The information contained in this document is subject to change without notice.
Hewlett-Packard makes no warranty of any kind with regard to this manual, including, but not limited to, the
implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be
liable for errors contained herein or direct, indirect, special, incidental or consequential damages in
connection with the furnishing, performance, or use of this material.
adaptation, or translation without prior written permission is prohibited, except as allowed under the
copyright laws.
Corporate Offices:
Hewlett-Packard Co.
3000 Hanover St.
Palo Alto, CA 94304
Use, duplication or disclosure by the U.S. Government Department of Defense is subject to restrictions as set
forth in paragraph (b)(3)(ii) of the Rights in Technical Data and Software clause in FAR 52.227-7013.
Rights for non-DOD U.S. Government Departments and Agencies are as set forth in FAR 52.227-19(c)(1,2).
Use of this manual and flexible disc(s), compact disc(s), or tape cartridge(s) supplied for this pack is restricted
to this product only. Additional copies of the programs may be made for security and back-up purposes only.
Resale of the programs in their present form or with alterations, is expressly prohibited.
A copy of the specific warranty terms applicable to your Hewlett-Packard product and replacement parts can
be obtained from your local Sales and Service Office.
Massachusetts Institute of Technology.
MS-DOS and Microsoft are U.S. registered trademarks of Microsoft Corporation.
OSF/Motif is a trademark of the Open Software Foundation, Inc. in the U.S. and other countries. Certification
for conformance with OSF/Motif user environment pending.
AutoRAID(tm) is a trademark of Hewlett-Packard Company for the Advanced Disk Array product.
2
Printing History
September 2001 Edition 1
The printing date and part number indicate the current edition. The printing date changes when a new
edition is printed. (Minor corrections and updates which are incorporated at reprint do not cause the date to
change.) The part number changes when extensive technical changes are incorporated.
New editions of this manual will incorporate all material updated since the previous edition.
Internal Date: July 17, 2001
This guide is intended for use by system administrators and others involved in managing HP-UX system
hardware resources. It describes the installation and use of EMS Hardware Monitors—an important tool in
managing the operation and health of system hardware resources.
The book is organized as follows:
• Chapter 1, “Introduction,” provides a foundation for understanding what the hardware monitors are and
how they work. Although not required reading, this material will help you use the hardware event
monitors efficiently.
• Chapter 2, “Installing and Using Monitors,” describes the procedures for creating and managing
monitoring requests.
• Chapter 3, “Detailed Description,” gives a detailed picture of the components involved in hardware
monitoring, their interaction, and the files involved.
• Chapter 4, “Using the Peripheral Status Monitor,”covers the PSM, which serves as the interface between
the event-driven hardware event monitors and MC/ServiceGuard.
• Chapter 5, “Hardware Monitor Configuration Files,” describes how to control the operation of hardware
monitors by modifying the configuration files.
NOTEThe information previously contained in the chapter entitled “Monitor Data Sheets,” has been
moved to the Web at http://docs.hp.com/hpux/onlinedocs/diag/ems/emd_summ.htm.
An HP-UX man page is available for each monitor. To access the man page, type:
monitorname
man
where
Typographical Conventions
This guide uses the following typographical conventions:
NOTENotes contain important information.
CAUTIONCaution messages indicate procedures which, if not observed, could result in damage to your
equipment or loss of your data.
WARNI NGWarning messages indicate procedures or practices which, if not observed, could
result in personal injury.
monitorname
is the executable file listed in the data sheet.
9
Supporting Documentation
The following documentation contains information related to the installation and use of the hardware event
monitors:
• Support Plus: Diagnostics User's Guide - provides information on installing the EMS Hardware Monitors.
• Managing MC/ServiceGuard (B3936-90024) - provides information on creating package dependencies for
hardware resources.
• Using EMS HA Monitors (B5735-90001) - provides detailed information on using EMS to create
monitoring requests. Note: this manual pertains to high availability (HA) monitors rather than to the
hardware monitors.
Related Web Site
The following web site provides information on hardware monitoring.
• http://docs.hp.com/hpux/diag—the online library for information about EMS Hardware Monitors
• http://docs.hp.com/hpux/onlinedocs/diag/ems/emd_summ.htm—Data sheets for the hardware
event monitors
Reader Comments
We welcome your comments about our documentation. If you have editorial suggestions or recommended
improvements for this document, please write to us. You can reach us through e-mail at
dst-support@am.exch.hp.com, or by sending your letter to: Documentation Manager M/S 42L9, Hewlett
Packard Company, 19483 Pruneridge Ave., Cupertino, CA 95014-0604. USA. Please include the following
information in your message:
• Title of the manual you are referencing.
• Manual part number (from the title page).
• Edition number or publication date (from the title page).
•Your name.
• Your company’s name.
Serious errors, such as technical inaccuracies that may render a program or a hardware device inoperative,
should be reported to your HP Response Center or directly to a Support Engineer.
10
1Introduction
This chapter introduces the EMS Hardware Monitors. The topics discussed in this chapter include:
• What is hardware monitoring?
• How does hardware monitoring work?
• Benefits of hardware monitoring
• Products supported by hardware monitoring
• Tips for hardware monitoring
• Hardware monitoring terms
NOTEDo I Really Need to Read This Chapter?
Although it is not essential that you read this material before using the hardware monitors, it
will help you understand how monitoring works, which in turn should help you use it
effectively. New users are strongly encouraged to read through the general overview material
before proceeding to Chapter 2, “Installing and Using Monitors”.
Introduction
Chapter 1
11
Introduction
Hardware Monitoring Overview
Hardware Monitoring Overview
What is Hardware Monitoring?
Hardware monitoring is the process of watching a hardware resource (such as a disk) for the occurrence of
any unusual activity, called an event. When an event occurs, it is reported using a variety of notification
methods (such as email). Event detection and notification are all handled automatically with minimal
involvement on your part.
To achieve a high level of system reliability and availability, it is essential that you know when any system
resource is experiencing a problem. Hardware monitoring gives you the ability to detect problems with your
system hardware resources. By providing immediate detection and notification, hardware monitoring allows
you to quickly identify and correct problems—often before they impact system operation.
Another important feature of hardware monitoring is its integration with applications responsible for
maintaining system availability, such as MC/ServiceGuard. It is vital that these applications be alerted to
hardware problems immediately so they can take the necessary action to avoid system interruption.
Hardware monitoring is easily integrated with MC/ServiceGuard, and the necessary notification methods are
provided for communication with other applications such as HP OpenView.
Hardware monitoring is designed to provide a high level of protection against system hardware failure with
minimal impact on system performance. By using hardware monitoring, you can virtually eliminate
undetected hardware failures that could interrupt system operation or cause data loss.
12
Chapter 1
Introduction
Hardware Monitor ing Overvie w
How Does Hardware Monitoring Work?
The following figure shows the basic components involved in hardware monitoring.
Figure 1-1Components Involved in Hardware Monitoring
The typical hardware monitoring process works as follows:
1. While monitoring its hardware resources, the hardware event monitor detects some type of abnormal
behavior on one of the resources.
2. The hardware event monitor creates the appropriate event message, which includes suggested corrective
action, and passes it to the Event Monitoring Service (EMS).
3. EMS sends the event message to the system administrator using the notification method specified in the
monitoring request.
4. The system administrator (or Hewlett-Packard service provider) receives the messages, corrects the
problem, and returns the hardware to its normal operating condition.
5. If the Peripheral Status Monitor (PSM) has been properly configured, events are also processed by the
PSM. The PSM changes the device status to DOWN if the event is serious enough. The change in device
status is passed to EMS, which in turn alerts MC/ServiceGuard. The DOWN status will cause
MC/ServiceGuard to failover any package associated with the failed hardware resource.
NOTEThe Difference Between Hardware Event Monitoring and Hardware Status
Monitoring
Hardware event monitoring is the detection of events experienced by a hardware resource. It is
the task of the EMS Hardware Monitors to detect hardware events. Events are temporary in
the sense that the monitor detects them but does not remember them. Of course the event itself
may not be temporary—a failed disk will likely remain failed until it is replaced.
Hardware status monitoring is an extension of event monitoring that converts an event to a
change in device status. This conversion, performed by the Peripheral Status Monitor, provides
a mechanism for remembering the occurrence of an event by storing the resultant status. This
persistence provides compatibility with applications such as MC/ServiceGuard, which require a
change in device status to manage high availability packages.
Chapter 1
13
Introduction
Hardware Monitoring Overview
Benefits of Hardware Monitoring
Hardware monitoring provides the following benefits:
• Reduces system downtime by detecting hardware failures when they occur, allowing you to quickly
identify and correct problems.
• Integrates into MC/ServiceGuard and other applications responsible for maintaining system availability.
These applications can now add many hardware resources to the components they monitor.
• Minimizes the time required to isolate and repair failures through detailed messages describing what the
problem is and how to fix it.
• Includes a default monitoring configuration that offers immediate protection for your system hardware
without any intervention on your part after monitoring is enabled.
• Provides a common tool for monitoring a wide variety of system hardware resources.
• Offers a variety of notification methods to alert you when a problem occurs. No longer do you need to check
the system console to determine if something has gone wrong.
• Requires minimal maintenance once installed and configured. New hardware resources added to the
system are automatically included in the monitoring structure.
14
Chapter 1
Introduction
Hardware Monitor ing Overvie w
Products Supported by Hardware Monitors
EMS hardware monitors are provided for a wide range of system hardware resources. The following list
identifies the types of hardware supported by monitors at the time of publication. A detailed list of the specific
hardware products supported by each hardware monitor is included in http://docs.hp.com/hpux/diag/ the online library for information about EMS Hardware Monitors (look for “Supported Products” under EMS
Hardware Monitors).
• HP disk arrays, including AutoRAID Disk Arrays and High Availability Disk Arrays
• HP disk devices, including CD-ROM drives and MO drives
• HP SCSI tape devices, including many DLT libraries and autochangers
• HP Fibre Channel SCSI Multiplexer
• HP Fibre Channel Adapters
• HP Fibre Channel Adapter (A5158)
• High Availability Storage Systems
• HP Fibre Channel Arbitrated Loop Hubs
• HP Fibre Channel Switch
• System memory
• Core hardware
• Low Priority Machine Checks (LPMCs)
• HP-UX kernel resources
• HP Fibre Channel disk array FC60
• SCSI1, SCSI2, SCSI3 interface cards
• System information
• HP UPSs (Uninterruptible Power Systems)
• Devices supported by HP device management software (Remote Monitor)
NOTEWill new products be supported?
Hewlett-Packard's strategy is to provide monitoring for all critical system hardware resources,
including new products. For the latest information on what products are supported by EMS
Hardware Monitors, visit the hardware monitoring web pages available at
www.docs.hp.com/hpux/systems/.
Chapter 1
15
Introduction
Hardware Monitoring Overview
Tips for Hardware Monitoring
Here are some tips for using hardware monitoring.
✓ Keep hardware monitoring enabled to protect your system from undetected failures. Hardware
monitoring is an important tool for maintaining high-availability on your system. In a high-availability
environment, the failure of a hardware resource makes the system vulnerable to another failure. Until the
failed hardware is repaired, the backup hardware resource represents a single-point of failure. Without
hardware monitoring you may not be aware of the failure. But if you are using hardware monitoring, you
are alerted to the failure. This allows you to repair the failure and restore high-availability as quickly as
possible.
✓ Integrate the peripheral status monitor (PSM) into your MC/ServiceGuard strategy. An
important feature of hardware monitoring is its ability to communicate with applications responsible for
maintaining system availability, such as MC/ServiceGuard. The peripheral status monitor (PSM) allows
you to integrate hardware monitoring into MC/ServiceGuard. The PSM gives you the ability to failover a
package based on an event detected by hardware monitoring. If you are using MC/ServiceGuard, you
should consider using the PSM to include your system hardware resources in the MC/ServiceGuard
strategy. In addition, the necessary notification methods are provided for communicating with network
management application such as HP OpenView.
✓ Utilize the many notification methods available. The notification methods provided by hardware
monitoring provide a great deal of flexibility in designing a strategy to keep you informed of how well your
system hardware is working. The default monitoring configuration was selected to provide a variety of
notification for all supported hardware resources. As you become familiar with hardware monitoring, you
may want to customize the monitoring to meet your individual requirements.
✓ Use email and/or textfile notification methods for all your requests. Both of these methods, which
are included in the default monitoring, receive the entire content of the message so you can read it
immediately. Methods such as console and syslog alert you to the occurrence of an event but do not deliver
the entire message. You are required to retrieve the message using the resdata utility, which requires an
additional step.
✓ Use the `All monitors' option when creating a monitoring request. This applies the monitoring
request to all monitors. This has the benefit of ensuring a new class of hardware resource added to your
system will automatically be monitored. This means that new hardware is protected from undetected
hardware failure with no effort on your part.
✓ Easily replicate your hardware monitoring on all your systems. Once you have implemented a
hardware monitoring strategy on one of your system, you can replicate that same monitoring on other
systems. Simply copy all of the hardware monitor configuration files to each system that will use the same
monitoring. The monitor configuration files live in /var/stm/config/tools/monitor. Of course, you
must have installed hardware event monitoring on each system before you copy the configuration files to
it. Be sure to enable monitoring on all systems.
16
Chapter 1
Introduction
Hardware Monitor ing Overvie w
Hardware Monitoring Terms
The following terms are used throughout this guide. Understanding them is important when learning how
the hardware event monitors work and how to use them effectively.
Table 1-1Hardware Monitoring Terms
Term De fin it io n
Asynchronous event
detection
Default monitoring
request
Event Monitoring
Service (EMS)
EMS hardware
monitors
EMS high availability
(HA) monitors
The ability to detect an event at the time it occurs. When an
event occurs the monitor is immediately aware of it. This
method provides quicker notification response than polling.
The default monitoring configuration created when the EMS
Hardware Monitors are installed. The default requests
ensure that a complete level of protection is automatically
provided for all supported hardware resources.
The application framework used for monitoring system
resources on HP-UX 10.20 and 11.x. EMS hardware monitors
use the EMS framework for reporting events and creating
PSM monitoring requests. The EMS framework is also used
by EMS High Availability monitors.
The monitors described in this manual. They monitor
hardware resources such as I/O devices (disk arrays, tape
drives, etc.), interface cards, and memory. They are
distributed on the Support Plus Media and are managed
with the Hardware Monitoring Request Manager
(monconfig).
These monitors are different than EMS hardware monitors
and are not described in this manual. They monitor disk
resources, cluster resources, network resources and system
resources. They are designed for a high availability
environment and are available at additional cost. For more
information, refer to Using EMS HA Monitors, which can be
downloaded from http://docs.hp.com/hpux/ha/
Chapter 1
Event severity levelEach event that occurs within the hardware is assigned a
severity level, which reflects the impact the event may have
on system operation. The severity levels provide the
mechanism for directing event notification. For example, you
may choose a notification method for critical events that will
alert you immediately to their occurrence, and direct less
important events to a log file for examination at your
convenience. Also, when used with MC/ServiceGuard to
determine failover criteria, severe and critical events cause
failover.
Hardware eventAny unusual or notable activity experienced by a hardware
resource. For example, a disk drive that is not responding, or
a tape drive that does not have a tape loaded. When any such
activity occurs, the occurrence is reported as an event to the
event monitor.
17
Introduction
Hardware Monitoring Overview
Table 1-1Hardware Monitoring Terms
Term De fin it io n
Hardware event
monitor
Hardware resourceA hardware device used in system operation. Resources
MC/ServiceGuardHewlett-Packard's application for creating and managing
A monitor daemon that gathers information on the
operational status of hardware resources. Each monitor is
responsible for watching a specific group or type of hardware
resources. For example, the tape monitor handles all tape
devices on the system. The monitor may use polling or
asynchronous event detection for tracking events.
Unlike a status monitor, an event monitor does not
“remember” the occurrence of an event. It simply detects and
reports the event. An event can be converted into a more
permanent status condition using the Peripheral Status
Monitor.
supported by hardware monitoring include mass storage
devices such as disks and tapes, connectivity devices such as
hubs and multiplexors, and device adapters.
high availability clusters of HP 9000 Series 800 computers. A
high availability computer system allows application
services to continue in spite of a hardware or software
failure. Hardware monitoring integrates with
MC/ServiceGuard to ensure that hardware problems are
detected and reported immediately, allowing
MC/ServiceGuard to take the necessary action to maintain
system availability. MC/ServiceGuard is available at
additional cost
18
Monitoring requestA group of settings that define how events for a specific
monitor are handled by EMS. A monitoring request identifies
the severity levels of interest and the type of notification
method to use when an event occurs. A monitoring request is
applied to each hardware device (or instance) supported by
the monitor.
Monitoring requests are created for hardware events using
the Hardware Monitoring Request Manager. Monitoring
requests are created for changes in hardware status using
the EMS GUI.
Multiple-viewAs of the June 2000 release (IPR 0006), certain monitors will
allow event reporting to be tailored for different targets
(clients). This “multiple-view” (“Predictive-enabled”) feature
will be added to all hardware monitors in future releases.
Previously, hardware monitors generated events the same
way for all targets. The problem is that different targets,
such as Predictive Support, may have different requirements
for events.
Chapter 1
Table 1-1Hardware Monitoring Terms
Term De fin it io n
Introduction
Hardware Monitor ing Overvie w
Peripheral Status
Monitor (PSM)
PollingThe process of connecting to a hardware resource at regular
Predictive-enabledSee “multiple-view.” This feature enables hardware monitors
Resource instanceA specific hardware device. The resource instance is the last
Resource pathHardware event monitors are organized into classes (and
Included with the hardware event monitors, the PSM is a
monitor daemon that acts as a hardware status monitor by
converting events to changes in hardware resource status.
This provides compatibility with MC/ServiceGuard, which
uses changes in status to manage cluster resources. Through
the EMS GUI, the PSM is also used to create hardware
status monitoring requests.
intervals to determine its status. Any events that occur
between polling intervals will not be detected until the next
poll, unless the monitor supports asynchronous event
monitoring.
to work with Predictive Support.
element of the resource path and is typically the hardware
path to the resource (e.g., 10_12_5.0.0), but it may also be a
product ID as in the case of AutoRAID disk arrays. There
may be multiple instances for a monitor, each one
representing a unique hardware device for which the
monitor is responsible.
subclasses) for creating monitoring requests. These classes
identify the unique path to each hardware resource
supported by the monitor. Two similar resource paths exist
for each hardware resource—an event path used for creating
event monitoring requests, and a status path used for
creating PSM monitoring requests.
Chapter 1
19
Introduction
Hardware Monitoring Overview
20
Chapter 1
Installing and Using Monitors
2Installing and Using Monitors
This chapter instructs you on how to use the EMS Hardware Monitors to manage your hardware resources.
The topics discussed in this chapter include:
• An overview of the steps involved
• Installing EMS Hardware Monitors
• Adding and managing monitor requests
• Disabling and enabling EMS Hardware Monitors
NOTEYou don't need to completely understand the terms and concepts to begin protecting your
system with EMS Hardware Monitors by following the procedures in this chapter. If a term or
concept puzzles you, refer to Chapter 1, “Introduction,” or to Chapter 3, “Detailed Description.”
Chapter 2
21
Installing and Using Monitors
The Steps Involved
The Steps Involved
The steps involved in installing and configuring hardware monitoring are shown in Figure 2-1 on page 23.
Each step is described in detail in this chapter on the page indicated.
Step 1: (HP-UX 10.20 or 11.x only.) Install the Support Tools from the most current copy of Support Plus
Media you can find. You can also download this package over the Web. See “Installing EMS Hardware
Monitors”. This step is only necessary for HP-UX 10.20 or 11.x. With HP-UX 11i, the Support Tools are
automatically installed when the OS is installed.
Step 2: Examine the list of supported products to see if any of your devices have special requirements in
order to be monitored. For example, if monitoring FC-AL hubs, edit the file:
/var/stm/config/tools/monitor/dm_fc_hub. See “Fibre Channel Arbitrated Loop Hub Monitor”.
Step 3: (Releases earlier than June 1999 only.) Enable hardware event monitoring. See “Enabling
Hardware Event Monitoring”. This step is only necessary if you have a release of the Diagnostic/IPR
Media earlier than June 1999.
Step 4: Determine whether default monitoring requests are adequate. See “Viewing Current Monitoring
Requests”.
Step 5: Add or modify monitoring requests as necessary. See “Adding a Monitoring Request” and
“Modifying Monitoring Requests”.
Step 6: If desired, verify monitor operation (recommended but optional). See “Verifying Hardware Event
Monitoring”.
NOTEHow Long Will it Take to Get Hardware Monitoring Working?
You can get hardware monitoring installed and working in minutes. Once the software is
installed, you simply need to run the Hardware Monitoring Request Manager and enable
monitoring. The default hardware monitoring configuration should meet your monitoring
requirements without any changes or modifications. If you find that the default monitoring
should be customized, you can always return later and add or modify monitoring requests as
needed.
NOTEIf I'm Already Using EMS HA Monitors, Can I Also Use the EMS GUI to Manage
Hardware Monitoring?
For the most part, no. Hardware event monitoring is managed using the Hardware Monitoring
Request Manager, which serves the same function the EMS GUI serves for the EMS HA
monitors. The only portion of hardware monitoring that is managed using the EMS GUI is
status monitoring done using the Peripheral Status Monitor (PSM) described in Chapter 4,
“Using the Peripheral Status Monitor.”
22
Chapter 2
Installing and Using Monitors
Figure 2-1The Steps for Installing and Configuring Hardware Monitoring
The Steps Invol ved
Chapter 2
23
Installing and Using Monitors
Installing EMS Hardware Monitors
Installing EMS Hardware Monitors
The EMS Hardware Monitors software is distributed with the Support Tools (diagnostics). All the necessary
files for hardware monitoring are installed automatically when the Support Tools are installed. There are
several different ways that the Support Tools are installed:
• The Support Plus Media: installing the OnlineDiag depot from the Support Plus Media using swinstall.
• HP Software Depot website: downloading the “Support Tools for the HP 9000” in the “Enhancement
Releases” product category, then using swinstall to install the OnlineDiag depot.
• Automatic: with HP-UX 11i, the Support Tools are automatically installed from the OE CD-ROM when
the operating system is installed.
Complete instructions for installing STM are contained in Chapter 5 of the Support Plus: Diagnostics User's Guide.
The following software components are installed for hardware monitoring:
• All hardware event monitors
• Monitor configuration files
• Monitoring Request Manager
• EMS framework, including the EMS graphical interface
All EMS Hardware Monitors on the CD-ROM will be installed on your system, but only those that support
hardware resources you are using will be active. If you add a new hardware resource to your system that uses
an installed monitor, the monitor will be launched when the system is restarted, following the execution of the
IOSCAN utility, or when the Enable Monitoring option is selected from the Hardware Monitoring Request
Manager. This ensures that immediate monitoring and notification are provided for the new hardware
resource.
NOTEReinstalling or upgrading the STM software will erase the current Peripheral Status Monitor
(PSM) configuration. Any MC/ServiceGuard package dependencies or EMS monitoring
requests you have created with the PSM will be lost. Before reinstalling the STM software,
record the current PSM configuration so you can easily recreate it after the software has been
installed. Or you can comment out the PSM dependencies in the ServiceGuard configuration
files, then re-enable them after the STM software has been installed.
Supported System Configuration
To use the hardware event monitors your system must meet the following requirements:
• HP 9000 Series 700 or 800 Computer
• HP-UX 10.20 or 11.x (Hardware event monitoring is not currently available on the special high security
systems, HP-UX 10.26 (TOS) and HP-UX 11.04 (VVOS).
• Support Plus Media, the more current the better. The hardware event monitors were first distributed in
the February 1999 release (IPR 9902). Before the September 1999 release, the Support Plus Media was
called the Diagnostic/IPR Media.
Rather than use the Support Plus Media, you can download the Support Tools (including STM and the
hardware event monitors) over the Web. See Chapter 5 of the Support Plus: Diagnostics User's Guide for
24
Chapter 2
Installing and Using Monitors
Installing EMS Hardware Monitors
more information
• If you are using MC/ServiceGuard (optional), you must have version A.10.11 on HP-UX 10.20, or version
A.11.04 for HP-UX 11.x.
Removing EMS Hardware Monitors
The hardware monitoring software can be removed using the swremove utility. Run swremove and select the
OnlineDiag bundle. This will remove the hardware monitoring software components and the STM software
components.
Chapter 2
25
Installing and Using Monitors
Checking for Special Requirements
Checking for Special Requirements
Some devices have special requirements in order to be monitored. Examine the tables of supported products
below to see if any of your devices have special requirements.
Table 2-1Disk Arrays
ProductModel/Product
Number
HP AutoRAID Disk Array
Supported by: AutoRAID Disk Array
Monitor
HP High Availability Disk Array
Supported by: High-Availability Disk
Array Monitor
HP Fast/Wide SCSI Disk Array
Supported by: Fast/Wide SCSI Disk
Array Monitor
HP Fibre Channel High Availability
Disk Array (Model 60/FC)
Supported by Disk Array FC60 Monitor
12H
12
30/FC
20
10
C243XHANone
60/FCRequires AM60Srvr
Special
Requirements
Requires the
following ARMServer
versions:
B.10.01.10 for HP-UX
10.X (Patch
PHCO_21309)
B.11.00.10 for HP-UX
11.X (Patch
PHCO_21435)
None
daemon, part of the
Array Manager 60
disk array
management
software.
26
For HP-UX 11.00:
patch PHCO_21315
For HP-UX 10.20:
patch PHCO_21314
Chapter 2
Tab l e 2-2D is k Pr od uct s
Installing and Using Monitors
Checking for Special Require ments
ProductModel/Product
Number
All disks bound to the sdisk and disc30
drivers and not under the control of
another event monitor (such as a disk
array monitor).
Supported by: Disk Monitor
NANone
Special
Requirements
Table 2-3Tape Products (all supported by the SCSI Tape Devices Monitor)
ProductModel/Product
Number
DDS-2 AutoloaderA3400ANone
DDS-3 AutoloaderA3716ANone
DDS-4 AutoloaderC6370A, C6371AMarch 00 Release
DLT4000 4/48 Library; HP-UX;
Differential SCSI
DLT4000 2/48 Library; HP-UX;
Differential SCSI
A3544ANone
A3545ANone
Special
Requirements
DLT4000 2/28 Library; HP-UX;
Differential SCSI
DLT 4000 and 7000; 2/28; Drives
Differential; Robotics SE/Diff
The FC-AL Hub monitor requires:
Device Firmware revisions:
• Device Agent Firmware revision 2.14 or
greater
• Hub Controller Firmware revision 3.06
or greater
Firmware and installation instructions
are available at
http://www.software.hp.com
Special
Requirements
The following driver
revisions are
required: B.10.20
TFC plus Dart40
B.11.00 release
IPR9808 (Rocklin
version)
driver (td) Dart 48
B.11.00 release IPR
0003
Chapter 2
C++ runtime support patches:
• 10.20 PHSS_17872 (has a dependency:
PHSS_17225)
• 11.00 PHSS_21906
Before using the hub monitor, edit the
monitor configuration file
(/var/stm/config/tools/monitor/dm_fc_hub.cfg
) to indicate what hubs will be monitored.
See “Fibre Channel Arbitrated Loop Hub
Monitor” on page 102.
29
Installing and Using Monitors
Checking for Special Requirements
Table 2-8Fibre Channel Switch
ProductModel/Product
HP Fibre
Channel Switch
Supported by:
Fibre Channel
Switch Monitor
Tab l e 2- 9Mem or y
ProductModel/Product
All system memory.
Supported by: Memory Monitor
Special Requirements
Number
A5223AThe FC Switch monitor requires:
C++ runtime support patches:
• 10.20 PHSS_17872 (has a dependency:
PHSS_17225)
• 11.00 PHSS_21906
Before using the switch monitor, edit the
monitor configuration file
(/var/stm/config/tools/monitor/dm_fc_sw.cfg)
to indicate what switches will be monitored.
See “Fibre Channel Arbitrated Loop Hub
Monitor” on page 102.
Special
Number
NANone
Requirements
Tab l e 2-10S yst e m
ProductModel/Product
Core hardware (hardware within the
SPU cabinet)
Supported by: Core Hardware Monitor
Low Priority Machine Checks (LPMCs)
Supported by: LPMC Monitor
HP-UX Kernel Resources
Supported by: Kernel Resource Monitor
System Status
Supported by: System Status Monitor
Special
Number
NAHP-UX 11.x
NAHP-UX 11.x
NAHP-UX 11.x.
NANone
Requirements
Requires
configuration
through SAM.
30
Chapter 2
Tab l e 2-11I nt erf ac e Ca r ds
Installing and Using Monitors
Checking for Special Require ments
ProductModel/Product
SCSI1, SCSI2, & SCSI3 interface cards.
Supported by: SCSI123 Monitor
Tab l e 2- 1 2Oth er s
ProductModel/Product
All devices managed by HP device
management software. Current
plans are for many different types
of devices to be supported,
including disk drives, disk arrays,
disk jbods, tape drives, tape
libraries, FC hubs, switches and
bridges.
Supported by: Remote Monitor
HP UPSs (Uninterruptible Power
Systems):
Supported by: UPS Monitor
Number
NANone
Number
As of July 13, 2000:
HP A6188A storage
array
HP A6189A storage
array
HP Power Trust
A2941A (600 VA)
A2994A (1300 VA)
A2996B (1.3kVA)
A2997B (1.8kVA)
A2998B (3.0kVA)
A3589B (5.5kVA)
Special
Requirements
Special
Requirements
HP-UX 11xx, Sept. 2000
or later
TCP/IP port 2818 must
be available.
The HP-UX monitoring
daemon, ups_mond,
which is shipped on all
Series 800 systems (but
not on S700 systems)
Chapter 2
HP Power TrustII
A1353A (2.0kVA,
120V)
A1354A (2.0kVA,
240V)
A1356A (3.0kVA,
240V)
Explorer UPS
31
Installing and Using Monitors
Using Hardw are Monitoring Requests
Using Hardware Monitoring Requests
Monitoring requests are used to implement your strategy for monitoring hardware resources. The Hardware
Monitoring Request Manager is the tool you use to create and manage hardware event monitoring requests.
The following procedures describe how to use the Hardware Monitoring Request Manager to perform the
tasks involved in managing monitoring requests for all hardware event monitors.
What Is a Monitoring Request?
A monitoring request is the mechanism by which you manage how hardware event notification takes place.
EMS uses a monitoring request to determine what events should be reported, and what notification method
should be used to report them.
In building a monitoring request, you define the components that comprise the monitoring request. See
Figure 2-2 on page 33.
When building a request you must make the following decisions:
• WHAT hardware should be monitored? This is defined by selecting the monitor responsible for the
hardware resources you want to monitor. You can select multiple monitors for each monitoring request,
which gives you the ability to use a single request for a variety of hardware.
• WHAT events should be reported? Although the monitor can detect all hardware events, you can limit
the events that are reported. This is done by specifying the severity level(s) and an arithmetic operator.
Each severity level is assigned a numeric value to work with the operator (e.g., CRITICAL=5). Together
these settings determine which events to report. For example, you may be interested in all events greater
than or equal to Major Warning (>=MAJOR WARNING).
• HOW will notification be sent? You must select the notification method you want to use when an event
occurs. You may want to use several notification methods, but each method will require its own monitoring
request.
Some Monitoring Request Examples
The following monitoring request applies to all monitors. It sends all events with a severity greater than or
equal to MAJOR WARNING to an email address of sysad@hp.com:
Send events generated by all monitors
with severity >= MAJOR WARNING to EMAIL sysad@hp.com
The following monitoring request sends information events for all monitors to a text log:
Send events generated by all monitors
with severity = INFORMATION to TEXTLOG /var/opt/resmon/log/information.log
32
Chapter 2
Figure 2-2Building a Monitoring Request
Installing and Using Monitors
Using Hardw a re Monit or ing Requests
Chapter 2
33
Installing and Using Monitors
Running the Monitoring Request Manager
Running the Monitoring Request Manager
NOTEYou must be logged on as root to run the Monitoring Request Manager.
To run the Monitoring Request Manager, type:
/etc/opt/resmon/lbin/monconfig
The opening screen indicates if monitoring is currently enabled or disabled. Since the June 1999 release,
monitoring is enabled by default.
EVENT MONITORING IS CURRENTLY ENABLED<== MONITORING
========================================================
======Monitoring Request Manager Main Menu========
========================================================
Select:
(S)how current monitoring requests configured via monconfig
(C)heck detailed monitoring status
(L)ist descriptions of available monitor
(A)dd a monitoring request<== MAIN MENU
(D)elete a monitoring requestSELECTION
(M)odify an existing monitoring requestOPTIONS
(E)nable Monitoring
(K)ill (disable) monitoring
(H)elp
(Q)uit
Enter selection: [s]
STATUS
34
Chapter 2
Installing and Using Monitors
Enabling Hardware Event Monitoring
Enabling Hardware Event Monitoring
Hardware event monitoring must be enabled to protect your system from undetected hardware failures. All
hardware monitoring requests are ignored while monitoring is disabled. Once monitoring has been enabled,
all hardware event monitors and their associated monitoring requests will become operational.
NOTEAs of the June 1999 release, the hardware event monitors are automatically enabled when the
Support Tools bundle containing STM and the monitors is installed.
NOTEAre There Any Fibre Channel Arbitrated Loop Hubs or Fibre Channel Switches You
Wan t to Monito r?
An EMS Hardware Monitor is included for FC-AL hubs and FC switches. However, unlike the
other hardware monitors, these monitors require some initial configuration before they will
function. To ensure that your FC-AL hubs or FC switches are monitored, you should perform
the initial configuration before enabling monitoring. For information on performing the initial
configuration, refer to “Fibre Channel Arbitrated Loop Hub Monitor”, and “Fibre Channel
Switch Monitor” in Chapter 6, “Special Procedures.” When you have configured these monitors.
return here and continue with the procedure to enable monitoring.
To enable hardware event monitoring (only necessary for February and April 1999 releases):
1. Run the Hardware Monitoring Request Manager by typing:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter E
Hardware event monitoring is now enabled. The default monitoring requests shown in Table 2-13 on page 36
will be used to monitor your hardware. If these settings are adequate, you are done. If you want to add or
modify the monitoring you can do so using the Monitoring Request Manager.
Chapter 2
35
Installing and Using Monitors
Enabling Hardware Event Monitoring
Default Monitoring Requests
A set of default monitoring requests are created for each hardware event monitor. These default requests
provide a complete level of monitoring and protection for the hardware resources under the control of the
monitor. The default monitoring requests listed in Table 2-13 on page 36 are used for all hardware event
monitors.
NOTEWhen to Modify the Default Monitoring Requests
You can use the default monitoring requests provided and achieve a complete level of
protection. However, the default monitoring requests provide a limited number of notification
options. By modifying or adding new monitoring requests, you gain greater control over what
notification methods are used to alert you when events occur. You can add new notification
methods or remove those that may not be required. Creating custom monitoring requests also
allows you to manage which severity levels you want reported.
Table 2-13Default Monitoring Requests for Each Monitor
Severity Levels Notification Method
AllTEXTLOG File:
/var/opt/resmon/log/event.log
Serious, Critical.
As of IPR 9904
Major Warning
Serious, Critical.
As of IPR 9904
Major Warning
Serious, Critical.
As of IPR 9904
Major Warning
SYSLOG
CONSOLE.
Note: As of the June 1999 release, messages
are no longer sent to the console by default.
EMAIL address: root
36
Chapter 2
Installing and Using Monitors
Listing Monitor Descriptions
Listing Monitor Descriptions
One of the first steps in managing monitoring requests is selecting the proper monitor for the hardware
resource. You must know what hardware resources each monitor is responsible for to ensure that you select
the proper monitor. Listing the descriptions of the available monitors will show you what hardware resources
each monitor supports.
To list the descriptions of available monitors:
1. Run the Hardware Monitoring Request Manager by entering:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter L
A complete list of the available monitors and the hardware type each supports is displayed. Identify the name
of the desired monitor and then proceed with the monitoring request task.
NOTEFor a detailed list of the specific products each monitor supports, refer to the Diagnostics
website at:
http://docs.hp.com/hpux/diag/
Under “EMS Hardware Monitors,” click on “Supported Products” and “Data Sheets.” You can
also refer to the man page for the particular monitor; for example, “man_disk_em”.
Chapter 2
37
Installing and Using Monitors
Viewing Current Monitoring Requests
Viewing Current Monitoring Requests
Before adding or modifying monitoring requests, you should examine the current monitoring requests. These
include the default monitoring requests created during system startup. By examining the current requests,
you can determine what additional requests may be needed to implement your monitoring and notification
strategy.
The option to Show Monitoring Requests displays all the monitoring requests that have been created using
the Hardware Monitoring Request Manager, even requests that are inactive. See “Checking Detailed
Monitoring Status” on page 47, for information on viewing only active monitoring requests.
To view (or show) the current monitoring requests:
1. Run the Hardware Monitoring Request Manager by entering:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter S
A list of all the current monitoring requests configured for the hardware event monitors is displayed. The
display will be similar to the following screen, which shows the default monitoring requests.
1) Send events generated by all monitors
with severity >= INFORMATION to TEXTLOG / var/opt/resmon/log/event.log
2) Send events generated by all monitors
with severity >= MAJOR WARNING to SYSLOG
3) Send events generated by all monitors
with severity >= MAJOR WARNING to EMAIL root
Hit <enter> to continue...
38
Chapter 2
Installing and Using Monitors
Adding a Monitoring Request
Adding a Monitoring Request
Adding a monitoring request is a convenient way to add another notification method for a monitor. Each new
notification method requires its own monitoring request.
Monitoring requests can only be added at the monitor level, which creates an identical request for all
instances of the hardware resources supported by the monitor. Monitoring requests cannot be added for a
specific hardware instance. An “A(ll)” option allows you to add a monitoring request for all monitors in one
operation.
NOTEUsing the “All monitors” option when creating a request has the benefit of applying the request
to a new class of supported hardware resource that you may add to your system. This ensures
that the new hardware is automatically included in your monitoring strategy.
To add a monitoring request:
1. Run the Hardware Monitoring Request Manager by typing:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter A.
3. At the Monitors selection prompt, enter the number assigned to the monitor for which you are creating a
request. The numbers for the monitors are listed on the screen. You can enter multiple numbers separated
by commas, or you can enter “a” to create a request for all monitors.
4. At the Criteria Threshold prompt, enter the number for the desired severity level. See Table 2-15 on
page 41.
5. At the Criteria Operator prompt, enter the number for the desired operator. See Table 2-14 on page 40.
6. At the Notification Method prompt, enter the number for the desired method. See Table 2-14 on page 40. If
the notification method you selected requires you to input additional information, do so when promoted.
7. At the User Comment prompt, enter any comments about this monitoring request that you desire. This
text will be sent with events which match this monitoring request. This feature is NEW, as of the June
2000 release.
8. At the Client Configuration File prompt, enter (C)lear to use the default client configuration file, or enter
A(dd) to specify the name of a specific client configuration file for this request. This file allows you to
enable/disable events, set thresholding criteria and severity levels for events on a per-client basis (for
example, for Predictive Support). Adding a client configuration file at this prompt does not create or edit
the file; it merely sets up the monitoring request to use the file. Unless you have a specific client that
requires a client configuration file, choose (C)lear (the default). This feature is NEW, as of the June 2000
release. It is only valid for monitors that are Multiple-View (Predictive-Enabled).
9. Save the request when prompted.
Repeat the above steps for each new monitoring request.
NOTEAre monitoring requests automatically applied to new hardware resources?
Because monitoring requests are created at the monitor level and not at the hardware instance
level, a new hardware resource added to the system inherits the same monitoring requests
assigned to other hardware of the same type. This ensures that new hardware is automatically
added to the monitoring configuration. When you restart the system or perform an ioscan, the
Chapter 2
39
Installing and Using Monitors
Adding a Monitoring Request
new hardware will be included in event monitoring.
If you add a new class of supported hardware resource to your system, any monitoring requests
that apply to All monitors are used for the new hardware, ensuring that your hardware is
protected immediately from undetected failure.
For hardware monitoring to recognize new devices, the new devices must be properly added
and configured, so that they are recognized by the kernel (ioscan must see them).
This value identifies the severity level used in conjunction with the
criteria operator to generate an event message. See Table 2-15 on
page 41, for an explanation of severity levels.
This value identifies the arithmetic operator used with the criteria
threshold to control what events are reported. Valid operators are:
<(lessthan)
<= (less than or equal to)
>(greaterthan)
>= (greater than or equal than)
! (not equal to)
Operators treat each severity level as a numeric value assigned as
follows:
Critical = 5
Serious = 4
Major warning = 3
Minor warning = 2
Informational = 1
The criteria operators allow you to direct events of several severity
levels using the same notification method. For example, to direct both
Serious and Critical events using the same method, you would use a
condition of >= Serious.
The following notification methods are available.
EMAIL* - sends notification to the specified email address
TEXTLOG* - sends notification to specified file
SNMP - sends notification using SNMP traps
CONSOLE - sends notification to the system console
TCP - sends notification to the specified target host and port
UDP - sends notification to the specified target host and port
OPC - sends notification to OpenView ITO applications (available
only on systems with OpenView installed).
SYSLOG - sends notification to the system log
Only one notification method can be selected for each monitor
request, consequently you will need to create multiple requests to
direct event notification to different targets. * These are the only
methods that deliver the entire content of the event message. The
remaining methods alert you to the occurrence of an event, but
require you to retrieve the complete message content using resdata
explained later in this chapter.
Table 2-15Event Severity Levels
Event
Severity
Level
Description MC/ServiceGuard
Response
CriticalAn event that will or has already
caused data loss, system down time,
or other loss of service. System
operation will be impacted and
normal use of the hardware should
not continue until the problem is
corrected. Immediate action is
required to correct the problem.
SeriousAn event that may cause data loss,
system down time, or other loss of
service if left uncorrected. System
operation and normal use of the
hardware may be impacted. The
problem should be repaired as soon as
possible.
Major
Warning
An event that could escalate to a
Serious condition if not corrected.
System operation should not be
impacted and normal use of the
hardware can continue. The problem
should be repaired at a convenient
time.
If MC/ServiceGuard is
installed and this is a
critical component, a
package fail-over WILL
occur.
If MC/ServiceGuard is
installed and this is a
critical component, a
package fail-over WILL
occur.
If MC/ServiceGuard is
installed and this is a
critical component, a
package fail-over WILL
NOT occur.
Chapter 2
41
Installing and Using Monitors
Adding a Monitoring Request
Table 2-15Event Severity Levels
Event
Severity
Level
Minor
Warning
InformationAn event that occurs as part of the
Description MC/ServiceGuard
An event that will not likely escalate
to a more severe condition if let
uncorrected. System operation will
not be interrupted and normal use of
the hardware can continue. The
problem can be repaired at a
convenient time.
normal operation of the hardware. No
action is required.
Response
If MC/ServiceGuard is
installed and this is a
critical component, a
package fail-over WILL
NOT occur.
If MC/ServiceGuard is
installed and this is a
critical component, a
package fail-over WILL
NOT occur.
42
Chapter 2
Installing and Using Monitors
Adding a Monitoring Request
Example of Adding a Monitoring Request
The following example illustrates the process of adding a monitoring request. In this example a request is
added that will send all CRITICAL events detected by the AutoRAID disk array monitor to an email address
of admin@hp.com.
===================================================================
===========Monitoring Configuration Main Menu=============
===================================================================
Select:
(S)how current monitoring requests configured via monconfig
(C)heck detailed monitoring status
(L)ist descriptions of available monitors
(A)dd a monitoring request
(D)elete a monitoring request
(M)odify an existing monitoring request
(E)nable Monitoring
(K)ill (disable) monitoring
(H)elp
(Q)uit
A list of monitors to which it applies
A severity range (A relational expression and a severity. For example,
%< "MAJOR WARNING" means events with a severity "INFORMATION" and
"MINOR WARNING")
A notification method
Please answer the following questions to specify a monitoring request.
Monitors to which this configuration can apply:
1) /storage/events/disk_arrays/AutoRAID
2) /storage/events/disks/default
3) /adapters/events/FC_adapter
4) /connectivity/events/multiplexors/FC_SCSI_mux
5) /storage/events/enclosures/ses_enclosure
6) /storage/events/tapes/SCSI_tape
7) /storage/events/disk_arrays/FW_SCSI
8) /storage/events/disk_arrays/High_Availability
Enter monitor numbers separated by commas
{or (A)ll monitors, (Q)uit, (H)elp} [a] 1<== SELECT AUTORAID MONITOR
Criteria Thresholds:
1) Informational2) Minor Warning3) Major Warning
4) Serious5) Critical
Enter selection {or (Q)uit,(H)elp} [4] 5<== SELECT ONLY
Enter Email Address: [root] admin@hp.comadmin@hp.com
Chapter 2
43
Installing and Using Monitors
Adding a Monitoring Request
User Comment:
(C)lear(A)dd
Enter selection {or (Q)uit,(H)elp} [c] a<== ADD COMMENT
Enter comment: []This is a test message.IF DESIRED
Client Configuration File:
(C)lear(A)dd
Use Clear to use the default file.
Enter selection {or (Q)uit,(H)elp} [c] c<== SPECIFY CLCFG FILE
New entry:
Send events generated by all monitors
/storage/events/disk_arrays/AutoRAID<== NEW MONITORING
with severity = CRITICAL to EMAIL admin@hp.comREQUEST
with comment:
This is a test message
Are you sure you want to keep these changes?
{(Y)es,(N)o,(H)elp} [n] y
IF DESIRED (USUALLY
CHOOSE DEFAULT)
44
Chapter 2
Installing and Using Monitors
Modifying Monitoring Requests
Modifying Monitoring Requests
Modifying an existing monitoring request is a convenient way to alter one of the settings used in the request.
Simply select a monitoring request and then change the desired setting. All other aspects of the request
remain unchanged.
To modify a monitoring request:
1. Run the Hardware Monitoring Request Manager by typing:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter M
All current monitoring requests are displayed.
3. From the list of current monitoring requests, enter the number of the request you want to modify.
4. As you are prompted for each monitoring request setting, change the settings to achieve the desired
results.
5. Save the request when prompted.
Chapter 2
45
Installing and Using Monitors
Verifying Hardwa re E v e nt Mo nito ri n g
Verifying Hardware Event Monitoring
Once you have created the monitoring requests you need for your system, you may want to verify that they
are working as you expect. The most effective way of verifying hardware event monitoring is to simulate a
hardware failure or event. Depending on the hardware, you can do this by removing a disk from an array,
unplugging a cable, turning off the hardware resource, using known defective media, etc.
The simulated fault should generate event messages using all the notification methods you have specified. If
it does not, check the monitoring requests and make sure they are configured properly.
46
Chapter 2
Installing and Using Monitors
Checking Detail ed Monitoring Status
Checking Detailed Monitoring Status
This option lets you view the detailed information for all active monitoring requests. This information is
organized by resource instance, and lists all the monitoring requests currently applied to each instance.
Unlike the option to Show Monitoring Requests which displays all the monitoring requests that have been
created using the Hardware Monitoring Request Manager, the detailed status displays only the requests that
are currently active. For example, you can create a monitoring request for a monitor that is inactive, but it
will not be displayed in the detailed list.
A monitor that is not active will be identified with a status of NOT MONITORING. Any monitor that does not
have any resources to monitor will be inactive.
NOTEWhere Did the TCP Requests Come From?
You may notice that most resources have a TCP monitoring request that you did not create.
This request is created automatically by the Peripheral Status Monitor (PSM) to allow it to
gather event information from each monitor.
The following sample is representative of the types of entries displayed for detailed monitoring status.
Event messages generated by hardware monitoring can be delivered using a variety of notification methods.
To simplify receiving event messages you may want to use the email and/or textfile notification methods. Both
of these methods, which are included in the default monitoring, receive the entire content of the message so
you can read it immediately.
Methods such as console, syslog, and SNMP alert you to the occurrence of an event but do not deliver the
entire message. You are required to retrieve it using the resdata utility. For these methods, the event
notification will include a message similar to the following:
Execute the following command to obtain event details: /opt/resmon/bin/resdata
-R 392036357 -r /storage/events/tapes/SCSI_tape/10_12_5.0.0 -n 392036353 -a
It is important that you execute the command exactly as indicated, including the two critical number fields
that are indexes for the resdata entries.
Sample Event Message
The following is a portion of a sample event message.
> Event Monitoring Service Event Notification %<
Notification Time: Wed Sep 9 10:48:30 1998
hpbs8684 sent Event Monitor notification information:
/storage/events/disks/default/10_4_4.0.0 is >= 1.
Its current value is CRITICAL(5).
Event data from monitor:
Event Time : Wed Sep 9 10:48:30 1998
Hostname : hpbs8684.boi.hp.comIP Address : 15.62.120.25
Event Id : 0x0035f6b15e00000000Monitor: disk_em
Event # : 100037Event Class : I/O
Severity : CRITICAL
Disk at hardware path 10/4/4.0.0 : Media failure
Associated OS error log entry id(s):
000000000000000000
Description of Error:
The device was unsuccessful in reading data for the current I/O request
due to an error on the medium. The data could not be recovered. The
request was likely processed in a way which could cause damage to or loss
of data.
Probable Cause / Recommended Action:
The medium in the device is flawed. If the medium is removable, replace
the medium with a fresh one. Alternatively, if the medium is not
removable, the device has experienced a hardware failure.
Repair or replace the device, as necessary.
You may want to delete any monitor requests for a hardware resource that has been removed from your
system. Only requests created exclusively for the missing resource should be deleted.
CAUTIONUse careful consideration before deleting monitoring requests or you may make your system
vulnerable to undetected hardware failures. This is particularly true for the default monitoring
requests, which provide protection for all the supported hardware resources on your system.
To delete a monitoring request:
1. Run the Hardware Monitoring Request Manager by typing:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter D
All current monitoring requests are displayed.
3. From the list of current monitoring requests, enter the number assigned to the request you want to delete.
4. Delete the request when prompted to do so.
Chapter 2
49
Installing and Using Monitors
Disabling Hardware Event Monitoring
Disabling Hardware Event Monitoring
You can disable hardware event monitoring if desired. However, all EMS Hardware Monitors will be disabled.
You cannot disable a specific monitor. While monitoring is disabled, all monitoring requests are disabled. The
monitoring requests are retained and become operational when monitoring is re-enabled.
CAUTIONUse careful consideration before disabling hardware event monitoring. Be aware that ALL
hardware monitoring will be disabled. While monitoring is disabled, your hardware resources
are vulnerable to undetected failures.
Disabling monitoring will impact MC/ServiceGuard if package dependencies have been created
for the hardware event monitors.
To disable hardware event monitoring:
1. Run the Hardware Monitoring Request Manager by typing:
/etc/opt/resmon/lbin/monconfig
2. From the main menu selection prompt, enter K.
3. Confirm disabling when prompted to do so. When you are ready to re-enable hardware event monitoring,
see “Enabling Hardware Event Monitoring”.
50
Chapter 2
Detailed Description
3Detailed Description
This chapter describes EMS Hardware Monitors in detail. The topics discussed in this chapter include:
• Hardware monitoring architecture.
• Hardware monitoring request manager.
• EMS hardware event monitor.
• Polling or asynchronous?
• Startup client.
• Peripheral status monitor.
• Event monitoring service (EMS).
• File locations.
• Startup process (in detail).
• Asynchronous event detection (in detail).
• Event polling (in detail).
Chapter 3
51
Detailed Description
The Detailed Picture of Hardware Monitoring
The Detailed Picture of Hardware Monitoring
The following figure shows the major components involved in hardware monitoring and the communication
paths between them.
Figure 3-1Hardware Monitoring Architecture
52
Chapter 3
Detailed Description
The Detailed Picture of Hardware Monitoring
Components from Three Different Applications
Hardware event monitoring involves components from three different applications:
• Event Monitoring System (EMS) provides the framework for event notification. EMS was originally
developed to support system monitoring, but the existing framework is used to manage hardware event
monitoring as well.
• Hardware event monitoring components include the event monitor, associated configuration files, and the
hardware monitoring request manager.
• Support Tools Manager provides the low-level error handling components that are also used for recording
and viewing system errors.
Hardware Monitoring Request Manager
Hardware event monitoring requests are created and managed using the Hardware Monitoring Request
Manager program. This tool allows you to easily create monitoring requests for all the hardware event
monitors running on your system. The Hardware Monitoring Request Manager uses all the notification
methods supported by Event Monitoring Service (EMS), giving you the ability to create a consistent
notification strategy for both system resources and hardware resources. The Hardware Monitoring Request
Manager is also used to enable or disable hardware monitoring.
Once created, all hardware event monitoring requests are handled by EMS, which uses the request settings to
determine how an event should be reported.
Chapter 3
53
Detailed Description
The Detailed Picture of Hardware Monitoring
EMS Hardware Event Monitor
The EMS hardware event monitor is the key component in the event monitoring architecture. An event
monitor is a daemon process, running in the background continuously. The event monitor watches all
instances of the hardware resources it supports, waiting for the occurrence of any failures or other unusual
events. The monitor may use polling, asynchronous event detection, or both.
When an event occurs, the monitor alerts EMS and passes it the appropriate event message. The event
monitor also tells the PSM about the event. If the event is serious enough the PSM will change the status of
the hardware to DOWN.
Two configuration files control the operation of each hardware event monitor:
• Global monitor configuration file. The settings defined in this file are used for all hardware event
monitors, unless overridden by a monitor-specific file.
• Monitor-specific configuration file. Each monitor includes its own configuration file with optimized
settings. The settings defined in the monitor-specific file override corresponding settings defined in the
global configuration file.
NOTEThe settings defined by the monitor-specific configuration file have been carefully selected to
meet the needs of most users. It is possible to alter these settings, but it is not recommended
unless you fully understand the implications of doing so. For information on modifying the
monitor-specific configuration files, see Chapter 5, “Hardware Monitor Configuration Files.”
NOTEAs of the June 2000 release, several of the hardware monitors have been converted to be
“multiple-view” (Predictive-enabled). These monitors use a different file for configuration, the
Client Configuration File.
Polling or Asynchronous?
Hardware event monitors employ two methods of tracking events: polling and asynchronous event detection.
A monitor may use one or both of the methods to detect events.
Using polling, a monitor checks the status of its hardware resources at regular intervals, typically 60
minutes. Any unusual condition reported by the hardware will trigger an event by the monitor. The polling
interval is selected to provide reasonable detection without impacting system performance. The main
disadvantage of polling is that an event will not be detected until the next time the resource is polled, which
makes the system vulnerable to another hardware failure.
Asynchronous detection allows a monitor to detect an event when it occurs, usually during an I/O to the
device. An event typically results in a log entry made by the hardware device driver. The monitor detects the
log entry and initiates the event notification. Asynchronous event monitoring allows immediate notification
and response to a critical situation.
Startup Client
The startup client launches and configures the hardware event monitors each time the system is started, or
following the execution of the IOSCAN utility. The startup client starts each monitor and configures its
hardware resources using a set of default monitoring requests.
Each monitor has its own startup configuration file, which contains the default monitoring requests and
any customized requests created using the Hardware Monitoring Request Manager. During system startup,
54
Chapter 3
Detailed Description
The Detailed Picture of Hardware Monitoring
following the execution of the IOSCAN utility, or when managing requests using the Hardware Monitoring
Request Manager, the startup client reads each configuration file and creates the monitoring requests defined
by the entries in the file. The Hardware Monitoring Request Manager updates the contents of the startup
configuration file when you add or modify monitoring requests.
Peripheral Status Monitor (PSM)
The sole purpose of the peripheral status monitor (PSM) is to convert events detected by a hardware event
monitor to changes in hardware resource status. This conversion is required for use with MC/ServiceGuard in
controlling package failover. When an event occurs, the PSM determines if it is serious enough to warrant a
change in hardware resource status to DOWN. If it is, the PSM alerts EMS, which then informs
MC/ServiceGuard.
More information about the PSM is included in Chapter 4, “Using the Peripheral Status Monitor.”
Event Monitoring Service (EMS)
The event monitoring service (EMS) provides the framework within which hardware monitoring takes
place. EMS manages the monitoring requests created for each monitor. When an event occurs, the associated
monitor alerts EMS and passes it an event message. EMS then uses the monitoring request to determine how
(or if) the event message should be delivered. EMS manages all hardware event notification.
EMS also provides the graphical interface for creating and managing PSM monitoring requests. Like event
monitoring requests, all PSM monitoring requests are managed by EMS.
Other system monitors are available for EMS at additional cost. For more information on EMS and available
monitors, see Using EMS HA Monitors (B5735-90001).
Chapter 3
55
Detailed Description
The Detailed Picture of Hardware Monitoring
File Locations
The following table lists the locations of the files involved in hardware monitoring.
In the above table, monitor_name is the name of a particular monitor such as armmon.
56
Chapter 3
Detailed Description
The Detailed Picture of Hardware Monitoring
Startup Process (in Detail)
The following steps describe the process used to start the hardware monitoring. The startup process is
illustrated in Figure 3-2 on page 57.
The startup process is managed by the startup client (startcfg_client). The startup client is run when the
system is restarted, following an IOSCAN, when the enable monitoring command is executed from the
Hardware Monitoring Request Manager, or when monconfig changes the monitor requests.
1. When the system is restarted, following an IOSCAN, or when the enable monitoring command is executed,
the Hardware Monitoring Request Manager (monconfig) calls the start up client (startcfg_client).
2. The startup client reads the contents of a monitor startup configuration file and registers the monitoring
requests contained in the file with the EMS registrar. This causes the associated monitor to start running.
If monitoring is already enabled, the startup client unregisters all current monitoring requests, then reads
the content of the startup configuration files and registers the requests again.
3. The monitor examines the IOSCAN results table to determine if there are any hardware resources on the
system that it is responsible for monitoring. If it finds such resources, the monitor continues to run. If it
does not find any resources, the monitor stops.
4. If the monitor supports asynchronous event detection, it registers with diaglogd, indicating what types of
errors the monitor wants to receive. The monitor may specify a product description, product number, or
driver name.
5. The startup client then repeats the process for all monitor startup configuration files.
Figure 3-2Monitoring Startup Process
Chapter 3
57
Detailed Description
The Detailed Picture of Hardware Monitoring
Disabling Monitoring
Hardware monitoring can be disabled using the Hardware Monitoring Request Manager. Disabling
monitoring disables all EMS Hardware Monitors. Individual monitors cannot be disabled using the Hardware
Monitoring Request Manager.
When monitoring is disabled all existing monitoring requests are unregistered, and then a kill -2 command
is issued to stop all monitors.
58
Chapter 3
Detailed Description
The Detailed Picture of Hardware Monitoring
Asynchronous Event Detection (in Detail)
The following steps describe the process involved in asynchronous event detection. The asynchronous
detection is illustrated in Figure 3-3 on page 60.
1. A device driver detects an error during an I/O with the device.
2. The device driver passes the error information, including SCSI sense data, to the diag2 pseudo driver,
which adds information indicating the instance of the driver logging the error to the message header. The
error message is then passed to the diaglogd daemon used by STM to monitor recoverable errors.
3. Diaglogd uses the instance information to retrieve hardware path, product type, product name, and
driver name information from the message header. This information is used to determine which monitor, if
any, the information should be passed to. The error message is also written to the raw error log
(/var/stm/logs/os/log#.raw.cur).
During startup, each asynchronous monitor registered with diaglogd, indicating what types of errors the
monitor wants to receive. The monitor may specify a product description, product number, or driver name.
If a monitor is registered to receive the error, the message is passed to it.
4. The monitor decodes the error to determine if an event should be reported. If an event should be reported,
the monitor passes the event message to Event Monitoring Service (EMS).
5. EMS uses the current monitoring requests for the monitor to determine what action to take. Based on the
requests, the event is reported using the specified notification method(s).
Event Decoding
In addition to monitoring hardware, many of the EMS hardware monitors also act as message decoders for
logtool, which is used to read the contents of the raw error log. If the error uses an EMS hardware monitor
as the decoder, logtool launches a new instance of the monitor to perform the decoding. In this way all
events that have occurred on the device, including those IGNORED by the monitor, can be viewed.
Chapter 3
59
Detailed Description
The Detailed Picture of Hardware Monitoring
Figure 3-3Asynchronous Event Detection Process
60
Chapter 3
Detailed Description
The Detailed Picture of Hardware Monitoring
Event Polling (in Detail)
The following is the process used for gathering event information using polling. The polling process is
illustrated in Figure 3-4 on page 62.
1. At the interval defined by the polling value in the monitor configuration file, the monitor communicates
with all the devices it is currently monitoring. The monitor sends pass-thru commands to all SCSI devices,
and uses the appropriate protocol for other types of devices. The exact type and sequence of
communication used during a polling operation is monitor-specific.
2. Each device responds to the message from the monitor by returning data indicating its status. The
information returned in response to polling is not entered in the raw error log.
3. The monitor interprets the information from the device to determine if an event should be reported. If an
event should be reported, the monitor passes the event message to EMS.
4. EMS uses the current monitoring requests for the monitor to determine what action to take. Based on the
requests, the event is reported using the specified notification method(s).
FC-AL Hub and FC Switch Polling Processes
Unlike the other EMS hardware monitors, the FC-AL hub monitor and FC switch monitor use SNMP to
gather information from the hubs or switches they are monitoring. Using the hub or switch IP addresses
defined in the hub or switch configuration files, the monitor polls the devices at the defined polling interval
(60 minutes by default) using SNMP.
The reporting of events is handled in the same way as all other monitors. Event information gathered by the
hub and switch monitors does not get written to the raw error log, and the hub and switch monitors do not act
as a decoder for logtool.
Memory Monitor Polling
The memory monitor polling process uses different components to retrieve event information. The memory
monitor polling process is illustrated in Figure 3-5 on page 63.
1. At regular intervals (default 60 minutes) the memlogd daemon polls the memory hardware.
2. If a single-bit error is detected, memlogd uses the values from the memory configuration file to determine
the severity of the error, and then passes the appropriate event message to the memory monitor.
The error is also logged in memlog, which can read using logtool. All decoding of memory error messages
is performed by memlogd.
3. The memory monitor determines if the event should be reported. If the event should be reported, the
monitor passes the event message to Event Monitoring Service (EMS).
4. EMS uses the current monitoring requests for the memory monitor to determine what action to take.
Based on the requests, the event is reported using the specified notification method(s).
Chapter 3
61
Detailed Description
The Detailed Picture of Hardware Monitoring
Figure 3-4Monitoring Polling Process
62
Chapter 3
Figure 3-5Memory Monitor Polling Process
Detailed Description
The Detailed Picture of Hardware Monitoring
Chapter 3
63
Detailed Description
The Detailed Picture of Hardware Monitoring
64
Chapter 3
Using the Peripheral Status Monitor
4Using the Peripheral Status Monitor
This chapter describes the peripheral status monitor, which converts hardware events to status information
for use by MC/ServiceGuard. The topics in this chapter include:
• An overview of the PSM
• How to configure MC/ServiceGuard package dependencies with the PSM
• How to create EMS monitoring requests for the PSM
Chapter 4
65
Using the Peripheral Status Monitor
Peripher al Status Monitor Overview
Peripheral Status Monitor Overview
The primary function of the peripheral status monitor, or PSM, is to convert hardware events into changes in
device status. These changes in status can then be used by MC/ServiceGuard to control package failover.
The information in Chapter 2, “Installing and Using Monitors,” described how to configure your system to
detect hardware events using the Monitoring Request Manager. In this chapter you will learn how to use the
PSM to convert these events into changes in device status using the EMS GUI, which is accessed through
SAM.
NOTECan I Use the PSM Without MC/ServiceGuard?
Even if you are not using MC/ServiceGuard, you can still use the PSM to create hardware
status monitoring requests using EMS. This allows you to get notification for changes in
hardware resource status, much as you can for other EMS monitors. If you create a PSM
monitoring request, when a hardware event occurs you may be alerted twice—once for the
event itself and again if the event caused the status of the resource to change to DOWN.
66
Chapter 4
Using the Peripheral Status Monitor
How Does the PSM Work?
How Does the PSM Work?
The PSM converts hardware events detected by the EMS Hardware Monitors to “UP” or “DOWN” status,
which is used by MC/ServiceGuard in controlling package failover. Figure 4-1 on page 68 illustrates how the
PSM works with the other components of hardware monitoring.
Because hardware event monitors detect and report the occurrence of events rather that resource status, a
method is required to alert MC/ServiceGuard when a hardware resource has a status that may impact data
availability. The PSM provides this functionality, serving as the interface between the hardware event
monitors and MC/ServiceGuard.
Some monitors can determine when a problem has been corrected and the hardware is functioning properly.
These monitors automatically alert the PSM when the hardware is fixed, and the PSM will return the state of
the hardware to UP. Other monitors do not have the capability of determining when the hardware problem is
corrected. With these monitors it will be necessary for the user to use the set_fixed utility to manually
return the operational state to UP.
Chapter 4
67
Using the Peripheral Status Monitor
How Does the PSM Work?
Figure 4-1Peripheral Status Monitor
68
Chapter 4
Using the Peripheral Status Monitor
How Does the PSM Work?
PSM Components
The PSM comprises the following components, which are installed along with the hardware event monitors.
Each component has its own man page containing detailed information about its operation.
• psmctd - the Peripheral Status Client/Target daemon used to monitor the state of hardware resources.
• psmmon - the utility used to monitor the state of resources recognized by the psmctd daemon.
• set_fixed - the utility used to manually change the status of a hardware resource from DOWN to UP.
Used only for monitors that do not the have capability to perform this operation automatically.
PSM States
The PSM can assume the three status conditions shown in the following table. These are the values you can
use to define a monitoring request.
Tab l e 4-1P SM Sta tus
Condition Interpretation
UpThe hardware is operating normally.
DownAn event has occurred that indicates a
failure with the hardware.
UnknownCannot determine the state of the
hardware. This state is treated as DOWN by
the PSM.
PSM Resource Paths
Selecting a hardware resource for PSM monitoring requires the selection of the correct resource path. The
resource class path is the means by which EMS identifies system resources. Resources are divided into
classes and subclasses based on their type or function. For example, the resource classes for PSM monitoring
include adapters, connectivity, and storage.
The resource path ends with the resource instance, which uniquely identifies a hardware resource. There is
an instance for each individual hardware resource supported by the monitor. The resource instance is
typically the hardware path to the device (e.g., 10_12_5.0.0), but it may also be a device name as in the case of
AutoRAID disk arrays.
EMS monitoring requests are applied at the resource instance level. This is unlike event monitoring requests
created using the Hardware Monitoring Request Manager, which are applied at the monitor level. Thus when
creating an EMS monitoring request you must select the specific resource you want to monitor. An all (*)
option allows you to apply a PSM monitoring request to all current instances of the hardware. A monitoring
request will not be applied to new hardware added to the system after the request is created.
PSM resource class path names are structured as follows:
For example, the PSM resource class path for a SCSI tape device at hardware path 10_12_5.0.0 would be:
/storage/status/tapes/SCSI_tape/10_12_5.0.0
The PSM resource class path for an AutoRAID disk array with an ID of 000000105781 would be:
/storage/status/disk_arrays/AutoRAID/000000105781
Chapter 4
69
Using the Peripheral Status Monitor
How Does the PSM Work?
The status resource class path for each monitor is included in the monitor descriptions are available on the
Web at http://docs.hp.com/hpux/onlinedocs/diag/ems/emd_summ.htm.
An HP-UX man page is available for each monitor. To access the man page, type (where
executable file listed in the data sheet): man
monitorname
monitorname
is the
70
Chapter 4
Using the Peripheral Status Monitor
Configuring MC/ServiceGuar d Package Dependencies with the PSM
Configuring MC/ServiceGuard Package Dependencies with the PSM
The PSM allows you to create MC/ServiceGuard package dependencies for resources monitored by EMS
Hardware Monitors.
To use the PSM with MC/ServiceGuard, you configure one or more of the resource instances available in the
PSM as MC/ServiceGuard package dependencies. This creates an EMS monitoring request that monitors the
status of the resource and alerts MC/ServiceGuard if the status of the resource changes.
Here are some examples of how PSM monitoring requests might be used:
• In a cluster where one copy of data is shared between all nodes in a cluster, you may want to failover a
package if the host adapter has failed on the node running the package. Because buses, controllers, and
disks are shared, package failover to another node because of bus, controller, or disk failure would not
successfully run the package. To make sure you have proper failover in a shared data environment, you
must create identical package dependencies on all nodes in the cluster. MC/ServiceGuard can then
compare the resource “UP” values on all nodes and failover to the node that has the correct resources
available.
• In a cluster where each node has its own copy of data, you may want to failover a package to another node
for a host adapter, bus, controller, or disk failure. In this sort of cluster of web servers, where each node has
a copy of the data and users are distributed for load balancing, you can failover a package to another node
with the correct resources available. Again, the package resource dependencies should be configured the
same on all nodes.
NOTEYou should create the same requests on all nodes in an MC/ServiceGuard cluster.
There are two methods for configuring PSM package dependencies; using SAM, or by editing the package
configuration file.
Chapter 4
71
Using the Peripheral Status Monitor
Configuring MC/ServiceGuard Package Dependencies with the PSM
Configuring Package Dependencies using SAM
The procedure assumes you have taken the necessary steps to create the package to which you will be adding
resource dependencies. Complete instructions for configuring MC/ServiceGuard clusters and packages are
provided in Managing MC/ServiceGuard.
To create a package resource dependency:
1. From the command line, start the graphical version of SAM by typing: sam
2. Double-click the Clusters icon.
3. Double-click the High Availability Clusters icon.
4. Double-click on the Package Configuration icon.
The High Availability Clusters screen is displayed showing all requests configured on that system.
5. From the Actions menu, select either Create/Add a Package or Modify Package Configuration.
Depending on which option you selected, the Create/Add Package screen is displayed or the Modify
Package screen is displayed.
6. If you have not yet done so, specify a Package Name and Node and Specify a Package SUBNET Address.
Then click on “Specify Package Resource Dependencies…” to add PSM resources as package dependencies.
The Package Resource Dependencies screen is displayed.
7. To make a package dependent on an EMS HA Monitors resource, click Add Resource. The Add Resources
screen is displayed listing all the installed resources discovered by MC/ServiceGuard. The resource classes
used for PSM monitoring are adapters, connectivity, storage, and system.
8. Double-click on the appropriate PSM resource class, then on the status class, then on the remaining
resource subclasses until the PSM monitor instances are displayed in the Resource Names list. Select
the desired PSM resource and click OK. A Resource Parameters screen is displayed
9. Enter an appropriate Resource Polling Interval value. This value determines how often EMS checks
the PSM for changes in status. The value you select for polling should be related to how critical the
resource is to system operation. You may want to use a short polling interval for critical resources, and a
longer interval for non-critical resources. Be aware that polling can impact system performance, so avoid
using a short polling interval for all resources.
10.Select UP from the list of Available Resource Values, then click < — Add — .
11.Click OK to add the package dependency.
Package failover will now occur if the status of the resource changes from UP.
72
Chapter 4
Using the Peripheral Status Monitor
Configuring MC/ServiceGuar d Package Dependencies with the PSM
Configuring Package Dependencies by Editing the Configuration File
You can also add PSM package dependencies by editing the package configuration file in
/etc/cmcluster/pkg.ascii. See the Managing MC/ServiceGuard for details on modifying this file.
When using the MC/ServiceGuard commands (e.g., cmapplyconf) to specify the use of the PSM Resource
Monitor, the section of the package configuration file that has the keyword “RESOURCE_NAME” must be
uncommented and set to the value of the resource name of interest. The PSM has a different resource path
name for hardware resource being monitored.
For example, assume you want to create a dependency on a SCSI disk that has a resource path of
/storage/status/disks/default/10_0_5.0.0. You want to use a polling interval of 10 seconds and identify
UP as the only state that will not cause failover. The following entry would be added to the configuration file
to add a package dependency for this disk:
In addition to creating MC/ServiceGuard package dependencies, you can also use the PSM to create EMS
monitoring requests. Because it is a state monitor rather than an event monitor, the process and options
available for creating PSM requests with EMS are identical to those for the other system monitors available
for EMS.
To create a PSM monitoring request:
1. From the command line, start the graphical version of SAM by typing: sam
2. Double-click the Resource Management icon.
3. Double-click on the Event Monitoring Service icon.
The Event Monitoring Service main screen is displayed showing all monitoring requests configured on the
system. Included are any PSM monitoring requests you may have created, and any requests created for
other EMS monitors that may be running on your system. If you have not created any requests, the field
area of the screen will be empty.
4. From the Actions menu select Add Monitoring Request.
The top level resource classes are displayed. The resource classes used for PSM monitoring are adapters,
connectivity, storage, and system.
5. Double-click on the appropriate resource class, then on the status class, then on the remaining resource
subclasses until the PSM monitor instances are displayed in the Resource Instance list.
6. Select the desired PSM resource instance and click OK. If there are multiple instances, you can select the
* (All Instances) option to apply the monitoring request to all instances of the selected resource. All
Instances is a convenient way to create many requests at one time.
The Monitoring Request Parameters screen is displayed for the selected PSM resource.
7. Using the various parameter fields available, define the monitoring request. A description of the various
parameters and how they are used is included in the following section.
Although there are many possible ways to define the monitoring request, the following settings are
recommended for PSM requests:
• Notify conditions set to “Notify When value is…Not Equal Up (0)”
• Options set to Initial and Return
• Pollin g Interval set to an appropriate value
• Notify via set to the desired notification method
8. Click OK to save the monitoring request. The request will be added to those in the Current Monitoring
Requests screen.
Repeat the above steps for each new PSM monitoring request. It will be necessary to create a new monitoring
request for each notification method.
74
Chapter 4
Using the Peripheral Status Monitor
Monitoring Request Parameters
Monitoring Request Parameters
The following information describes in detail the monitoring request parameters and offers tips on how to use
them.
Specifying When to Send Event - <Notify>
One of the first steps in creating a monitoring request involves specifying the conditions under which you
want to be alerted. The following options are available for selecting when to send an alert.
Tab l e 4-2P SM Sta tus
When value
is…
When value
changes
At each
interval
You define the conditions under which you wish to be notified for a
particular resource using an operator (=, not equal, >, >=, <, <=)
and a value returned by the monitor (UP, DOWN, UNKNOWN).
Text values are mapped to numerical values.
This notification might be used for a resource that does not change
frequently, but you need to know each time it does.
This sends notification at each polling interval. It would most
commonly be used for reminders or gathering data for system
analysis. Use this for only a small number of resources at a time,
and with long polling intervals of several minutes or hours; there is
a risk of affecting system performance.
Determining the Frequency of Events - <Options>
If you select the When value is… from the <Notify> options, the Options box is displayed. Select one or more
of these options:
Tab l e 4-3P SM Sta tus
InitialUse this option for testing a new request to ensure it is sending alerts
to the desired destinations.
RepeatUse this option for urgent alerts. The Repeat option sends an alert at
each polling interval as long as the notify condition is met. Use this
option with caution; there is a risk of high CPU use or filling log files
and alert windows.
ReturnUse this option to track when a condition returns to its previous
value.
These Options are not available if you have selected When value changes or At each interval from the
<Notify> list. In these cases the options default to:
• Repeat and Return - Not selected
•Initial - Selected
Setting the Polling Interval - <Polling Interval>
The polling interval specifies how often EMS will check the PSM for changes in hardware status. The polling
Chapter 4
75
Using the Peripheral Status Monitor
Monitoring Request Parameters
interval is the maximum amount of elapsed time before EMS will be aware of a change in status for the
hardware resource being monitored. A short polling interval will ensure that you have recent data. However,
a short polling interval may use more CPU and system resources. You must weigh the importance of being
able to respond quickly against the importance of maintaining good system performance.
Some considerations include:
• MC/ServiceGuard monitors resources every few seconds. You may want to use a short polling interval (30
seconds or less) when it is critical that you make a quick failover decision.
• You may want a polling interval of 5 minutes or so for monitoring less critical resources.
• You may want to set a very long polling interval (4 hours) to monitor failed disks that are not essential to
the system, but which should be replaced in the next few days.
Selecting Protocols for Sending Events - <Notify Via>
Using the <Notify via> option, you can specify the method EMS uses to send events. The options are:
opcmsg ITO
This option sends messages to ITO applications via the opcmsg daemon. IT Operation 4.0 or above must be
installed on the resource server for this option to display.
The ITO message severity options are:
• Critical
• Major
• Minor
• War n ing
• Normal
A specified severity other than Normal is returned under the following conditions:
•The When value is . . . condition evaluates to TRUE
•The When value changes condition evaluates to TRUE
See the HP OpenView IT/Operations Administrators Task Guide (Part Number B4249-90003) for more
information on configuring notification severity.
Templates for configuring IT/Operations and Network Node events can be found on the Hewlett-Packard
High Availability public web page at http://www.hp.com/go/ha.
To set the opcmsg ITO:
1. Specify the notification type from the <Notify> list.
2. Select the opcmsg ITO option from the <Notify via> list.
3. Select the severity from the <Severity> list, (Critical, Major, Minor, Warning, Normal).
SNMP traps
This option sends messages to applications using SNMP traps, such as Network Node Manager. See HP
OpenView Using Network Node Manager (P/N J1169-90002) for more information on configuring SNMP
Specify the ITO message severity for both normal and abnormal events:
• Critical
• Major
• Minor
• War n ing
• Normal
A specified severity other than Normal is returned under the following conditions:
Certain SNMP trap monitoring requests can map directly to severity levels. For these requests, a toggle
button <Map severity from value> is displayed. If this is selected, options selected from <Severity> are
ignored.
•The When value is… condition evaluates to TRUE
•The When value changes condition evaluates to TRUE
To set the SNMP trap:
1. Specify the notification type from the <Notify> list.
2. Select the opcmsg ITO option from the <Notify via> list.
3. Select the severity from the <Severity> list, (Critical, Major, Minor, Warning, Normal).
TCP and UDP
This option sends TCP or UDP encoded events to the target host name and port indicated for that request.
Thus the message can be directed to a user-written socket program.
To set the TCP or UDP conditions:
1. Select the TCP or UDP option, as appropriate, from the <Notify via> list.
2. Specify the target host name and the port.
email
This option sends event notification to the specified email address
To set for email notification:
1. Select the Email option from the <Notify via> list.
2. Specify the full email address in the Email Address field.
syslog
This option sends event notification to the system log.
For an abnormal event, a system logging level of error will be associated with the logged message.
An abnormal event message (error) is returned under the following conditions:
•The When value is . . . condition evaluates to TRUE
•The When value changes condition evaluates to TRUE
Chapter 4
77
Using the Peripheral Status Monitor
Monitoring Request Parameters
To set for a system log notification:
1. Select the Syslog option from the <Notify via> list.
Console
This option sends event notification to the system console.
To set for a console notification:
1. Select the Console option from the <Notify via> list.
Textlog
This option sends event notification to the specified file.
To set for an text log notification:
1. Select the Textlog option from the <Notify via> list.
2. Specify the filename and path in the File Path field.
A default path, /var/opt/resmon/log/event.log, is displayed when the Textlog option is selected.
Note that EMS HA Monitors will not create the file, it will add notifications to an existing file.
Adding a Notification Comment - <Comment>
The notification comment is useful for sending task reminders to the recipients of an event. For example, you
may want to add the name of the person to contact if an event occurs. If you have configured
MC/ServiceGuard package dependencies, you may want to enter the package name as a comment in the
corresponding request.
78
Chapter 4
Using the Peripheral Status Monitor
Copying Monitoring Requests
Copying Monitoring Requests
There are two ways to use the copy function:
• To create requests for multiple resources using the same monitoring parameters. This is a quick way to set
requests for multiple resources.
• To create requests for the same resource using different monitoring parameters. This is a quick way to
create requests that send events using multiple notification methods.
To create requests for multiple resources using the same monitoring parameters:
1. From the Event Monitoring Service main screen, select the monitoring request whose parameters you
wish to copy. You need to have configured at least one similar request for a similar instance.
2. From the Actions menu select Copy Monitoring Request.
The Add Monitoring Request screen is displayed.
3. From the Add Monitoring Request screen, select a different resource instance and click OK.
The Monitoring Request Parameters screen is displayed.
4. Click OK in the Monitoring Request Parameters screen.
A message is displayed indicating the new request has been added, and the Event Monitoring Service
main screen is displayed.
To create requests for the same resource using different monitoring parameters:
1. From the Event Monitor Service main screen, select the monitoring request with the instance for which
you wish to have multiple monitoring requests.
You need to have configured at least one request for the instance.
2. From the Actions menu select Copy Monitoring Request.
The Add Monitoring Request screen is displayed.
3. Click OK in the Add Monitoring Request screen.
The Monitoring Request Parameters screen is displayed.
4. In the Monitoring Request Parameters screen, modify the parameters as desired.
5. Click OK.
A message is displayed indicating the new request has been added, and the Event Monitoring Service
main screen is displayed.
Chapter 4
79
Using the Peripheral Status Monitor
Modifying Monito ri ng Request s
Modifying Monitoring Requests
To change the monitoring parameters of a request:
1. From the Event Monitoring Service main screen, select the monitoring request whose parameters you
wish to modify.
2. From the Actions menu select Modify Monitoring Request.
The Monitoring Request Parameters screen is displayed.
3. In the Monitoring Request Parameters screen, modify the parameters as desired.
4. Click OK.
A message is displayed indicating the request has been modified, and the Event Monitoring Service main
screen is displayed.
80
Chapter 4
Using the Peripheral Status Monitor
Removing Monitoring Reque sts
Removing Monitoring Requests
The Remove Monitoring Requests functions with multiple requests as well as single requests.
To remove monitoring requests:
1. From the Event Monitoring Service main screen, select the monitoring request you wish to remove.
To select contiguous multiple requests, hold the
To select individual multiple requests, hold the
2. From the Actions menu select Remove Monitoring Request.
A Confirmation screen is displayed.
3. Click OK.
A message is displayed indicating the request(s) has been removed, and the Event Monitoring Service
main screen is displayed.
4. To start monitoring the resource again you must recreate the request, either by copying a similar request
for a similar resource or by re-entering the information.
Shift key and click.
Ctrl key and click.
Chapter 4
81
Using the Peripheral Status Monitor
Viewing Monitoring Requests
Viewing Monitoring Requests
To view the parameters for a monitoring request:
1. From the Event Monitoring Service main screen, select the monitoring request you wish to view and
either:
• Double-click, or
•From the Actions menu select View Monitoring Request
The View Monitoring Request Parameters screen is displayed. The parameters listed here match the
parameters specified for the monitoring request.
2. To exit the View Monitoring Request screen, click OK.
82
Chapter 4
Using the Peripheral Status Monitor
Using the set_fixed Utility to Restore Hardware UP State
Using the set_fixed Utility to Restore Hardware UP State
Most hardware event monitors cannot detect when a hardware failure has been repaired and the resource has
been returned to normal operation. Consequently, these monitors cannot alert the PSM to change the status
of its hardware resources from DOWN to UP. It is necessary for you to manually change the status of the
hardware resources using the set_fixed utility included with the PSM. To determine if a monitor requires
use of the set_fixed utility, refer to the monitor descriptions in Chapter 6, “Monitor Data Sheets.”
The set_fixed utility includes its own man page describing how to change the state of the resource.
NOTEMake sure you have repaired the problem before you use the set_fixed utility to return the
hardware resource status to UP. If the hardware is not repaired, the change in status to UP
may cause MC/ServiceGuard to erroneously assume the hardware is working properly.
To restore the operating state of a resource to UP:
1. If necessary, list the hardware resources that currently have a status of DOWN by typing:
/etc/opt/resmon/lbin/set_fixed -L
2. Set the status of the DOWN hardware resource to UP by typing:
set_fixed -n
resource_name
The resource_name is the status resource path name to the hardware resource that has been repaired. When
specifying the resource_name you can use wildcards such as “*” to indicate all instances.
Example 4-1Example of Using set_fixed
The following example sets to UP the status of the SCSI tape device at hardware path 10_12_5.0.0
Using the set_fixed Utility to Restore Hardware UP State
84
Chapter 4
Hardware Monitor Configuration Files
5Hardware Monitor Configuration Files
Several configuration files are used to control the operation of each hardware event monitor. The operation of
the monitor can be altered by editing the contents of the various configuration files. Before altering the
contents of a configuration file, you should have a thorough understanding of what effects the changes will
have on monitor operation. The following paragraphs should provide the understanding you need for using
configuration files properly.
CAUTIONBefore editing any configuration file, create a backup copy of it. This will allow you to recreate
the original environment if the changes you make do not produce the desired results.
Chapter 5
85
Hardware Monitor Configuration Fil es
Monitor Configuration Files
Monitor Configuration Files
Two configuration files control the operation of each hardware event monitor:
• Global monitor configuration file. The settings defined in this file are used for all monitors, unless
overridden by a monitor-specific file.
• Monitor-specific configuration file. Each monitor includes its own configuration file with optimized
settings. Settings defined in the monitor-specific file override comparable settings defined in the global
configuration file.
NOTEAs of the June 2000 release, several of the hardware monitors have been converted to be
“multiple-view” (Predictive-enabled). These monitors use a different file for configuration, the
Client Configuration File (for example, default_disk_em.clcfg).
The common operating parameters defined by the monitor configuration files for all monitors include:
• Polling Interval - identifies the frequency at which the monitor polls the hardware for status. This value is
selected to provide current device status without seriously impacting system performance.
• Repeat Frequency - indicates how often the same event should be reported. Events that continue to exist
should not overburden the system with a continuous stream of messages. A value of once a day is used as
the default repeat frequency.
• Severity Action - determines whether the severity level will be passed to EMS for reporting or ignored.
• Event Definition - identifies each event handled by the monitor, defines its severity level, and determines
what action the monitor will take when the event occurs. Actions include ignoring the event, passing it on
to EMS, or using the default action defined by the Severity Action setting.
NOTEWhen Do Changes Made to a Configuration File Take Effect?
Changes made to a monitor-specific configuration file are invoked at the next polling interval or
when an event occurs, which ever comes first. In either of these situations, the monitor reads
its configuration file for any changes and implements any new settings.
86
Chapter 5
Hardware Monitor Configuration Files
Monitor Configuration Files
File Names
Global configuration file: /var/stm/config/tools/monitor/Global.cfg
The file naming convention for the startup configuration files is:
/var/stm/config/tools/monitor/monitor_name.cfg
monitorname is the name of the monitor executable
File Format
Settings in the device configuration file use the following conventions:
• Configuration settings consist of a term defining the characteristic to be configured, followed by a value
assigned to the term.
For example, POLL_INTERVAL 60
• There must be at least one space between the term and each value.
• Comments begin with the pound character (#) and continue until the end of the line. A comment may occur
on a line by itself, or after a blank space following the value in a configuration entry.
For example, either of the following are valid comments:
# Valid values for severity_name are:
SEVERITY_ACTIONCRITICAL NOTIFY# notify on critical events
Table 5-1 lists the common fields used to define monitor configuration settings. In addition to the common
parameters, some monitors include other parameters in their configuration file. Any additional configuration
parameters used by each monitor are listed in the monitor descriptions in the data sheets for the hardware
event monitors available on the Web at http://docs.hp.com/hpux/onlinedocs/diag/ems/emd_summ.htm.
NOTEAn HP-UX man page is available for each monitor. To access the man page, type (where
monitorname is the executable file listed in the data sheet): man monitorname
positive integer
indicating number of
minutes to wait between
polls
Identifies an event, the
severity to be applied to
the event, and the action
the monitor should take
when the event occurs.
An action of DEFAULT
indicates that the value
specified in the
SEVERITY_ACTION
definition for the
specified severity should
be used.
Defines how often the
monitor should poll the
device to determine if an
event has occurred.
REPEAT_FREQUENCY
<frequency>
frequency must be a
positive integer
indicating the number of
minutes to wait before a
repeat event can be
generated
Defines how often
repeat alerts should be
generated for the sane
event. Events for a
specific device should
not be reported more
often than the specified
frequency.
Considerations for Modifying the Monitor Configuration File Settings
The default configuration settings for each monitor have been carefully selected to provide efficient
monitoring for most systems. However, it may be necessary to modify these settings in specific situations.
Here are some considerations for altering the configuration settings.
NOTESettings in the Global.cfg configuration file apply to all monitors, so you should avoid
changing these settings. If you need to change the parameters for a monitor, do so using the
monitor-specific configuration file.
88
Chapter 5
Hardware Monitor Configuration Files
Monitor Configuration Files
Event Definition
You may want to alter the event definition in a monitor-specific configuration file to change the severity level
assigned to an event, or to suppress reporting of an event.
NOTEBe aware that any changes you make to the event definition will impact all instances of the
monitor's hardware resources. You cannot modify the behavior of a specific hardware resource.
For example, if a disk array is repeatedly reporting the same event and you would like to
suppress it, you can do so by changing the event definition. But the change will suppress that
event even if it occurs on a different disk array. This may not be the result you want.
• Changing the severity level assigned to an event. If you feel that the severity level assigned to an
event does not reflect its importance in your environment, you can make the event more or less important.
For example, if an event is currently assigned a severity level of MAJOR WARNING but from experience
you feel it represents a CRITICAL condition, you can change the DEFINE_EVENT setting for the event.
• Ignoring an event. By default, all events are reported. If you are getting repeated notification for an
event, you can ignore the event. When the condition that caused the event is corrected, you can once again
set the event for notification.
Severity Action
By default, all severity levels are reported to EMS. This default was selected because even lower level events
such as INFORMATION may provide valuable data for identifying trends that could lead to more serious
conditions. Consequently, it is recommended that you do not suppress the reporting of any events.
However, if you do want to suppress the reporting of less important events, you can change the severity action
to IGNORE. This will affect all events in that category, and all instances of the monitor's hardware resources.
Polling Interval
If you need more frequent polling to isolate a potential problem with the hardware, the polling interval can be
reduced. Be aware that more frequent polling may impact system performance, so you may want to shorten
the polling period only temporarily until the problem is solved. Avoid using a low polling interval for all
monitors or system performance may suffer.
Repeat Frequency
If you need to be alerted to an event frequently, the repeat frequency can be reduced. The default repeat
frequency is once a day.
Sample Global Configuration File
The following sample shows a portion of the global monitor configuration file.
## Global.cfg: Sentinel Global Configuration File
#POLL_INTERVAL60# in minutes (one hour)
REPEAT_FREQUENCY 1440# in minutes (one day)
##DEFAULT ACTIONS FOR EACH SEVERITY
#(Action can be NOTIFY or IGNORE)
#SEVERITY_ACTIONCRITICALNOTIFY
SEVERITY_ACTIONSERIOUSNOTIFY
##EXPLANATION OF EVENT CONFIGURATION LINES
## configverb event# severity- action- -msg-number-in-library-catalog#
# DEFINE_EVENT 100001 INFORMATIONDEFAULT # msg num 1
#
## EXPLANATION OF DEVICE STATUS INTERPRETATION FOR EVENT
##D= DIRECT ACCESS DEVICE
#T= SEQUENTIAL ACCESS DEVICE
#L= PRINTER DEVICE
#P= PROCESSOR DEVICE
#W= WRITE ONCE READ MULTIPLE DEVICE
#R= READ ONLY (CD-ROM) DEVICE
#S= SCANNER DEVICE
#O= OPTICAL MEMORY DEVICE
#M = MEDIA CHANGER DEVICE
#C = COMMUNICATION DEVICE
#
#DTLPWRSOMC = SCSI Device Class
#
#--> [ 28 00 06 ] DTLPWRSOMC Not-ready to ready transition. Medium changed.
#
#cc qq kk ssData elements equating to event
#
#cc= SCSI Additional Sense Code
#qq= SCSI Additional Sense Code Qualifier
#kk= SCSI Sense Key
#ss = SCSI Hardware Status
##DEFAULT CONFIGURATION FOR SCSI DEVICE EVENTS
#-
DEFINE_EVENT 100001 INFORMATIONDEFAULT # msg num 1
#[00]
#[0c]
#[ 00 00 00 ] DTLPWRSOMC No additional sense information.
#[00]
#[04]
Sample Monitor-Specific Configuration File
The following is a sample of a device configuration file.
#****************************************************************************#
#* dm_ses_enclosure.cfg : monitor configuration statements for all*#
#*events handled by the ses_enclosure monitor*#
#****************************************************************************#
#****************************************************************************#
#* These items will appear in the global config file, but are repeated*#
#* here for documentation purposes. They could also appear here to override*#
#* the global values.*#
#****************************************************************************#
90
Chapter 5
Hardware Monitor Configuration Files
Monitor Configuration Files
#POLL_INTERVAL5# polling interval in minutes
#REPEAT_FREQUENCY1440# in minutes, for one day
#****************************************************************************#
#* This list of default actions for each severity also appears in the*#
#* global configuration file, and should not generally appear here.*#
#* It is shown for documentation purposes.*#
#****************************************************************************#
#SEVERITY_ACTIONINFORMATIONNOTIFY
#SEVERITY_ACTIONMINOR_WARNINGNOTIFY
#SEVERITY_ACTIONMAJOR_WARNINGNOTIFY
#SEVERITY_ACTIONSERIOUSNOTIFY
#SEVERITY_ACTIONCRITICALNOTIFY
DEFINE_EVENT 101 CRITICALDEFAULT # The disk is indicating a fault
DEFINE_EVENT 102 CRITICALDEFAULT # The disk is not on the FC link
DEFINE_EVENT 201 CRITICALDEFAULT # The power supply has faulted
DEFINE_EVENT 202 CRITICALDEFAULT # The power supply is not recieving adequate AC
DEFINE_EVENT 301 CRITICALDEFAULT # The fan is not providing cooling
DEFINE_EVENT 302 CRITICALDEFAULT # Temperature has exceeded critial threshold
DEFINE_EVENT 303 MAJOR_WARNING DEFAULT # Temperature has exceeded warning threshold
DEFINE_EVENT 304 CRITICALDEFAULT # Temperature has exceeded low critial threshold
DEFINE_EVENT 305 MAJOR_WARNING DEFAULT # Temperature has exceeded low warning threshold
DEFINE_EVENT 306 MAJOR_WARNING DEFAULT # Temperature sensor may have failed
DEFINE_EVENT 401 CRITICALDEFAULT # The enclosure services controller has failed
DEFINE_EVENT 501 CRITICALDEFAULT # The SCSI port/transceiver has lost the link
DEFINE_EVENT 502 CRITICALDEFAULT # The transmit signal has been lost
DEFINE_EVENT 601 CRITICALDEFAULT # Over voltage critical threshold exceeded
DEFINE_EVENT 602 MAJOR_WARNING DEFAULT # Over voltage warning threshold exceeded
DEFINE_EVENT 603 CRITICALDEFAULT # Under voltage critical threshold exceeded
DEFINE_EVENT 604 MAJOR_WARNING DEFAULT # Under voltage warning threshold exceeded
DEFINE_EVENT 605 MAJOR_WARNING DEFAULT # Voltage sensor may have failed
Chapter 5
91
Hardware Monitor Configuration Fil es
Startup Configuration File
Startup Configuration File
Each hardware event monitor has its own startup configuration file which contains the monitoring requests
currently defined for the monitor. At startup, following the execution of the ioscan utility, or when using the
Hardware Monitoring Request Manager (monconfig) to manage monitoring requests, the entries in the
startup configuration file are used to create monitoring requests for the monitor.
Each monitoring request in the startup configuration file is applied to all instances of the monitor's hardware
resources. An identical set of default requests are included in the startup configuration file for each monitor.
You modify the contents of the startup configuration file using the Hardware Monitoring Request Manager.
When you use the Hardware Monitoring Request Manager to create or manage monitoring requests, the
results are stored as an entry in the monitor's startup configuration file. If you have selected the All Monitors
option for the request, an entry will be made in the startup configuration file for all the monitors.
NOTEWhen Do Changes Made to a Startup Configuration File Take Effect?
Changes made to a startup configuration file are invoked when the system is restarted,
following the execution of the IOSCAN utility, or when the Hardware Monitoring Request
Manager is used to manage monitoring requests. For example, when you add, delete, or modify
a monitoring request using the Hardware Monitoring Request Manager, the changes to the
startup configuration file will take effect immediately.
File Names
The file naming convention for the startup configuration files is:
/var/stm/config/tools/monitor/monitorname.sapcfg
monitorname is the name of the monitor executable.
File Format
Entries in the startup configuration file use the following conventions:
• The startup configuration file contains monitoring request entries identifying the notification method and
reporting criteria for the monitor. Each entry contains records consisting of a keyword, followed by a colon
(:), followed by the value assigned to the keyword. For example, Criteria Threshold: INFORMATION
• 'MONITOR' must be the first keyword found in each entry, but the remaining records in the entry are not
order-dependent. For example:
MONITOR: /storage/events/disk_arrays/FW_SCSI
• Comments begin with the pound character (#) and continue until the end of the line. A comment may occur
on a line by itself or after a blank space following the value for a keyword.
For example, either of the following are valid comments:
# Default monitoring entries
Target Type: SYSLOG# Send events to syslog
Table 5-2 identifies the keywords that make up each entry in the startup configuration file. Each entry must
contain the keywords identified as required.
92
Chapter 5
Hardware Monitor Configuration Files
Startup Configuration File
Considerations for Modifying the Startup Configuration File Settings
While you can edit the contents of the startup configuration file directly, the better approach is to use the
Hardware Monitoring Request Manager (monconfig) to create and manage your monitoring requests. Using
the monitoring request manager you can create requests for multiple monitors simultaneously. And the
Hardware Monitoring Request Manager ensures that all request entries are formatted correctly.
The only benefit that editing the configuration file offers is that you can use the COMMENT setting to add
information that will be included with the event.
%< (less than)
%<= (less than or equal to
)
> (greater than)
>= (greater than or equal
to)
!(notequalto)
Identifies the hardware
event monitor to which
the entry applies. All
entries must use the
resource path for the
monitor being
configured.
Note: This must the first
keyword in each entry
Defines the severity
level used as the
notification criteria
threshold.
This value identifies the
arithmetic operator
used with the criteria
threshold to control
what events are
reported. The operator
treats each severity
level as a numeric value
assigned as follows:
Chapter 5
Critical = 5
Serious = 4
Major warning = 3
Minor warning = 2
Informational = 1
The event severity
received is the left
operand and the
Criteria Threshold value
is the right operand.
93
Hardware Monitor Configuration Fil es
Startup Configuration File
Table 5-3 Startup Configuration File Entries
Keyword Values Description
Target Type (required)Valid values include:
UDP
TCP
OPC
SNMP
TEXTLOG
SYSLOG
EMAIL
CONSOLE
Target Type Modifier
(required for the following target types)
UDP
Target UDP Host - hostname of the machine to which UDP event messages will be sent
Target UDP Port - port number on the host that will be used for the network connection
TCP
Target TCP Host - hostname of the machine to which TCP event messages will be sent
Target TCP Port - port number on the host that will be used for the network connection
USERLOG
Target USERLOG - name of the log file to which TCP event messages will be sent
EMAIL
Target EMAIL Address - email address of the recipient of the event messages
Identifies the method of
notification used.
Comment: (Optional)Any text string.An optional field which will be
presented as user data in each
event meeting this criteria.
94
Chapter 5
Hardware Monitor Configuration Files
Startup Configuration File
Default File Entries
The following default monitoring requests illustrate the structure of the entries in the startup configuration
file.
Table 5-4Default Monitoring Requests
Description Entry
Entry to send all
events to textlog
Entry to send
SERIOUS and
CRITICAL events to
syslog
Entry to send
SERIOUS and
CRITICAL events to
email
Peri pher a l St atus Monit or (PSM) Configuration File
Peripheral Status Monitor (PSM) Configuration File
Interaction between the PSM and a hardware event monitor is controlled by a PSM configuration file. This
file defines what severity levels will result in DOWN status being reported, and what action, if any, is
required to return the hardware to UP status. Any hardware event monitor that does not include a PSM
configuration file will not be monitored by the PSM.
NOTEWhen Do Changes Made to a PSM Configuration File Take Effect?
The PSM checks its configuration files every 10 seconds, so any changes will be invoked when
the file is checked. If the hardware configuration has changed and the PSM is communicating
with all the monitors to determine what their resources are, it may take a few minutes for any
changes to a configuration file to take effect.
File Names
The file naming convention for the PSM configuration files is:
/var/stm/config/tools/monitor/monitorname.psmcfg
monitorname is the name of the monitor executable.
File Format
The PSM configuration file contains a single entry using the following conventions:
• The entry consists of keywords defining the characteristic to be configured, followed by a value assigned to
the keyword.
• There must be at least one space between the keyword and each value.
• Comments begin with the pound character (#) and continue until the end of the line. A comment may occur
on a line by itself or after a blank space following the value for a keyword.
Table 5-5 identifies the keywords that make up the entry in the PSM configuration file. The entry must
contain the keywords identified as required.
96
Chapter 5
Hardware Monitor Configuration Files
Peripheral Status Monitor (PSM) Configuration File
Considerations for Modifying the PSM Configuration File
• The only change you should consider making to the PSM configuration file is redefining the severity levels
which cause a change to DOWN status. By default, SERIOUS and CRITICAL events will result in a
DOWN status. If you want to include lower level events, or restrict the status change to just CRITICAL
events, you can do so using the DOWN_SEVERITY_THRESHOLD and DOWN_SEVERITY_OPERATOR settings.
NOTEDo not attempt to change the value of MONITOR_STATE_HANDLING. Changing this value may
result in unpredictable results when attempting to reset the hardware status of the resource to
UP.
It is recommended that you not lower the severity levels that can cause a DOWN status. If you do,
events that do not warrant a status of DOWN may cause it to occur.
Chapter 5
97
Hardware Monitor Configuration Fil es
Peri pher a l St atus Monit or (PSM) Configuration File
Table 5-5PSM Configuration File Fields
Keyword Values Description
MONITOR_RESOURCE_NAME
(required)
PSM_RESOURCE_NAME
(Optional)
MONITOR_STATE_HANDLING
(Optional)
A valid event
monitor
resource path
name
A valid PSM
(status)
resource path
name
Identifies the type of state handling the
monitor performs.
Valid values include:
NO_UP_CONTROL (Default) - the monitor
uses the severity mapping of events to
control the DOWN state as well as calling
the appropriate API routines to send
DOWN state messages to the PSM. The UP
state will be controlled by the set_fixed(1m)
command.
Identifies the hardware
event monitor to which
the entry applies Note:
This must the first
keyword in the file.
This value should be
related to
MONITOR_RESOURCE_
NAME.
If not specified, the
default will be created by
replacing the word
“events” in the
MONITOR_RESOURCE_
NAME with the word
“status”.
98
UP_STATE_CONTROL- the monitor uses
the severity mapping of events to control
the DOWN state as well as calling the
appropriate API routines to send DOWN
state messages to the PSM. The monitor
itself controls the UP state by calling the
appropriate API routines to send UP state
messages to the PSM.
ALL_STATE_CONTROL - the monitor itself
controls both states by calling the
appropriate API routines to send UP and
DOWN state messages to the PSM.
Chapter 5
Table 5-5PSM Configuration File Fields
Keyword Values Description
Hardware Monitor Configuration Files
Peripheral Status Monitor (PSM) Configuration File
DOWN_SEVERITY_THRESHOLD
(Optional. This value is required if
DOWN_SEVERITY_OPERATOR is
specified)
DOWN_SEVERITY_OPERATOR
(Optional)
Valid values
include:
CRITICAL
SERIOUS (De
fault)
MAJOR_WAR
NING
MINOR_WAR
NING
INFORMATIO
NAL
Valid values
include:=
!=
<
<=
>
>= (Default)
Defines the event severity
level used with
DOWN_SEVERITY_OPE
RATOR
Defines the operator used
with the event severity
and
DOWN_SEVERITY_THR
ESHOLD as operands.
The event severity
received is the left
operand and the
DOWN_SEVERITY_THR
ESHOLD value is the
right operand.
Chapter 5
99
Hardware Monitor Configuration Fil es
Peri pher a l St atus Monit or (PSM) Configuration File
Example File Entries
The following examples illustrate the various types of file entries that can be made for the PSM monitor.
Example 1: Use all default values. SERIOUS and CRITICAL event will cause DOWN status.