The BlackBerry Management Pack for BES 5.0.x contains a number of rules that check the log files for particular events which could have an impact on your BlackBerry environment. The standard rules in the BlackBerry management pack should be sufficient to monitor your BlackBerry logs, but in certain cases you might want to monitor additional entries. To accommodate for this, the BlackBerry Management Pack contains templates for creating custom rules in the Authoring section of the Operations Manager Console.
The following example will show you how to create a custom Log File Alert Rule for checking the state of a ‘BlackBerry Messaging Agent’ by using the available template in the BlackBerry Management Pack.
In the Operations Manager Console navigate to the Authoring section of the Operations Manager Console and select the BlackBerry Log File Alert Template.
Right click the BlackBerry Log File Alert Template and select Add Monitoring Wizard…
Select the BlackBerry Log File Alert Template in the Select Monitoring Type wizard page and click Next.
On the Name and Description page enter a logical name (Messaging Agent Not Started in this example) and description and select a management pack in which you would like to store the custom rule. Click Next.
In this example we are looking for the phrase “not started in the MAGT logs.
On the Alert Configuration page select the BlackBerry Mailbox/Messaging Agent (MAGT) from the Log File dropdown box. In the Query pattern box enter the string to search for in the log file. You can use either Simple Expressions or Regular Expressions. In this example we look for the Simple Expression not started. We can set the Severity of the alert to Critical or Warning in the Severity dropdown box, in this example we set the severity to Warning.
Click Create to finish creating the custom rule. The custom rule is now visible in the BlackBerry Log File Alert Template view.
The OpsLogix Dev team has released an update to fix the issue as described in KB post (https://www.opslogix.com/blog/?p=759).
Please contact OpsLogix Sales for this Updated version V126.96.36.199.
Notice: This Version will only be for SCOM 2012 and above.
Notice: We do not provide any fixes for this MP for SCOM 2007.
- If you have configured an incorrect IP format as Ping Target the “Target Host Ping Check” monitor will be put in Warning state and a warning Alert will be generated.
- If you look into the Health explorer the state will be “Ip is Invalid” shown as the warning state. See screenshot below.
For the download or if you have any questions please contact OpsLogix Sales.
OpsLogix Dev team.
We are very proud to introduce our Oracle RAC MP.
OpsLogix Senior developer Michel worked closely with GRID-IT.nl and the following weeks will see the Authoring templates updated and the addition of dashboards.
What is Oracle Real Application Cluster (RAC)?
Single-instance Oracle databases have a singular one-to-one relationship between the Oracle database and the instance.
In an Oracle RAC environment there are multiple one-to-many relationships between the database and instances. An Oracle RAC database can have up to 100 instances all of which access one database. All database instances must use the same interconnect which in turn is used by Oracle Clusterware.
Oracle Clusterware enables servers to communicate with each other, so that they appear to function as a single entity or collective unit: a collection of servers known as a cluster. Although the servers are standalone servers, each server has additional processes that communicate with other servers. In this way the separate servers appear as if they are one system to applications and end users.
Any direct benefits?
Yes, both of which cut back long-term costs by directly reducing system redundancy and increasing availability.
- Scalability – Oracle RAC shared disk method of clustering databases: increases scalability because servers can easily be tailored to meet current needs. This enables more efficient capacity management and a degree of system robustness which in turn lowers overall maintenance cost.
- High Availability – RAC improves availability because if one server fails, another clustered one can seamlessly assume its workload insuring continued production.
OpsMgr 2012, OpsLogix and Oracle RAC
So aside from what we already know about the OpsLogix Oracle MP how does this management pack support RAC components?
InterConnect Performance counters
Custered Tablespace Performance counters
Clustered Instance Performance counters
And of course drilldown diagram views
What is Oracle Automatic Storage Management (ASM)?
Oracle ASM is a volume manager and a file system for Oracle database files that supports single-instance Oracle Database and Oracle RAC configurations. Oracle ASM is Oracle’s recommended storage management solution that provides an alternative to conventional volume managers, file systems, and raw devices.
ASM is based on the principle that the database should manage storage instead of requiring an administrator to do it. ASM minimizes directly managing potentially thousands of Oracle database files.
Oracle ASM uses disk groups to store data files. Oracle ASM disk group is a collection of disks that Oracle ASM manages as a unit. The content of files that are stored in a disk group are distributed according to resource load to provide uniform performance across the disks.
Disks can be added or removed from a diskgroup simultaneously while a database continues accessing files from the same diskgroup. ASM will automatically redistribute the file contents and minimizes system and production downtime.
OpsMgr 2012, OpsLogix and Oracle ASM
ASM Diskgroup space
ASM disk byte performance
In its simplest form a database is a collection of organized data. Traditional databases are organized by fields, records, and files. A field is a single piece of information; a record is one complete set of fields; and a file is a collection of records.
The oldest public database in the world would probably be a phonebook or almanac but databases were used long before this for those who followed schools of science, mathematics and medicine.
Any tiered methodical train of thought or process requires accessing a database. It is a tool used to store and keep track of information relative to activities that an application, service and workflow has in context with the platform or parameters it is functioning in.
In the IT world a database is a collection of information organized in such a way that a computer program can quickly select desired pieces of data: an electronic filing system.
How information is collected and the database models
Collections of independently stored information pieces (data), and management of a database involves initial indexing of available data by ‘tagging’ the individually stored information based on common factors or lack of them. Values are assigned to relevant criteria, e.g. phone numbers, names, addresses, male/female etc.
When initial values are assigned one or more relationships between assigned tags can further be defined to allow the creation of ‘groups’ or ‘pools’ which meet programed criteria to make use of a database. In the case of a business or enterprise this determines access rights of users to search within preset groups, e.g. new clients + high volume + wholesale + online sales or new clients + high volume + retail + offline sales.
If values and relationships are not assigned to the information stored within a database (comparable to a book with no page numbers and index) than desired requests for data will take much longer to be processed resulting in inefficiency. How these values are assigned depends on the database model and management.
A database model is a type of data model that determines the logical structure of a database and fundamentally determines how data will be stored, organized, and manipulated. It defines the logical design of how the data will be collected, categorized and stored. It is the foundation of the database management system.
There are well over 10 different database models and potentially an infinite degree of subsets within those depending on business sector or enterprise priority. There are however 3 historical models that have been the foundations of all current database models.
- The Hierarchal Model is a data model in which the data is organized into a tree-like structure or pyramid.
- The Network Model is a data model in which the entities are organized in a graph in which some entities can be accessed through several different paths. This was designed to solve the issue of data redundancy in the hierarchal model. The network model organizes the relationship of data in a net or grid-like fashion.
- The Relational Model for database management is a database model based on first-order predicate logic.
First-order logic is symbolized reasoning in which each sentence or statement is broken down into a subject and predicate. The predicate modifies or defines the properties of the subject. In first-order logic, a predicate can only refer to a single subject.
In the relational database model, all data is represented in terms of tuples, grouped into relations. A tuple is an ordered list of elements or set of values.
The most popular database model is the relational model which uses the table-based format. This is of course because it is a flexible model that enables application to dynamic economic markets and sectors.
Database and information management
Whatever model is chosen for how information is collected, categorized and stored, the accessing and retrieval of such information is all part of database management.
Database management systems (DBMSs) are specially designed software applications that define the database parameters and allow the user and other other applications to capture, analyze, administrate and retrieve data. Database management additionally involves creation and maintenance of access rights which controls which users can access what content.
A simple and clear example of automatic management of access rights with collected database information is seen with mobile phone POI (Point of Interest) applications and GPS location services. Depending on the select geographical area and what keywords are used, the IP address of the searcher is matched against a list of corresponding IP locations which are only in the targeted geographical areas while blocking access to those which do not yield a match regardless of the keywords. Other examples include the way some internet search engines favor paid advertisements over content and so on.
A key factor in database management is categorizing and understanding the relevant collectible information of the business sector.
This can be marked in 3 ways and falls back to the concept of first-order logic and the relational model of collecting information:
- Change over time, shift in priorities (Relations)
- What product or service is relevant to the recipient at the current time (Properties)
- What is the relevant method of interaction/ delivery (Functions)
Since the turn of the millennium, databases have become commonplace in company IT infrastructures of every conceivable economic sector. The DBMS application that is chosen will always impact the efficiency and growth of a company and choosing the correct DBMS is pertinent to solid enterprise foundations.
There are many opinions out there on which DBMS is best or most reliable; I’ll let some of them speak for themselves: