) (n/a) State int no 4 10 0 no (n/a) (n/a) Assigned int no 4 10 0 no (n/a) (n/a) AssignedBy varchar no 64 yes yes no AssignedTo varchar no 64 yes yes no TicketID varchar no 32 yes yes no CreationTime datetime no 8 no (n/a) (n/a) ReceivedTime datetime no 8 no (n/a) (n/a) CurrentTime datetime no 8 no (n/a) (n/a) LastEventID int no 4 10 0 no (n/a) (n/a) EventRepeatCount int no 4 10 0 no (n/a) (n/a) EventCount int no 4 10 0 no (n/a) (n/a) AttributeID int no 4 10 0 no (n/a) (n/a) AttributeName varchar no 50 yes yes no CategoryName varchar no 32 yes yes no Class int no 4 10 0 no (n/a) (n/a) DMPID int no 4 10 0 no (n/a) (n/a) MsgID int no 4 10 0 no (n/a) (n/a) ProcessName varchar no 16 yes yes no 10 10 0 0 Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-21 Appendix A Alarms Database Schema Detailed Schema Description Column_name Type Computed Length Prec Scale Nullable Trim Trailing FixedLen Blanks NullInSource SystemName varchar no 32 yes yes no Side char no 1 yes yes yes SingleState bit no 1 no (n/a) (n/a) TrapSeverity int no 4 10 0 no (n/a) (n/a) SystemType int no 4 10 0 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-22 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description AlarmID Primary key, value that uniquely identifies the Alarm object. RealAlarm A flag indicating whether the Alarm object is a “real” Alarm, meaning it was created as a result of a Listener down Event. This table also stores Listener Base Record information that merely indicate that an object is in an up state. These are not considered real Alarms and, thus, have a value of 0 for this field. ObjectName The Listener ObjectName associated with the Alarm. OwnerHandle The Handle in the InstanceNodes table which identifies the Instance Node associated with this Alarm. IIDAddress IIDAddress in the InstanceNodes table corresponding to the OwnerHandle of the Instance Node associated with this Alarm. CustomerID Customer ID. ProductID Product ID. Excluded 1 - Alarm is Excluded. 0 - Alarm is not Excluded. Active 1- Alarm is Active. 0 - Alarm is Inactive. An Active Alarm is an open Alarm. It is an Alarm that is not in its terminal state. See Alarm State Transition Diagram for a State transition diagram for an Alarm object. ApplicationError 1- Alarm is an Application Error. 0 - Alarm is not an Application Error. State State value of the Alarm. The range of State values are shown in Alarm State Transition Diagram. Assigned Assignment Status value of the Alarm. The range of Assigned values are shown in Alarm State Transition Diagram. AssignedBy The user name of the person who assigned, cleared, excluded, deleted an Alarm. AssignedTo Text that a user can type in to indicate a person or group responsible for an Alarm. TicketID Text field that can be used to associate an Alarm with a trouble ticket reporting system. CreationTime Time the Alarm event condition was raised. ReceivedTime Time the database Alarm object was created. CurrentTime Time of the last Event record for this Alarm object. LastEventID EventID from the Events table of the last Event for this Alarm object. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-23 Appendix A Alarms Database Schema Detailed Schema Description Column_name Column Description EventRepeatCount The number of times a duplicate Event was received for this Alarm object. The LGMapper/LGArchiver implement a form of Event suppression for Alarm objects to control the number of Events stored for an Alarm object. When an Alarm is in a particular state as shown in Alarm State Transition Diagram, if repeated Events that do not involve a state transition are received, they are inserted only up to a particular threshold value. The threshold value (default value = 5) is set by the LGMapperCnfg or LGArchiverCnfg programs. Once the number of repeat Events exceed this threshold, they begin to be overwritten to cap the amount of data stored for any particular Alarm. This field stores the Event repeat count for the current Alarm state. EventCount The total number of Events received for this Alarm. AttributeID The AttributeID from the Attributes table associated with this Alarm. AttributeName The AttributeName from the Attributes table. CategoryName Category Name from the EMS message. Class Class from the EMS message. DMPID DMP ID from the EMS message. MsgID EMS Message ID. ProcessName Name of the process that generated the Alarm/Event. SystemName System name of the machine that generated the Alarm/Event. Side Duplexed side (typically 'A' or 'B') that generated the Alarm/Event. SingleState 1 - Alarm is a single-state object. 0 - Alarm is not a single-state object. Some Alarm objects are defined as single-state Alarms. This means that a Clear Event (see Alarm State Transition Diagram) will never be received for it. An AlarmTracker user must clear this Alarm manually to close it. TrapSeverity SNMP Trap Severity from the EMS message. SystemType System Type from the EMS message. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-24 Appendix A Alarms Database Schema Detailed Schema Description Events Table Description The Events table is joined to the Alarms by the AlarmID field and represents all Events received for a particular Alarm object. This table represents all the state transitions of an Alarm object as described in Alarm State Transition Diagram. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks EventID (PK) int no 4 10 0 no (n/a) (n/a) AlarmID (PK) int no 4 10 0 no (n/a) (n/a) MsgID int no 4 10 0 no (n/a) (n/a) MsgType int no 4 10 0 no (n/a) (n/a) State int no 4 10 0 yes (n/a) (n/a) Assigned int no 4 10 0 yes (n/a) (n/a) Time datetime no 8 no (n/a) (n/a) ReceivedTime datetime no 8 no (n/a) (n/a) MsgText varchar no 255 yes yes no OutcomeText varchar no 255 yes yes no AssignedBy varchar no 64 yes yes no FixedLen NullInSource Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-25 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_ name EventID Column Description Sequential EventID for an Alarm object. The initial raise Event for the Alarm will always be EventID = 1. Note that due to Event repeat count suppression and total Event count suppression, the sequence of Events will not always be consecutive, but they will always be in order. AlarmID AlarmID from the Alarms table. MsgID EMS Message ID for the Event. MsgType Message type. The following message types are defined in Mnemonic -- Value -- Description order: mtMessage -- 1 -- Customer-generated Listener message mtHeartbeat -- 2-- Listener Heartbeat message. (Does not appear in Events table). mtLastBaseRecord -- 3 -- Listener Last Base Record message. (Does not appear in Events table). mtWorkingOn -- 4 -- User action message. Indicates a user has assigned or unassigned an Alarm. mtExclude -- 5 -- User action message. Indicates a user has excluded or unexcluded an Alarm. mtExcludeNode -- 6 -- User action message. Indicates a user has excluded or unexcluded a Node. mtClear -- 7 -- User action message. Indicates that a user has cleared an Alarm. mtDelete -- 8 -- User action message. Indicates that a user has deleted an object. State State value of the Event. The range of State values are shown in Alarm State Transition Diagram. Assigned Assignment Status value of the Event. The range of Assigned values are shown in Alarm State Transition Diagram. Time Event time. For a customer-generated Event, this is the time of the Event at the Customer site adjusted to be in the time zone of the LGMapper/LGArchiver. For an AlarmTracker user Event, this is the time the user Event was generated. ReceivedT The time the Event was received at the LGMapper/LGArchiver. ime MsgText Message text. OutcomeT ext Notes entered by AlarmTracker user. Assigned By For a user action message. Indicates the user name of the person who initiated the action. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-26 Appendix A Alarms Database Schema Detailed Schema Description Simples Table Description The Simples table stores the set of Simple Events sent by Listener. Simple Events are stateless objects and are considered to be less important than Alarm objects so they are maintained in a separate table. Note Listener purges Simple Events from its in-memory objects and the LGMapper Server also purges Simple Events to mirror Listener's actions. LGArchiver, on the other hand, does not purge Simple Events based on Listener commands. Instead, Simple Events are purged from the LGArchiver database based on the amount of time history is saved in the database. This parameter is configurable from the LGArchiverCnfg tool. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks AlarmID (PK) int no 4 10 0 no (n/a) (n/a) ObjectName varchar no 255 no yes no OwnerHandle int no 4 10 0 no (n/a) (n/a) CustomerID int no 4 10 0 no (n/a) (n/a) ProductID int no 4 10 0 no (n/a) (n/a) Excluded bit no 1 no (n/a) (n/a) State int no 4 no (n/a) (n/a) CreationTime datetime no 8 no (n/a) (n/a) ReceivedTime datetime no 8 no (n/a) (n/a) CategoryName varchar no 32 no yes no DMPID int no 4 10 0 no (n/a) (n/a) MsgID int no 4 10 0 no (n/a) (n/a) ProcessName varchar no 16 yes yes no SystemName varchar no 32 yes yes no Side char no 1 yes yes yes TrapSeverity int no 4 10 0 no (n/a) (n/a) SystemType int no 4 10 0 no (n/a) (n/a) MsgText varchar no 255 no yes no 10 0 FixedLen NullInSource Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-27 Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description AlarmID Primary key, value that uniquely identifies the Alarm object. ObjectName The Listener ObjectName associated with the Alarm. OwnerHandle The Handle in the InstanceNodes table which identifies the Instance Node associated with this Alarm. CustomerID Customer ID. ProductID Product ID. Excluded 1 - Alarm is Excluded 0 - Alarm is not Excluded. State State value of the Alarm. The range of State values are shown in Alarm State Transition Diagram. CreationTime Time the Alarm event condition was raised. ReceivedTime Time the database Alarm object was created. CategoryName Category Name from the EMS message. Class Class from the EMS message. DMPID DMP ID from the EMS message. MsgID EMS Message ID. ProcessName Name of the process that generated the Alarm/Event. SystemName System name of the machine that generated the Alarm/Event. Side Duplexed side (typically 'A' or 'B') that generated the Alarm/Event. TrapSeverity SNMP Trap Severity from the EMS message. SystemType System Type from the EMS message. MsgText Message text. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-28 Appendix A Alarms Database Schema Detailed Schema Description ObjectState Table Description The ObjectState table is used by LGMapper only and maintains a map of Listener ObjectName to the particular Alarm object (AlarmID) currently associated with it. This table allows the AlarmTracker user to more easily query the current object state in its Object State View. Column_name Type Prec Scale Nullable Trim Trailing Blanks FixedLen NullInSource no yes no Computed Length ObjectName (PK) varchar no 255 CustomerID (PK) int no 4 10 0 no (n/a) (n/a) ProductID (PK) int no 4 10 0 no (n/a) (n/a) AlarmID int no 4 10 0 no (n/a) (n/a) Column_name Column Description ObjectName The Listener ObjectName associated with the Alarm. CustomerID Customer ID. ProductID Product ID. AlarmID Primary key, value that uniquely identifies the Alarm object. Fields AlarmsSummaryHour Table Description The AlarmsSummaryHour table stores summary counts and statistics across all Customers. This table is updated hourly. A thirty (30) day history of hourly records are maintained. Column_name Type Trim Trailing FixedLen Computed Length Prec Scale Nullable Blanks NullInSource CustomerID (PK) int no 4 Time (PK) datetime no 8 NewAlarmCount int no 4 10 ClosedAlarmCount int no 4 UnassignedAlarms int no AssignedAlarms int no 10 0 no (n/a) (n/a) no (n/a) (n/a) 0 no (n/a) (n/a) 10 0 no (n/a) (n/a) 4 10 0 no (n/a) (n/a) 4 10 0 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-29 Appendix A Detailed Schema Description Column_name Type Trim Trailing FixedLen Computed Length Prec Scale Nullable Blanks NullInSource ExcludedAlarms int no 4 10 0 no (n/a) (n/a) NewAppErrCount int no 4 10 0 no (n/a) (n/a) ClosedAppErrCount int no 4 10 0 no (n/a) (n/a) UnassignedAppErrs int no 4 10 0 no (n/a) (n/a) AssignedAppErrs int no 4 10 0 no (n/a) (n/a) ExcludedAppErrs int no 4 10 0 no (n/a) (n/a) AlarmEventCount int no 4 10 0 no (n/a) (n/a) AppErrCount int no 4 10 0 no (n/a) (n/a) SimpleCount int no 4 10 0 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-30 Alarms Database Schema Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description CustomerID Customer ID. Time Time of update. NewAlarmCount The number of new Alarms that were raised during this hour. ClosedAlarmCount The number of Alarms that were closed (either from a device-generated Clear or a user-generated Clear Event). UnassignedAlarms The number of unassigned Alarm objects that existed at the time of the update. AssignedAlarms The number of open and assigned Alarm objects that existed at the time of the update. ExcludedAlarms The number of open and excluded Alarm objects that existed at the time of the update. NewAppErrCount The number of new Application Error objects that were created during this hour. ClosedAppErrCount The number of Application Error objects that were closed by user-generated Clear Events. UnassignedAppErrs The number of unassigned Application Error objects that existed at the time of the update. AssignedAppErrs The number of open and assigned Application Error objects that existed at the time of the update. ExcludedAppErrs The number of open and excluded Application Error objects that existed at the time of the update. AlarmEventCount The total number of Alarm object Events processed during the hour. This count does not include Simple Events or Application Error Events. AppErrCount The total number of Application Error Events processed during the hour. SimpleCount The total number of Simple Events processed during the hour. AlarmsSummaryDay Table Description The AlarmsSummaryDay stores daily summary counts and statistics generated from the AlarmsSummaryHour table across all Customers. This table is updated daily, it is not purged. Column_name Type Computed Length Prec Trim FixedLen Trailing NullIn Scale Nullable Blanks Source CustomerID (PK) int no 4 0 Time (PK) datetime no 8 Samples int no 4 10 NewAlarmCount int no 4 10 10 no (n/a) (n/a) no (n/a) (n/a) 0 no (n/a) (n/a) 0 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-31 Appendix A Detailed Schema Description Column_name Type Computed Length Prec Trim FixedLen Trailing NullIn Scale Nullable Blanks Source ClosedAlarmCount int no 4 10 0 UnassignedAlarmsAvg float no 8 53 AssignedAlarmsAvg float no 8 ExcludedAlarmsAvg float no NewAppErrCount ClosedAppErrCount int no (n/a) NULL no (n/a) (n/a) 53 NULL no (n/a) (n/a) 8 53 NULL no (n/a) (n/a) int no 4 10 0 no (n/a) no 4 10 0 no (n/a) (n/a) UnassignedAppErrsAvg float no 8 53 NULL no (n/a) (n/a) AssignedAppErrsAvg float no 8 53 NULL no (n/a) (n/a) ExcludedAppErrsAvg float no 8 53 NULL no (n/a) (n/a) AlarmEventCount int no 4 10 0 no (n/a) (n/a) AppErrCount int no 4 10 0 no (n/a) (n/a) SimpleCount int no 4 10 0 no (n/a) (n/a) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-32 (n/a) (n/a) Alarms Database Schema Appendix A Alarms Database Schema Detailed Schema Description Fields Column_name Column Description CustomerID Customer ID. Time Time of update. Samples The number of samples from the AlarmsSummaryHour table that rolled up into this entry. If the LGMapper/LGArchiver is running continuously over the 24-hour period, this value will be 24. If the Server is down for a period, this value may be less than 24. NewAlarmCount The number of new Alarms that were raised during this day. ClosedAlarmCount The number of Alarms that were closed (either from a device-generated Clear or a user-generated Clear Event). UnassignedAlarmsAvg The average number of unassigned Alarm objects over the hourly samples for that day. AssignedAlarmsAvg The average number of open and assigned Alarm objects over the hourly samples for that day. ExcludedAlarmsAvg The average number of open and excluded Alarm objects over the hourly samples for that day. NewAppErrCount The number of new Application Error objects that were created during this day. ClosedAppErrCount The number of Application Error objects closed by user-generated Clear Events. UnassignedAppErrsAvg The average number of unassigned Application Error objects over the hourly samples for that day. AssignedAppErrsAvg The average number of open and assigned Application Error objects over the hourly samples for that day. ExcludedAppErrsAvg The average number of open and excluded Application Error objects over the hourly samples for that day. AlarmEventCount The total number of Alarm object Events processed during the day. This count does not include Simple Events or Application Error Events. AppErrCount The total number of Application Error Events processed during the day. SimpleCount The total number of Simple Events processed during the day. The five (5) count fields (NewAlarmCount, ClosedAlarmCount, AlarmEventCount, AppErrCount and SimpleCount) are actually pro-rated values over a 24 hour period based on the number of Samples recorded. The value stored in one of these fields represents the sum of the hourly count values times the 24 hour pro-rated factor. e.g.: NewAlarmCount = (24 / Samples) * SUM (AlarmsSummaryHour.NewAlarmCount) Note If Samples = 24, the pro-rated factor is one. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-33 Appendix A Alarms Database Schema Detailed Schema Description Filters Table Description The Filters table stores the server-side filter settings for customer filtering and product filtering. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks FilterField int no 4 10 0 no (n/a) (n/a) Criterion int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) Fields Column_name Column Description FilterField A value of 1 indicates that this is a Customer filter. A value of 2 indicates that this is a Product filter. Criterion If FilterField = 1, this value is the CustomerID to be filtered out. If FilterField = 2, this value is the ProductID to be filtered out. ModifiedTime Time this record was last updated. Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-34 FixedLen NullInSource Appendix A Alarms Database Schema How Handles Are Used FiltersProductSpecific Table Description The FiltersProductSpecific table stores the server-side filter settings that are product specific. These include Class-level and MsgID-level filters. Column_name Type Computed Length Prec Scale Nullable Trim Trailing Blanks ProductID int no 4 10 0 no (n/a) (n/a) FilterField int no 4 10 0 no (n/a) (n/a) Criterion int no 4 10 0 no (n/a) (n/a) ModifiedTime datetime no 8 no (n/a) (n/a) FixedLen NullInSource Fields Column_name Column Description ProductID Product ID. FilterField A value of 3 indicates that this is a Class filter. A value of 4 indicates that this is a MsgID filter. Criterion If FilterField = 3, this value is the Class to be filtered out. If FilterField = 4, this value is the MsgID to be filtered out. ModifiedTime Time this record was last updated. How Handles Are Used A Handle is a 32-bit value that uniquely identifies a Node in the object hierarchy. Although there are no formal restrictions on the value of the Handle (other than it be unique across all Nodes), we have decided to use certain bits to define characteristics about the Node. This section describes how those bit fields are used. The following table shows the layout of the 32 bits used in the Handle. Bits 31 30 29 ... ProductID 24 23 ... 14 Customer ID 13 ... 0 Object ID The following table describes the use of the 32 bits used in the Handle Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-35 Appendix A Alarms Database Schema How Handles Are Used Bits Description 0-13 Used to specify an arbitrary Object ID. This allows for 214-1 = 16,383 objects for each ProductID. 14-23 Reserved for a Customer ID. This allows for 210=11,024 customers. This Customer ID matches that used in the Alarms Database. By convention, the Object ID for the Customer Node is 0. 24-29 Reserved for a ProductID. This allows for 26-1 = 63 ProductIDs. This ProductID matches that used in the Alarms Database. By convention, the ProductID for the Customer Node is 0. ProductID 1 is assigned to ICM. 30 Reserved. This bit will always be set by applications using these Handles. The root node of a hierarchy will have only this bit set. 31 The user bit. Use to create new Nodes in your Client code. That is, you are free to create new LGNode objects and set that bit and not be concerned that the Server may create Node objects that clash with any that you create. By convention the Root Node labeled as “Customers” has a Handle = 0x40000000. As an example of some other Handles, consider a customer with Customer ID = 38. The Customer Node for this customer is 0x40098000 (0100 0011 0000 1001 1000 0000 0000 0000). The Object IDs and ProductIDs will be different for all other child Nodes, but bits 14-23 will be the same, and bit 30 will always be set. The following macros in Grid2Common.h may be useful when manipulating Handles. #define DP_CUSTOMERSHANDLE 0x40000000 // Customers RootNode #define DPM_DPRESERVED 0xff000000 #define DPM_PRODUCTVALUES 0x3f000000 // ProductIDs #define DPM_CUSTVALUES 0x00ffc000 // CustomerIDs #define DPM_OBJECTVALUES 0x00003fff // Object values #define CUSTIDFROMHANDLE(arg) (((arg) & DPM_CUSTVALUES) >> 14) #define PRODUCTIDFROMHANDLE(arg) ((arg) & DPM_PRODUCTVALUES) >> 24) #define CUSTHANDLEFROMHANDLE(arg) ((arg) & (DP_CUSTOMERSHANDLE | DPM_CUSTVALUES)) #define UNMAPPEDOBJECTSFROMHANDLE(arg) ((arg) & (DP_CUSTOMERSHANDLE | DPM_CUSTVALUES)) + 1) #define ISCUSTOMERHANDLE(arg) \ ((((arg) == ((arg) & (DP_CUSTOMERSHANDLE | DPM_CUSTVALUES))) && \ ((arg) & DPM_CUSTVALUES)) ? TRUE : FALSE) #define ISPRODUCTHANDLE(arg) \ ((((arg) == ((arg) & (DP_CUSTOMERSHANDLE | DPM_PRODUCTVALUES | DPM_CUSTVALUES))) \ && ((arg) & DPM_PRODUCTVALUES)) ? TRUE : FALSE) #define MAKELGHANDLE(prodID, custID, objID)\ (DP_CUSTOMERSHANDLE | ((prodID) << 24) | ((custID) << 14) | (objID)) Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-36 Appendix A Alarms Database Schema Alarm State Transition Diagram Alarm State Transition Diagram Figure A-2 indicates the possible state transition values for an Alarm object. It shows how an Alarm object is created and the different state transitions that it can make. Alarm State Transition Model Clear User Clear Clear User Clear Assign Raise svDown asUnassigned svDown asUnassigned Unassigned svUp asUnassigned svUp asNoAlarms Raise Unassigned Clear Include Include svDown asExcluded Exclude svUp asExcluded Raise 63919 Figure A-2 Red (solid) transition arrows indicate state changes as a result of customer-generated Events. Blue (dashed) transition arrows indicate state changes as a result of customer support-generated Events (such as Clear, Assign, Exclude). An Alarm is created when a Listener Raise Event is received at the LGMapper. The initial state of an Alarm object is Down and Unassigned. Figure A-2, shows two mnemonics that indicate the State (corresponding to the Alarms.State and Events.State field values) of the Alarms and its Assignment Status (corresponding to the Alarms.Assigned and Events.Assigned field value). The following mnemonics for the State values are defined: svUp = 0, svApplicationError = 1, svPartialImpaired = 2, svDown = 3, The following mnemonics for the Assigned values are defined: asNoAlarms =0 asUnused =1 Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-37 Appendix A Alarm State Transition Diagram asExcluded =2 asAssigned =3 asAssignedTimeout =4 asUnassignedAppErr =5 asUnassigned =6 Cisco Remote Monitoring Administration Guide, Release 2.1(0) A-38 Alarms Database Schema INDEX A B Access Permissions, LGMapper, Modifying Active Connections, LGMapperNM Menu adding a new customer to Listener Alarm Object Backwards Compatibility Considerations 3-13 Beeper.flt Modifications 5-4 2-4 2-13 1-10 Alarms Database 11-1 C 1-9 Alarms Database, disk space requirements 10-2 Clients Tab, LGMapper Configuration, Enable Server Alarms Database, Re-indexing 6-1 Clients Tab, LGMapper Configuration, Reason Alarms Database Maintenance 6-1 Clients Tab, LGMapper Configuration Dialog Alarms Database Maintenance Overview Alarms Database Map 6-1 Cloning a Database A-3 Alarms DB Compatibility Considerations, Grid Compatibility Considerations, Listener A-29 compression A-21 AlarmTracker Client A-1 configuring Listener 1-1, 1-6, 1-7, 1-8 duplex settings AlarmTracker client, configuring on Windows XP AlarmTracker Client, Installation overview 8-1 AlarmTracker Clients, compatibility considerations Applications, LGMapper2 3-28 Archived Alarms Database Archived Alarms DB 1-6, 1-9 1-6 Archiver Database Tab, LGArchiver Configuration Dialog 4-10 A-11 audience for this guide ii-xi 8-5 A-1 2-11 Connected Clients, LGMapperNM Menu Creating Databases 6-1 Creation Failure, Database 6-1 3-32 Creation Failures, Local Account Creation Failures, User Groups 2-14 CSFS 1-2 Current Users 5-4 7-8 Creating Databases Manually CSFC 11-1 2-1 Creating a New Database 11-2 11-2 4-8 Configuration Tables, Table Classes Alarms Tables, Table Classes 11-2 11-1 Compatibility Considerations, LGMapper Server A-31 AlarmsSummaryHour Table Attributes Table 11-1 Compatibility Considerations, AlarmTracker Clients 1-10 AlarmsSummaryDay Table Alarms Table 4-1 6-1 Compatibility Considerations 1-5 Alarms History 4-4 7-8 Cloning Databases Alarms Database Tab, LGMapper Configuration Dialog 4-6 4-5 3-28 3-28 4-1 customer adding to Listener 2-13 Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-1 Index deleting in Listener Enable Thresholds setting 2-14 editing configuratinon in Listener CustomerLog Max setting Customers Table 2-13 Enabling the Exclude Node Feature 2-13 Enabling the LGMapper Server 2-12 9-1 4-2 End of Message Sequence alarm message format A-17 Customer Support Forwarding Service Customer Voice Portal (CVP) Ensuring LGM Administrators, LGM Readers, and LGM Users Were Created 3-31 1-2, 2-14 1-9 Error Reporting 1-2 Event Log Message, LGArchiverNM D Event Log Messages Database, Cloning Events Table 3-32 Databases, Remote Monitoring Suite, SQL Database Schema, Alarms Database Date alarm message format A-25 9-1 Exclude Node Feature, enabling 9-1 Exclude Node Feature, Overview 2-14 9-1 Exit Service, LGMapperNM Menu 3-32 1-2 5-4 F deleting a customer in Listener Deployment Considerations Deployment Issues 2-14 Failure, Creation, Database 1-12 Failures, Creation, Local Account 2-15 Detailed Schema Description, Alarms Database Disabling the LGMapper Server Distributed Architecture Failures, Creation, User Groups Fault Tolerant Considerations 10-2 FiltersProductSpecific Table Filters Table 4-1 1-1 3-32 3-28 3-28 1-12 A-35 A-34 Filter Tables, Table Classes 1-12 Distributed Diagnostics and Services Network domain setting A-4 4-2 Disk Space Requirements for Alarms Database Displaying Current Users 3-32 Failure, Registry Settings, DCOMCnfg 10-1 Description alarm message format A-2 First Optional Argument alarm message format 2-11 Drive Letter Other Side setting Drive property, Listener 2-13 G 2-3 general configuring, Listener 1-2, 1-3 DTP default setting 2-10 General Tab, LGMapper2 Properties 1-3 duplex configuration settings Grid, compatibility considerations 2-11 3-9 11-1 H E editing customer configuration in Listener EMS 2-13 Handles, how used A-35 Hardware Recommendations 1-3 1-13 Hide Tray Icon, LGArchiverNM Menu Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-2 5-8 1-1 DDSN Transfer Process DTP 5-5 Exclude Node Feature 3-27 A-1 DCOMCnfg Registry Settings Failure DDSN 5-8 Event Log Messages, LGArchiver Node Manager 7-8 Database Creation Failure 2-15 5-8 2-14 Index Hide Tray Icon, LGMapperNM Menu How to Implement IWantHelp HyperlinkInfo Table LGArchiver Configuration Dialog, Log Files Tab 5-4 LGArchiver Database - accessing 12-2 1-11 LGArchiver - Exit, LGArchiverNM Menu A-14 LGArchiver - Installation Checklist LGArchiverNM I ICM 1-5, 5-1, 5-5 LGArchiverNM, Menu Options Icon, Hide Tray, LGArchiverNM Menu Icon, Hide Tray, LGMapperNM Menu Icon, LGARchiverNM Task Bar Icon, LGMapperNM Task Bar LGArchiverNM, Starting 5-4 3-25 Implementing the IWantHelp Interface 12-1 3-27 Issues, deployment LGArchiverNM Menu, LGArchiver - Start 5-8 LGArchiverNM Menu, LGArchiver - Stop 5-8 5-7 5-7 5-5 LGArchiver Node Manager, Menu Options IWantHelp Interface, Overview 12-2 LGArchiver Properties 12-1 LGArchiver Server L Language property, Listener 1-8 5-8 LGArchiver - Stop, LGArchiverNM Menu 5-8 LGMapper 3-28 LGMapper2 Properties - General Tab 4-10 LGMapper - Backwards Compatibility 4-10 LGMapperCnfg Tool 4-1 LGArchiver Configuration Dialog, Archiver Database Tab 4-10 LGArchiver Configuration Dialog, Listener Tab 4-12 3-31 1-1, 1-5, 1-6, 3-1 LGMapper2 Applications 1-6 5-7 1-6, 7-1 LGM Administrators, Ensuring Creation of 1-11 LGArchiverCnfg Tool, Overview 3-26 LGArchiver - Start, LGArchiverNM Menu LGCnfg Tool 3-19 1-1, 1-6, 3-1 LGArchiver Alarms Database 5-7 LGArchiver Up Since, LGArchiverNM Menu 2-3 Launch Permissions, LGMapper, Modifying 5-8 LGArchiver Node Manager, Starting on Windows 2000 and Windows 2003 5-5 12-1 IWantHelp Interface, Interface Definition 5-7 5-7 LGArchiver Node Manager, Event Log Messages 12-2 IWantHelp Interface, implementation LGArchiverCnfg Tools 5-7 LGArchiverNM Menu, Listener Messages Processed LGArchiver Node Manager 10-1 LGArchiverCnfg Tool 5-8 5-8 LGARchiverNM Task Bar Icon 12-2 12-2 LGArchiverCnfg 5-5 LGArchiverNM Menu, LGArchiver - Exit LGArchiverNM Menu, Show Statistics A-17 IWantHelp, How to implement LGArchiver 5-5 LGArchiverNM Menu, Open LGArchiverCnf Interface Definition, IWantHelp Interface IWantHelp.idl 8-1 1-9, 1-10 InstanceNodes Table 5-5 LGArchiverNM Menu, LGArchiver Up Since 2-1, 2-3 Installing the AlarmTracker Client, Overview Instance Nodes 5-7 LGArchiverNM Menu, Hide Tray Icon 5-3 Installation Folder Sub-directories 5-8 LGArchiverNM, Starting, Windows 2000 5-7 Identity Tab, LGMapper2 Properties installing Listener LGArchiverNM, Overview 5-8 5-8 3-1 LGArchiverNM, Event Log Messages 1-9 4-13 3-9 3-1 4-1 LGMapperCnfg Tool, Overview 4-1 LGMapper Configuration Dialog, Alarms Database Tab 4-6 Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-3 Index LGMapper Configuration Dialog, Clients Tab LGMapper Configuration Dialog, Listener Tab general LGMapper - Installation Procedure 2-14 duplex configuration settings 3-1 2-11 editing customer configuration 3-3 properties settings LGMapperNM, Menu Options 2-13 2-10 deleting a customer 3-27 1-5, 5-1 LGMapperNM, Starting 1-1, 1-2, 1-3, 1-5, 1-6, 2-1 configuring 3-1 LGMapper - Installation Checklist 3-31 2-13 adding new customer 5-4 LGMapper Installation, Troubleshooting LGMapperNM Listener 4-9 5-4 LGMapper - Enable, LGMapperNM Menu LGMapper - Installation Listen Actives setting 4-8 LGMapper Configuration Dialog, Log Files Tab LGMapper - Disable, LGMapperNM Menu LGM Users, Ensuring Creation of 4-1 2-13 2-3 Listener, compatibility considerations 5-3 Listener - Configuration 5-1 2-4 LGMapperNM, Starting on Windows 2000 and Windows 2003 5-1 Listener - Customer Configuration LGMapperNM Menu, Active Connections Listener Events 5-4 LGMapperNM Menu, Connected Clients LGMapperNM Menu, Exit Service 5-4 LGMapperNM Menu, Hide Tray Icon LGMapperNM Menu, LGMapper - Enable LGMapperNM Menu, LGMapper - Stop 5-4 LGMapperNM Menu, LGMapper Up Since Listener Tab, LGMapper Configuration Dialog Local Account, Creation Failure LGMapperNM Menu, Open LGMapperCnfg LGMapperNM Menu, Show Statistics 5-4 Local Account or User Groups Creation Failures Log Entries 5-3 5-1 5-3 M 5-1 LGMapper Node Manager, Starting, Windows 2000 LGMapper Server, compatibility considerations 5-1 11-2 4-2 Manually Creating Databases Map, Alarms Database Schema 6-1 A-3 MDAC Requirement, AlarmTracker Client 4-2 Menu Options, LGArchiverNM 5-4 Menu Options, LGArchiver Node Manager LGMapper - Stop, LGMapperNM Menu 5-4 Menu Options, LGMapperNM LGM Readers, Ensuring Creation of 5-4 3-31 Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-4 5-5 5-7 5-3 Menu Options, LGMapper Node Manager Messages, Event Log 8-1 5-7 LGMapper - Start, LGMapperNM Menu LGMapper Up Since, LGMapperNM Menu 4-8 3-28 2-14 Log Files Tab, LGMapper Configuration Dialog 5-3 LGMapper Node Manager, Starting 4-12 3-10 Log Files Tab, LGArchiver Configuration Dialog 5-1 LGMapper Node Manager, Menu Options 5-4 3-28 Location Tab, LGMapper2 Properties 5-3 LGMapper Node Manager (LGMapperNM) 5-7 Local Account Creation Verification, Windows 2000 Procedure 3-29 5-4 LGMapperNM Menu, Listener Messages Processed LGMapper Server, Enabling 2-3 Listener Tab, LGArchiver Configuration Dialog 5-4 5-4 LGMapper Server, Disabling 1-10 Listener Messages Processed, LGMapperNM Menu 5-4 LGMapperNM Menu, LGMapper - Start LGMapperNM Task Bar Icon 2-4 Listener Messages Processed, LGArchiverNM Menu 5-4 LGMapperNM Menu, LGMapper - Disable LGMapperNM Overview 2-13 Listener - Duplex Configuration Settings Listener - Installation 5-4 11-1 5-3 4-13 4-9 Index Messages, LGArchiver Node Manager, Event Log Modifying Access Permissions, LGMapper 3-13 Modifying Launch Permissions, LGMapper 3-19 Modifying the OID Node Hierarchy and Rules 5-8 7-9 R RAS 1-1, 1-2, 1-3 Registry Settings, DCOMCnfg, Failure Re-Indexing the Alarms Database Remote Access Service N 6-1 1-2 Remote Monitoring Suite 1-1, 1-2, 1-4 Network Considerations 1-7 Remote Monitoring Suite components New Database, Creating 7-8 RMS Node Manager property, Listener Note About Time 1-9 Rules, Modifying A-4 Number of Optional Arguments Following alarm message format 2-14 1-4 1-1 Rule Mapping 2-3 3-32 Rules Table 7-9 A-15 S O Security, SQL Server Objects Table A-7 ObjectState Table Security Tab, LGMapper2 Properties A-29 OIDNodeAttributes Table Serial Alarm Feed A-13 OID Node Hierarchy, Modifying OID Node Hierarchy and Rules OIDNodes Table 6-2 serial alarm feed 7-9 SERIALFD A-9 2-14 2-14 2-14 Show Statistics, LGArchiverNM Menu Open LGArchiverCnfg, LGArchiverNM Menu Open LGMapperCnfg, LGMapperNM Menu organization of this guide 2-14 serial alarm feed message formats 7-9 3-11 ii-xi 5-7 5-3 5-7 Show Statistics, LGMapperNM Menu 5-3 SideA event timeout (minutes) setting 2-13 SideBevent timeout (minutes) setting Side property, Listener 2-13 2-3 SimpleObjectHoldTime Minutes setting P Simples Table password setting 2-11 A-27 Specification, system Permissions, Access, LGMapper 3-13 SQL Server Permissions, Launch, LGMapper 3-19 SQL Server Databases Post-Installation Inspection Checklist Process Name alarm message format ProductInfo Table A-6 2-14 10-1 1-10 3-27 SQL Server Requirements SQL Server Security 3-2 6-2 Starting the LGArchiverNM properties Listener 3-27 5-5 Starting the LGMapper Node Manager 2-3 Properties, LGArchiver 2-12 5-1 Summary Statistics Tables, Table Classes 3-26 SysemNameOtherSide setting 2-11 System Name alarm message format System Specification A-2 2-14 10-1 Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-5 Index System Type alarm message format 2-14 U Upgrading Listener, guidelines T Uptime Table Table, Alarms Table, AlarmsSummaryDay A-11 Table, Customers A-17 Table, Filters A-34 Table, HyperlinkInfo A-14 Table, InstanceNodes A-17 Table, Rules A-15 A-27 Table, Uptime A-20 Table, VersionInfo Table Classes A-4 A-1 Tables, Alarms A-1 Tables, Configuration Tables, Filter A-13 A-6 Table, Simples A-1 A-2 Tables, Summary Statistics A-2 ThresholdIntervalMinutes setting ThresholdLimit setting Time, note about 2-12 2-12 A-4 Time alarm message format 2-14 Trap Number alarm message format 2-14 Trap Severity alarm message format 2-14 Troubleshooting the LGMapper Installation 3-27 Cisco Remote Monitoring Administration Guide, Release 2.1(0) IN-6 A-4 Windows Remote Access Server A-9 Table, ProductInfo 4-1 W A-29 Table, OIDNodeAttributes Table, OIDNodes 2-12 2-11 VersionInfo Table A-35 A-7 Table, ObjectState 3-28 V Table, FiltersProductSpecific Table, Objects username setting A-29 Users, Current Table, Attributes A-25 User Interface Settings A-31 Table, AlarmsSummaryHour Table, Events A-20 User Groups, Creation Failures A-21 2-2 1-1