Home
The eG Installation Guide
Contents
1. 325 Configuring the eG Agent on Unix Environments64 Configuring the eG Agent on Windows Environments E A TT 15 Using an MS SQL Server DatabasSe 22 Using an Oracle Database s s 19 Configuring the eG Manager on Windows Environments sssssssnsnnnnnnnnnnnnnnnnnnnnnnnnn 91 Using an MS SQL Database cssseesseenee 105 Using an Oracle Database scsscseeseseneeeeees 98 F Factors that influence manager location 5 I Installing the eG Agent On AIX ssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nnmnnn 57 On SolariS asuonsuonusnunonuononnnnanannsnunonnnnanonaonennnnan 54 On Unix Environments ssssssssnnnnn 54 On Windows Environments s sss 2 178 Installing the eG Manager On L NUX sonossonneonuannnonoonononnanannuunnononnanonoonennnnan 14 On SolariS ssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nnn 8 On Windows Environments s 91 S Starting the eG Agent on Unix Environments 77 Starting the eG Agent on Windows Environments EE A A AT T 227 228 Starting the eG Manager On Unix Environments sss sssnsnsn2n 53 Stopping the eG Agents On Unix Environments s ssssnsnnn2u 87 On Windows Environments ssss2 326 Stopping the eG Manager On Unix Environments ssssssssnn12 87 On Windows Environments s sssss1n
2. Figure 1 4 The main components of the eG manager 1 2 1 Sizing the Hardware and Database Required by an eG Manager The hardware sizing for the eG manager and database i e CPU speed memory required disk space required etc depends on the number of servers to be monitored the frequency of the monitoring and on the number of days of raw metrics that are to be stored in the database eG Innovations engineers will provide a sizing calculator that will allow you to determine the hardware requirements for the eG manager and database depending on your specific requirements Installing and Configuring on Unix 2 Installing and Configuring on Unix The procedure for installing the eG manager differs depending on the operating system environment being used on the server on which the manager is to be installed The eG manager is available for Solaris Red Hat Linux and Windows 2000 2003 2008 operating system environments This chapter describes the steps involved in installing and configuring eG Enterprise on Solaris and Linux operating systems For detailed instructions of installing and configuring the manager and the agents on Windows operating systems refer to the next chapter 2 1 Installing the eG Manager 2 1 1 System Requirements For the eG manager to function effectively the system on which the manager is being installed should support e Solaris 10 or higher or Red Hat Enterprise Linux 5 or higher or CentOS v5 2 o
3. Agent Figure 1 2 The manager agent communication in the eG architecture All manager agent communication happens over the HTTP HTTPS protocol The agent uses tester threads each of which is responsible for a specific test The main functions of the agent core are e To read configuration information from the manager and determine what tests are to be executed on a host e To periodically refresh the configuration information from the manager and determine if any of the testers needs to be stopped or restarted or whether the configuration information for any of the tests needs to be changed e To read the threshold information from the manager and use it to determine whether the state of each measurement is normal or not e To provide alarms to the manager in the event that the state of any measurement changes e To upload measurement results back to the manager for permanent storage Figure 1 3 depicts the typical deployment architecture of eG Enterprise The eG manager is installed on a server called the eG server By default an external agent is also hosted on this system Internal agents are installed on all the other servers being monitored in this environment The configuration of external agents can be modified to suit the target environment For example in Figure 1 3 an external agent is located within each customer s network in the case of a service provider servicing multiple customers or within each network domai
4. F Last Default rule D Vrtual Private Networks ven A Apply Discard To save changes and update the configuration cick Apply RA HTTP Be MA HTTPS H All Outbound Traffic lt i Internal Otte 4 all Outbound Traffic GI all Traffic yall Networks and Local Host 2 all Ne Sy All Networks and Local Host exter Se alle All Networks and Local Host All Nd Firewall Policy Firewall Policy Tasks Create New Access Rule F Publish a Web Server Publish a Secure Web Server 5 Publish a Mail Server 5 Create New Server Publishing Rule A Edit Selected Rule X Delete Selected Rules Move Selected Rules Down Disable Selected Rules System Policy Tasks SF Edit System Policy amp Show System Policy Rules Export System Policy B Import system Policy Related Tasks EF Define IP Preferences aoe ears f Figure 3 234 Moving the new rule to the first position 36 270 Next expand the Configuration node in the tree structure in the left pane of Figure 3 234 and click on the Networks sub node within see Figure 3 235 Installing and Configuring on Windows Environments 37 38 Microsoft Internet Security and Acceleration Server 2004 aston wow gt Glo 2 a atx 3 9 Tree Networks J Microsoft Internet Security and Accel o EcrtLasoz E Monitoring Z Firewall
5. Make sure that the eGuser account exists on the target system before you run the Note silent_install script Provide execute permissions for the silent_install script and run the script on the target host To grant execute permissions issue the following command from the directory that holds the silent_install script say tmp chmod x silent_install Upon successful execution of the script the eG agent will be automatically installed and started on the host 2 12 4 Installing an eG Agent on HPUX in the Silent Mode To install an eG agent on HPUX in the silent mode do the following 1 First manually install an eG agent on a target HPUX host using the installation instructions provided in Section 2 7 5 of the eG Installation Guide Typically this is achieved by executing the iAgent_hpux script from the super user account After manual installation of the agent you will find that a directory named egurkha is automatically created in the install location specified during installation Now tar the egurkha folder as eGagent_hpux tar to a temporary folder say tmp on the agent host For this purpose issue the following command at the shell prompt tar 73 Installing and Configuring on Unix cvf tmp eGagent_hpux tar egurkha Manual installation will also automatically create a silent_install script and an iAgent_hpux_silent in the loptiegurkha bin directory of the agent host Copy these two script files as well to th
6. 170 System Architecture AgEntsS 2 cecceeseeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeseeeeeeeenene 2 Database s essensnanununonnuonenonaononnununanuaonennnanunonnnnn 4 Manager cceceeecneensensseeeeeeeeeeneeeseeseneseeeeeeeenenene 1 User Interface sssssnsnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn nnn 4 System Requirements Installing an eG Agent on Unix Environments54 Installing the eG Manager on Windows Environments ccssccssscssseenssenssenseenseeennsenneeee 91 System Requirements for installing the eG Manager on Unix Environments s sssssnn 7 T Troubleshooting Configuring the eG Agent ss ssssss2 383 Configuring the eG Manager s s 380 Installing the eG Agent ssssss2 383 Installing the eG Manager s 376 Starting the eG Agent ssss1s1 384 385 Starting the eG Manager 382 U Uninstalling an eG Agent in a Windows Environment Uninstalling the eG Manager in a Windows Environment sssssnnnnnnnnnnnnnnnnnnnnnnnnnnnnn 328 Uninstalling the eG Suite on Unix Environments87 On HP UX cscceceescnsceeensseeenesensensensneeensneeeeesenes 87 On Linux and AIX cccseeseseeeeeeeeeeeeeeeeeeeeeeeeeee 87 On Solar isS csceeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee 87
7. 5 Now Figure 3 115 will appear requesting your confirmation to allow trusted certificates only Click on the Yes button if the agent is expected to communicate only with a manager that has a trusted SSL certificate If you click on the No button the agent accepts any certificate provided by the manager at the time when the SSL connection is established x Question om e Please indicate if you want to allow trusted certificates only a Figure 3 115 A message box requesting your confirmation to allow only trusted certificates 6 Clicking on either button in Figure 3 115 will reveal Figure 3 116 using which the manager IP hostname and the SSL port will have to be specified 189 Installing and Configuring on Windows Environments eG Agent Setup eG Agent Setup Please enter the following details eG Manager IP Host Name 192 168 8 147 eG Manager SSL port 443 lt Back _ Next gt l Cancel Figure 3 116 Specifying the IP hostname and SSL port of the eG manager A If you have chosen to allow only trusted certificates then ensure that the IP hostname provided in Figure 3 116 matches that of the certificate Then follow the procedure Note detailed in Section 3 13 once the agent installation is complete 7 If you select the No button in Figure 3 116 then setup will attempt to configure the agent s operational environment with the details of the eG manager that the agent shou
8. Add Roles Wizard ac Confirm Installation Selections This server might need to be restarted after the installation completes Web Server Is Find out more about Windows System Resource Manager WSRM and how it can help optimize CPU usage Web Server Common HTTP Features Static Content Default Document Directory Browsing HTTP Errors HTTP Redirection Application Development ASP NET NET Extensibility ASP CGI ISAPI Extensions ISAPI Filters Server Side Includes Print e mail or sav Figure 3 140 Installing the web server role 10 Once installation completes successfully Figure 3 141 will appear confirming the success of the installation 212 Installing and Configuring on Windows Environments Add Roles Wizard ic Installation Results Windows automatic updating is not enabled To install the latest updates use Windows Update i Control Panel to check for updates Web Server 11S Installation succeeded The following role services were installed Web Server Common HTTP Features Static Content Default Document Directory Browsing HTTP Errors HTTP Redirection Application Development ASP NET NET Extensibility Figure 3 141 A message indicating that installation was successful 11 Click on the Close button in Figure 3 141 to close the wizard Figure 3 142 will then appear displaying the newly installed role 213 Installing and Configuring on Window
9. SQL Server Configuration Manager Local SQL Server Services B J SQL Server Network Configuration l Protocols for MSSQLSERVER Ge Protocols for SQLEXPRESS BD SQL Native Client 10 0 Configuration I I Figure 2 7 The list of protocols on the SQL Server Configuration Manager e Check whether the status of the VIA protocol in the list is Enabled If so proceed to disable it by right clicking on the VIA protocol and selecting the Disable option see Figure 2 8 F Sal Server Configuration Manager File Action View Help SQL Server Configuration Manager Local E SQL Server Services B 4 SQL Server Network Configuration Hl Protocols for MSSQLSERVER Protocols for SQUEXPRESS SQU Native Cent 10 0 Configuration Figure 2 8 Disabling the VIA protocol 27 Installing and Configuring on Unix e Next check whether the other protocols listed in the right panel of Figure 2 8 are Enabled If not then enable those protocols If the MS SQL Server 2008 is used as the eG backend then ensure that the SQL Server service and SQL Server Agent service are running on the SQL Server host If the MS SQL Server uses named instances instead of port number then before configuring that server to function as the eG backend make sure that the SQL Browser service is up and running on the SQL Server host 2 2 2 2 Configuring the eG Manager to use an MS SQL Server Database This section aids
10. lasass Figure 7 13 Uninstalling the eG SMS Manager 3 Now select Remove from Figure 7 14 and click the Next gt button to proceed with the uninstallation GSMS Manager Setup SMS A2 MANAGER Enabling Service Excellence Welcome to the eG SMS Manager Setup Uninstallation program This program lets you modify the current installation Click one of the options below C Modify Select new program components to add or select currently installed components to remove Reinstall all program components installed by the previous setup Remove all installed components lt Back cancel _ Figure 7 14 Selecting the Remove option 4 Next click on the OK button in Figure 7 15 to confirm deletion of the entire eG SMS manager application Confirm File Deletion x Do you want to completely remove the selected application and all of its components Figure 7 15 Confirming the complete removal of the eG SMS manager 365 Configuring the eG Manager to Send SMS Alerts 7 3 Integrating the eG Manager with Air2Web Air2Web s Mobile Internet Platform MIP allows customers to build implement and run data solutions that enable wireless access to their major back office software solutions Content Gateway is Air2Web s core platform that delivers messages SMS MMS and WAP Push through all major US and international carriers In environments that either have the gateway in house or subscribe to Air2Web s
11. 194 Figure 3 123 Setup requesting the user s confirmation to assign a nick name for the eG agent 00 cece eee ese ceeeecseeeeseeecsesseeecseeeesesaeeeseeees 194 Figure 3 124 Figure 3 125 Assigning a nick name for the eG agents hOSt cecccccessssvsecescuaveredsesesccsessvavelassesncaduswesccabsvedcassvenccuhevadei eevee canhevadecevsves cohasaasecabevenects 195 The completion of the eG agent setup Figure 1 The process of importing and trusting the manager certificate ERRANA AE EEN EEE E E avavcia viens cansovans cavevet lint Figure 3 126 Figure 3 127 Figure 3 128 Figure 3 129 Figure 3 130 Figure 3 131 Figure 3 132 Figure 3 133 Figure 3 134 Figure 3 135 Figure 3 136 Figure 3 137 Figure 3 138 The IS consoles ini shaer iea r tasted ASE AAE A ET N E EE Aa a EAA TEA EA ERER Sa Selecting the Properties option from the shortcut menu of the Web Sites node Windows 2003 Enabling logging forall the WebSitesi oorsee e iena AS EREDE EAA EAEE E ERTER KER EEEE TERS 202 Selecting the Properties option for the egurkha web site ccesssesscesecseceseeseeseesecseceseeseeseesecsecseceeceaeeseesecseceseaeeseeaesaecaeeereeeeeaeeaes 202 Enabling access logging for the egurkha web site Modifying the agent configuration IS web server monitoring Opening the Server Mana get aaar EN REA AEA EA Aa KEES EA ER oneuncetaas ER EEES AETAT AEROS The Servei Manager CONSOLE noaee raei EEEE RAAE S ENEA
12. Figure 3 184 The details of the new protocol rule being displayed 22 Now that the protocol rules have also been applied proceed to configure the site sites on the destination set that can be accessed by the client set To do this first click on the Site and Content Rules sub node within the Access Policies node in the left pane of Figure 3 185 The Configure Site and Content Rules page will then appear in the right pane 245 Installing and Configuring on Windows Environments Microsoft Internet Security and Acceleration Server 2000 Administration Action View e gt m Ale Tree Internet Security and Acceleration Server 2000 Config ure S ite a nd Content Ru les EGI SAS E RVE R Array a Arrays 3 e P ear S EGISASERVER Array Site and content rules determine if content on the specified destination computers can be accessed by specific users B ae Use this taskpad to create modify or delete site and content rules Monitoring a 2 A These are current site rules a t Rules Scope Name Description Action Applies To Schedule Destination Protocol IP Packet Filters Publishing E Bandwidth Rules Cache Configuration Monitoring Configuration Extensions Network Configuration Client Configuration EN H323 Gatekeepers Create site and content Delete site and content Modify site and content tule tule tule Figure 3 185 The Configure Site and Content Rules page 23 To crea
13. Web Ske Performance ISAPIFikers HomeDirectory Documents Connection timeout seconds IV Enable HTTP Keep Alives Enable logging Actiye log Format wac Extended Log File Format x Properties Figure 3 130 Enabling access logging for the egurkha web site 3 14 2 Modifying the eG Agent Configuration to Enable Web Transaction Monitoring In order to monitor the web transactions to the web sites on an IIS web server a specific filter needs to be installed on the IIS web server to track all requests to and from the web server To achieve this the eG agent on the IIS web server has to be modified To do so perform the steps given below 1 Select Uninstall Agent from the options available under the eG Monitoring Suite gt eG Agent menu The screen depicted by Figure 3 131 will appear Here select the Modify option and click the Next gt button 203 Installing and Configuring on Windows Environments eG Agent Setup Welcome Modify repair or remove the program Figure 3 131 Modifying the agent configuration 2 Ifthe eG agent setup program identifies an IIS server in the user environment it expects the user to state if he she wants to monitor this IIS server as depicted by Figure 3 132 If the user chooses Yes the Setup installs a specific filter that will be used to track all requests to and from a web server The default option is No Figure 3 132 IIS web
14. Figure 3 265 Viewing the service name 28 Finally click on the Finish button in Figure 3 266 to quit the wizard 292 Installing and Configuring on Windows Environments Registry Replication la Figure 3 266 Finishing cluster resource creation 29 You will then return to the Cluster Administrator console where you will view a message stating that the eG agent cluster resource has been successfully created Click on the OK button in this message box 293 Installing and Configuring on Windows Environments E gt Cluster Administrator EXTERNALAGENT ExternalAgent smalibusiness local Bie Yew Window Help S AA xe BI 2 oa Groups i IP Address AB Cluster Group Network Name E Resources 7 Majority Node Set E Cluster Configuration Rec Agent Generic Service eG Agent service e NODE i NODE2 Cluster Administrator i Cluster resource eG Agent created successfully Figure 3 267 A message box indicating the successful creation of the eG agent cluster resource 30 Now that the eG agent has been created as a cluster resource the eG agent service running in the cluster must be started stopped only through the cluster administrator To start the eG agent running in the cluster first right click on eG Agent in the list of cluster resources that will appear in the right panel when the Cluster Groups sub node of the Groups node in the tree structure is clicked From the shortcut menu that appears pic
15. ccecesesssseseeseeeceeceeeesseeseeseeaceeeseeesseesessesaeeeeneees 225 3 18 Configuring the eG Agent to Monitor an IBM HTTP Servet ccc ccc eceesesseeseeseeeceeceeeesseesesseeeceececsesaeesesaeeseeeseeees 225 3 19 Configuring the eG Agent to Monitor a ColdFusion Server cccccecessesessseseesceeceeceeesessesseeseeaceeeeeesesseeseeseeaeeesseees 226 3 20 Starting the eG Atentaat eee E E ANE EE E A EEA E E A seers 227 3 20 1 Starting the eG Agent on Windows 2003 XP ec eeecssseesceseeeeneceecseesesseeseesceacecsecsessesseesesaeeassessesaeeseeseeaeeaseeseees 227 3 20 2 Starting the eG Agent on Windows 2008 2012 7 8 Vista ccsccsseesessseseescesceeceececseeseeseeseesesessesaeeseeseeaeeeseeeeees 228 3 20 3 Starting the eG Agent on a Windows 2008 7 Vista System with Italian Locale ccceeeeeeeeeeeeeseeseeeeeeeeeeees 231 3 21 THE EGA BENE SELVICES oea E caacs E E sucdueus E eesra saute NA RNE RAAN E E EA E avegs 233 3 22 Troubleshooting the Failure of the eG Agent msinione a a A E A A RA aS 233 3 23 Performance Impact of the eG Agentoaoi e na eA E NORNER RANAR O ERAR ENAR ena ved 234 3 24 Increasing the Memory of the eG Abente a a A Ta R RA A A A RS 234 3 25 Configuring the ISA Proxy Server to Enable Agent Manager Communication ssesesesssssssersrsrsrersrrrerereresrersrseees 235 3 25 1 Configuring the ISA Proxy Server on Windows 2000 ccecesssessseseeseeseeseesceecsecsesseeseesesseeecsesesseeseesesaeeaseeseees 235 3 2
16. 1 Generating the keystore file 2 Generating a certificate request 3 Submitting the certificate request to the Certificate Authority CA and obtaining a certificate 4 Importing the certificate into a keystore 5 Configuring Tomcat for using the keystore file 154 Installing and Configuring on Windows Environments The sub sections below elaborate on each of these steps 3 4 2 1 Generating a Keystore File The keystore file stores the details of the certificates necessary to make the protocol secure Certificates contain the information pertaining to the source of the application data and helps validate the source To generate the keystore use the keytool command For this purpose login to the Windows manager and go to the command prompt Then execute the following commands one after another cd JAVA_HOME bin keytool genkey alias egitlab1 keyalg RSA keypass mykey keystore lt Filename gt keystore storepass mykey keysize 2048 validity 1095 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias an alias name for the certificate being generated gt keypass a password used to protect the key that is generated ensure that you provide the same values for keypass and storepass gt keyalg specifies the algorithm that is used to generate the keys The options are as follo
17. Figure 1 The process of importing and trusting the manager certificate e Now start the agent 3 14 Configuring the eG Agent to Monitor Web Site Transactions on an IIS Web Server on Windows 2003 To enable the eG agent to monitor an IIS web server on Windows 2003 follow the steps below First make sure logging is enabled on these platforms Next make sure that the eG agent configuration is modified to support web transaction monitoring The sub sections that follow will discuss each of these steps elaborately 3 14 1 Enabling Logging on the IIS Web Server Logging triggers the creation of log files that track the URLs accessed on the IIS web server The eG Enterprise suite requires these log files for monitoring the transactions to the web sites hosted on the IIS web server In the absence of these log files an eG agent will not be able to monitor web site transactions for Microsoft IIS web servers Therefore in order to enable the eG Enterprise suite to perform effective web transaction monitoring logging must be enabled for the managed web sites To enable logging for web sites on Windows 2003 use the procedure discussed below 1 Open the Internet Information Services IIS Manager on the IIS web server host using the menu sequence Start gt Programs gt Administrative Tools gt Internet Information Services IIS Manager Figure 3 126 will then appear 200 Installing and Configuring on Windows Environments
18. NetTerm Send To cee Copy Yahoo Messe Remove from this list g CuterTe _ Bename Properties amp Mozilla Firefox gt All Programs Figure 3 317 Stopping the eG agent on Windows Vista Then at the command prompt switch to the lt EG_AGENT_INSTALL_DIR gt bin directory and execute the stop_agent command In case of Windows 2008 follow the menu sequence depicted by Figure 3 318 327 Installing and Configuring on Windows Environments T Computer 5 Recyde Bin E d internet Explorer B Windows Contacts windows Update Ji Accessories P EditPlus B eG Monitoring Suite B coe Documents Start Agent Stop Agent Ls X Uninstall Agent J Tools Network jy Extras and Upgrades Ji Maintenance ie Control Panel J Microsoft SQL Server 2005 ad Microsoft SQL Server 2008 Administrative Tools J Microsoft Visual Studio 2008 B Startup Help and Support d Symantec Endpoint Protection J Windows PowerShell 1 0 Run Start Search Salam se Figure 3 318 Stopping an eG agent on Windows 2008 3 29 Uninstalling the eG Manager 1 It is essential to stop the manager before uninstalling it To stop it first choose the eG Monitoring Suite option of the Windows Programs menu Next choose eG Manager Finally select Stop Manager from the options available 2 To uninstall the eG manager select Uninstall Manager from the options available under th
19. Refer to the certification authority s statement for details Issued to eginnovations com Issued by DigiCert High Assurance CA 3 Valid from 25 09 2012 to 30 09 2015 Issuer Statement Learn more about ce Figure 3 81 Viewing the Certificate information Troubleshooting the error message Public keys in reply and keystore don t match If the above error message appears when importing a certificate into a keystore it could imply that you have not downloaded all the certificates that are part of the certificate chain In this case go to the web site of the certifying authority to download the certificates Then try to import each certificate in sequence of their type i e import the root certificate first the intermediate certificates next and the domain certificate last How to convert a certificate from the p7b format to a PEM format Digital certificates issued by Microsoft are in a format p7b that cannot be used by Tomcat Therefore if you have obtained a valid certificate using Microsoft Active Directory Certificate Services as the CA then before attempting to import that certificate into a keystore file i e before getting to Section 3 4 2 3 you will have to convert the digital certificate in p7b PKCS 7 format to PEM format on Windows To achieve this follow the steps below 1 Login to the eG manager host 2 In Windows Explorer search for the certificate file
20. The next step depicted by Figure 3 113 prompts the user to select the destination location for the eG agent if he she chooses not to install the agent in the default folder If the eG manager resides on the host where the agent is being installed the Setup program will place the agent in the same location as the manager In this case the screen depicted by Figure 3 113 will not appear eG Agent Setup Choose Destination Location Select folder where setup will install files Setup will install eG Agent in the following folder To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder Ch Browse tore Figure 3 113 Location of the eG agent Soon after the agent install directory is specified a message box will appear requesting you to indicate whether 188 Installing and Configuring on Windows Environments the eG agent is to use SSL for communicating with the manager see Figure 3 114 Click on the Yes button to confirm SSL support for the agent Question lex F 1 The eG Agent can use HTTP or HTTP SSL to communicate with the eG y Manager In order to use HTTP SSL please make sure that the eG Manager has been configured to support SSL Do you want to configure the eG Agent to use SSL for communication with the eG Manager ves Figure 3 114 A message box requesting the user s confirmation to enable SSL support for the eG agent
21. The procedure for importing certificates differs based on the format of the downloaded certificate These procedures have been detailed in the sub sections below Importing a Combined Certificate into the Keystore File In this case follow the steps below to import the certificate into the keystore file 1 At the command prompt execute the following commands one after another cd JAVA_HOME bin keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 2 4 1 1 gt file the name of the domain certificate that you want to import 40 Installing and Configuring on Unix gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 1 1 above Importing a Signed Certificate and the Certificate Chain into the Keystore File Digital certificates are verified using a chain of trust The trust anchor for the digital certificate is the Root Certificate Authority CA The Certificate Hierarchy is a structure of certificates that allows individual
22. To prevent the issues that are caused by a split in the cluster the cluster software requires that any set of nodes running as a cluster must use a voting algorithm to determine whether at a given time that set has quorum Because a given cluster has a specific set of nodes and a specific quorum configuration the cluster will know how many votes constitutes a majority that is a quorum If the number drops below the majority the cluster stops running Nodes will still listen for the presence of other nodes in case another node appears again on the network but the nodes will not begin to function as a cluster until the quorum exists again In Windows Server 2008 a majority of votes is what determines whether a cluster achieves quorum Nodes can vote and where appropriate either a disk in cluster storage called a disk witness or a file share called a file share witness can vote In the Node and File Share Majority quorum mode each node plus a designated file share created by the administrator the file share witness can vote whenever they are available and in communication The cluster functions only with a majority of the votes that is more than half To configure a cluster with this quorum mode do the following 1 Launch the Failover Cluster Manager In the tree view in the left panel of the cluster manager right click on the node representing the cluster that you created move your mouse pointer over M
23. er Enabling Service Excellence The eG Installation Guide eG Enterprise v6 0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice No part of this document may be reproduced or disclosed to others without the prior permission of eG Innovations Inc eG Innovations Inc makes no warranty of any kind with regard to the software and documentation including but not limited to the implied warranties of merchantability and fitness for a particular purpose Trademarks Microsoft Windows Windows NT Windows 2000 and Windows 2003 are either registered trademarks or trademarks of Microsoft Corporation in United States and or other countries The names of actual companies and products mentioned herein may be the trademarks of their respective owners Copyright 2014 eG Innovations Inc All rights reserved The copyright in this document belongs to eG Innovations Inc Complying with all applicable copyright laws is the responsibility of the user Table of Contents INTRODUCTION 21osaiscssccsescsnctescsaxscursesasuns ussscsauassecesussessusousatcotuuesusstevesesnaessiesestsoesensnscs otonss sates saasesuatssuaesusstesutuussiebesussesssasoszenesae 1 1 1 SystemArchitecture sissie e Een EA AE e Ea E E EEE AATE T eissay sisted eerste eed 1 1 1 1 MAESE TA E E A E E T E E EEL 1 1 1 2 ADENS ora E E E E a a e E EEE 2 1 1 3 Database E E E E E E E E 4 1 1
24. A o Uppercase letters A B C and so on o Lowercase letters a b c and so on o Numbers 0 1 2 and so on o Non alphanumeric characters amp and so on o Does not contain the corresponding username For instance if the name of the special database user is egdb then the password that you set for this user should be a strong password such as db123 Note that without a strong password the eG manager installation will fail prefixed by a domain name Your specification should then be only username 8 The configuration process next prompts the user to specify if the database user name specified has already been created Does the egurkha account already exist y n n If the user response is y here then the following message will appear User egurkha exists Continuing Before attempting to set an existing database user name as the eG database user make sure Note that dbowner privileges are granted to such a user If the user response is n then the configuration process prompts for the user s consent to create the database user account Do you want to create the egurkha account now y n y 31 Installing and Configuring on Unix 10 11 Enter y to invoke the following New user creation requires database administrator privileges Enter the DBA user name eg sa or in the form domain dbaccount Enter the DBA password After providing the required information if
25. After manual installation of the agent you will find that a directory named egurkha is automatically created in the install location specified during installation Now tar the egurkha folder as eGagent_hpux_itanimum tar to a temporary folder say tmp on the agent host For this purpose issue the following command at the shell prompt tar cvf tmp eGagent_hpux_itanium tar egurkha Manual installation will also automatically create a silent_install_itanium script and an iAgent_hpux_itanium_silent in the opt egurkha bin directory of the agent host Copy these two script files as well to the temporary folder ay tmp Then copy the eGagent_hpux_itanium tar silent_install_itanium and iAgent_hpux_itanium_silent files to any location say tmp on that HPUX host on which you want to install an eG agent in the silent mode Next login as root user to the target HPUX host and edit the silent_install_itanium script so that it contains the inputs required for the agent installation on that host For this follow the procedure explained in step 4 of Section 1 1 of this document Once all the aforesaid parameters are configured with the values relevant to your agent installation save the 74 Installing and Configuring on Unix file Make sure that the eGuser account exists on the target system before you run the silent_install_itanium script til 7 Provide execute permissions for the silent_install_itanium scri
26. Delete Lj Networks C Network Sets 5 a Computers eG Manager E USERDNS Address Ranges E Subnets E Domain Name Sets C URL Sets Computer Sets Add Close Figure 3 218 Adding the newly created client set 23 Figure 3 215 will reappear but this time displaying the selected computer see Figure 3 219 Click the Next gt button here now to continue 262 Installing and Configuring on Windows Environments New Access Rule Wizard Access Rule Destinations This rule will apply to traffic sent from the rule sources to the destinations specified in this page Figure 3 219 The chosen computer being displayed in the destinations list 24 Next Figure 3 220 will open which by default displays the All Users option indicating that by default the rule applies to requests placed by all users To restrict the rule s applicability to specific users only click the Add button New Access Rule Wizard User Sets You can apply the rule to requests from all users Or you can limit access to specific user sets All Users Figure 3 220 Clicking the Add button to configure new users 25 Then click the New button in Figure 3 221 to create a new user s 263 Installing and Configuring on Windows Environments Add Users x User sets New Edit Delete BiaepOll Authenticated Users ey Egtesters Access A
27. ETEN Creating New Crnim p T 10 200 40 0 21 Dumay Figure 3 277 Specifying the name and IP address of the cluster 12 A brief summary of the cluster configuration will then appear as shown by Figure 3 278 Click Next therein to confirm and proceed UP Create Chester Wizard Fa Confirmation You ae ready to ieste chister The wazad sd woate your cluster wath the bolomo settings ATTP EGIRAC HJ atip epracnsO attp local atip egracnpO2 attp local 10 200 41 113 Crestng New Ginter Sirens Figure 3 278 Confirming the cluster configuration 13 Cluster creation will then begin see Figure 3 279 301 Installing and Configuring on Windows Environments UP Create Chester Wizard y Creating New Cluster i Pitara veal while the chsh cor gaed Fomo chester ATTP EGIRACKY Figure 3 279 Cluster creation in progress 14 Once cluster creation completes Figure 3 280 will appear Click the Finish button therein to end the cluster creation process EP Create Cluster Wizard You have successhdy completed te Create Ouste Wasd Create Cluster ATTP EGIRACH atip egracnpl attp local attp e racny02 attp local Quorum Node Maponty To vew the repot coeated by the mead chck View Repot To chose tha sized click Finish Figure 3 280 Completion of cluster creation 3 27 2 Creating a Windows File Share Now that the cluster has been created proceed to create a Windows File Share for the cluster
28. Provide a name for the text file to which the certificate request will be saved keypass the password used to protect the key that was generated make sure that you provide the same password that you provided while generating the keystore file see Section 3 4 2 1 of this document Also note that storepass and keypass should be the same gt keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 3 4 2 1 of this document 3 If this command executes successfully then a certificate request will be generated and automatically stored in the text file you specified in step 2 above 3 4 2 2 1 Obtaining the Certificate from the CA 1 The first step towards obtaining a certificate is to submit the certificate request to the CA For this connect to the Certificate server of the CA and submit the certificate The procedure for request submission will differ from one CA to another 2 The certificate will thus be generated Download the certificate 156 Installing and Configuring on Windows Environments 3 4 2 3 Importing the Certificates into the Keystore File The downloaded certificate can be in one of the following forms e Can bea single combined certificate e Can be accompanied by a certificate chain e Can be in a PEM format The procedure for importing certificates differs based on the format of the downloaded certificate These
29. The installation will attempt to create the user account if it does not exist on the system If you specify an existing user name then this group prompt will not appear 4 Would you like the eG agent to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the agent to start automatically every time the system hosting the agent reboots Now press y to install the auto restart feature or n to proceed without installing the same 5 If the agent is installed on the same system as the manager some common files need not be reinstalled The following files are already installed on the system and are being used by another package Do you want to install these conflicting files y n q n 6 As in the case of the eG manager the agent package contains components that need to be installed with the set uid permissions set These components must be installed for the agent to function properly Following this step the eG agent components are extracted and stored 7 TheeGagent will be installed in the default Jopt base directory Upon successful installation the following message will be displayed KKKKKKKKKKKKKKKKKKKKKKK KKK KKK KKK KKK KKK KKK KKK KK KKK KK KK KKK KK KK KKK AK 62 Installing and Configuring on Unix The eG agent has been successfully installed Please login as lt eG user name gt and run the script opt egurkha
30. To deploy an eG agent on AIX use the standard AIX agent package The procedure for deployment has been explained clearly in Section 2 9 4 of this document Since the eG agent on AIX 32 bit is bundled with both JRE 1 5 and JRE 1 6 upon installing an agent on a 32 bit AIX host two JRE folders will be created in the opt egurkha directory namely gt The jre1 6 folder containing the default JRE 1 6 gt The jre folder containing JRE 1 5 After installing the eG agent on an AIX host try starting the agent and check for errors that say that Java cannot be run If such errors do not occur it is a clear indicator that the AIX system hosting the eG agent is JRE 1 6 compatibleOn the contrary if the agent startup process throws the Java cannot be run errors it could mean that the AIX host supports JRE 1 5 only In such a case do the following gt Open the opt egurkha folder on the AIX system that is hosting the eG agent gt Remove the jre1 6 folder therein gt Restart the eG agent 2 14 Starting the eG Agent To start the agent first login as the eG user and then run the command opt egurkha bin start_agent The following message would be displayed FRR RK K K K K K KKK KK K K K K K K K K KK KK KK K K K K K KK KK KK KK KK KA KK KK KKK KKK KK KK K K K K KKK KKK KKK K Starting the eG agent The eG agent 5 1 has been started Please check the file opt egurkha agent logs error_log for any errors while executing the agent
31. To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder Figure 3 98 Location of the eG agent Soon after the agent install directory is specified a message box will appear requesting you to indicate whether 4 the eG agent is to use SSL for communicating with the manager see Figure 3 99 Click on the Yes button to 179 Installing and Configuring on Windows Environments confirm SSL support for the agent Question gt The eG Agent can use HTTP or HTTP SSL to communicate with the eG Manager In order to use HTTP SSL please make sure that the eG Manager has been 7 configured to support SSL Do you want to configure the eG Agent to use SSL for communication with the eG Manager Figure 3 99 A message box requesting the user s confirmation to enable SSL support for the eG agent 5 Now Figure 3 100 will appear requesting your confirmation to allow trusted certificates only Click on the Yes button if the agent is expected to communicate only with a manager that has a trusted SSL certificate If you click on the No button the agent accepts any certificate provided by the manager at the time when the SSL connection is established Question LY Please indicate if you want to allow trusted certificates only Figure 3 100 A message box requesting your confirmation to allow only trusted certificates 6 Clicking on either button in Figure 3
32. US Is CN eG Innovations Inc OU United States O eG Innovations Inc L Bridge Water ST New Jersey C US correct no yes 146 Installing and Configuring on Windows Environments When requested for the first and last name indicate how you will be accessing the eG manager For instance if you will be accessing the eG manager for which the certificate is being generated via the intranet then specify the IP address of the eG manager here On the other hand if the eG manager is to be accessed via the public Internet then specify the fully qualified host name of the manager eg http www manager com here Once all the required inputs are provided a keystore file will be generated in the lt JAVA_HOME_DIR gt bin directory with the lt Filename gt you had provided while issuing the command 3 4 1 2 Generating a Certificate Request Once a keystore file is generated proceed to request for a certificate from an internal certifying authority The procedure for this is as follows 1 Login to the eG manager and go to the Windows command prompt 2 Execute the following commands one after another cd JAVA_HOME bin keytool certreq alias egitlab1 keyalg RSA file lt Name_of_the_text_file gt keypass mykey keystore lt filename gt keystore storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been descr
33. lt Connector gt Set the port parameter in the XML block to reflect the port number that you have configured for the eG manager Also note that two new parameters namely keystoreFile and keystorePass have been inserted into the SSL block While the keystoreFile parameter has to be set to the full path to the keystore file that you generated earlier the keystorePass parameter should be set to the keystore password that you specified while issuing the keytool command With that change the eG manager on Linux has acquired the capability to listen on two ports the SSL port and the non SSL port To configure the eG manager to listen only on the SSL port simply comment that section of the server xml file where the non SSL Coyote HTTP connector on port 8081 has been defined as indicated below lt Define a non SSL Coyote HTTP 1 1 Connector on port 8081 gt lt lt Connector className org apache coyote tomcat4 CoyoteConnector PORES lt eGE Manager ePOrmE Wem imMrrOCess Ors 57 maxProcessors 256 enableLookups true redirectPort 8443 acceptCount 10 debug 0 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 gt gt Save the file Next make sure that the eG manager URL configured against the MailHomeURL parameter in the MISC_ARGS section of the eg_services ini file in the opt egurkha manager config directory begins with https nstead of http Then save the file Finall
34. opt egurkha bin setup agent to configure the agent KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KK KKKK KK KK KK KK KK KKKKKKKKAKKKKKKKKKK 2 9 5 Installing an eG Agent on HP UX 2 9 5 1 System Requirements For the eG agent to function effectively the system on which the agent is being installed should have the following e HP UX 11 or higher e 64 MB RAM and 50 MB of disk space 2 9 5 2 The Installation Process The standard eG agent software for Hpux is provided as a depot file by name eGAgent_hpux depot An accompanying script called iAgent_hpux drives the installation process for the agent The steps involved in installing an agent on HP UX are 1 Execute the iAgent_hpux script from the super user account 58 Installing and Configuring on Unix iAgent 05 22 02 12 18 02 IST BEGIN swreg SESSION non interactive Session started for user root hpux01 Beginning Selection Targets hpux01 Objects var spool sw eGAgent depot Selection succeeded 05 22 02 12 18 02 IST END swreg SESSION non interactive NOTE The interactive UI was invoked since no software was specified Starting the terminal version of swinstall Navigation in swinstall use the Tab key to move between screen elements use the arrow keys to move within screen elements use Ctrl F for context sensitive help anywhere in swinstall On screens with a menubar at the top like this File V
35. 7077 minSpareThreads 32 maxThreads 512 enableLookups false acceptCount 10 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 compression on compressionMinSize 2048 noCompressionUserAgents gozilla traviata compressableMimeType text html text xml text plain application x java applet application octet stream application xml text javascript text css image png image jpeg image gif app lication pdf application x javascript application javascript SSLEnabled true scheme https secure true clientAuth false sslProtocol TLS keyAlias egitlab1 keystoreFile lt The_full_path_to_the_keystore_file gt keystorePass mykey gt Set the port parameter in the XML block to reflect the SSL port number that you have configured for the eG manager Also note that three new parameters namely keyAlias keystoreFile and keystorePass have been inserted into the SSL block While the keystoreFile parameter has to be set to the full path to the keystore file 160 Installing and Configuring on Windows Environments that you generated earlier the keystorePass parameter should be set to the keystore password that you specified while issuing the keytool command Likewise the keyAlias parameter is to be set to the alias name that you provided for the certificate file when you generated it in Section 3 4 2 1 above 4 With that change the eG manager on Windows has acquired the capabil
36. Allow inhented Shae over SMB eg_atp Share path ATTP EGIPSNION eg atp Derogtor Upa in Maamum allowed Ofira vetirg Selected tie ard progama avelabie offre SMB perme sore Everyore Aloe Read ATTP Sarena Allow Ful Corio Figure 3 295 Reviewing the share settings If share creation is successful then Figure 3 296 will appear indicating the same Click the Close button therein 313 Installing and Configuring on Windows Environments Hp Prowmeen a Shared tobkder Wizard au Confirmation Shand foliu Locuien O You have succesthily completed the Provision a Shared Folde Wieard NTFS Pemennane Share Protocols SMB Settings SMB Perms mons OFS Namespace Publishes Renew Settings ard Lese Shwe Cordersation Tonks Emors Figure 3 296 Successful creation of the file share 314 Installing and Configuring on Windows Environments 3 27 3 Configuring Cluster Quorum Settings As stated earlier the quorum for a cluster is the number of elements that must be online for that cluster to continue running When network problems occur they can interfere with communication between cluster nodes A small set of nodes might be able to communicate together across a functioning part of a network but might not be able to communicate with a different set of nodes in another part of the network This can cause serious issues In this split situation at least one of the sets of nodes must stop running as a cluster
37. Ce To get the eG agent to communicate via an ISA proxy server to the eG manager follow the Refer steps discussed in Section 3 21 11 If authentication is required the eG agent setup allows the user to enter the user name and password that is 182 Installing and Configuring on Windows Environments used for all communications from the agent to the manager via a proxy server as in Figure 3 106 eG Agent Setup eG Agent Setup Please enter the following details Usermame to be used tor the Froxy server eguser L Password Retype the password Figure 3 106 Username and password to be used for communication via a proxy server If the eG agent is configured to communicate with the eG manager via a proxy server then Ga whenever the eG agent attempts to remotely monitor an application by connecting to it via HTTP HTTPS it may automatically use the proxy server to establish this connection this in tun may cause problems while monitoring those applications To avoid this before configuring the eG agent manager communication via a proxy make sure that the agent will be able to connect to remote applications also via the same proxy Refer The next step displays all the details that have been provided so far by the user as in Figure 3 107 183 Installing and Configuring on Windows Environments eG Agent Setup eG Agent Setup The Setup has enough information to start copying the program files I
38. Custer IP add Cluster Configuration Quorum aT 192 168 2 Select the resource or resource type that you would like to Cluster networ use for the quorum resource Local Ares Pa Sin A HOLMEN KEE a Quorum View Log To create a cluster with this configuration click Next lt Back Next gt Cancel Figure 3 249 Selecting the resource to be used for the quorum resource 280 Installing and Configuring on Windows Environments 11 The cluster creation process will then end Click the Next button in Figure 3 250 to confirm completion of the process New Server Cluster Wizard Creating the Cluster Please wait while the cluster is configured Reanalyzing cluster Configure cluster services Configure resource types Figure 3 250 Cluster creation in progress 12 Clicking the Next button in Figure 3 250 will lead you to Figure 3 251 which confirms the successful completion of the cluster creation process Click the Finish button in Figure 3 251 to exit the wizard 281 Installing and Configuring on Windows Environments 13 14 New Server Cluster Wizard Completing the New Server Cluster Wizard You have successfully completed the New Server Cluster Wizard View Log To close this wizard click Finish Figure 3 251 Completion of cluster creation Now that cluster Node 1 has been added proceed to add Node 2 For that open the Cluster Administrator console by following the
39. ECOBS5E31 F42B 46 4E B764 45FEA005C954 AskYesNo 0 Result 1 ECOBS5E31 F42B 4B4E B764 45FEA005C954 AskYesNo 1 Result 1 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdShowDlgEdit2 0 szEditl 192 168 10 27 szEdit2 7077 Result 1 ECOBSE31 F42B 4B 4E B764 45FEA005C954 AskYesNo 2 Result 1 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdShowDlgEdit2 1 szEditl 192 168 10 5 szEdit2 80 Result 1 ECOBSE31 F42B 4B 4E B764 45FEA005C954 AskYesNo 3 Result 1 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdShowD1lgEdit3 0 szEditl egquser szEdit2 egqurkha szEdit3 egurkha Result 1 ECOBSE31 F42B 46 4E B764 45FEA005C954 SdStartCopy 0 Result 1 Application Name eG Agent Version 4 Company eG Innovations Inc Lang 0009 ECOBSE31 F42B 4B 4E B764 45FEA005C954 AskYesNo 4 Result 1 B764 45FEA005C954 SdShowD1lgEditl 0 Change the value of this parameter to change the nick name ECOBSE31 F42B 48 4E B764 45FE4005C954 SdFinish 0 Result 1 bOptl 0 bOpt2 0 Figure 3 73 Changing the nick name of an eG agent 4 Finally save the file 143 Installing and Configuring on Windows Environments 5 Once this is done you can proceed to use the updated script file to install the eG agent on a host The procedure for installation is the same as discussed in Section 3 2 2 2 1 above 3 2 2 2 3 Silent Mode Installation of an eG Agent Using a Script File that is Newly Generated Sometimes the configuration you desire
40. Enee Elle Action view window Help e mBelg r mi E Application Pools B Web Sites Default Web Site a Myweb egurkha J Web Service Extensions Figure 3 126 The IIS console 2 Ifall the web sites on the IIS web server are being monitored by eG then you will have to enable logging for all To achieve this right click on the Web Sites node in the tree structure on the left pane of Figure 3 126 and select Properties see Figure 3 127 from the shortcut menu that appears amp Internet Information Services 11S Manager Fg File Action View Window Help J Application Pools J Web Sites Service is running J Web Service Extensions e m Web New Window From Here Refresh Figure 3 127 Selecting the Properties option from the shortcut menu of the Web Sites node Windows 2003 3 Next click the Web Site tab of the Properties dialog box see Figure 3 128 that appears and ensure that the Enable logging check box is selected 201 Installing and Configuring on Windows Environments Web Sites Properties x Directory Security HTTP Headers Custom Errors Service Web Site Performance ISAPI Filters Home Directory Documents M Web site identification Description IP address All Unassigned z Adyanced TEP port SSL port M Connections Connection timeout seconds IV Enable HTTP Keep Alives IV En
41. Enter the eG database user name egurkha Enter the password for egurkha Please re enter the password for egurkha 4 The configuration process next prompts the user to specify if the database user name specified has already been created If this is not the case the configuration process prompts for the user s consent to create the database user account Does the egurkha account already exist y n n Do you want to create the egurkha account now y n y 5 If the user chooses not to have the user account created by the configuration process the user account has to be created manually with connect resource and select_catalog privileges 6 In the event that the user agrees to have the account created by the configuration process the user is prompted to specify the default and temporary database tablespaces with which the user account should be associated Oracle requires that a user account be associated with a default and a temporary tablespace Pleas nter the default tablespace for the user egurkha Pleas nter the temporary tablespace for the user egurkha 20 Installing and Configuring on Unix e We recommend that when you install the eG manager with an Oracle database backend the following tablespaces with the parameters indicated are specifically created for eG create tablespac gurkhadata0l datafile C Oracle ORADATA egurkha eGurkhaData0l dbf size 10240M autoextend off extent mana
42. Figure 3 201 Figure 3 202 Figure 3 203 Figure 3 204 Figure 3 205 Figure 3 206 Figure 3 207 Figure 3 208 Figure 3 209 Figure 3 210 Figure 3 211 Figure 3 212 Figure 3 213 Figure 3 214 Figure 3 215 Figure 3 216 Figure 3 217 Figure 3 218 Figure 3 219 Figure 3 220 Figure 3 221 Figure 3 222 Figure 3 223 Figure 3 224 Figure 3 225 Figure 3 226 eG menu options to start stop and uninstall the eG agent e ce eceseeccsseeceeseeeesecseceeeeeeseeseeseeseceeceaeeseesesaecseceeeaeeaeeaeeaeeeeneseneeaeeas 228 Starting an eG agent on Windows 2008 Ji sassescsscvasescsassvesiadescesasacev sesssscsasnsaxcvapavsgunaansavcvarsoneonsenasedeateisdonscnasadestasauanedeasedesaustbatesca tees Starting the eG agent on Windows Vista Message indicating that the agent has started successfully ccessscesesceesceseeseeseceeceeeeseeseesecsecseceeeseesecsecsecseceeceaseseeaeeaeeneeeeseaeeaees 231 THE Control Panel esos ia aA SEANA TA EE A EAS ANEAN IRI RRS EREA REE AEEA TERE EEREN 231 The Administrative tab page 232 Copying the current user s settings to the system accounts 233 Opening the ISA Administration Tool 0 0 0 0 eee 235 The administration C nsolas asro raS voseaenedayeaaianssseaedccusbateccaigapcveasbaasaeasseasaasbasesvsvasnesvasbesaauloaestarisranaigrevraatarenaniibeet 236 Assigning aname for the new ClEnt set ossireirsicsossi raii iini TR s iao TRE
43. Figure 3 231 Figure 3 232 Figure 3 233 Figure 3 234 Figure 3 235 Figure 3 236 Figure 3 237 Figure 3 238 Figure 3 239 Figure 3 240 Figure 3 241 Figure 3 242 Figure 3 243 Figure 3 244 Figure 3 245 Figure 3 246 Figure 3 247 Figure 3 248 Figure 3 249 Figure 3 250 Figure 3 251 Figure 3 252 Figure 3 253 Figure 3 254 Figure 3 255 Figure 3 256 Ending the user confi guration sanoa eati Ei TAE AOT cba ene cea sees EEE EEEE SKEER EREE ENEA E OEN EE aera dan 267 Selecting th newly added user Set iessiisissrsisir erasi rise snz tite asinis neVe evasavalevdavandonsansavavarssxeonsenasedeateisbonsenasadestssauaneieaseseseuatbateseazess 267 Viewing the new user set Removing the default set Ending the access rule configUrati n rossiccio iiei iriiri EiS RSEN E EREE REEE EACE ANE EREE 269 The name of newly added access rule displayed Moving the new rule up Moving the new rule to the first position Viewing the Networks sub node of the Configuration nOde ccscsscsssesseeseesecseceeceeceeeeseeseeseeseceeceaeeseeseeaecaeceeeaeeseeaeeaeeeeneeeeeeaeeas 271 The Web Proxy tab o oo ea BA s AEREI EA EEEREN TRASEE Dues sgn AE EESE AEE cos Sovedadebaes cas EAA TE Selecting an Authentication option Assigning an authentication domain Clicking on the LAN Settings Dutton ienser einsi eae Ee N VEE EE EREE TNE OEE E 273 Defining the proxy settings 213 Choosing to create a new cluster 274 The We
44. Figure 3 31 Figure 3 31 Figure 3 32 Figure 3 32 7 Selecting the Configure Cluster Quota Settings option cccessssessesecseceseeseesecececeseeseesecsecsececeseeseeseesecseceeseseeaeeaecseceeeeseaseneeaes 315 8 Selecting the Node and File Sharing Majority Option cccesesessesseceeceseeseeeesecsececeeceseeseesececeeeaeeaeeaecaececeseeeeaeeseesesaeeneseeseneeaees 316 9 Entering the full path to the shared folder OSREviewin g the guorum settings seia erei Aa AE e dances sy etesceu seta ceanena sas snasavsnuraten EAA EE AEREE EAEE A OERE RESES 1 Completion of quorum configuration s serseri riiai nr iiia EE ER EERE EAE EREE KEANE ERRETEN 2 Choosing to configure a service or application 318 3 The welcome screen of the High Availability wizard 319 4 Selecting the Generic Service option 319 5 Selecting the eGurha pent service sias aen aa aN a wos EEESTIS ESES ISVER EE EE ASSE IEEE EIEEE SATENE EENEN aes 320 6 Entering the network name and IP address using which clients will be accessing the clustered resource s s ssssssesieresseeeseeeeeee 320 7 Clicking the Next button in the Select Storage page 8 Skipping the Replicate Registry Settings page we ccds ccesceccsccecessovasceceseaucecsvsavesesvenscadeveaatovndscenccunsuteswesrdessscaccssvvstevedecsansdeveiseneversindes 9 Reviewing the service conficuratioM eeens irii a ti a VEE REE REEE OTE E EOE a 0 High availability configurat
45. File Edit view Tools Help Organize v FEE views v u Name Iz Date modified Izl Type Size Favorite Links 7 _WebAdapterFile_D20110616 110119988 l 6 16 2011 5 00PM Text Document J 1 F Documents _ WebAdapterFile_D20110617 000000143 6 16 2011 9 53PM Text Document E Pictures Lj WIN DXMESFXBON3 Server_D20110616 11012 6 16 2011 5 00PM Text Document lf 7 Music L WIN DXMESFXBON3 Server_D20110617 00000 6 16 20119 53PM Text Document E More Folders ag Floppy Disk Drive A aj amp Local Disk C B AdvancedLogs db eg_adapter d eGurkha P snmp ab agent ry config d data B logs ISAdvlogs ab snmptrapd echbave Figure 3 153 List of log files saved to the AdvancedLogs directory 17 To view a log file click on any of the log files in the list of Figure 3 153 The chosen log file will then open in Notepad as depicted by Figure 3 154 223 Installing and Configuring on Windows Environments i WebAdapterFile_D20110405 062614106 Notepad ioi Xx File Edit Format View Help Hsoftware IIS Advanced Logging Module Version 1 0 Start Date 2011 04 05 06 26 14 107 Fields time local csCHost s ip s port sc status cs uri stem cs uri query CPU Utilization sc bytes cs bytes TimeTakenMS s computername s sitename cs username 23 26 13 615 192 168 8 185 192 168 8 185 80 200 iisstart htm 100 934 152 2 WIN DXMESFXBON3 DEFAULT WEB SITE 23 26 13 615 192 168 8 185 192 168 8 185 80 200
46. Gemplus Globalscape Inc H E Googe E Helios H E Hewlett Packard Installshield H E Intel Intel Corporation InterSoft International Inc Javasoft KasperskyLab lameme Macromedia E Mcafee H E Microsoft E MySQL AB E Net SNmP osc Policies PowerArchiver zi Ane My Computer HKEY_LOCAL_MACHINEISOFTWARE eG Innovations Inc Figure 3 328 Selecting the eG Innovations Inc entry 4 Delete the selected entry by pressing the Delete key on the keyboard and confirm deletion by clicking the OK button in Figure 3 329 that appears Confirm Key Delete Ixi A re you sure you want to delete this key and all of its subkeys Figure 3 329 Confirming deletion of the selected key 5 Then place the cursor on the My Computer key at the top of the registry tree see Figure 3 328 and then proceed to choose the Find option from the Edit menu see Figure 3 330 334 Installing and Configuring on Windows Environments Registry Editor ale x File Edit View Favorites Help E New F aj Name Type Data Permissions Delete Del Rename Gopy Key Name Eind Ctrl F Find Next F3 Avance covresy H Citrix E Classes Clients DeterministicNetworks E eGurkha E5 Computing E Expertcity E Gemplus GlobalScape Inc Google Helios Hewlett Packard Installshield Intel Intel Corporation InterSoft International Inc Javasoft KasperskyLab
47. KEKEKKKKKKKKKKEKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKKKK KK KK KK 2 9 6 Installing an eG Agent on an HP UX Server Running an Itanium Processor The eG agent software for Hpux_Itanium is provided as a tar file named eGagent tar An accompanying script called iAgent drives the installation process for the agent The steps involved in installing an agent on such a host are 61 Installing and Configuring on Unix discussed hereunder 1 To start the installation process execute the iAgent script with the eGagent tar file located in the same directory as iAgent A The agent installation must be performed from a super user account Note 2 Next specify the user account to be used for executing the eG agent First enter the name of the eG user The default value taken is egurkha This script will install th G agent Th G agent must be installed and executed by a separate user If you have installed the eG manager on the same system you must use the same user and the same installation directory for the manager and the agent Enter the name of th G user egurkha A E If the agent is being installed on the same system as the manager the eG user configured Not for the agent should be the same as that used for the manager 3 Enter the group to which the eG user is to be associated egurkha Then enter the group to which the eG user is to be associated with The default value taken is egurkha
48. Node Majority not secommended lor you curent nambas of nodes Can surtan laises of nodets C Node and Duk Marty pecommended tor pos curert nate of noder Can sustan lakae of 1 nodejs wath the dick aner or re Cn antan Lohrer of O nodali the dsk wetness goes oiire o isi Node and Fie Share Masty lor chatas sih penal conmbg s atone Cn anian Lases of nodais the fie chwe wires mnane ovedabie Cn anian lakse of O rockets the fie share wirer becomes unavakabio C NoMapaty Dat Oriy not commended Can anian lakso of al nodes except 1 Cannot antan a lakre of the quora dik The Configuration a not recommended becane the det n a snge port of ts pe Mote deL IEAM congestion Figure 3 298 Selecting the Node and File Sharing Majority option In the Shared Folder Path text box of Figure 3 299 enter the full path to the shared folder that you had created earlier on the file share server refer to Section 3 23 2 Then click the Next button Configure Ouster Quorum Wizard y Configure File Share Witness Pisara select a shared tokder that val be used by the le chare winess ssouce Tha shared folder must not be homed by thes chate ii can be made mere valstis by hosing i on another Shared Fokder Path pomena OOOO O O Figure 3 299 Entering the full path to the shared folder Review the quorum settings once more in Figure 3 300 and click the Next button to proceed with the settings 316 Installing and Configuri
49. The eG Manager requires a special database user account to store its measures Please enter the eG Manager database user name egdb Please enter the password for the above database user Retype the password Figure 3 68 Creating a special database user account 7 Subsequently specify the folder in which the eG manager is to be installed see Figure 3 69 and click the Next button eG Manager Setup Choose Destination Location Select folder where setup will install files Setup will install eG Manager in the following folder To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder Figure 3 69 Specifying the eG manager install directory 8 A summary of the installation inputs that you have provided will then appear see Figure 3 70 Review the inputs and click the Next button to resume setup 137 Installing and Configuring on Windows Environments eG Manager Setup Start Copying Files Review settings before copying files Setup has enough information to start copying the program files If you want to review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings IP Host Name 192 168 117 214 Port Number 7077 Tomcat Port 3 7077 Double Byte Support k Not Enabled Path for JDK C egurkha ava Database ServerName IP 192 168 10 100 Datab
50. To manually configure the eG web adapter on an IBM HTTP Server 6 x on Unix Linux Solaris AIX do the following 1 2 First login to the Unix server as the IBM HTTP install user Edit the lt IBM_HTTP_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_ibm_eg6 so Copy the file mod_ibm_eg6 so from the opt egurkhallib directory to lt IBM_HTTP_HOME gt modules under lt IBM_HTTP_INSTALL_USER gt Stop and restart the IBM HTTP server Note that the eG web adapter cannot be configured on an IBM HTTP Server 6 x on HPUX 2 17 4 Configuring the eG Web Adapter for an Apache Web Server ona 64 bit Linux Operating System To configure the eG web adapter for an Apache web server on a 64 bit Linux host do the following 1 2 The eG agent for the 64 bit Linux host is bundled with the following shared libraries to be used by the eG web adapter if configured on the host mod_eg24 so mod_eg22 so mod_eg2 so libeg_reptr_cat so libeg_reptr_total so ibeg_reptr_site so These files are available in the opt egurkhal lib lib64 directory on the host To enable the eG web adapter for Apache 2 0 following the steps given below e First login to the Linux host as the Apache install user e Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg2 so e Copy the file mod_eg2 so from the opt egurkhallib lib64 directory t
51. do the following 1 Edit the eg_services ini file in the lt EG MANAGER INSTALL gt manager config directory 2 Define a URL against the NowSmsUrl parameter in the SMS_SERVER section of the file in the format shown below NowSmsuUrl http lt NowSmsServer gt lt NowSmsPort gt PhoneNumber amp Text 356 Configuring the eG Manager to Send SMS Alerts A sample configuration is shown below SMS_SETTINGS NowSmsuUrl http 192 168 1 25 8800 PhoneNumber amp Text 3 Once the NowSmsuUr is set save the file 7 2 Integrating the eG Manager with the eG SMS Manager 7 2 1 Architecture of the eG SMS Manager As and when problems occur in the environment the eG manager generates alarms to monitor users If a monitor user has been configured to receive the alarm information via SMS then the eG manager forwards the alarms to the eG SMS manager The eG SMS manager then transmits the alarm information to the monitor user s mobile phone using a GSM Global System for Mobile communication 7 07 compliant modem Figure 7 2 depicts how the eG SMS manager works Sends alarm information GSM Modem Mobile Phone eG Manager eG SMS manager Figure 7 2 How the eG SMS Manager works 7 2 2 Installing the eG SMS manager This section outlines the prerequisites and the prcedure for installing the eG SMS manager 7 2 2 1 Installation Prerequisites Software Prerequisites Windows 2000 Professional or Windows 2003 server
52. ett te ttt eee Se ee ee ee ee ee ee eee ee ee ee eee eee ee eee EEEE EEEE EEE EEEE EEE E EE E EEE The following error message would appear if the agent fails to start FER AK KK KK KK EK KK KK EK A KK KK A KK KK EK AK KK KK K K K K KK K KKK KKK KKK KKK KKK KKK The eG agent failed to start This is probably because the eG manager s license does not permit this agent to communicate with it Please check the file opt egurkha agent logs error log for details HK KA KKK RAK KK KK KK KKK KKK RK 77 Installing and Configuring on Unix An eG agent may fail to start if e the eG manager cannot be contacted or e there is a license mismatch The following processes will run when the agent starts gt A Java process that executes EgMainAgent this is the core agent process Note gt A script named eGAgentMon that periodically monitors the agent and restarts it if the agent ever fails Then the eG administrative interface described in the the eG User Manual can be used to enable disable authentication during manager agent communication In Linux AIX and HPUX systems error and output logging for the eG agent can be triggered by editing the start_agent script in the opt egurkha bin directory The steps involved in this process are discussed hereunder 1 Open the start_agent file 2 _ Edit the line that begins with nohup opt egurkha jre bin jjava Xrs EgMainAgent see Figure 2 19 then CLASSPATH
53. ilalealex OoOl olg Environments Firewall Policy aa ity Acceleration nE Standard Edition L2 Firewall Policy LD vetual Private Networks ven A Apply Discard J Configuration Firewall Policy Order Name S P Block Egtesters All Open 3 Shiva Last Default rule Action _ Protocols Deny L3 all Outbound Traffic allow lH ariow LG all outbound Traffic To save changes and update the configuration click Apply From Listener lt Internal All Networks and Local Host All Ne All Networks and Local Host Extel Al nd All Networks and Local Host All Nd Firewall Policy Firewall Policy Tasks 4 Create New Access Rule 5 Publish a Web Server A Publish a Secure Web Server T Publish a Mal Server T Create New Server Publishing Rule op Edit Selected Rule X Delete Selected Rules 4 Move Selected Rules Up Disable Selected Rules System Policy Tasks GF Edit System Policy S Show system Policy Rules Export system Policy 3 Import System Policy Related Tasks of Define IP Preferences Move Up Microsoft Internet Security and Accel lemmas Security amp Gg EcmaBoz Acceleration Server 2004 E Monitoring Standard Edition 4 Firewall Policy 3 Configuration E alov F 2 BlockEgtesters Deny Allow alow Q Deny S F 3 Al Open a P 4 Shiva
54. lt Host IP gt lt Port No gt Please Note that this screen will remain for the next 15 seconds Figure 3 84 Message indicating that the manager has been started successfully Upon starting the eG manager the following services get started e eGmon manager recovery process e eGurkhaTomcat core manager process Please check the services running on your system If the status corresponding to the service eGurkhaTomcat and eGmon is Started then the manager has been started successfully If the manager fails to start the following message appears Start Manager i Starting the eG manager components Failed to start the eG manager Possible re for this could he Ci Your lice located in the file eG Home Directory bin licens may be invalid Please check eG Rome Dir ry manager lLogs error_log lt ii You may not have perm s to start the eG manager Please check the vermissi the directory Please Note that this reen will remain for the next 15 seconds FAIRIES SESE SESSA SESE SESE SESE SESE SESS SESE SESS SESE SESE SESE Figure 3 85 Message indicating that the manager has not been started successfully Please check the lt EG_HOME_DIR gt manager logs error_log file to find out the reasons due which the manager failed to start 3 5 2 Starting the eG Manager with SSL Support The first step towards starting the manager with SSL support is to SSL enable the startmanager bat script by following the s
55. open the eg_services ini file in the lt EG_INSTALL_DIR gt manager config directory see Figure 7 9 361 Configuring the eG Manager to Send SMS Alerts 5 6 j eg_services ini Notepad File Edit Format Help START MANAGER iF lag FALSE MISC_ARGS Rediscoveryper iod 60 DiscBase IP DiscUniqueTargets FALSE DiscBaseChange FALSE DiscTimeout 250 UselcmpForDiscovery Yes AuthenticateAgents No EncryptReports No SNMPCommuni tystr ings Licenseexpiredmess vour subscription to the eG asPlite service has expired Please contact your administrator to renew your subscription to this service LicenseExpirymess Your subscription to the eG ASPlite service will expire in no_of_days more day s Please contact your administrator at the earliest to renew your subscription Licensemgrmai 1id eg your domain com Alertagent sNotRunning No Mai 1Lastvalue No Aut oIpNamecheck ves NickIpcheck ves Ss 1MgrRestart No Default aut oupgr ade no The SMS_SETTINGS p i x section SI ms Server C smsPort sms Services NOPORT_SERVERS Local_directorsnul1 The entries under the ICisco_router nul1 CheckFoint_server nul GSMS SETTINGS section BizTalk_server nul Printersnul1 i Figure 7 9 The contents of the eg_services ini file Figure 7 9 indicates that the following entries exist under the SMS_SETTINGS section of the eg_services ini file SmsServer SmsPort SmsService To conf
56. or Windows XP Professional with a serial port interface Hardware Prerequisites 128 MB RAM A GSM 7 07 compliant modem 357 Configuring the eG Manager to Send SMS Alerts Others Subscription to a mobile phone operator s SMS service 7 2 2 2 Installation Procedure To install the eG SMS manager do the following 1 Insert the eG product CD into your CD drive 2 Double click on the eGSMSMgr exe file in the CD drive to initiate the installation process 3 When setup commences the Welcome screen will appear see Figure 7 3 Click on the Next gt button here to continue eG SMS Manager Setup www eginnovations com edm ESMS Warning 2007 eG Innovations Inc All rights C reserved Enabling Service Excellence A Cancel Figure 7 3 The Welcome screen of the eG SMS manager setup 4 Next the eG SMS manager s license agreement appears see Figure 7 4 Click on the Yes button to accept the agreement or No to exit the setup 358 Configuring the eG Manager to Send SMS Alerts eG SMS Manager Setup Enabling Service Excellence Figure 7 4 Accepting the license agreement 5 Upon accepting the license agreement you will be required to select the port on which the GSM modem has been installed see Figure 7 5 Then click the Next gt button to proceed with the setup eG SMS Manager Setup MANAGER Enabling Service Excellence Figure 7 5 Selecting the port on which the GSM m
57. 23 40 20 450 localhost 1977 1 1977 304 Test html 3 119 211 332 1 WIN DxXME8FXBON3 xl Figure 3 154 Viewing the log file Sometimes even after choosing to log the Username the advanced logs may continue to display only a hyphen against the Username field To ensure that the Username is correctly logged do the following e On the IIS 7 8 host edit the C Windows System32 inetsrv config applicationHost config file in an editor e Locate the following line in the file lt field id UserName sourceName UserName sourceType RequestHeader logHeaderName cs username Note category Default loggingDataType TypeLPCSTR gt e Change the entry in Bold in step 2 above as indicated below lt field id UserName sourceName UserName sourceType BuiltIn logHeaderName cs username category Default loggingDataType TypeLPCSTR gt e Save the file 224 Installing and Configuring on Windows Environments 3 17 Configuring the eG Agent to Monitor an Apache Web Server The eG web adapter can be configured on an Apache web server on Windows using a manual configuration process only The same has been discussed below To manually configure the eG web adapter on an Apache web server 1 x on Windows do the following 1 First login to the Windows server 2 Edit the lt APACHE_HOME gt confihttpd conf file to append the following lines AddModule mod_egurkha c LoadModule mod_egurkha modul
58. 3 146 Viewing the list of log definitons that pre exist In the Log Definition page that appears specify WebAdapterFile as the Base file name Check the Enabled option the Publish real time events option and the Write to disk sub option 8 217 Installing and Configuring on Windows Environments Internet Information Services 115 Manager je x E13 SF gt WIN DXMEBFxB0N3 gt CESC File wiew Help i J Log Definition a e HIA 1 FJ g Sy Apply I Start Page Base file name a Ex Cancel 1 83 WINDXMESFXBONS WIN DXME WebAdapterFile 2 Application Pools View Log Files Piney M Enabled amp ites Return To Advanced Logging m Sites I Publish real time events eee write to disk Hep Online Help Log File Rollover Schedule Daily z IT Start new log file when configuration changes Maximum duration in seconds Maximum file size in kilobytes Selected Fields Required Default Value Move First Edit mere Move Up Move Down Move Last Select Fields l Remove z 4 Features View Content View Ready amp Figure 3 147 Adding a new log file definition 9 Then click on the Select Fields button at the bottom of the Log Definition page to select he server side and client side logging fields to be logged in the specified log file Doing so will invoke Figure 3 148 from which you wil have to select the
59. 3 312 E Fatover Outer Marage S Uh ATPEGRAOO stip oct Failover Cluster Manager T ean wed wok tere aT Create laike duster vahdste harese lor potent takes clusters and patom configston changes to pous ladover cheers fring the service o apokcston orire 3 arn Toke this sanoe or appkcaton offine a am Mee thes service oF apphcation to another node gt oe Compases thu work together to messane the evekatility of services and ancestors The chiteed serven called rodes ee connected by phpecal cables ond ty softmae Il one of the o provade serce Le procer brome ar adorver ij ase t fret vada yos hardware confirmation then cose a chute Afe these sept we complete you can manage the chaim Managing a chuse can pekade mgaing sece and apghcatons to Server 2003 Windows Server 2008 a Windas Server 2008 R2 E uesia hatter vakion tets B irmata chaim a aii B Manon alates aas Mng eee and appic shy tan a cham ON lM E Eain tte tres on he wst E Eaire cute coments on the Wet B Haan aor com o te Wed Figure 3 312 Editing the Properties of the eGurkhaAgent service that has been added as a cluster resource 13 Figure 3 313 then appears In the General tab of Figure 3 313 the nodes added to the failover cluster you have created will be listed in the Preferred owners section You can either set a single node as the owner of the service by selecting the check box that corresponds to that node in this case you will have to deselect th
60. 4 User Interfaces eaen rs a EE E E E A R ENE 4 1 2 Factors Governing the Location of the Manager ccccecesesesssseesecseeseeeceeceeesecseesessceaceeseesesaeesesseeaseasseesesaesseeseeaseaseeees 5 1 2 1 Sizing the Hardware and Database Required by an eG Managert s ssesesssssesessssssserrseststsrsrsrsrerrersrerstntnreenenrersrsteet 6 INSTALLING AND CONFIGURING ON UNIX cscccisvssssusccstssessscciseieascsescvapescscescssocssccasessesscsensesseeuscsacctesousdctecesccasessessedesseedesode 7 2l Inistalling thee G ManaterSierroron ane sia EE EE AEE E E E AERE 7 2 1 1 System ReguiremeNtS 5504 20s estes oaa A E AEE E AT e E T a E I E Ta E denethaneys 7 2 1 2 Installing th Manag r on SolariS siseiiissisrriisisnoissisinostsetrnestas tedascacdessszsvescoudvdsatateesduvsdhesstsatuesdeaatvapasavdoeazanade snisvetvess 8 2 41 3 Installing the Manager om Linux CentOs issis rinie iein rir ES ETE A ER 14 2 2 Configuring theeG Manager sicsssscivcacssccdsesscascctveisiveveessesasae sid ena iai EE EDE ANENE OE TESERO AA duesscsdvassaoabved ODER SESSE 15 2 2 1 Using an Oracle Databases ivc ssicsisscsvesesonsdeeuvesesatsieotson sus supusatacs vase E ENOTE E EREA EITE T EISERES AEE O EI EEEE 19 2 2 2 Using ati MS SQ Server Database sser an a e e Ea e daS e Naia 22 2 2 3 Using a Microsoft Azure SQL Database vccsscssisasssscssesssssiscsicassicasdesssssodecasesaseaasessdvesssvedsessesalscasvavdvessesadeealeaatiescrosios 33 2 3 Configuring Manaper Redundancy
61. 5 Please indicate if you accept the eG licensing terms y n n Press y for accepting the terms Once the licensing terms have been accepted the configuration process prompts the user to enter the full hostname or the IP address of the host on which the eG manager is being configured Pressing n on the other hand indicates non acceptance of the licensing terms and terminates the configuration process 6 In this stage enter the full hostname or the IP address of the host on which the eG manager is being configured If the domain name service is used in the target environment use the full hostname Otherwise specify the IP address Also enter the port number on which the eG manager listens for requests from the agents and from the users default is 7077 Port configuration for the eG Manager KKKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKK KKK Enter the full hostname or IP address of this host Enter the port number for the eG Manager 7077 e While specifying the host name IP address of the manager please take care of the following aspects a If the host name is provided when installing the manager use this name and not the IP address for accessing the user interface via the web browser ll If the host name is provided make sure that forward and reverse lookups for this name are enabled via the DNS service in the target environment S o e When providing an IP address for
62. 6 Then SSL enable the start_manager bat script For this first open the start_manager bat file see Figure 3 76 residing in the lt EG_INSTALL_DIR gt lib directory Change the URL http lt eGmanagerlp gt lt eGmanagerdefaultTCPPort gt final servlet upload present in the last line of the batch file to 153 Installing and Configuring on Windows Environments https lt eGmanagerlp gt lt eGmanagerPort gt final serviet iupload see Figure 3 76 amp j start_manager bat Notepad File Edit Format Help dad path path C IDK13 1 1_O bin D WINNT Syst em32 set eg_classpath D PROGRA 1 ss Itest egurkha ib classes12 zip D PROGRA 1 ss Itest egurkha 1ib eg_manager jar D PROGRA 1 s5 Ttest egurkha manager tomcat webapps final weEB INF classes D PROGRA 1L ss Itest egurkha lib classesl2 zip D PROGRA 1L ss1t Final Wee INF cTasses equrha 0 PROGRA L ss Test equrkha b GsHengine Jarib PROGRA a ssItest egurkha 1ib ldapjdk jar D PROGRA 1 ss Itest egurkha manager tomcat server 116 D PROGRA 1L ss Itest e urkha manag er tomcat common lib serv let jar D PROGRA 1 ssltest egurkha manager tomcaticommon Tib ant jar D PROGRA L ss Itest egurk a lib eg_troubleticket jar D PROGRA 1 s5 Itest egurkha 1lib eg_subscr ibermanagement jar D PROGRA 1 s5 test egurkha manage r tomcat bin bootstrap jar D PROGRA 1 ss5 Itest egurkha manager tomcat common ib activation jar D PROGRA 1 Ss Itest egurk ha lib Acme jar
63. 6 0_10 the setup process will check for the fonts directory in the location optijava1 6 0_10 jre lib fonts If this directory is not found the following error message appears and the setup process will prompt the user to specify the Java fonts directory 16 Installing and Configuring on Unix 10 11 12 13 14 15 The setup process failed to locate opt javal 6 0 10 jre lib fonts The eG Enterprise system provides users with the option to view and key in data in a language of their choice Different users connecting to the same manager can view data in different languages However some languages such as Chinese Japanese and Korean support a double byte character set To view data in the eG user interface in Chinese Korean or Japanese the eG manager should be explicitly configured to display and process double byte characters In such a case enable double byte support for the eG manager by specifying y On the other hand for handling the character sets of other languages example French German Spanish Portugese etc the eG manager need not be double byte enabled At such times enter n to disable double byte support for the eG manager Do you require the eG Manager to be double byt nabled for East Asian languages yin 2 m Ce For a detailed discussion on how to enable double byte support for eG Enterprise refer to Refer Chapter 4 of this manual Next the setup_manager script invokes the set
64. AEEA ENEAS E SA SOKE ESENE AAEE ESNEA ENES EE EEEE Clicking on the Roles node in the tree structure Clicking on the Next button in the welcome screen of the Add Roles Wizard sssssssssssssssssesessissssstsessstsrsrsrsrsrrrsrsresssesesssensnest 208 Selecting the Web Server US 106 ereenn o E ENERE evesccpasuncecdssvevccbasencsadusbevesausunceaduewesccabevecsese 209 An introduction to the web server role Figure 3 139 Selecting the required role services 211 Figure 3 140 Installing the web server role 212 Figure 3 141 A message indicating that installation was successful SEA AE E SEE A EET 213 Figure 3 142 The Roles page in the right panel displaying the Web Server IIS role that was just installed s sssssssssissrersrsrerersssssssssesese 214 Figure 3 143 Accepting the license agreement Figure 3 144 Finishing the installation ce eeeeeeeeneeee Figure 3 145 The Internet Information Services IIS Manager console bestest duets beacon sie aceas uncles sate sesiouedeaa sien enue A AT 216 Figure 3 146 Viewing the list of log definitons that pre exist 217 Figure 3 147 Adding a new log file definition 218 Figure 3 148 Selecting the logging fields to be logged 219 Figure 3 149 Re arranging the sequence of the logging fields cieeeesceeeceseeseceeeeseeseesecsecsecsececsaeeseesecsecsecsceeseeaecseeseseeeeseaeeaeeaeeaeeeeeeseaeenees 220 Figure 3 150 The newly ad
65. Add Nodes Wizard You have successfully completed the Add Nodes Wizard View Log To close this wizard click Finish Figure 3 259 Clicking the Finish button 287 Installing and Configuring on Windows Environments 22 You will then return to the Cluster Administrator console where you will find the newly created NODE2 appear as a sub node of the EXTERNALAGENT node see Figure 3 260 Ea Cluster Administrator EXTERNALAGENT ExternalAgent smalibusiness local C Groups resources J Cluster Configuration a NODE1 aij NODE Figure 3 260 NODE2 appearing as a sub node of the EXTERNALAGENT node 23 Next proceed to add the eG agent service as a cluster resource For this click on the Groups gt Cluster Group menu sequence on the tree structure in the left panel right click on Cluster Group and choose New gt Resource see Figure 3 261 288 Installing and Configuring on Windows Environments Es Cluster Administrator EXTERNALAGENT ExternalAgent smalibusiness local XTERNALAGENT ExternalAgent smalibusiness local By EXTERNALAGENT Taani Wine B an Viva mn 1 Ol Cri E Resources Initiate Failure Ctrl I Cluster Configuration Change Group g NODE g NODEZ Ctrl D Ree Figure 3 261 Adding the eGurkhaAgent service as a cluster resource 24 Specify the details of the eG agent service in the cluster resource wizard Provide a name and description for the clus
66. Administration action view e gt Eile e Tree Configure Client Address Sets EGISASERVER Array Client address sets include one or more computers For access policy rules client address sets include computers that are on your internal network For publishing policy rules client address sets include computers external to your network Internet Security and Acceleration Server 2000 GS Arrays S EGISASERVER Array Monitoring Server E Access Policy Current client uth sets F Publishing Name Description _ Bandwidth Rules amp Policy Elements E Schedules Bandwidth Priorities Destination Sets 3 Client Address Sets E Protocol Definitions E Content Groups Cache Configuration Monitoring Configuration Extensions E Network Configuration e5 Client Configuration ES H323 Gatekeepers f Invoke User Manager Delete client set Modify client address sets Figure 3 165 The administration console 3 Figure 3 166 will then appear wherein provide a Name to the new client set To add computers to the client set click on the Add button in Figure 3 166 Client Set x Name intemal client Description Include these IP addresses From To Figure 3 166 Assigning a name for the new client set 4 Next using the From and To text boxes in Figure 3 167 specify the range of IP addresses that need to be allowed external ac
67. Allowed C Windows Microsoft NET Framework v 1 1 4322 aspnet_isapi dil gic ASP NET v2 0 5 Allowed C Windows Microsoft NET Framework v2 0 50727 aspnet_isapi dll egurkha Allowed C Progra 1 eGurkha manager tomcat pin native isapi_redirector dll RPC Proxy Serv Alowe PAUSCH et heottetre ics 2 x I Allow unspecified CGI modules IV allow unspecified ISAPI modules Lo cnet een Configuration localhost applicationHost config m Sa Eo 4 ae Sa i i Ea io i i t i Figure 8 4 Lifting the ISAPI and CGI restrictions from the egurkha extension 8 2 Configuring the eG Manager e I have the eG manager working Now I have shifted my database to another server Can I reconfigure the manager to work with the new database Information regarding the eG managers database connection is maintained in the file lt EG_HOME_DIR gt manager config eg_db ini By editing this file you can modify the database that the eG manager will use 380 Troubleshooting e How do I configure eG on a Linux default Apache Linux includes a default apache server actually a daemon that starts running as soon as the server is booted up This server listens on port 80 The server startup file is in etc rc d init d and is called httpd The server configuration file is picked from the directory etc httpd conf To stop this server use the command etc rc d init d httpd stop To start this server use
68. Chpux0i 1 for more target MM Logritc Figure 2 28 Status changing to Completed e Finally exit the uninstall process using the menu sequence File gt Exit SAM If an agent monitoring a web server is uninstalled then the web adapter should be manually removed To do so open the httpd conf file in the lt WEB_SERVER_HOME_DIR gt conf directory of the web server and comment the LoadModule egurkha_module entry and the AddModule mod_egurkha entry lil 90 Installing and Configuring on Windows Environments Installing and Configuring on Windows Environments This chapter describes the steps involved in installing and configuring eG Enterprise on Windows 2003 2008 2012 operating systems Installing and configuring the eG manager can be achieved in a single stage in Windows environments The various factors that need to be considered while installing the eG manager as well as the components that make up the manager have been described in the first chapter e Administrator privileges are required to perform this installation e Before proceeding with the installation process please go to Control Panel gt Display Note gt Settings and set the number of colors to 65536 at least This is the optimal DISPLAY setting in the computer to view the eG user interface well 3 1 Installing and Configuring the Manager 3 1 1 Pre requisites for Installation For the eG manager to function the system on whic
69. D PROGRA 1 ss Itest egurkha lib chart jar D PROGRA 1 ss Itest egurkha lib mail jar D PROGRA L ss Itest eg urkha Tibipop3 Jar D ApRocha Nes TrestregurkhaNlibAparser Jar D NPROGRA TAsSTtesthegurkhamanageripJaipja Jar D oa Iss Itest egurkha manager p a rtgr aphics Tar 3D AEROGRA INTS test egurkha manager tomcat shared classes C JDK13 1 1_0 1ib tools jar C IDK13 1 1_o lib dt jar c IDK13 1 1_o0 jre lib rt jar pb prRoGRA 1 ssItest ecurkha 1 ib eg_util jar D PROGRA 1 ss test ecurkha 1ib eg_supermanager jar D PROGRA 1 ss Itest eGurkha lib chart ext jar D PROGRA 1 ss Itest ecurkha lib ja Hee eee ee eee ee eee ee ee IBAT ext Jar 0 PROGRA L ssTtestiecurk a lib jnet jar D PROGRA 1 ss5 1test eG jb jcert jar D PROGRA 1 ss1test ecurkha lib jsse jar set classpath eg_classpath set EGURKHA_INSTALL_DIR D PROGRA 1 s5 Itest egurkha set JAVA_HOME C JDK13 1 1_0 net stop egurkhaTomcat 2 gt D PROGRA 1L ss Itest egurkha ib startmanager_err txt 1 gt D PROGRA L ss Itest egurkha lib startmanager_out txt del D PROGRA 1 ss Itest egurkha manager tomcat webapps final wEB INF 1 ib eg_manager jar e opy D PROGRA 1 s5 Itest egurkha lib eg_manager jar D PROGRA 1 ssItest egurkha manager tomcat webappsfinaT wEB INF Tib cls echo starting the eG Manager components G net start egurkhaTomcat 2 gt D PROGRA 1 s5 Itest egurkha lib startmanager_err txt 1 gt D PROGRA L ss Itest egurkha lib s
70. Destination Location Select folder where setup will install files Setup will install eG Manager in the following folder To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder tore Figure 3 15 Specifying the destination directory for the eG manager 6 The next step summarizes all the details that have been provided so far by the user as in Figure 3 16 101 Installing and Configuring on Windows Environments eG Manager Setup Start Copying Files Review settings before copying files Setup has enough information to start copying the program files If you want to review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings IP Host Name 192 168 8 147 Port Number 7077 Tomcat Port 7077 Double Byte Support Not Enabled Path for JDK A C egurkha JAVA Database Server Name IP 192 168 11 11 Database Server Port 1521 Oracle Instance SID A pdbeg Database User Name egdbuser lt Back Next gt Cancel Figure 3 16 Information specified by the user at the various stages of the setup 7 The setup next tries to access the database server and create the user account specified in step 4 If the user name already exists in the database an alert message appears The user needs to now specify if he she wants to use the same accou
71. EEKE Figure 8 1 The error message that appeared when the egurkha web site listing in the IIS 2008 manager console was clicked eee eee 377 Figure 8 2 Clicking on the node representing the IIS web server in the left pane of the Console ccc ess eeeseeseeeeseeeesecsceecseeeeesseeeaneees 378 Figure 8 3 Checking whether the egurkha extension is Allowed to run on the web server Figure 8 4 Lifting the ISAPI and CGI restrictions from the egurkha extension Introduction Introduction This manual delves into the detailed procedure for installing and configuring eG Enterprise Before getting into the details it is imperative for a user to understand the architecture of eG Enterprise A thorough understanding of its architecture can enable the user to deploy and use eG Enterprise effectively This chapter provides the details of the eG architecture 1 1 System Architecture eG Enterprise follows the manager agent architecture that has been widely used in the past for designing monitoring systems While the manager is a software component that controls what elements are monitored and how frequently they are monitored the agents are software components that perform the monitoring functions Figure 1 1 depicts the main components of eG Enterprise and the following sections describe these components in detail D Configuration Store measurements Thresholds thresholds gt ger Manager gt g Retrieve measureme
72. Environments Shared Folder Locator NIFS Peewesssone SME Setters SMB Pern nons Figure 3 288 Accepting the default settings of the Share Protocols section 9 This will take you to the SMB Settings section see Figure 3 289 Here again click the Next button to proceed 308 Installing and Configuring on Windows Environments Fh Prowrsan SMB Settings aw Steps Shared Foker Locston NTFS Penmestearse Share Protocols SNE Setters SMB Pesressons DFS Namespace Pubbthng Rewew Settings and Ceste Share Cortemator Specily hoes thes wed loker is to be used by chert sccesnrg over the SMB protocol You can use the desception to add commerts about how the iwed folder i weed You can also control advanced SMB setting nchading the mama PUTTPEGIFSUOT eg amp Descrpten Advanced cotter User im Mmm awed Accesbasederumenston Ouatied SOSOSO C S S Otre seting Selected ties and progam avaiable otare Te change these settingi chick Advanced Figure 3 289 Accepting the default settings of the SMB Settings section 10 In the SMB Permissions section that appears next select the Users and groups have custom share permissions option see Figure 3 290 Then click the Permissions button in Figure 3 290 309 Installing and Configuring on Windows Environments son a Shared toler Wizard A Proy ala SMB Permissions EA Steps NTFS Peermencns Share Protocols SMB Sette SMB Pemenone
73. Figure 3 271 Then under Features Summary click Add Features 297 Installing and Configuring on Windows Environments EL server Manager De acton Yew tiep e TE iy Server Manager BOM SRV3 E Roles o maL E pa Oaqnostes E gt Configurason PSS Storage A View the status of featres nstaled on Pis server and add or remove features Features Summary Features tof 42 ncales SW Services DOP Senne Figure 3 271 Clicking the Add Features option in the Server Manager 4 If Server Manager is not running click Start click Administrative Tools click Server Manager and then if prompted for permission to continue click Continue Then under Features Summary click Add Features 5 In the Add Features Wizard click Failover Clustering and then click Install see Figure 3 272 Fe Confirmation Progress NET Framework 3 5 1 Features Results E Background Intelligent Transfer Service BITS BitLocker Drive Encryption BranchCache Connection Manager Administration Kit L Desktop Experience _ DirectAccess Management Console ig Failover Clustering Group Policy Management Ink and Handwriting Services L Internet Printing Client Internet Storage Name Server LPR Port Monitor Message Queuing Multipath 1 0 Network Load Balancing Peer Name Resolution Protocol Quality Windows Audio Video Experience Remote Assistance Remote Differential Compression Description Failover Clust
74. Figure 7 16 Starting the PageGate server 3 Once the PageGate server is started a PageGate icon will appear in the SystemTray By clicking on this icon a pop up menu depicted by Figure 7 16 appears Figure 7 17 Clicking on the PageGate icon to view a pop up menu 4 From the menu click on PG Admin to lauch the PageGate Admin console Alternatively you can start PageGate admin by following menu sequence depicted by Figure 7 17 368 Configuring the eG Manager to Send SMS Alerts 6 Power4rchiver Windows Catalog Windows Update Winzip Yahoo Messenger Administrative Tools Programs eG Monitoring Suite P te CitraTest e Documents gt PageGate Help ts Settings gt Nero E PageGate Monitor s Search gt MagicISO EB PageGate Server x E ReadMe File Release Notes C27 Help and Support f Run Shut Down t CSSOOO a g id EA l 0ga y a Figure 7 18 Launching the PG Admin console Windows Server 2003 Standard Edition q The PG Admin console that then appears displays a tree structure in the left pane Expand the global PageGate node in the tree to view its sub nodes Now proceed to add a new carrier by right clicking on the Carriers sub node and selecting the Add option from the shortcut menu that appears The carrier represents the paging service provider using whose services PageGate will be trans
75. IRATA ENE EE T E ANES 363 1 2 5 Uninstalling the 6G SMS Manatetnsenuueereci eidi nr I a a E S 364 7 5 Integrating theeG Manager with Air2 WeD cs sccssasessssseascsordesassssvevie sees covasseseoats nenie TaS iE rE iiaae EEE dete 366 7 4 Integrating the eG Manager with PageGate 0 eee eeesesseseeseeseeecsecseesesseesessesacsesseesecseesesseeacassessecseesesseeaseaseasseaes 367 7 4 1 Configuring the PageGate Software to Transmit Alarms Sent by the eG Manager eesseessereeererererrrrererereree 367 7 5 Integrating the eG Manager with a Web based Interface 00 0 eeeesesseeeeseeseesceseseesecsecsesseeseeasessesaessesseeaeesseaseeeaes 374 TO Logging Of SMS ALES caicosa ev vasdivi oui AaS possssausohedavuiniasobsfosedoubevivitnulebstorseaasd oie dilans gots 374 TROUBLESHOOTING osccsssscdisessdesssccscsosestcuscnssssed stesssssedsssssssesseuseusssoasossessesssivosss lt custeustusssosceisescusasacsses scbscasssessssdsescsscueetesseasss 376 8 1 Installing the eG Manager isviso cosia tusatandeesosatdveevessautasidaiaioed Aa EE e EE EEN ESE EE E E ENE E AEE Ea 376 8 2 Confisuring the G Manager cc sseials coswessess ias stcasesssessbecvsoastesussgvarbusasdenreansceovesnaydaesnssessscocsunnsi viv eatusanbeoueasa ve seveniseens 380 8 3 Confisuring the G Database oi ccsiseisccicelesesiesiie catcasvessseatsenseredie thats cous ANENE So E aD SEEEN EEREN NEEE OE a ETa o Eiaa Soia 382 8 4 Starting the eG Manager vs sc cs scussassesei
76. If the domain certificate import command throws an error for any reason it could be because all related certificates may not have been imported Check the web site of the CA for more Note details Importing a Certificate that is in the PEM Format PEM is a container format that may include just the public certificate such as with Apache installs and CA certificate files etc ss certs or may include an entire certificate chain including public key private key and root certificates or may only contain a certificate and a private key If the certificate you downloaded is in the PEM format and includes only a certificate file and a private key file then follow the steps below to import that certificate into a keystore file 1 Run the following command from the command prompt to export the certificate and private key file into the pkcs12 format openssl pkcs12 export in certificate crt inkey private key certfi e certificate crt name My certificate out keystore p12 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below in the name of the certificate that is included in the PEM container inkey the name of the private key file the PEM container consists of certfile the name of the certificate that is included in the PEM container name Provide a unique name for the certificate file that is bei
77. Once the silent mode script is created you can use this script to perform subsequent agent installations Before attempting to reuse a script file you might have to decide on the following a Whether the target script file can be used as is b Whether the target script file can be used after minor changes c Whether a new script file is to be generated This decision is typically based on the configuration you desire for the eG agent that you are about to install Moreover the process of installation may slightly vary depending upon this decision The sections that follow discuss each decision and how it impacts the silent mode installation process 3 2 2 2 1 Silent Mode Installation of an eG Agent without any Changes to the Script File Sometimes for some reason you might just want to reinstall an eG agent on a host where a script file pre exists the configuration of the old agent and the intended configuration of the new agent may be the same In this case therefore you can opt for a above i e proceed to use a script file without any changes for agent installation in the silent mode The procedure to reinstall an eG agent in the silent mode has been discussed below 1 Uninstall the eG agent on the host if it already exists 2 Ensure that the eGAgent_ lt OS gt exe is present on the host go to the command prompt and then switch to the directory containing the agent executable 3 From that directory execute th
78. Policy D Virtual Private Networks VPN Apply Discard To save changes and update the configuration click Apply E38 Configuration EN Pont Networks gt Networks amp coche Tasks Tennis eb 3 Add ins E General Networks Tasks Create a New Network a Edit Selected Network Delete Selected Network External Network Internet Related Tasks Ree OF Specify Dial up Preferences Internal Network Link to VPN Configuration Page You have changed the network topology The network diagram does not reflect these changes All networks in the x Export Existing Networks E eet aint he NE Networks Import Networks Name___ AddressRanges_____ Description External IP addresses external to the ISA Server rk object representi te Internal G 10 0 0 1 10 0 0 100 New esenting the interna de Local Host No IP addresses are associated with thi ia aaa rk object represent Import to Selected Quarantined VPN Cli No IP addresses are currently assigned Eo this network Bullfin dynamic network represer VPN Clients No IP addresses are currently assigned to this network Built in dynamic network object re 4 gt gt Properties Figure 3 235 Viewing the Networks sub node of the Configuration node Upon selecting the Networks option the existing list of configured networks will appear in the right pane see Figure 3 235 Now select the newly created network from the list right clic
79. Processes Management a g A Features View Content View Figure 3 145 The Internet Information Services IIS Manager console 7 216 Click on the node representing the IIS web server host in the tree structure in the left panel of the console The Installing and Configuring on Windows Environments right panel will change to display a variety of options In the IIS section of the right panel click on the Advanced Logging option Figure 3 146 will then appear In the Actions list in the right panel click on the Add Log Definition option as indicated by Figure 3 146 to add a new log definition i Internet Information Services IIS Manager go S4 gt win oxmesrxeon3 gt File view Help Connections e Eae ey Advanced Logging The Advanced Logging feature Start Page is disabled SI s WIN DXMESFXBON3 WIN DXME Use this feature to create and manage log definitions which specify which server side and client side logging fields to a log and to configure additional logging settings 4 Application Pools FTP Sites H 8 Sites Group by No Grouping Add Log Definition Name _ Enabled Enable Advanced Lagging COMPUTERNAME Server Enabled Enable Client Logging Edit Lagging Fields Edit Log Directory View Log Files Help Online Help 4 gt Features View Content view Configuration localhost applicationHost config Figure
80. Protocol Rule Wizard E xi Completing the New Protocol Y Rule Wizard You have successfully completed the New Protocol Rule Wizard You created a protocol rule with the following configuration Name a http_rule Applies to the following protocols Selected protocols HTTP HTTPS Schedule Always Client type E hA To close this wizard click Finish Figure 3 183 Finishing the protocol rule configuration 21 Once you return to Figure 3 175 you will find the details of the web protocol displayed therein see Figure 3 184 Euf Microsoft Internet Security and Acceleration Server 2000 Administration 01 x Action view e gt am e Tree Configure Protocol Rules EGISASERVER Array Protocol rules determine which protocols can be used to communicate with the Internet Internet Security and Acceleration Server 2000 amp EN Arrays 5 EGISASERVER Array g Monitoring Server g 3 Access Policy E Site and Content Rules 3 Protocol Rules E IP Packet Filters E Publishing G Bandwidth Rules E G Policy Elements m Cache Configuration These are current protocol rules ra bearray http_rule HTTP H ES Monitoring Configuration El Extensions E Network Configuration Client Configuration b H323 Gatekeepers ty Allow Web protocol Create protocol rule Delete protocol rule Modify protocol rule
81. Submit button The certificate will thus be generated Download the certificate 148 Installing and Configuring on Windows Environments Gi Favortes iy E sugpested Stes E Web Sice Gallery gt E rtcrosot Active rectory Certficate Services M E mo Paes Seye Tose e internet Explorer has blocked this ste from using an ActiveX contral in an unsafe manner As a result this page might not display correctly Certificate Issued The certificate you requested was issued to you DER or Base 64 encoded Don cate chain P NE Done F internet Protected Moda On a gt Rios Figure 3 75 Downloading the certificate 3 4 1 3 1 Importing the Certificates into the Keystore File The downloaded certificate can be in one of the following forms e Can bea single combined certificate e Can be accompanied by a certificate chain e Can be in a PEM format The procedure for importing certificates differs based on the format of the downloaded certificate These procedures have been detailed in the sub sections below Importing a Combined Certificate into the Keystore File In this case follow the steps below to import the certificate into the keystore file 1 At the command prompt execute the following commands one after another cd JAVA_HOME bin keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt ke
82. System Administrators mM S Security Administrators Op Server Administrators O b Setup Administrators O Process Administrators O Y Disk Administrators Yb Database Creators x Description P perform bulk insert operation Properties Cancel Help Figure 2 10 Granting the requisite privileges to the new user If MS SQL 2008 is used as the eG backend then ensure that the dbcreator securityadmin Ea and public roles are assigned to the user Also either provide a strong password for the user Not or make sure that the Enforce password policy option is disabled while creating the user e vap profile in the SQL Enterprise Manager While Figure 2 9 and Figure 2 10 illustrate the procedure to be followed to create a new user on an MS SQL server with SQL Server Authentication enabled remember the following while creating a user on an MS SQL server with Windows Authentication enabled e The username you specify should be that of a valid user to the Windows domain of which the MS SQL server is a part e The username specification should be of the format domainname username 6 On the contrary if you choose to use an existing database then press y at step 3 and enter the name of an existing database Pleas nter the database name 7 Next specify the details of the user account that will be used to host the eG database e the eG database user name default is egurkha e the password for
83. TABLE permission denied in database egdb F DB Security DB Server Objects 3 D Replication 3 Z Management O Notification Services a Figure 3 60 The eG user is executing a query on the eG database 15 The error message depicted by the Messages section of Figure 3 60 will then appear This is because the eG user john does not have the right to execute queries on the eG database egdb To grant table creation and query execution permissions to john login to the SQL server using the sa credentials Then expand the Databases node in the tree structure in the left pane of the studio right click on the egdb node within and select Properties see Figure 3 61 131 Installing and Configuring on Windows Environments 16 R Microsoft SQL Server Management Studio 218 xf File Edt Yiew Tools Window Community Help Huwae DDD S G F aa PORMA ea E gb EGURKHASAP SQL Server 9 0 1399 sa O Databases 4 B System Databases E Database Snapshots egdatabase a g New Database a jiu 4 New Query Script Database as P 3 Li SQL Server Agent Agent XPs disabled Ready ox Summary esa a ag YEs fre egdb EGURKHASAP Databases eadb 8 Item s Ll Database Diagrams Tables Figure 3 61 Selecting the Properties option of the eG database From the left pane of the Database Properties window see Figure 3 62 that opens select Permissions From the Users or rol
84. This is required in order to set a quorum for the cluster The quorum for a cluster is the number of elements that must be online for that cluster to continue running In effect each element can cast one vote to determine whether the cluster continues running The voting elements are nodes or in some cases a disk witness or file share witness Where a file share witness FSW is a voting element you will have to create a Windows file share The procedure for this is as follows 302 Installing and Configuring on Windows Environments Launch the Share and Storage Management tool on the File Share server by following the Start gt Administrative Tools gt Share and Storage Management menu sequence Once in the Share and Storage Management console click on the Provision Share option in the right panel of the console as indicated by Figure 3 281 Share send Mor age Manaipreirnt Ion al Soares vuasres Denes See Poet Loipe Gee fete ote frees Protocut S8 3 toms g gt anas SMe C window ala Shnrod F aktes ocna m Somiy Pa toner at pon seart to awe On a wokine wth appreonate chaactenstcs snd space select an easing toler a conate a new one It a appopase voiase does m oa ch Pomon Stwaga si create ore Figure 3 281 Selecting the Provision Share option 2 In the Location text box of Figure 3 282 that appears specify the folder you want to share from the local machine and click the Next bu
85. again the OK button needs to be clicked This will lead you back to Figure 3 236 where the Apply and the OK buttons need to be clicked 43 Then open the Internet Explorer window and select the Internet Options option from the Tools menu on its menu bar Click on the Connections tab within and click on the LAN Settings button in it see Figure 3 239 internet Options o E General Security Privacy Content Connections Programs Advanced i To setup an Internet connection click Setup Setup m Dial up and Virtual Private Network settings Add Remove Choose Settings if you need to configure a proxy Settings server for a connection Neyer dial a connection Dial whenever a network connection is not present Always dial my default connection Curent default None Set Default m Local Area Network LAN settings LAN Settings do not apply to dial up connections Choose Settings above for dial up settings Figure 3 239 Clicking on the LAN Settings button 44 In Figure 3 240 that appears select the User a proxy server for your LAN option and provide the Address and Port of the ISA proxy server Also ensure that the Bypass proxy server for local addresses check box is selected Finally click the OK button to save the changes Local Area Network LAN Settings Eix m Automatic configuration Automatic configuration may override manual settings To ensure the use nual
86. all the way back to the manager To minimize network bandwidth usage the eG manager should be located as close as possible to the agents deployed in the target environment At the same time since eG Enterprise s default external agent is co located with the manager the eG manager should be located so that measurements made by the external agent are representative of the quality of service perceived by users of the IT infrastructure For example the eG manager can be located on a server that is directly connected to the access router of the IT infrastructure Doing so ensures that the eG external agent uses the same data path that is used by users of the infrastructure cC Firewall set up In Figure 1 4 while the web server Tomcat communications are internal to the eG manager accesses from users and agents to the eG manager involve remote communication to and from the eG manager s web server port 7077 is the default port If there are any firewalls used in the target environment it is essential to ensure that the firewalls are configured to allow all communications to and from the web server component of the eG manager In the event the eG database is hosted on a server other than the one hosting the eG manager the firewall rules should also allow the manager database communications Introduction eG Manager Discovery User Interface Port Ll Components Port 7079 Tomcat gt Port 1521 1433 eG Database Server
87. allowed to start the eG manager If an eG manager was previously installed ensure that this manager was stopped and uninstalled 382 Troubleshooting before the new manager is installed and started e The eG manager used to work Suddenly it has stopped working What could be wrong o First check for expiry of the eG license Run the command viewCert license from the lt EG HOME DIR gt bin to make sure that your license has not expired If the license has expired the eG manager will not start o This problem can also occur if you have uninstalled the Java environment that you had specified when installing the eG manager Even an upgrade of the java environment or changing the java installation directories can cause problems You will need to edit the lt eG home Dir gt bin start_manager script on Unix to restart the manager On Windows reinstall Java in the same location o Ifthe IP address or hostname of the database server has changed the eG manager will not start properly Reconfigure the eG database setting by editing the file lt EG_HOME_DIR gt manager config eg_db ini 8 5 Installing the eG Agent e The eG agent failed to install properly What could be wrong Please check for the following o Did you accept the license agreement o Do you have the pre requisites An operating system version that eG supports The right service pack and option pack for Windows environments 8 6 Configuring the eG Agent
88. and Configuring on Windows Environments Internet Internet Explorer E mail Windows Live Mail Documents Pictures ow Remote Deskt EditPlus a Notepad s I Send to Fax Recipient Gal i Ec Microsoft Offi Scan for Viruses 9 WinZip 4 Paint E mail with Yahoo we Unpin from Start Menu Microsoft Offi Add to Quick Launch NetTerm Send To cee Copy Yahoo Messe Remove from this list g CuterTe _ Bename Properties amp Mozilla Firefox gt All Programs Figure 3 159 Starting the eG agent on Windows Vista Then at the command prompt switch to the lt EG_AGENT_INSTALL_DIR gt bin directory and execute the start_agent command If the agent starts successfully the following message appears 230 Installing and Configuring on Windows Environments Start Agent E C gt net start eGurkhafgent The eGurkhafgent service is starting The eGurkhafgent service was started successfully C gt pause Press any key to continue Figure 3 160 Message indicating that the agent has started successfully 3 20 3 Starting the eG Agent on a Windows 2008 7 Vista System with Italian Locale Before starting the eG agent deployed on a Windows 2008 7 Vista system with Italian language support you need to ensure that the language settings of the user who is currently logged into that Windows system are copied to the Local System Local Service and Network Service accoun
89. are forced to process their logs in off line mode The eG web adapter is designed to enable web site administrators to collect statistics regarding user accesses in real time without the need for explicit logging of requests by the web server The web adapter is a layer that fits between the TCP IP stack and the web server itself It can be thought off as a passive probe that watches the requests received by the server and the responses produced by the server By applying a fast pattern matching algorithm on the packets that flow by the web adapter collects a variety of statistics regarding web sites and the transactions executed by users at these sites Details of the statistics collected by the web adapter are provided in the eG Measurements Manual Introduction eG agents have been pre programmed to execute specific tests for web servers SSL servers LDAP servers DNS server Database servers and application servers Please see the eG Measurements Manual for details on the tests included in eG Enterprise For components that are not included in the core eG Enterprise system the eG professional services team provides customization services that include studying the behavior of a component designing and implementing tests for the component and integrating the new component into the eG management framework via HTTP HTTPS Tester Config Information Ys via HTTP HTTPS gt Agent Man r anaga Core Measurement results L
90. below will appear e Then click on the Server Settings tab page in Figure 2 1 Figure 2 2 will appear SQL Server Properties EGURKHA02 x General Memory Processor Security Connections Server Settings Database Settings m Connections Maximum concurrent user connections fc ga apa 0 unlimited o z Default connection options Interim deferred constraint checking Implicit transactions Close cursor on COMMIT ANSI warming O ANSI padding ANSI nulls m Remote server connections Vv Allow other SQL Servers to connect remotely to this SQL Server using RPC Query time out sec 0 unlimited 0 2 T Enforce distributed transactions MTS Figure 2 1 Setting the maximum concurrent user connections e Make sure that the Maximum concurrent user connections field is set to unlimited 0 22 Installing and Configuring on Unix Then click the OK button to save the settings and to close the dialog box Multi protocol support should be configured on the MS SQL server Ensure that Multi protocol support is enabled on the MS SQL server to be used as the backend for the eG manager To ensure this do the following On the MS SQL server host follow the menu sequence Start gt Programs gt Microsoft SQL Server gt Client Network Utility to open the MS SQL server s Client Network Utility see Figure 2 2 Internet Explorer E S
91. bin setup agent to configure the agent KKK KKKAKIKKKIAKAK KAI IK IKEA IIIA I KIA KAKI AIK IKI IK IAI II KAKAK KK KKK K A license is not required for installing an eG agent However the licensing terms of the eG Note manager should support the number of agents being deployed 2 9 7 Manually Installing Uninstalling the Auto restart Feature for the eG Agent Manager To manually install uninstall the auto restart feature for the eG agent manager do the following 1 Move to the opt egurkha bin directory and run the command auto_restart lt argument1 gt lt argument2 gt where lt argumentt gt could be either of the following o install Enter install if you wish to install the auto restart feature o uninstall Type uninstall if you wish to uninstall the auto restart feature o lt argument2 gt could hold either of the following values o manager Enter manager to ensure that the manager restarts on system reboot o agent Enter agent if the agent is to be restarted on system reboot 2 If none of the above arguments are provided or an incorrect invalid argument is provided then the following message will appear Usage opt egurkha bin auto_ restart install uninstall manager agent Now specify the correct argument and proceed with the corresponding process 3 Only a super user has the permission to execute the auto_restart script Therefore if the current user is not the super user then soon af
92. bin setup webadapter If there were no errors the web adapter has been successfully configured For the web adapter to b ffective please restart the configured web server KKKEKKKKKKKKKKKKKKKKKKK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK In the case of an iPlanet web server prior to version 6 0 the start and stop files are modified after retaining a copy of them called start pre_egurkha and stop pre_egurkha To uninstall the web adapter capability replace 82 Installing and Configuring on Unix the existing start and stop files with start pre_egurkha and stop pre_egurkha respectively 2 17 2 Configuring the eG Web Adapter for a SunONE Web Server Version 6 x on Solaris To configure the eG web adapter for a SUNONE web server version 6 x on Solaris follow the steps given below 1 Login as a SunONE install user 2 Open magnus conf file in the lt SUNONE_INSTALL_DIR gt lt SERVER_NAME gt config directory For instance if the SunONE web server is installed in the directory opt SUNWwbsvr and the name of the server is https test then the magnus conf file will be in the directory opt SUNWwbsvr https test config directory Append the following lines in the file n Init fn load modules shlib opt egurkha lib sun1webadapter_6 so funcs onServerInit onChildinit onLog Init fn onServerInit WEB_SERVER_ROOT lt SunONE_install_dir gt lt Server_Name gt For example if the SunONE web server is installed in t
93. case specify y here If not enter n If NAT is used i e if y is specified at step 13 provide the NAT IP or hostname using which the managers interact with each other Pleas nter the NAT IP hostname Similarly also indicate whether Port Address Translation PAT is used PAT again comes into play only when the managers span geographies In such a case enter y If not press n 17 Installing and Configuring on Unix 16 17 18 19 20 21 Please specify if you use Port Address Translation PAT y n nly If y is specified against PAT usage then specify the PAT port number Pleas nter the PAT port 8088 Then specify y if the manager uses a proxy server for communicating with the other managers in the redundant cluster Please indicate if you would use proxy server for communications y n n y If a proxy server is indeed used you will then have to provide the IP address or hostname and port number of the proxy server Pleas nter the hostname of the proxy 192 168 10 60 Pleas nter the port of the proxy 80 Indicate whether further authentications for the proxy server are required and if so proceed to provide the user name and password to be used for the proxy Do you need authentication for the proxy y n n y Pleas nter the username to be used for the proxy user Pleas nter the password for user Please re enter the password for user Next state whether the manager
94. change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being extracted make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document If you are extracting the SSL certificate from the default keystore that is bundled with the eG manager then the alias should be egitlab1 gt keypass the password used to protect the key that was generated make sure that you provide the same password that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document Also note that storepass and keypass should be the same If you are extracting the SSL certificate from the default keystore that is bundled with the eG manager then the storepass and keypass should be eginnovations gt keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 3 4 1 1 or 3 4 2 1 of this document gt file Specify the full path to and the name of the certificate file cer to which the certificate has to be exported 3 Once the keytool command successfully executes the certificate file will be created 198 Installing and Configuring on Windows Environments 3 13 2 Importing the SSL Certificate into the JRE of the eG Agent To achieve this do the f
95. command keytool import trustcacerts alias intercert1 file lt Name_of_the_intermediate_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypass mykey storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for every intermediate certificate 150 Installing and Configuring on Windows Environments gt file the name of the intermediate certificate that you want to import gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 1 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 3 4 1 1 above for details Finally import the entity domain certificate into the keystore by issuing the following command keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you pr
96. completed If at a later stage the user desires to configure any Coldfusion servers for monitoring by the eG agent the user need not start the configuration process all over again Instead to configure a Coldfusion server use the command opt egurkha bin setup_cf Similarly for configuring a Sybase Adaptive server use the command opt egurkha bin setup_sybase sh Upon successful termination of the agent setup process the following message is displayed FRR KR K KKK KKK KK K K K K K K K K KK AK K K K K K K K K K KK KKK KK K K KKK KKK KK KK KK K KK K K KK KKK KKK KKK KKK K To configure any application at a later time for monitoring by the eG agent please follow the steps below Database Servers Configure database servers for monitoring by the eG agent through th G user interfac Coldfusion Servers To configure a Coldfusion server for monitoring please have the Coldfusion server s administrator execute the script opt egurkha bin setup cf Sybase Adaptive Servers To configure a Sybase Adaptive server for monitoring please have the Sybase server s administrator execute the script opt egurkha bin setup_sybase sh The eG Agent has been configured successfully Please use the commands opt egurkha bin start_agent and opt egurkha bin stop agent to start and stop the agent To provide feedback and report errors please contact support eginnovations com DKK KK OK OK KK KK K KK KK KOK KK KK KK K KK KK OK OK OK KK KK K KK KK KK
97. contain a certificate and a private key If the certificate you downloaded is in the PEM format and includes only a certificate file and a private key file then follow the steps below to import that certificate into a keystore file 1 Run the following command from the command prompt to export the certificate and private key file into the pkcs12 format openssl pkcs12 export in certificate crt inkey private key certfi e certificate crt name My certificate out keystore p12 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below in the name of the certificate that is included in the PEM container inkey the name of the private key file the PEM container consists of certfile the name of the certificate that is included in the PEM container name Provide a unique name for the certificate file that is being exported Y VV V WV out Specify the name of the keystore file to which the certificate and private key are to be exported The keystore file can have any name of your choice Next you need to convert the keystore file which is currently in the pkcsi2 format into the Java keystore i e JKS format For this issue the following command at the command prompt keytool importkeystore alias egitlab1 deststorepass mykey destkeypass mykey destkeystore keystore jks srckeystore keystore pk1
98. db_accessadmn 1 db_backupoperator EGUAKHASAP 6 datareader i db_datawwiter Connections db_ddladmn sa db_denydatareader 32 View connection properties db_denydatawniter O db_owner j O db_secutityadmin Progress public Figure 3 59 Mapping the eG database to the eG user Finally click the OK button to save the changes Next try logging in as the eG user john in this example and executing a query on the egdb database To attempt this once you return to the main window of the studio select egdb from the Databases node in the left pane of the studio right click on it and pick the New Query option Then in the space provided in the right pane build the query that you wish to execute see Figure 3 60 and then click the Execute button on the toolbar 130 Installing and Configuring on Windows Environments Ex Microsoft sat server Management studio i Lax Bile Edk Wew Query Project Jools Window Community Help iDeween P SSI Goa DPOB iB BR ae eodb leete yom 3S MA 2 42 3 ily aE EGURKHASAP eg alt Summary JEET EGURKHASAP SQL Server 9 0 1399 john 0 Databases O System Databases Ej Database Snapshots 9 e 4 Ci Database Diagrams Qj Tables if Views E O Synonyms E O Proyammabiity OI Service Broker 8 m Storage H O Security junk3 junk4 ratheesh E Messages SSRs ReportServer Msy 262 Level 14 State l Lane 1 g ReportServerTempOB CREATE
99. e While configuring a web server to be monitored by eG I specified yes when the Setup enquired if this web server has SSL support I get an error message Why The error message appears if the web server is not configured for SSL support 383 Troubleshooting 8 7 Starting the eG Agent The eG agent was installed successfully but it does not seem to be reporting any measures What could be wrong Make sure that the IP address or the hostname of the manager specified during the agent install is correct Please check to see if the eGAgent service on Windows or the EgMainAgent process on Unix is running If the agent service process is not running the main reason is probably because the Java environment is not set properly If the agent is running but is not reporting measures possible reasons for this are o The manager may not be accessible from the agent Please check to see if any test from the agent is reporting measures If no test is reporting measures it is possible that the agent is not able to communicate with the manager In this case check the directory lt EG_HOME_DIR gt agent data If there are many files in this directory the main reason for this could be that the manager is either down or is not accessible from the host where the agent is installed o Another reason why the agent may not be reporting measures to the manager could be that no applications running on the host where the agent is installed are in
100. etc rc local and append the following line to this file sbirYiptables restore lt opt egurkha iptables fw Now even if the eG manager system is rebooted the iptables configuration is restored 52 Installing and Configuring on Unix 2 7 Starting the Manager To start the manager execute the command opt egurkha bin start_manager The following message appears when the manager starts successfully start_ manager 5 Starting the eG manager components Please wait Starting the admin components Starting the monitor components Starting the eghelp components Initializing the eG manager KKKKKKKKKKKK KK KK KK KK KK KKKKKK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK The eG manager 5 has been started successfully KKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK If the manager fails to start the following message appears FRA A AK AK K K AK KKK KK KK K K K KKK KKK KK KK KK K KK AK KKK KK KK KK KKK KKK K KK KKK KKK K KKK KK KK KKK Failed to start the eG manager Possible reasons for this could be Please check the file opt egurkha manager logs error log for details ii You may not have permissions to start the eG manager Please check the permissions for the directory opt egurkha manager FRR KR K K K K KKK KK KK K K K K K K KKK KK KK KK K K K KKK KKK KKK KK K KKK KK KK KK KK K K K KK K K KKK KK KKK K 2 8 Increasing the Memory of the eG Manager Process i Your license
101. exit the Setup eG Manager Setup Setup has completed installing the eG Manager Before starting the eG Manager you will need to restart the computer Please choose one of the following options gt Yes want to restart my computer now valid license is required for the eG Manager to start functioning Please contact license eginnoyvations com to obtain the license Place this license file in the C egurkha bin directory Click Finish to exit eG Manager Setup Figure 3 19 Setup program indicating the completion of the eG manager 104 Installing and Configuring on Windows Environments 3 1 2 2 Using an MS SQL Database If you choose to configure an MS SQL server database as the eG backend then setup first requests you to indicate whether not the Microsft SQL server in your environment is NTLMv2 enabled see Figure 3 20 If so click the Yes button in the message box of Figure 3 25 If not click the No button Question Q Is NTLMV2 enabled Figure 3 20 A message box requesting you to confirm whether or not the Microsoft SQL server is NTLMv2 enabled Next setup will request you to confirm whether not a Microsoft SQL server is running in your environment Question Do you have the Microsoft SQL Server running in your environment Figure 3 21 A message box requesting you to confirm whether not a Microsoft SQL server is running in your environment If you select Yes from Figure 3 21 then befor
102. file that was created in step 2 Refer to the eG Installation Guide for the detailed procedure for installing an eG agent on Windows in the normal mode 4 Figure 3 72 depicts a sample script file and explains its key components 140 Installing and Configuring on Windows Environments jai ECP IOS SGASGApentinstallise File Edit Yiew Search Document Project Tools Window Help Oet aa t aX n eS BE InstallShield Silent Version v7 00 File Response File File Transfer OverwrittenReadOnly NoToall ECOBSE31 F42B 4B4E B764 45FE4005C954 Dlg0rder Dlg0 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdWelcome 0 Count 14 Dlgl ECOBSE31 F42B 4B4E B764 45FEA005C954 SdLicense 0 Dlg2 ECOB5E31 F42B 4B4E B764 45FE4005C954 SdaskDestPath 0 Dlg3 ECOBSE31 F42B 4B 4E B764 45FEA4005C954 AskYesNo 0 Dlg4 ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 1 Dlg5 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdShowDlgEdit2 0 Dlg6 ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 2 Dlg ECOBSE31 F42B 48 4E B764 45FEA005C954 SdShowDlgEdit2 1 Dlg8 ECOB5SE31 F42B 4B4E B764 45FE4005C954 AskYesNo 3 Dlg9 ECOBSE31 F42B 4B 4E B764 45FE4005C954 SdShowDlgEdit3 0 Dlgl0 ECOBSE31 F42B 46 4E B764 45FEA005C954 Sd5tartCopy 0 Dlgll ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 4 Dlgl2 ECOBS5E31 F42B 4B4E B764 45FEA005C954 SdShowD1lgEditl 0 Dlgl3 ECOB5E31 F42B 4B4E B764 45FEA005C954 SdFinish 0 ECOBSE31 F42B 4B4E B764 45FE4005C954 Sdilelcome 0 Resul
103. follows 1 Toa temporary folder say tmp on the target Solaris host copy the eGmanager package that corresponds to that host For instance to install the eG manager on a Solaris host that supports the AMD processor copy the eGmanager package in the AMD folder 2 To start the installation process execute the command 12 Installing and Configuring on Unix pkgadd d lt path of the package eGmanager gt 3 The list of available packages will be displayed next Enter all to install all the packages related to the eG manager il Gmanager G Manager SunOS version 6 0 Select package s you wish to process or all to process all packages default all q 4 We recommend that the eG manager be executed by a special user account that is exclusively created for this purpose Next the installation process attempts to create the eG user account Processing package instance lt eGmanager gt from lt tmp Gmanager gt eG Manager Sparc AMD64 version 6 0 eG Innovations Inc Enter the name of th G user egurkha Specify the user account to be used for executing eG Enterprise The default value is egurkha Enter the group to which the eG user is to be associated egurkha Also specify the group to which this user account should be associated The default value taken is egurkha e An existing user and or group can be specified during this step e The installation process checks for t
104. for the agent to be installed could be vastly different from the script file contents This is possible in the following cases o If an SSL enabled agent is to be installed but the script file is for a non SSL agent or vice versa o Ifthe agent to be installed needs to communicate via a Proxy server but the script file does not consist of a Proxy server configuration or vice versa o Tf the agent to be installed communicates via a Proxy server with authentication but the script file does not consist of any authentication information or vice versa In these cases it is recommended that you generate a new script file that suits your specific purpose using the procedure discussed in Section 3 2 2 1 and then use it to install the eG agent The procedure for installation is the same as discussed in Section 3 2 2 2 1 above 3 2 2 3 Uninstalling the eG Agent on Windows in the Silent Mode Like installation agent uninstallation might also need to be performed simultaneously on multiple agent hosts with little to no human interference To achieve this follow the steps below 1 First ensure that an eG agent is operational on the target host 2 Next make sure that the eGAgent_ lt OS gt exe is available on the local host 3 Then from the command prompt switch to the directory in which the eGAgent_ lt OS gt exe resides 4 Next issue the following command to create a script file for the uninstallation eGAgent_ lt OS gt exe a r
105. further The steps involved in configuring the eG agent are the same for Solaris and Linux systems and are listed below 1 For configuring type the following command at the command prompt optiegurkha bin setup_agent 2 The following message will be displayed and the process seeks the user s confirmation KREKERKRE RE KRERKR ERK RRR ERK RR RE REERR RR KKK RRR RRR RK ERK RRR REE K KEKE RK RK RR RKKRERER REESE The licensing terms for eG products are mentioned in the file opt egurkha license agreement PLEASE READ THIS FILE BEFORE PROCEEDING FURTHER KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKK Please indicate if you accept th G licensing terms y n n 3 After the configuration process verifies that the licensing terms are acceptable to the user it attempts to configure the agent s operational environment with the details of the eG manager that the agent should communicate with For this purpose the configuration process prompts the user for the hostname or IP address and the port number of the eG manager The hostname should be used if DNS is enabled in the target environment Otherwise the IP address should be used Setup of manager agent communication path KKEKEKKKKKKKKKKKKK KK KK KK KK KK KK KK KK KK KK KKKK KKK KKK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK Enter the hostname or IP address of the eG Manager Enter the port number of the eG Manager 7077 4 The configuration
106. host first untar the eGurkha directory to the opt directory and then check whether the IP host name of the new host is different from the old manager host If so run the reset_manager and reset_agent scripts from the opt egurkha bin directory and change the IP host name of the eG manager to that of the new host Also replace the old eG manager license with a new license generated for the new IP address hostname After restoring check whether the opt egurkha manager tomcat webapps final WEB INFi lib is a soft link to loptiegurkhallib To perform this check execute the following command from the command prompt Is alt opt egurkha manager tomcat webapps final WEB INF If the result of this command includes the following statement then it indicates that the soft link exists lib gt opt egurkha lib If not first remove the directory opt egurkha manager tomcat webapps final WEB INF lib Next create a soft link using the following command In s opt egurkha manager tomcat webapps final WEB INF lib opt egurkhallib Finally restart the eG manager 346 Backing up and Restoring eG Enterprise 5 2 Backing up and Restoring the eG Manager on Windows Environments To back up and restore the eG manager on Windows do the following 1 Login to the eG manager host 2 Copy the eGurkha directory to a convenient location 3 If you want to restore the eG mananger to the same host from which its backup was taken follow the
107. included in the destination set 238 Installing and Configuring on Windows Environments New Destination Set Eriki Name jec Manager Description optional e Includes theses computers Name IP Range Path Add Edit Remove Cancel Figure 3 171 Providing a name to the new destination set 9 Ifthe agents are to report to a single manager then provide the IP of the manager in the Computer text box of Figure 3 172 To enable the agents to communicate with multiple external managers provide an IP range using the From and To text boxes in Figure 3 172 Then click the OK button in Figure 3 172 Computer name 92168 1059 C IP address Erom To optional sates i include a specific directory in the destination set type the path low To include all the files in a directory use this format dir To select specific file in a directory use this format dir filename Path Cancel Figure 3 172 Specifying the Manager IP 10 You will then return to Figure 3 171 which will now display the manager IP in the Include these computers section see Figure 3 173 239 Installing and Configuring on Windows Environments New Destination Set Name jes Manager Description optional Includes theses computers Name IP Range Path 192 168 10 59 Edit Remove OK Cancel Figure 3 173 The New Destination Set page displaying the newl
108. lameme Macromedia E McAfee Microsoft E MySQL AB E Net 5NMP osc Policies 3 PowerArchiver Program Groups E Realtek pina al Foundation Finds a text string in a key value or data Figure 3 330 Selecting the Find option 6 When the Find dialog box appears see Figure 3 331 specify eG Agent as the string to search for Find 21x Find what eG Agent ws pe V Keys IV Values IV Data J Match whole string only Figure 3 331 Finding the string eG Agent 7 Then click the Find Next button in Figure 3 331 to trigger the search 8 Continue searching until the eG Agent entry present under the key indicated by Figure 3 332 is located 335 Installing and Configuring on Windows Environments 10 X Registry Editor SIE File Edit view Favorites Help 2 Uninstall Name Type Data 0EFC6259 3aD8 4CD2 BC57 D4937AFSCCOE ab Default REG SZ walue not set C 12ECDC9D 2DEE 4550 BEF0 C5FAAA070D7A Bvisplayname REG SZ The eG Agent entry a 195CA5B4 88C0 4C88 B8C0 033E90F54345 ab LogFile REG_SZ C Program Files InstallShield Installation Information Ey 88F4D4FD 1814 4068 B316 C28FC776C6DD a Uninstallstring REG_SZ RunDII32 C PROGRA 1 COMMONIYINSTAL L engin 6824967 1 8714 11D7 88E8 0050DA21757E 84708DD8 45E6 11D4 4706 000629E95E20 84D2E430 5049 11D4 A08E 0080AD978BF5 96539823 87 16 11D7 88E8 0050DA421757E CD0159C9 17FB 11D6 A764 00B
109. least one server j eme tp egracrd otp bocal 44 wip egrecnil atp bea Figure 3 275 Adding nodes to a cluster 10 Skip the validation tests by clicking the Next button in Figure 3 276 DW Create Chester Wizard 7 Validation Warning Betcre You Begn Fon the terves you sebected hur the cluster the seports from clutter Corba ston Select Servers appew to be maang o mcomplete Microsclt suppor a chume sakmon oriy the complete Configuration jnervert network and socage can par al the testi nthe V a Corhigasion Do you mant to iun configuration validation tests betcee contreang cr When cick Newt run configuration validston testi and ther setum to the proces of ceeating ce No do not requre support hom Miosa tor Gres chuster_ and therefore do not wart to aun the veidetor tests When cich Ned corirue creating the chaster tmon GH een Figure 3 276 Skipping the validation tests 11 Next provide a name for the cluster and specify its IP address as depicted by Figure 3 277 below Then click the Next button 300 Installing and Configuring on Windows Environments OP Create Custer Wizard E Access Point for Administering the Cluster Type the name you sant to use when admneterng the chaster Betore You Begn Seain Cities ATIPEGIRADW Vedin Waira One m mone Pri adhesses could not be configused automatically Foi each nafwerk to be used make ae nae the natmo is selected aed then type an addes
110. list settings on the Web server Detailed Error Information ModuleIsapiModule Requested URLhttp 192 168 10 58 7077 jakarta isapi_redirector dll NotificationExecuteRequestHandler Physical PathC Program HandlerISAPI dll Files egurkha manager tomcat bin native isapi_redirector dll Error Code0x800704ec Logon MethodAnonymous Logon UserAnonymous Most likely causes e No handler mapping for this request was found A feature may have to be installed e The Web service extension for the requested resource is not enabled on the server e The mapping for the extension points to the incorrect location The extension was misspelled in the browser or the Web server Things you can try e Install the feature that handles this request For example if you get this error for an ASPX page you may have to install ASP NET via IIS setup Verify that the Web service extension requested is enabled on the server 1 Open the IIS Manager and navigate to the server level 2 In the Features view double click ISAPI and CGI Restrictions to verify that the Web service extension is set to Allowed 3 If the extension is not in the list click Add in the Actions pane 4 In the Add ISAPI and CGI Restrictions dialog box type the path of the dll or exe file in the ISAPI or CGI Path box or click Browse to navigate to the location of the file Figure 8 1 The error message that appeared when the egurkha web
111. located in the file opt egurkha bin license may be invalid The eG manager runs as a Java process The maximum heap memory that can be allocated to a 32 bit eG manager process is limited to 1 5 GB The maximum heap memory allocation to a 64 bit eG manager process on the other hand is limited to 3 GB Where a large number of components are to be monitored you may want to allocate more memory heap to the eG manager process On a Unix manager follow the steps below to modify the heap memory allocation 1 Login to the eG manager host Edit the catalina sh file in the opt egurkha manager tomcat bin directory 2 Search for the entry JvmMx in the file You will then find an entry that reads as follows JvmMx lt Heap_memory_allocation_to_manager gt JvmMs lt Heap_memory_allocation_to_manager gt 3 The JvmMx and JvmMs specifications govern the heap memory allocations to the eG manager If you want to increase it to say 2 GB change these specifications as indicated below JvmMx 2048 JvmMs 2048 4 Finally save the file While overrding the default heap memory allocations to the eG manager process ensure that the allocated heap memory is not greater than the total memory capacity of the eG manager host 53 Installing and Configuring on Unix 2 9 Installing the eG Agent The eG agents are responsible for making periodic measurements of the infrastructure and collecting a variety of statistics eG agents must be deplo
112. lt EG_INSTALL_DIR gt manager logs error_log For example once a user is created in the SQL database server one of the password policies in effect may mandate that the user change his her password before they can login In such a case the following error message is reported in the error_log file ERRORjava sql SQLException Login failed for user eguser Reason The password of the account must be changed If the user does not have permission to access the database that has been specified during the installation process the following error is logged ERRORjava sql SQLException Cannot open database egdb requested by the login The login failed 133 Installing and Configuring on Windows Environments 3 1 5 Installing and Using MS SQL Server 2005 2008 2012 Server Express as the eG Backend If you click No in Figure 3 21 it indicates that an MS SQL server is not already available in the target environment If you are installing the eG manager on a Windows 2008 2012 server or a Windows Vista 7 8 host then upon the non availability of an MS SQL server the setup process will present you with the following options see Figure 3 63 e To exit the setup e To install the Microsoft SQL Server 2005 2008 2012 Express and use it as the eG backend Question e Do you want to use Microsoft SQL Server 2005 Express Figure 3 63 A message box requesting your confirmation for quitting setup or installing MSDE Clicking No in Figure 3 63
113. menu sequence Start gt All Programs gt Administrative Tools gt Cluster Administrator Since Node 1 has already been created following the menu sequence mentioned at step 13 above will lead you to the Cluster Administrator console in the tree structure in the left panel of this console you can view the newly created NODE1 as a sub node of the EXTERNALAGENT node as indicated by Figure 3 252 To add another cluster node right click on the EXTERNALAGENT node in Figure 3 252 move your mouse pointer over the New menu that appears and pick the Node option from within as shown in Figure 3 252 282 Installing and Configuring on Windows Environments oe Cluster Administrator EXTERNALAGENT ExternalAgent smalibusiness local E Cluster gj NODE Figure 3 252 Adding a new node 15 You will then be welcomed to the Add Nodes Wizard Click the Next button to proceed Add Nodes Wizard Welcome to the Add Nodes Wizard This wizard helps you add additional nodes to an existing server cluster Using this wizard you specify the computers that will be added to a cluster You can add one computer at atime or you can add multiple computers at the same time This wizard requires that you provide the following information The names of the computers to be added to the cluster The password for the cluster service account To continue click Next lt Back Figure 3 253 The Welcome screen of the Add Nodes Wiz
114. network card requirements The quorum will be created later and the additional network is not required by the type of cluster Majority Node Set that the eG agent requires Click the Next button in Figure 3 245 to proceed New Server Cluster Wizard Analyzing Configuration Please wait while the wizard determines the cluster configuration Vv Checking for existing cluster Establishing node connection s Vv Checking node feasibility Finding common resources on nodes Checking cluster feasibility f 5 D 5 View Log Details Be analyze Click Next to continue Click Back to change the configuration lt Back Figure 3 245 Determining the cluster configuration 7 Then enter the IP Address for the cluster and click the Next button to move to the next step 277 Installing and Configuring on Windows Environments New Server Cluster Wizard IP Address Enter an IP address that cluster management tools will use to connect to the Figure 3 246 Entering the IP adress of the cluster service 278 Installing and Configuring on Windows Environments 8 In Figure 3 247 that then appears key in the domain admin account details for running the cluster service For this use the User name Password and Domain fields Then click the Next button New Server Cluster Wizard Cluster Service Account Enter login information for the domain account under which the cluster service will be
115. of the new database that is to be created 6 Since a new database instance can be created only by an administrator of the database server next specify the user name and password for the database administrator If Windows Authentication is enabled on the MS SQL server then ensure that the credentials of a valid Windows domain user with database administrator privileges are provided in Figure 3 28 Also make sure that the user name is of the format domainname username For eg if the name of the database administrator is dbadmin and the domain name is chi the user name you specify in Figure 3 28 should be ch dbadmin On the other hand if Mixed Mode Authentication is enabled on the MS SQL server then the database administrator name that you specify need not necessarily be preceded by the domain name In this case therefore your user name specification can be of either of the following formats username or domainname username However if SQL Server Authentication is enabled on the MS SQL server then the database administrator name should not be prefixed by a domain name Your specification should then be only username 108 Installing and Configuring on Windows Environments eG Manager Setup Database Settings New database creation requires administrator privileges e g sa or in the format domaindbaaccount if Windows authentication is enabled for the SQL database server Please enter the database administrator DBA u
116. on Windows Environments B Windows Update YS Yahoo Messenger Et PowerArchiver a New Office Document A Open Office Document fn Accessories EA Documents gt B Administrative Tools ih Settings a fa Microsoft SQL Server J Search Microsoft Excel eG TT ConfigTool g Help Wj Microsoft Word Start Manager g7 Run Ey TextPad ger Log Off shiva fs eG Monitoring Suite gt fy eG Manager gt x Uninstall Manager ap Shut Down start 4 E Figure 3 88 Stopping the eG manager If for some reason the IIS web server hosting the eG manager stops running then you can configure the Tomcat server to fill in for the IIS web server that is non operational and continue to work with the eG manager To achieve this do the following 1 Once the IIS web server goes down proceed to delete the egurkha web site that is automatically created on the IIS web server upon installing the eG Enterprise manager To do so select the Internet Services Manager option in Windows 2003 this will be the Internet Information Services IIS Manager option from the Start gt Programs gt Administrative Tools menu of the IIS web server 171 Installing and Configuring on Windows Environments Bf Component Services startup Computer Management E amp internet Explorer 33 Configure Your Server EI Outlook Express Connection Manager Administration Kit citrix Data Sources ODBC Java 2 Runtime Environment gt a
117. on Windows Environments Multiple Names Found Mose than one otyect matched the name ATTP EGI Select one oi moie names hom thes kit or reenter the name Matcheg names I ATTPEGFSNUOT ATTPEGIFSNJ Figure 3 292 A window displaying all objects with names that match the specified cluster name 13 Select the name of the cluster you created from Figure 3 292 and click the OK button therein Figure 3 293 will then appear From the Group or user names list of Figure 3 293 select the cluster name Then select the Allow check box against Full Control permission in the Permissions for list and click the OK button BB Permissions for eqi attp t SYSTEM BA Admarestsstors AT TP EGIFSMJO1 Adrwrestr ators ER ATTP EGIRACHIN ATTP ATTPEGIRACNIONS Be ATTPEGIRACHM AT TIPAT IPE GRACNIOS BA Users ATTPEGIFSNIO Wien Ful Corral Modty Read L Execse List Folder Conterts Figure 3 293 Granting Full Control to cluster 14 Once you return to the SMB Settings section click on the Next button to move on Figure 3 294 will then appear Accept the default settings of Figure 3 294 by clicking the Next button 311 Installing and Configuring on Windows Environments 14 Shared Foder Wir ard al DFS Namespace Publishing Steps Shared Fokder Locston NTFS Pesranons Shave Protocol SME Settras SMB Pers mans DFS Namespace Pubisteng Revew Semnge and Leye Share Corfematax 15 You can publish an SMB th
118. port 8443 minSpareThreads 32 maxThreads 512 enableLookups false acceptCount 10 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 compression on compressionMinSize 2048 noCompressionUserAgents gozilla traviata compressableMimeType text html text xml text plain application x java applet application octet stream application xml text javascript text css image png image jpeg image gif app lication pdf application x javascript application javascript SSLEnabled true scheme https secure true clientAuth false sslProtocol TLS keystoreFile webapps eGmanager bin keystorePass eginnovations gt 3 Then proceed to make the changes indicated in Bold below in the SSL XML block lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector protocol HTTP 1 1 port 7077 minSpareThreads 32 maxThreads 512 enableLookups false acceptCount 10 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 compression on compressionMinSize 2048 noCompressionUserAgents gozilla traviata compressableMimeType text html text xml text plain application x java applet application octet stream application xml text javascript text css image png image jpeg image gif app lication Kobe Ey OLA SAELEM x7 EWASCrISc ojollicacien javasercijae SSLEnabled true scheme https secure true clientAuth false sslProtocol TLS
119. procedures have been detailed in the sub sections below Importing a Combined Certificate into the Keystore File In this case follow the steps below to import the certificate into the keystore file 1 At the command prompt execute the following commands one after another cd JAVA_HOME bin keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 3 4 2 1 gt file the name of the domain certificate that you want to import gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 2 1 above Importing a Signed Certificate and the Certificate Chain into the Keystore File Digital certificates are verified using a chain of trust The trust anchor for the digital certificate is the Root Certificate Authority CA The Certificate Hierarchy is a structure of certificates that allows individuals to verify the validity of a certificate s issuer Certificates are issued and signed by certificates that reside higher in the certificate hierarchy so the
120. process then requires to know if the user needs an Http proxy for the eG manager agent communication If yes the user has to provide the name of the proxy server followed by the port number of the proxy server If further authentication is required the user name and the corresponding password have to be provided Please indicate if you want to use a proxy for the eG Agent to communicate with the eG Manager y n n If the eG agent is configured to communicate with the eG manager via a proxy server to it via HTTP HTTPS it may automatically use the proxy server to establish this then whenever the eG agent attempts to remotely monitor an application by connecting connection this in tun may cause problems while monitoring those applications To avoid this before configuring the eG agent manager communication via a proxy make sure that the agent will be able to connect to remote applications also via the same proxy 5 Then indicate whether you want to enable SSL for the eG agent 64 Installing and Configuring on Unix The eG Agent can use HTTP or HTTP SSL to communicate with the eG Manager In order to use HTTP SSL please make sure that the eG Manager has been configured to SUDO Orato Er Do you want to configure the eG Agent to use SSL for communication with the eG Manager y n n Entering y here will enable SSL support for the agent and n will disable it If SSL support is enabled then setup will request y
121. question by default 5 To enable output logging replace the first occurrence of dev null in the line with the full path to an output log 78 Installing and Configuring on Unix file see Figure 2 20 Similarly to enable error logging replace the second occurrence of dev null with the full path to the error log file see Figure 2 20 Llib vim jar EG_HOME 1lib xml apis jar EG_HOME lib xercesImp1l jar 4EG_HOME 1lib xmlParserAPIs jar CLASSPATH ocal bin bin port portNo dir opt egurkha ssl false highSecurity false Figure 2 20 The edited start_agent script 6 Finally save the start_agent script 7 Restart the agent In Solaris environments error and output logging for the eG agent can be triggered by editing the starta script in the loptiegurkha bin directory The steps involved in this process are discussed hereunder 1 Open the starta file 2 Edit the line that begins with nohup java client Xrs see Figure 2 21 if d opt egurkha manager then XMX Xmx256m Figure 2 21 The starta script 3 At the end of the line indicated by Figure 2 21 you can find an entry that reads as follows dev null 2 gt amp 1 4 This entry is appended to the nohup java line by default and indicates that both output and error logging is not enabled for the eG agent in question by default 5 Unlike Linux HPUX and AIX agents which can be configured with two separate log fi
122. sage a availabe Some gvylsdie dihs are not inted because fwy we not cumeriiy ordre cman Coon Carcel Figure 3 307 Clicking the Next button in the Select Storage page 7 To skip the Replicate Registry Settings page and move to the next step click the Next button in Figure 3 308 t Replicate Registry Settings Before You Degn Aart en fn Dogan oly heed a Theneicee a mpotart to have tes data avadatie or ee es Speci the regetry keys under MEEY_LOCAL MACHINE that rhodd Select Serce ot be ipic ated to af nthe ppicawn Seit Service Chart Acces Port Figure 3 308 Skipping the Replicate Registry Settings page 8 Once the Confirmation page appears see Figure 3 309 quickly review the service configuration displayed therein and click the Next button to confirm the addition of that service as a clustered resource 321 Installing and Configuring on Windows Environments Da ragh Availabilty Wizard Fie Confirmation Before You Begn You ae seedy to configure high availabilty for Genenc Service Select Sorice a Apok aion Select Sore Service eGurktha gent eGurkheAgent Network Name ATTP EGIRGenSve IP Address 10 200 41 114 Select Storage Parameters This Genere 5 Service has mo startup parameters Repicste Regit Settings Figure 3 309 Reviewing the service configuration 9 Upon confirmation the cluster manager will then begin configuring the high availability of the eGurkhaAgent
123. service see Figure 3 310 Wt igh Availability Wizard E Configure High Avaslability Figure 3 310 High availability configuration in progress for the eGurkhaAgent service 10 Once the configuration process ends Figure 3 311 appears confirming the successful completion of the high availability configuration and displaying the details of the eGurkhaAgent service for which high availability was configured 322 Installing and Configuring on Windows Environments Betoxe You Beogr High avadatdity war succetihdy Configured for Pe service of apphcaton bert Access Pow Generic Service tnt Sc ye pital diat Service EeGurihaspgent eGurkhs gent 5 Network Name ATTP EGIRGenSye ASEA IP Address 10 200 41 114 wean rap Parameters Ths Genenc Service has mo startup parameters v shabbat CE To vien the jepat crested by the wizard cick View Repat V w Report To close Ihis wineed cick Firash Figure 3 311 A message indicating the successful configuration of high availability for the eGurkhaAgent service 11 Click the Finish button in Figure 3 311 to exit the wizard 12 Now proceed to indicate which node in the failover cluster owns the eGurkhaAgent service For that expand the Services and Applications node in the tree structure in the left panel of the Failover Cluster Manager and right click on the sub node representing the eGurkhaAgent service From the shortcut menu that pops up select the Properties option see Figure
124. setti disable automatic configuration I Use automatic configuration script Address m Proxy server v Use a proxy server for your LAN These settings will not apply to dial up or YPN connections Address 10 0 0 11 Port s080 Advanced IV Bypass proxy server For local addresses cme Figure 3 240 Defining the proxy settings 3 26 Configuring High Availability for the eG Agent Using 273 Installing and Configuring on Windows Environments Windows Cluster Setup on Windows 2003 You can configure two agents within a Windows cluster setup so that when one agent fails the other agent takes over from the first and performs all the monitoring tasks originally assigned to the first This way there will not be a single point of failure of the eG agent In order to configure a fail proof agent follow the broad steps listed below 1 2 No or U oe Prepare two machines with identical specifications Name them as Node 1 and Node 2 Install Windows 2003 Enterprise Edition on both the machines Next create a Windows file share from a third machine This file share will be used as a third vote in the Majority Node set type cluster A copy of the cluster database will be stored into this share and it will be in sync with the cluster database on the 2 cluster node machines Setup Domain Controller and DNS Server on Node 1 Configure Node 2 as the backup Domain Controller Install an eG agent each
125. site listing in the IIS 2008 manager console was Clicked Why did this happen What do I do to resolve this This error typically appears if IIS and CGI restrictions have been imposed on the egurkha web site preventing its execution on the web server If you receive such an error message then do the following to resolve the issue 377 Troubleshooting e Login to the Windows 2008 server e Open the Internet Information Services IIS Manager console on the server e Once the console opens click on the node representing the IIS web server in the tree structure in the left pane of the console see Figure 8 2 E Internet Information Services IIS Manager ioj x r Ty o gt CoS gt EG284 gt we File View Help EG284 Home bed S Fy Manage Server p T Start Page s Restart SSeS Group by Area gt aay si EREN EG284 MAS eguser D Start Rules aj B stop a o view Application Pools ES View Sites Compression Default Directory Error Pages Document Browsing Hep Online Help E J a j Lb E d Failed Request Handler HTTP Redirect HTTP Tracing Rules Mappings Respo oe amp p IPv4 Address ISAPI and CGI ISAPI Filters Logging and Domai Restrictions sh Tas A e MIME Types Modules Output Server x Cachina Cavkifie ska fllreatres vow J E onene Vw Figure 8 2 Clicking on the node representing the IIS web
126. softmare It one of te pereon fa process Know at lakove v yas hardrrare c aan then oesie a chiter Alte Pese steps are comgiste you can manage the chte Managing a chanm Can nckade magating ienee and apekeahore to we 2001 Ws Serves 2008 a Windom Server 2008 R2 sjenina cite yatta teats Mrana laore cuita E Eae chata taes on he wet B iranan connate on he Wied E Hoat noor paz on the wet Figure 3 314 Bringing the clustered service online 15 Once the service goes online Figure 3 315 will appear confirming the same P ATTP EGIRGenSve OF ATTRA sto ec OB Sees ond acpicatons Summary of ATTP EGIRGenSve Er ows igi ATIPEGPACNID I H ATTPAGPANTY Sues ote orep Alerts noo B eors Pratermed Dunes ATTPEGIRACNIO ATTPEGIRACNIO Ei Custer everts Ciment Owner A1 TPEDRAOUO Serve Name Figure 3 315 The right panel of the Failover Cluster Manager indicating that the service is online 3 27 5 Manually Configuring an Apache Server To configure an apache server manually do the following 1 Change the Apache configuration file For that first open the httpd conf file which is located at 325 Installing and Configuring on Windows Environments lt APACHE_ROOT gt confi httpd conf Then enter the following lines at the end of the file LoadModule egurkha_module libexec mod_egurkha dll AddModule mod_egurkha c 2 Copy the dll file mod_egurkha dll from lt EG_ROOT gt lib to lt APACHE_ROOT gt libexec 3 Crea
127. source keystore gt destkeypass this refers to the keypass of the destination keystore file i e the keystore file in the JKS format The storepass and keypass of the destination keystore file should be the same destkeystore the name of the destination keystore file i e the keystore file in the JKS format srckeystore the name of the destination keystore file i e the keystore file in the PKCS12 format gt srcstorepass The storepass of the source keystore file i e the keystore file in the PKCS12 firmat make sure that you provide the same storepass you specified in Section 3 4 1 1 of this document 3 4 1 3 2 Configuring Tomcat for Using the Keystore File The eG manager on Windows uses Tomcat as the web server Therefore to SSL enable the eG manager you need to configure the server xml file of Tomcat with the name and full path to the keystore file which was created earlier 1 Edit the server xml file in the lt CATALINA_HOME gt conf directory 2 In the file search for the XML block where the SSL Coyote HTTP connector on port 8443 is defined If this block is commented it indicates that the eG manager is not SSL enabled and is hence listening on an HTTP port only To SSL enable the eG manager first uncomment this block as indicated below 152 Installing and Configuring on Windows Environments lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector protocol HTTP 1 1
128. specific users Server Access Policy E Protocol Rules GP Packet Filters Policy Elements Cache Configuration g3 Monitoring Configuration Extensions 4 149 Network Configuration 7 Client Configuration H H323 Gatekeepers E Create site and content Delete site and content Modify site and content rule rule rule Figure 3 195 The Configure Site and Content Rules page displaying the details of the new rule 3 25 2 Configuring the ISA Proxy Server 2004 In order to enable an eG agent to communicate with an eG manager via an ISA Proxy server 2004 do the following 1 Open the ISA Proxy server s management console using the menu sequence depicted in Figure 3 196 Figure 3 196 Opening the ISA Server Management console 2 Figure 3 197 will then appear First click on the Firewall Policy node in the tree structure on the left pane of 251 Installing and Configuring on Windows Environments Figure 3 197 to view the firewall policies already configured The ISA server 2004 doubles as a firewall server and therefore firewall rules can be defined using the ISA server itself To do so first click on the Firewall Policy node in the tree structure of Figure 3 197 00 x ation yew e gt ma e 2 a o Tree Ee E Monitoring 3 Configuration Firewall Policy ZD Virtual Private Networks VPR Microsoft Internet Security and Accel EGITLABOZ Microsoft In
129. status of the Verify if agent is reporting from configured IP parameter in the MANAGER SETTINGS page Configure gt Settings menu sequence in the eG administrative interface If this flag is set to No it indicates that the eG manager is identifying the eG agents using their nick names and not their IP addresses Since this is the desired setting following step 1 alone would suffice to ensure that both Sa and Sb communicate with the eG manager On the other hand if this flag is set to Yes in your eG manager installation it indicates that your eG manager is currently identifying the eG agents using their IP address only In such environments typically many eG agents may not have been configured with nick names at all at the time of installation In such a situation if you set this flag to No then agents without nick names will stop working To avoid this before proceeding any futher you must make sure that every eG agent installed in your environment is assigned a unique nick name Since manual nick assignment can be cumbersome the eG Enterprise system provides the following alternative 3 Edit the eg_tests ini file in the lt EG_INSTALL_DIR gt manager config directory 4 Set the UpdateNicks parameter in the AGENT_SETTINGS section of the file to Yes 5 Then save the file Setting UpdateNicks to Yes ensures that every eG agent in the environment which has no nick assigned to it is automatically assigned the nick name that is specifie
130. suite supports Chinese Korean or Japanese This is because unlike their peers these three languages support a double byte character set The steps below discuss these special configurations elaborately 1 The first step towards ensuring that eG Enterprise handles Chinese Korean or Japanese characters is to double byte enable the eG manager This can be performed during manager setup itself When the setup process prompts you enable disable double byte support press y in the case of a Unix manager or click the OK button in the case of a Windows manager to enable double byte support 2 Secondly you need to configure the eG database to store and process double byte characters If an MS SQL server is used as the eG backend then no additional configuration is necessary to enable double byte support However if an Oracle database is used as the eG backend then you will have to explicitly change the NLS settings of the Oracle server so that the database server is able to store double byte characters For that while creating an Oracle database instance do the following Click on the Character Sets tab Select the Use Unicode AL32UTF8 option Select AL16UTF16 as the National Character Set 341 Configuring Double byte Support for eG Enterprise If a Database Configuration Assistant is used to configure the Oracle instance then the aforesaid parameters can be set as depicted by Figure 4 1 below Database Configuration As
131. that apply to the configured client and destination sets To achieve this first expand the Access Policies node in the tree structure in the left pane of Figure 3 174 Then click on the Protocol Rules sub node within Figure 3 175 will then appear 240 Installing and Configuring on Windows Environments E Microsoft Internet Security and Acceleration Server 2000 Administration lol x action vew e gt aml Tree Configure Protocol Rules EGISASERVER Array Protocol rules determine which protocols can be used to communicate with the Internet Internet Security and Acceleration Server 2000 GS Arrays B EGISASERVER Array E e Monitoring Server B g Access Policy Site and Content Rules a les PP Packet Filters m Publishing Bandwidth Rules E Policy Elements E Cache Configuration E lonitoring Configuration E extensions WER Network Configuration ml Client Configuration fp H323 Gatekeepers These are current protocol rules a i gt Allow Web protocols Create protocol rule Delete protocol rule Modify protocol rule Figure 3 175 The Configure Protocol Rules page 13 To define the web protocols click on the Allow Web protocols option in the right pane of Figure 3 175 Figure 3 176 will then appear Provide a unique name for the new web protocol in the Protocol rule name text box and then click the Next gt button to proceed
132. that each of the managers uses a separate Not database The next step involves setting up of the eG manager for database access The installation process prompts the user to choose whether to use Oracle or Microsoft s SQL server as the backend database server that hosts the eG manager Database configuration for the eG Manager KKEKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKKK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKK The eG Manager requires a database server for storing its measurements KEKKKKKKKKKKKKKK KK KK KKKK KK KK KK KEKKK KK KK KK KKK KKK KK KK KK KK KKK KKKKKKKKKKKKKKKK Choose the type of database server which you want to use for the eG Manager 1 Oracle Database Server ZA eMiteros omens Olmocrajers Select the database server type by number To pick the Oracle Database Server enter 1 For the MS SQL Server Database enter 2 If you choose the former refer to Section 2 2 1 If you choose the latter please refer to Section 2 2 2 for further details 2 2 1 Using an Oracle Database This section provides instructions to configure the manager if Oracle is used as the database server for the eG manager Refer to Section 2 2 2 if MS SQL Server is to be used as the database server 1 2 Once Oracle is chosen as the database server the installation process instructs the user to appropriately size the tablespace that is to be used to host eG s database KKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKK
133. the lt rss gt value of 15 and above indicates strong signal strength a value below 10 will not guarantee SMS delivery The output CSQ 99 99 indicates the modem is not registered with the mobile network The Windows 2008 server does not come with the Hyperterminal utility The utility can be copied from any of the existing Windows 2003 servers and executed on the Windows 2008 server Files related to this utility are hpertrm exe and hypertrm dil ll o Mobile SIM card with valid subscription for outgoing SMS o The eG license should enable the SMS Alerting capability 7 1 2 Verifying the Proper Setup of the NowSMSS Lite Software Once the NowSMS Lite is installed and setup check whether SMS can be sent using its web interface For this purpose open the browser from the eG manager host and launch the following URL http lt NowSmsServer gt lt NowSmsPort gt PhoneNumber lt MobileNumberforReceivingSMSAlerts gt amp Text lt TestMessage gt A sample URL will be http 192 168 1 25 8800 PhoneNumber 9840098011 amp Text eGAlarms If the PhoneNumber configured in the URL receives the SMS alert with the configured Text it is a clear indicator that the web interface of the NowSMS Lite software is functioning without a glitch 7 1 3 Configuring the eG Manager to Work with NowSMS Lite Once the NowSMS lite is setup eG manager can be configured to send out SMS alerts using the web interface of NowSMS lite To achieve this
134. the above command the following message will appear Type n to continue with the setup Only a SunONE iPlanet web server can be configured for monitoring using this SIGHOUMIONE g For monitoring an Apache or IBM web server please refer to the eG Installation Manual Do you wank tol continue y me ly lly y 81 Installing and Configuring on Unix 10 Upon confirming you will view the following message Type y here to continue Note Only a web server administrator has permissions to configure the eG web adapter capability for a web server Do you want to continue y n y y Next setup will want to know whether the current user is the web server s administrator or not Are you the administrator of this web server y n y Entering y or n here will bring up the following query Pleas nter the user name of the web server s administrator Next you will need to enter the web server administrator s password Password Next enter the root directory of the web server to be configured Also indicate whether the web server is SSL enabled Enter the root directory of the SunONE iPlanet web server usr local web Is this web server enabled for SSL support y n n Based on the server type and the root directory the setup_webadapter script proceeds to modify the web server startup scripts to use the eG web adapter when the web server starts up Then the user has to specify whether this web server is e
135. the database user default is egurkha The eG Manager requires a special database user account to store its measures Enter the eG database user name egurkha Enter the password for egurkha Please re enter the password for egurkha Here again the Authentication mode set for the MS SQL server in question will have to be considered Iif Windows Authentication is enabled on the MS SQL server then the new user should be a valid Windows domain user Accordingly the user name should be of the format domainname username For eg if the name 30 Installing and Configuring on Unix of the new user is egdb and the domain name is sig the user name you specify in Figure 3 41 should be sig egadb On the other hand if Mixed Mode Authentication is enabled on the MS SQL server then the special user account you create need not necessarily be preceded by the domain name In this case therefore your user name specification can be of either of the following formats username or domainname username However if SQL Server Authentication is enabled on the MS SQL server then the user name should not be If MS SQL Server 2008 is being used as the eG backend then ensure that the password provided for the eG database user is a strong password Strong passwords are defined by the following parameters e Has at least 6 characters e Does not contain Administrator or Admin e Contains characters from three of the following categories
136. the eG agent 3 20 2 Starting the eG Agent on Windows 2008 2012 7 8 Vista The eG agents on the following platforms require administrator privileges to start Windows 2008 32 bit and 64 bit Windows 2012 32 bit and 64 bit Windows 7 Windows 8 Windows Vista In Windows 2008 Windows 7 systems therefore follow the Start gt Programs gt eG Monitoring Suite gt eG Agent menu sequence right click on the Start Agent menu option and pick the Run as administrator option see Figure 3 158 228 Installing and Configuring on Windows Environments B Beyond Compare 3 p BrowserPlus B Debugging Tools for Windows 64 J Dell B Dell DataSafe Documents eye Dell Webcam Pictures Ji DWWLAN Ji EditPlus di eG Monitoring Suite ik eG Agent st a Open Z ur Edit ad Td Select Left File for Compare P dae Music Games Panel Troubleshoot compatibility Land Printers Open file location Print Run as administrator Restore previous versions Send to Cut Copy Delete Rename Properties JJa Sale Figure 3 158 Starting an eG agent on Windows 2008 In case of Windows Vista click on Start Search on the task bar of the agent host right click on Command Prompt and then select the Run as administrator option as depicted by Figure 3 159 This implies that the command that is issued at the command prompt soon after will be executed with administrator privileges 229 Installing
137. the eG manager note that both IPv4 and IPv6 addresses are supported 7 Following this you will be required to indicate if the manager is to be configured to use SSL or not Do you want the eG Manager to be SSL enabled y n n Enter y to enable SSL or n to disable it 8 Please enter the location of your Java home directory usr To enable the setup process to configure the eG Enterprise s execution environment to execute Java programs next specify the Java home directory say opt java1 6 0_10 If the configuration process cannot locate the specified Java home directory it returns the following error message The setup process failed to locate opt javal 6 0 10 Then the configuration process looks for the Java library lib subdirectory of the Java home directory Within this directory the setup process checks for a specific file called tools jar For example if the user specifies loptijava1 6 0_10 as the Java home directory the configuration process will look for the file loptijava1 6 0_10 lib tools jar If the process fails to locate the Java lib directory it will explicitly ask the user to specify the Java lib directory and also display the following message The setup process failed to locate opt javal 6 0 10 lib tools jar 9 Once the Java lib directory has been located the setup process will look for a Java fonts directory within the Java home directory For example if the Java home directory is set to opt java1
138. the target host does not have a valid oo home directory While installing an eG agent on a Solaris host in the silent mode Tips make sure that the user specified as the eG user has a valid home directory on that host If not create a valid home directory for the eG user on that host and then proceed with the silent agent installation 2 12 3 Installing an eG Agent on AIX in the Silent Mode To install an eG agent on AIX in the silent mode do the following 1 First manually install the eG agent on any of the target AIX hosts in your environment by following the procedure provided in Section 2 7 4 of the eG Installation Guide Typically this is achieved by executing the iAgent_aix sh script with the eGagent_aix tar file located in the same directory as iAgent_aix sh Upon successful installation a silent_install script and an iAgent_aix file will get automatically created in the loptiegurkha bin directory of the agent host Next copy the iAgent_aix file and silent_install script from the opt egurkha bin directory to any location on the AIX host on which you want to install an eG agent in the silent mode To the same location copy the eGagent_aix tar file as well Then login to the AIX host as root user and edit the silent_install script To achieve this follow the procedure detailed at steps 4 of Section 1 1 above Once all the aforesaid parameters are configured with the values relevant to your agent installation save the file
139. themselves These documents can be downloaded from http www microsoft com or http www oracle com The exact URLs will vary depending upon the type and version being used and can be easily found using the Search options given in the sites 5 4 Mandatory steps If the database is in a different box and only the manager setup is to be restored to the same box from which it was backed up then follow steps detailed in Section 5 1 and 5 2 depending upon the operating system of the eG manager If the database alone is to be restored then follow step 5 3 only If both have to be restored then alone follow steps 5 1 through 5 3 Restart the system after this process before attempting to start the manager and or the agent 348 Configuring eG Enterprise to Work in NATed Environments Configuring eG Enterprise to Work in NATed Environments It is straightforward to deploy the eG manager and agents for monitoring an Intranet where all the managed systems are in the same IP address range and there are no firewalls address translators between the managed devices servers In many large environments there may be multiple demilitarized zones with firewalls between them Furthermore the monitored network can span multiple geographical locations and can be connected via Virtual Private Networks The devices servers in each location can be in a different often private IP address range This section covers how the eG manager and agents have to be co
140. to communicate with the eG manager via a proxy server then n whenever the eG agent attempts to remotely monitor an application by connecting to it via HTTP HTTPS it may automatically use the proxy server to establish this connection this in Note tun may cause problems while monitoring those applications To avoid this before configuring the eG agent manager communication via a proxy make sure that the agent will be able to connect to remote applications also via the same proxy The next step displays all the details that have been provided so far by the user as in Figure 3 122 193 Installing and Configuring on Windows Environments 12 eG Agent Setup eG Agent Setup The Setup has enough information to start copying the program files If you want to review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings Destination Folder E eG Manager IP Host name 192 168 8 147 eG Manager Port 7077 lt Back Cancel Figure 3 122 Information specified by the user at the various stages of the setup process Next the user has to decide whether to assign a nick name for the eG agent In many environments servers and routers may not be assigned host names Furthermore the host names may not be easy to remember or recall It is not easy to refer to servers and network devices using their IP addresses To make it easy for administrators opera
141. usage of an Oracle backend for the eG manager also necessitates the resetting of the following Oracle initialization parameters e The processes parameter should be set to a minimum of 100 e The open_cursors parameter should be set to a minimum of 200 These parameters might have to be tuned further based on an increase in server load 9 Database administrator privileges are required for creating a new database user The Setup now prompts the user to enter the database administrator s name and password as in Figure 3 18 The default value for the DBA user name will be system For more information about your environment contact your database administrator 103 Installing and Configuring on Windows Environments 10 eG Manager Setup Database Settings New user creation requires database administrator privileges Please enter the database administrator DBA user name system Please enter the password Retype the password Figure 3 18 Setup program seeking the name and password of a database administrator If the configuration process succeeds the following screen will be displayed see Figure 3 19 The Setup requires the user to restart the system This can be done immediately or at a later point of time A valid license must be obtained for the eG manager to function This license should be placed in the bin directory of the egurkha folder for e g C Program Files egurkha bin Clicking on the Finish button will
142. user name and password to make sure that the database instance is up Please refer to the eG User Manual for details 2 Make sure that the database instance can be reached from the eG manager system e g firewalls between the manager and the database could result in database connection problems 3 Check that the tablespaces specified when creating a new user are valid Please refer to the eG User Manual for a method of determining the tablespaces available for a database server 4 Ensure that the tablespaces specified have enough space to host the eG database tables Verify that if the eG manager and agent are being installed on the same system the same user owns the eG directories 6 Finally make sure that the operating system locale setting is English 376 Troubleshooting e I installed the eG manager on a Windows 2008 server but I could not start the manager To troubleshoot the failure I opened the IIS Manager console browsed the tree in the left pane to locate the egurkha website and tried to connect to the web site Once I did that the following error message appeared http 192 168 10 58 7077 IIS 7 0 Detailed Error 404 2 Not Found Microsoft Internet Explorer provided by eGinmnovations Server Error in Application EGURKHA JAKARTA Internet Information Services 7 0 Error Summary HTTP Error 404 2 Not Found The page you are requesting cannot be served because of the ISAPI and CGI Restriction
143. validity and trustworthiness of a given certificate is determined by the corresponding validity of the certificate that signed it The Chain of Trust of a Certificate Chain is an ordered list of certificates containing an end user subscriber certificate and intermediate certificates that represents the Intermediate CA that enables the receiver to verify that the sender and all intermediate certificates are trustworthy A certificate chain will therefore consist of multiple certificates Before importing each of these certificates you will have to understand the hierarchy of the certificates To know which is the root and which is the intermediate certificate refer to the web site of the certificate authority For instance if Comodo is the Certificate Authority that has issued the SSL certificate then connect to the following URL https support comodo com index php Default Knowledgebase Article View 620 1 to gain clarity Then follow the steps below 1 First import the Root certificate For this execute the following commands one after another in the command prompt 157 Installing and Configuring on Windows Environments cd JAVA_HOME bin keytool import trustcacerts alias rootcert file lt Name_of_the_root_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypass mykey storepassmykey The text in Bold in the above command line indicates those inputs that can change according to the requiremen
144. value The default time wait interval for a Solaris operating system is 240000 milliseconds which is equal to 4 minutes Recommended value 60000 milliseconds gt Solaris TCP_FIN_WAIT_2_FLUSH_INTERVAL Description Specifies the timer interval prohibiting a connection in the FIN_WAIT_2 state to remain in that state When high connection rates occur a large backlog of TCP IP connections accumulate and can slow server performance The server can stall during peak periods If the server stalls using the netstat command shows that many of the sockets opened to the HTTP server are in the CLOSE_WAIT or FIN_WAIT_2 state Visible delays can occur for up to four minutes during which time the server does not send any responses but CPU utilization stays high with all of the activity in system processes How to view and set Use the get command to determine the current interval and the set command to specify an interval For example ndd get dev tcp tcp fin wait 2 flush interval ndd set dev tcp tcp fin wait 2 flush interval 67500 Default value 675000 milliseconds Installing and Configuring on Unix Recommended value 67500 milliseconds gt Solaris TCP_KEEPALIVE_INTERVAL Description The keepAlive packet ensures that a connection stays in an active and established state How to view or set Use the ndd command to determine the current value or to set the value For example ndd get dev tcp tcp keepalive inter
145. with the extension p7b 3 Once you find it double click on it This will open the Certificates window see Figure 3 82 165 Installing and Configuring on Windows Environments F certmar Certificates Current User D EGFILES EG53FILES SSL CERTIFICATE CERTNEW_CHAIN_ Mif Ea File Action View Help e9 Aml lH m all Certificates Current User E C D EGFILES EGS3FILES SSL CER gt Certificates Export a certificate Figure 3 82 The Certificates window 4 Inthe left panel of the Certificates window you will find a tree structure with a list of certificate files available on the eG manager host for the current user Expand the SSL Certificate file node and then click on the Certificates sub node within The right panel will then display the certificates 5 From the certificates list in the right panel select the certificate that needs to converted into the PEM format right click on it and follow the A Tasks gt Export menu sequence in the shortcut menu that appears see Figure 3 82 6 A wizard will appear Click Next in the wizard to proceed 7 Figure 3 83 will then appear Select the DER encoded binary X 509 CER option in Figure 3 83 and click the Next button 166 Installing and Configuring on Windows Environments Certificate Export Wizard xi Export File Format Certificates can be exported in a variety of file Formats Select the format you want to use DER en
146. 0 Figure 3 41 Figure 3 42 Figure 3 43 Figure 3 44 Figure 3 45 Figure 3 46 Figure 3 47 Figure 3 48 Figure 3 49 Figure 3 50 Figure 3 51 Figure 3 52 Figure 3 53 Figure 3 54 Figure 3 55 Figure 3 56 Figure 3 57 Figure 3 58 Figure 3 59 Figure 3 60 Figure 3 61 Figure 3 62 Figure 3 63 Figure 3 64 Figure 3 65 Figure 3 66 Figure 3 67 Figure 3 68 Figure 3 69 Figure 3 70 Figure 3 71 Figure 3 72 Figure 3 73 Figure 3 74 Figure 3 75 Figure 3 76 Figure 3 77 Figure 3 78 Figure 3 79 Figure 3 80 Figure 3 81 Figure 3 82 Figure 3 83 Figure 3 84 Figure 3 85 Figure 3 86 Figure 3 87 112 Location of the eG manager Information specified by the user at the various stages of the setup s ssesssessssresssesesresrsrsssssesrstststrtsrsrtisestsseststesistnesrsesstseseesrsese 114 Message box indicating the existence of a database user Setup program seeking the name and password of a database administrator ga siaed GA Saved dav aves hanes T 115 Setup program indicating the completion of the eG manager installation 00 0 cece eee ee cee cseeecsecececseeeeseesesesaesecseseesesseeeaeeeees 115 Specify the type of database server to be used to host the eG database A message box requesting you to confirm whether or not the Microsoft SQL server is NTLMv2 enabled cscesceeeeseereeeeeees 117 A message box requesting you to confirm whether not a Microsoft SQL server is running in
147. 0 120 Figure 3 210 Specifying the IP address range of the sources 15 Upon clicking OK in Figure 3 210 Figure 3 211 appears listing the newly added source IPs Click the Next gt button here to continue New Network Wizard xi Network Addresses Define the IP addresses for this network You can add IP address ranges IP address ranges associated with a network adapter and private IP ranges Address ranges End Address 10 0 0 101 10 0 0 120 Remove Add Adapter Add Private lt Back Next gt Cancel Figure 3 211 The IP address range being listed 16 When Figure 3 212 appears click the Finish button therein to complete the network configuration New Network Wizard xi Completing the New Network PE Wizard Internet Poms fo Acceleration 2004 You have successfully completed the New Network Wizard The new network will have the following configuration Name EJ eG gents Network Type Internal Network Addresses D i 10 0 0 101 10 0 0 120 ae ol For traffic to pass through this network further configuration steps are required Help about further confiquration steps To close this wizard click Finish ae Figure 3 212 The Welcome screen of the new protocol rule wizard 259 Installing and Configuring on Windows Environments 17 You will then return to Figure 3 206 but this time expand the Network node within to reveal the configured n
148. 0 11 D A http 209 15 165 127 htip10 5 HAZ An eG agent on i 209 15 2 3 eG agent on User A 10 5 20 19 Figure 6 1 Manager behind a NAT 6 2 Agent on a Public IP Suppose an agent with a public IP address say 209 15 2 3 see Figure 6 1 has to communicate with the eG manager In this case when installing the agent the externally visible IP address of the manager i e 209 15 165 127 has to be specified as the manager s IP address see Figure 6 1 Only then can the agent communicate with the manager The dashed lines in Figure 6 1represent the flow of information from the eG agent on 209 15 2 3 to the eG manager on 10 5 20 12 In this case the server applications on 209 15 2 3 must be managed via the eG admin interface for the manager to respond to the agent 6 3 Agent behind a NAT Yet another scenario involving NATed environments is when the system on which the agent is installed is also behind a network address translator see Figure 6 2 Suppose that the agent is being installed on a server with a private IP address 192 168 10 7 and that this agent has to be configured to communicate with the manager on 10 5 20 12 which is accessible over the Internet as 209 15 165 127 Suppose that the private IP 192 168 10 7 is translated into the public IP address 209 15 2 3 via a NAT see Figure 6 2 350 Configuring eG Enterprise to Work in NATed Environments eG agent on public IP PublicIP Extemally visibl
149. 008 2012 you need to install and configure Advanced Logging on the target IIS web server soon after you create the Web Server role on the Windows 2008 server IIS Advanced Logging provides enhanced data collection and real time server and client side logging capabilities It can be managed by using IIS Manager and other tools that can work with the IIS 7 8 configuration system The Advanced Logging feature supports complex Web and media delivery scenarios that demand flexibility and control These scenarios may require custom logging fields real time access to data greater control over what gets logged and when extensibility for new sources of data the ability to consolidate log data posted by clients and correlate it to server data the option of sharing data from various sources and storing it in multiple logs capturing system state information inclusion of canceled requests in logs and even logging multiple times per request In order to monitor the web transactions to IIS 7 8 bundled into Windows 2008 and Windows 2012 installations respectively the eG agent requires that the Advanced Logging be installed and configured on IIS The steps in this regard have been discussed below 1 Login to the IIS host 2 Download the executable that installs the Advanced Logging feature from any of the following URLs depending 214 Installing and Configuring on Windows Environments upon whether the IIS installation is a 32 bit one or a 64 bit
150. 012 server Select the Web Server IIS role depicted by Figure 3 137 to install it Then click the Next button to proceed 208 Installing and Configuring on Windows Environments i e fAdd Roles Wizard File Services Installed C Network Policy and Access Services Figure 3 137 Selecting the Web Server IIS role 7 Then when Figure 3 138 appears click on the Next button to switch to the next step of the role installation 209 Installing and Configuring on Windows Environments Add Roles Wizard aS Web Server IIS Before You Begin Introduction to Web Server IIS Server Roles Web servers are computers that have specific software that allows them to accept requests from chent computers and return responses to those requests Web servers let you share information over the Internet or r fe through intranets and extranets The Web Server role includes Internet Information Services 115 7 0 a unified Web platform that integrates IIS 7 UAE ET ARONEN Som na TIS 7 0 also features enhanced securky simplified diagnostics and delegated administration Confirmation Things to Note Progress i Using Windows System Resource Manager WSRMI can help ensure equitable servicing of Web server Results traffic especially when there are multiple rotes on this computer i The default instalation for the Web Server IIS role includes the installation of role services that enable you to serve static content make mi
151. 100 will reveal Figure 3 101 using which the manager IP hostname and the SSL port will have to be specified eG Agent Setup eG Agent Setup Please enter the following details eG Manager IP Host Name 192 168 11 214 eG Manager SSL port Figure 3 101 Specifying the IP hostname and SSL port of the eG manager 180 Installing and Configuring on Windows Environments If you have chosen to allow only trusted certificates then ensure that the IP hostname provided in Figure 3 101 matches that of the certificate Then follow the procedure Note detailed in Section 3 13 once the agent installation is complete 7 If you select the No button in Figure 3 99 then setup will attempt to configure the agent s operational environment with the details of the eG manager that the agent should communicate with For this purpose the setup process prompts the user for the hostname or IP address and the port number of the eG manager see Figure 3 102 However 7077 is the default port The hostname should be used if DNS is enabled in the target environment Otherwise the IP address should be used eG Agent Setup eG Agent Setup Please enter the following details eG Manager IP Host Name 192 168 19 214 eG Manager Port 7077 o Cer Figure 3 102 Hostname and port number of the eG manager to which the agent communicates 8 The setup process requires to know if the user needs a proxy for the eG ma
152. 100 934 152 5 WIN DxXMESFXBON3 DEFAULT WEB SITE 192 168 8 185 192 168 8 185 80 200 iisstart htm 0 1885 934 152 0 WIN DEFAULT WEB SITE 192 168 8 185 192 168 8 185 80 200 0 1885 934 152 1 WIN DXMESFXBON3 DEFAULT WEB SITE 23 32 29 521 192 168 8 185 80 200 iisstart htm 22 02 953 18 16 WIN DxXMESFXBON3 DEFAULT WEB SITE 23 32 29 521 192 168 8 185 80 200 22 02 953 18 18 WIN DXME8FXBON3 DEFAULT WEB SITE Software IIS Advanced Logging Module Version 1 0 Start Date 2011 04 05 06 33 30 386 Fields time local cs Host s ip s port sc status cs uri stem cs uri query CPU Utilization sc bytes cs bytes TimeTakenMS s computername s sitename cs username 23 33 30 094 localhost 1977 1 1977 200 Test html 100 386 246 181 wIN DXME8FXBON3 TESTING 23 33 30 268 localhost 1977 1 1977 404 favicon ico 100 5352 224 49 WIN DxXMESFXBON3 TESTING 23 36 11 597 192 168 8 185 80 200 iisstart htm 3 211 953 18 0 WIN DXMESFXBON3 DEFAULT WEB SITE 23 36 11 597 192 168 8 185 80 200 3 211 953 18 0 WIN DXME8FXBON3 DEFAULT WEB SITE 23 36 18 297 192 168 8 185 192 168 8 185 80 200 iisstart htm 0 934 152 0 WIN DXMESFXBON3 DEFAULT WEB SITE 23 36 18 297 192 168 8 185 192 168 8 185 80 200 0 934 152 0 WIN DXMESFXBON3 DEFAULT WEB SITE 23 40 20 302 localhost 1977 1 1977 304 Test html 3 119 211 332 2 WIN DXME8FXBON3 TESTING
153. 2 srcstoretype PKCS12 srcstorepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the aliasname of the certificate being requested make sure that you provide the same alias name that you specified in Section 3 4 2 1 of this document gt deststorepass this refers to the storepass of the destination keystore file i e the keystore file in the JKS format The storepass of the destination keystore should be the same as the storepass of the source keystore 159 Installing and Configuring on Windows Environments gt destkeypass this refers to the keypass of the destination keystore file i e the keystore file in the JKS format The storepass and keypass of the destination keystore file should be the same destkeystore the name of the destination keystore file i e the keystore file in the JKS format srckeystore the name of the destination keystore file i e the keystore file in the PKCS12 format gt srcstorepass The storepass of the source keystore file i e the keystore file in the PKCS12 firmat make sure that you provide the same storepass you specified in Section 3 4 2 1 of this document 3 4 2 3 1 Configuring Tomcat for Using the Keystore File The eG manager on Windows uses Tomcat as the web server Therefore to SSL enable the eG manager you need
154. 3 19 Configuring the database ut Requesting for a certificaten aranne E AAEN ae A ORTEK A EENE aeea eA etcauavnlledesusheteoscvubelesssbateusevebeletasuatevevngetecasvadensestSuteveds 39 Downloading the Certificate onesies toT s ani EES EEEE REEE REEE EKNE EENE RAEES ENE ERE AN EEGEN as 40 The swinstall terminal interface Commencing the install analysis process sseseeee 60 A screen displaying the status of the install analysis process Completing the install analysis process s ssscicccssesasssssssssccssuadanssssiscevasusaacsnseiacesasvesssesncaznevavacecesnsazaevasaeaissedetecnssusavabsrsszasseabasavarsiaeenad 61 The process of importing and trusting the manager Certificate 20 0 eceeeeceesesseeseeseeeececeseeseeseesecseceeeeeeseesecsecsececeseeseeaessecaeeeeeneeeaeeaee 69 The start_agent script aS The edited start Agsent SCript sess ccxcsscssccccessvouscedensencesseveskecoreuacecsovansdesbvancedcevasetexvesscadedeasubevsvateucdscasasessvatevenseusiadevessevevsregeaeeveassncesrevebeels The starta SCript ys veccrsiecces sdieescsovvcocccsananedahvyeous oasesedaavenuceateunecahasond saiwanescawveences yoasests suas cab svasesgabwasccabsvayedau exec E E The edited starta Script cc eeeeeeeeeeees Selecting the Software Management option Choosing to remove a software on the local host Marking the eG agent software fordeleti ony aci c ciesscvescecovccacechovanseesnsuncedeosensdevetunssenshasulesevatces covasusessve
155. 40 3 3 Configuring Redundancy for the eG Manager on Windows ssssssesseseseessssssresrsrsrsrstetereereersrststetrrsrsrststeteenenrerststeet 145 3A SSE Enaps the eG MaE a a a n aa aaa ea aan ae E O e EER A EEE 145 3 4 1 SSL Enabling the eG Manager Using a Self Signed Certificate 0 00 ee ccccecceseeeceeeeeeseeseesceseeececeeesesseesesseeeeeees 145 3 4 2 SSL Enabling the eG Manager Using a Signed Certificate Obtained from a Valid Certifying Authority 154 3 4 3 Troubleshooting SSL Enabling the eG Manager 0 ececcsceecneesecseeseeseescesceecsecseesessesaesseeecesseesesaeeseesseaeeaeats 162 3 5 Starting the 6G Manager auseneen tas ones a ay ea Se es ay eh cia sae dase dee EEO elbows cused EEA E AES 167 3 5 1 Starting the eG Manager Without SSL Support 0 eee ccc eceeeeeceecseeseeseeseeacsececsecseesecsesaeesseecsessessesseeseesseeeeees 167 3 5 2 Starting the eG Manager with SSL Support 0 ee cece csceseescesceeeeecsecsecseeseeseeacsecsecseesessesaeseseessesaessesseeseesseeeeees 168 307 Testing the SSL Installations 2255 s cregites 085 cc estes cdedns ORE A edad RE AR AAS 169 3 7 Increasing the Memory of the eG Manager cccececesesseseesesseeseeseeeccesecsessecseeseeaceacsessesseesecseeaeesesessesaeesesseeaeeaseaseees 170 3 8 Stopping theseG Manager is sic a aaa ee Ga east tte eats 170 3 9 Dealing with Operating System Variations nunana a e E N REA E E A RA T 176 3 10 Pre requisites for Installing the eG Agent on Windows Env
156. 5 2 Configuring the ISA Proxy Server 2004 oo ee eisereen erisa ererig oha ier o e a Eea an rnp esi EAEra e Neps S ETRE Nas rA 251 3 26 Configuring High Availability for the eG Agent Using Windows Cluster Setup on Windows 2003 eee 273 3 27 Configuring High Availability for the eG Agent Using Windows Cluster Setup on Windows 2008 eee 297 3 27 Creating a Windows ClUSter iss sees ssisasscacssenscivices dcasssevscsnistsacdvsidsesduaseasioesceve Wiah scuabdesduastsd ssa ty N EAEE OOED senaleazavaes 297 3 27 2 Creating a Windows File Shate wi ci cssssscassvesccsusvssccaesssvcccuseteccausessccansennsdaceuceceneanvecdecvccbssuevecgedscacsdsteseedacseqnestusneantede 302 3 27 3 Confisuring Cluster Quorum Settings ic c siy cicsseesseescdesyscoass cteteisiessvossavatcodoineventesstadeses oveusivietnsebsieoseoses shsdatad ees vere 315 3 27 4 Adding the eG Agent Service as a Cluster Resource 10 eeeeeeeeecseeseeseesceseeecseeseesecaeeaesaeeaeeeseeseesaesaeeaseaeeeseaeaees 317 3 27 5 Manually Configuring an Apache Server ccceececcsseseescesceseeeceececsessecaeesceaceecsecsecseeseeseeaeesesessesatesesseeaeeeseaeaees 325 3 28 Stoppin e the eG Apei aei rga E S E E E A SAET E 326 3 29 Uninstalling the G Manager et eea a d aea aana e esda e paa e i aaae ias 328 3 30 Uninstalling anreG ALENT neseser Tane e EEEE TERO ETE EE EEEIEE 329 3 30 1 Removing the WebTransFilter siisccssscscaitesseterascsdeattiesessasstsceagsediaces
157. 620 1 to gain clarity Then follow the steps below 1 First import the Root certificate For this execute the following commands one after another in the command prompt cd JAVA_HOME bin keytool import trustcacerts alias rootcert file lt Name_of_the_root_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypassmykey storepass mykey 47 Installing and Configuring on Unix The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for the root certificate gt file the name of the root certificate that you want to import gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 2 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 2 4 2 1 above for details 2 Next import each of the intermediate certificates one after another using the following command keytool import trustcacerts alias intercert1 file lt Name_of_the_intermediate_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypass mykey storepass mykey The text in Bold in the above command line indicates those inputs that ca
158. 8 of Windows Server 2008 R E takita Confiomen E Wieteetartna chter rak son tests E Cerna a tative chain o miina a chaste node Figure 3 273 Creating a failover cluster 8 When Figure 3 274 appears click on the Next button to proceed Thee wiad creates a chatter whech it a set of servens that wok to naese the avadiablty of server begins hosting the chustered oan crave thet you hardese and sating ae compatible wath iaiover Miccio support a chaler soklon oriy d the complete comfgusahon tervers network and storage can panpe paag ay Drrosdar rarama ipdan In addition al hadmao components in the custe solution mutt be Certiied for Winders Server 2008 AT You munt be a local admenwtrator on each of the servers you want to nchude in the chate To cortinun cich Nest Mice sd fe none aod dese man sandat Aaa Sat Figure 3 274 The Welcome screen of the Create Cluster Wizard 9 Using Figure 3 275 that appears next add Node 1 and Node 2 to the cluster For that first enter the server name of Node 1 in the Enter server name text box of Figure 3 275 and click the Add button Likewise specify the server name of Node 2 in the Enter server name text box and click the Add button again Then click on Next to proceed 299 Installing and Configuring on Windows Environments Ls Create Chester Wizard Vv Select Servers Betore You Degn Adi the names of afl he server that pou wart to have n the chuster You must add af
159. A E EAER EE A OEA EAEE EERE A window displaying all objects with names that match the specified cluster name Granting Full Control to cluster Accepting the default settings of the Share Protoco s section Accepting the default settings of the SMB Settings section ccesssccsseesceeesecsecseceeeeeeeseeseeseesecseceaeeseeaesaecseeeceaeeaeeseeaeeeeeeeeeeeaeeas 309 Configuring SMP Perini ssions aater naa AEEA E ERES A E A EA cons eudensenaunreans enderebaeecseusvedbor Clicking the Object Types button A window displaying all objects with names that match the specified GIUSTE NAME vioeoriiiseriiri ieaie EREET 311 Granting Full Control to Cluster scopre ooir ese toesas rE E EN Ee KETENE TE TEEGEE ISFE NEIERE SENOR SVENE S EEEE TEER E O iaro Accepting the default settings of DFS Namespace Publishing section Reviewing the share Settings si sscssciscavsscvcscascnedasssasavaustesssusesasasadancsesusesssascazsseasvanssssscaatevevsinecesavancsvavssascesnsandenavesavsvesveraeedaseataversazese Successit Creation OF the Mle Share ccc vccessenpscceostosccsosivavccodbuacscsveunyscovascddeheunsn seven evesioasinssoudspsssescupsasencuseaveackessvuadcsatsesucoarecysages Figure 3 29 Figure 3 29 Figure 3 29 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 30 Figure 3 31 Figure 3 31 Figure 3 31 Figure 3 31 Figure 3 31 Figure 3 31 Figure 3 31 Figure 3 31
160. A System and Network Service Figure 3 221 Clicking on the New button to create a new user 26 First provide a name for the new user set see Figure 3 222 and then click the Next gt button New User Set Wizard a E x Welcome to the New User Sets Microsoft Wizard Internet Security amp Accel ra E This wizard helps you create a new user set A user set is a group of users whether Windows or non Windows e g RADIUS users defined together as a single set When you create Web publishing protocol and access policy rules you can apply the rule to one or more user sets User set name fea Users To continue click Next lt Back Cancel Figure 3 222 Naming the user set 27 Then click the Add button Figure 3 223 that appears and select the Windows users and groups option to add users to the user set 264 Installing and Configuring on Windows Environments New User Set Wizard 7 H XJ Users Select users to include in the user set Windows users and groups RADIUS SecurID lt Back Next gt Cancel Figure 3 223 Clicking the Add button to add users to the user set 28 Select a directory from the Look in list and select the users to be added to the set from the list box below see Figure 3 224 Then click the Add button to transfer the selection to the second list box in Figure 3 224 see Figure 3 225 Then click the OK button Select Users or Groups
161. AAE EEEE AE AE A N A Ea 236 Adding an IP range The details of the new chent Set being displayedsessiiissieiirosiiioreiiiiririii iier onii Eene KE iE EAE ENEE E 237 The name of the new client being displayed sreci rin e E E i EE EREEREER E a 238 Clicking on the Destination Sets node 238 Providing a name to the new destination set 239 Specifying the Manager IP ceeceeeeseesceceeteeneeseeeeeneeeneeee 239 The New Destination Set page displaying the newly added IP seeeeeecceseeseeseeseceeceeeeseeseeseesececeaeeseesessecseceeeaeeseeseeaeeeeeneseneeneeas 240 The newly created destination set being displayed ccsccecceseeseeseeseeesceseeseeseesecsecsceaeeaeeseesecseceeeaeeseesesaeeseceeeeeeaeeaeeaeeeeneeeeeeaeeas 240 The Configure Protocol Rules page The Welcome screen of the new protocol rule wizard ceeeeceeseeseeseeseeeeceseeseesecsecsecsceeaeeseeseeseesececeaeeseesecsecseceseaeeaeeseeaeeeeneseeeeneeas 241 Selecting protocols ais orisii orerar Eear rA REETIKA TEENIV ESEESE ITSEEN EESE TOPIE SONETOS TOSE SE IINE OSKE EERE SETE Oak Selecting a schedule Selecting the Specific computers OpUOm rsson naa r se A E EA E E EEEE EAR A nuns tevebedeaesnevavciputedaeesansesoreveunees 243 Clicking on the Add DUMON soss ien Ta raene aaa r EREA TRER R EEN EEEE EAEE E EAE KEENE EARN 243 Adding the newly created client set 244 The chosen client set being displayed in the Client Set dialog box 244 Finishing the protocol ru
162. CA and submit the certificate The procedure for request submission will differ from one CA to another 2 The certificate will thus be generated Download the certificate 2 4 2 4 Importing the Certificates into the Keystore File The downloaded certificate can be in one of the following forms 46 Installing and Configuring on Unix e Can bea single combined certificate e Can be accompanied by a certificate chain e Can be ina PEM format The procedure for importing certificates differs based on the format of the downloaded certificate These procedures have been detailed in the sub sections below Importing a Combined Certificate into the Keystore File In this case follow the steps below to import the certificate into the keystore file 1 At the command prompt execute the following commands one after another cd JAVA_HOME bin keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 2 4 2 1 file the name of the domain certificate that you want to import keystore Provide the name of the keys
163. CLASSPATH EG_HOME 1ib vmgfiles JAVA_LIB tools jar JAVA_LIB dt jar JAVA_LIB rt jar export CLASSPATH fi LANG en_US export LANG jar_list ls EG_HOME 1lib grep jar awk print 1 if jar_list then for jar in jar_list do CLASSPATH CLASSPATH EG_HOME 1ib jar export CLASSPATH done fi zip_list ls EG_HOME 1lib grep zip awk print 1 if zip_list then for zip in zip_list do CLASS PATH CLASSPATH EG_HOME 1ib zip export CLASSPATH done fi CLASSPATH SEG_HOME lib eg_agent jar EG_HOME lib eg_ util jar EG_HOME 1lib vim25 jar EG_HOME 1lib vim jar EG_HOME 1i export CLASSPATH PATH JAVA_HOME bin EG_HOME bin G_HOME bin ic sbin usr bin usr sbin bin PATH usr local bin bin export PATH host 192 168 10 12 portNo 7077 export host portNo egurkha kha bin op agen mohup opt egqurkha jre bin java Xrs Dsun net inetaddr ttl 900 EgMain gent manager host port portNo dir ver java con eg EgInstallInfo export ver val ps e o pid args grep egurkha jre grep v grep we 1 if val gt 0 then Figure 2 19 The start_agent script 3 At the end of the line indicated by Figure 2 19 you can find an entry that reads as follows dev null 2 gt dev null 4 This entry is appended to the nohup opt egurkhaj jre bin java line by default and indicates that both output and error logging is not enabled for the eG agent in
164. Connector port 8081 maxThreads 150 minSpareThreads 25 maxSpareThreads 75 enableLookups false redirectPort 8443 acceptCount 100 debug 0 connectionTimeout 20000 disableUploadTimeout true gt Upon startup Tomcat will parse the server xml file and create objects based on the content of the file A single Connector element specification in the server xml file will hence cause Tomcat to create a Connector object If you then update the file with another Connector element specification it will automatically trigger the creation of another instance of the Connector This is how the above change creates two connectors listening on port 8080 and 8081 respectively You only have one container though The connectors create a request and response object for each incoming HTTP request and pass it to the container Then save the file Finally restart the Tomcat server 51 Installing and Configuring on Unix 2 6 Installing the eG Manager on Privileged Ports On Unix all ports below 1024 are privileged ports Only super users or users authorized to access this port will be able to bind to these ports If you wish to have the eG manager listening on a privileged port you will need to follow the procedure listed below When the eG manager is installed on Solaris 10 or higher you can install the eG manager and have it configured to listen to a privileged port e g 80 or 443 Before starting the manager login to the Solaris serv
165. Content Gateway services users have the option of configuring the eG manager to send SMS alerts to mobile phones via Air2Web s service offering instead of the eG SMS manager The key advantages of this approach are e The eG SMS manager need not be procured installed and configured e No modems would be required e Users need not subscribe to any service provider s SMS service The only requirements of this approach therefore are e A valid subscription to Air2Web s services e An eG manager installation with the license enabled ror SMS Alerts To integrate this eG manager with Air2Web do the following 1 2 Edit the eg_services ini file in the lt EG_INSTALL_DIR gt manager config directory You will find the following entries in the SMS_SETTINGS section of the file SMS SETTINGS SmsServer SmsPort SmsService Air2WebUr1 The SmsServer SmsPort and SmsService parameters in this section are of relevance only if the eG SMS manager is being used for sending SMS alerts Similarly the Air2WebUrl specification gains significance only if the eG manager integrates with Air2Web If the Air2WebUrl parameter holds no value it indicates that the eG manager does not integrate with Air2Web To ensure that the eG manager automatically attempts to transmit SMS alerts via Air2Web you need to ensure that this parameter is first uncommented and then set to a valid URL if this is done then the Air2WebUrl specification automatical
166. DFS Namaipace Pubbrheng Renen Satro and Ciee Share Confemator Speciy share petmsscms tor SMB based access to the shared lokder For renwak socer to a shwed folder the more restnctwe of the share permeson and NTFS Deerreons delene the level of access granted to uterst groups Shure pafi WATTPEGIFSNION eg_onp Select one of the tolicewing banc share peenenons of cosie oustom hye perwsmons C Alumn and gops have only Read access C Admis have Ful Control all other sen and gop have only Read access e Atrerestestors hye Ful Corio all othe wies and groupe have oriy Flesd access and Witte access Users and groups have custom share perme sons For mate formation about sharing and permisions see Maneang Pemrenens fot Staaned F ches Peon Net cn Figure 3 290 Configuring SMP Permissions 11 When Figure 3 291 appears click the Object Types button in Figure 3 291 select the Computers check box in the window that pops up and click the OK button in that window to return to Figure 3 291 Select Users Computers Service Accounts of Groups Figure 3 291 Clicking the Object Types button 12 Now in the Enter the object names to select text area of Figure 3 291 type the name of the cluster you created using the procedure detailed in Section 3 23 1 and click the Check Names button Figure 3 292 will then appear listing all objects that match the cluster name that you specified 310 Installing and Configuring
167. Distributed File System AY Acrobat Reader 5 0 Event Viewer netterm 8 inter EE textpad Licensing GB Netscape Communicator Local Security Policy Real gt SP Network Monitor A WinZip gt R Performance Symantec client Security gt E Routing and Remote Access ae gt Server Extensions Administrator al Telnet Server Administration Terminal Services Client Creator Terminal Services Configuration Windows 200 Figure 3 89 Selecting the Internet Information Services IIS Manager option 2 From the window that appears select the egurkha web site right click on it and choose the Delete option see Figure 3 90 emet Information Services 115 Manager Figure 3 90 Deleting the egurkha web site 3 Next to configure the Tomcat server so that it functions as the web server edit the server xml file in the 172 Installing and Configuring on Windows Environments lt EG_INSTALL_DIR gt manager tomcat conf directory on the eG manager host 4 In the server xml file locate the block where the AJP 1 3 Connector is defined By default this block will be uncommented as indicated by Figure 3 91 E serverat Word TT eee Ble Edt View Insert Format Help osal SIR al slelo j lt Factory cia ssName org apache coyote tomceat4 CoyoteserverSocketFactory clientAuth f alse protocoi TLS gt lt Connector gt lt Define a Coyote JK2 AJP 1 3 Connector on port 8009 gt ees lt Connecter c
168. G database 5 By default the SQL server instance that Azure creates is SSL enabled Therefore when requested to confirm whether the SQL server is SSL enabled or not click Yes see Figure 3 88 Question 2 Do you have MSSQL Server with SSL support enabled Figure 3 43 Confirm whether not the SQL database on Azure is SSL enabled 6 Next specify whether a new database has to be created to host the eG database Since you intend to use the SQL database that is already created on Azure to store measures click No in Figure 3 89 Installing and Configuring on Windows Environments Question Figure 3 44 Specifying whether a new database has to be created for the eG database 7 Enter the name you assigned to the SQL database when you created it on Azure eG Manager Setup Enter Text Please enter information in the field below Enter an existing database that should be used for the eG Manager lt Back Next gt Fit Cancel Figure 3 45 Indicating the name of the SQL database you created on Azure 8 Next specify the details of the user account that will be used to host the eG database For this configure the following in Figure 3 94 Installing and Configuring on Windows Environments e the login name that you provided when creating the SQL database on Azure e the password that you provided for the login name at the time of creating the Azure SQL database eG Manager Setup Datab
169. HEA AA A A A EEE EK KK AKA KH KA KK KK KKK KKK KKK AK 2 2 Configuring the eG Manager After the installation the eG manager needs to be configured for proper functioning The steps involved in configuring the eG manager are the same for Solaris and Linux systems and are listed below 1 2 For configuring the eG manager first login as the eG user For the eG manager to operate correctly a valid license must be available at the location opt egurkha bin It is essential to ensure that a database server is available to host the eG database The database server used for the eG database can either reside on the eG manager itself or it could be hosted on an external server The installation process will attempt to connect to the database server and install the eG database The sizing requirements for the eG database depend on the number of servers to be monitored Next at the prompt issue the following command opt egurkha bin setup_ manager The following message will appear FRR A KK AK K KKK KK KKK KK KK AK KK KK KKK K K KK KK KKK KK KK KKK KKK KKK KK KK KKK KKK K Configuring the eG Manager The licensing terms for eG products are mentioned in the file opt egurkha license agreement PLEASE READ THIS FILE BEFORE PROCEEDING FURTHER DR A A KKK KKK KKK K K K K K KK KK KK K KK KK K K KKK KK KK KK KK KK KK KKK KKK K KK KK KK KK KK KK T 15 Installing and Configuring on Unix
170. HOME C JIDK13 1 1_0 G net stop egurkhaTomcat 2 gt D PROGRA 1L ss Itest egurkha ib startmanager_err txt 1 gt D PROGRA L ss Itest egurkha lib startmanager_out txt del D PROGRA 1 ss Itest egurkha manager tomcat webapps final wEB INF ib eg_manager jar ecopy D PROGRA 1 s5 Itest egurkha lib eg_manager jar D PROGRA 1 ss Itest egurkha manager tomcat webapps final weB INF 1ib cls echo starting the eG Manager components net start egurkhaTomcat 2 gt D PROGRA 1 s5 Itest egurkha lib startmanager_err txt L gt D PROGRA L ss Itest egurkha lib startmanager_out txt 6c IDK13 1 1_O bin java exe c Di PROGRAWI SS test equrk has ibyeq_manager jar D PROGRA A ss1test egurkha ib classes12 21p D PROGRA 1 ss1test egurkha i i WEBIINE classes D PROGRA 1 ss Itest egurkha ib GSMengine jar D PROGRA 1 s5 Itest egurkha 1i jar D PROGRA L s5Itest egurkha lib jnet jar EgstartManager a a let uploag Figure 3 77 SSL enabling the start_manager script SSL enabling the start manager script by making the indicated change 7 Next make sure that the eG manager URL configured against the MailHomeURL parameter in the MISC_ARGS section of the eg_services ini file in the lt EG_INSTALL_DIR gt manager config directory begins with https instead of http Then save the file 8 Finally start the eG manager 161 Installing and Configuring on Windows Environments 3 4 3 Troubles
171. ISAPI filters 6 To remove the WebTransFilter select it and click on the Remove button in Figure 3 326 Finally click on the 332 Installing and Configuring on Windows Environments Apply button in Figure 3 326 followed by the OK button 3 31 Manually Uninstalling the eG Agent To manually uninstall the eG agent on Windows do the following 1 Stop the eG Agent using the menu sequence Start gt Programs gt eG Monitoring Suite gt eG Agent gt Stop Agent 2 Open the Windows registry by typing regedit in the Run dialog box which appears upon following the Start gt Run menu sequence and clicking the OK button therein see Figure 3 327 LS 8 x Type the name of a program folder document or Internet resource and Windows will open it For you Open regedit x Cancel Browse Figure 3 327 Opening the Windows registry 3 In the Registry Editor see Figure 3 327 that opens look for the eG Innovations Inc entry in the My Computer HKEY_LOCAL_MACHINE SOFTWARE node sequence see Figure 3 328 333 Installing and Configuring on Windows Environments X Registry Editor File Edit View Favorites Help My Computer GD HKEY_CLASSES_ROOT GD HKEY_CURRENT_USER HKEY_LOCAL_MACHINE E HARDWARE aE sam security SOFTWARE H Adobe H E Apache Software Foundation E Avance covrsy Citrix Classes Clients EQ eG Agent 31 E eGurkha E ES Computing Expertcity
172. Installing and Configuring on Windows Environments 3 Finally restart the eG agent 4 Upon restarting the following files will be automatically created in the lt EG_AGENT_INSTALL_DIR gt agent logs directory gt The agentout log file which records details of the tests run and measures reported by the agent to the manager gt The agenterr log and error_log files to which the runtime errors encountered by the eG agent are logged gt The agentupgrade log file which provides the agent upgrade status 5 The errors if any will be logged in the error_log file that will be automatically created in the lt EG_AGENT_INSTALL_DIR gt agent logs directory You can switch off error logging if so required by running the debugoff bat file in the lt EG_AGENT_INSTALL_DIR gt lib directory 3 23 Performance Impact of the eG Agent The resource utiliation of an eG agent is dependent on various factors including the number of components that are being monitored by the eG agent the specific component types to be monitored the frequency of monitoring whether the agent is monitoring applications in an agent based or an agentless manner For an internal agent monitoring a single application on the server at a 5 minute frequency the agent typically consumes 0 1 0 3 of CPU Network traffic generated by the agent is about 0 05 0 2 kbps The size of the agent on disk is about 100 MB When the agent is started its memory footpr
173. JP connector comment the block by inserting the lt symbol at the beginning of the block i e just below the block header and the gt symbol at the end of the block as depicted by Figure 3 92 173 Installing and Configuring on Windows Environments KX 8 alele Bie EX Yow Inot Farm Hh osal IA al lele S acceptCount 10 debug 0 scheme http secure crue useURTValidationHack tZalse gt Factory className org apache coyote tomeat4 CoyoteserverSocketFactory clientAuth f alse protocoi TLS gt lt Connector gt gt lt Define a Coyote JK2 AJP 1 3 Connector on port 8009 gt lt lt Connector clas Name lt org apache coyote tomeat4 CoyoteConnector port S009 minProcessors S maxProcessors 75 enableLookups true redirectPort 8443 acceptCount 10 Gebug 0 connect ionTimeouc 20000 useURIValidationHack false protocolHandler las Name org apache jk server JkCoyoteHandler gt ated ad lt Define an AJP 1 3 Connector on port 8009 gt lt lt Connecter className org apache ajp tomeat4 Ajp13Connector enabicLookups talse port 7079 minProcessors 32 maxProcessorsa 2 56 acceptCount 20 debug 0 gt gt lt Define a Proxied HTTP 2 1 Connector on port 8082 gt lt e See proxy documentation for more information about using this gt Pape lt Connector className 0rg apache coyote tomcat4 CoyoveConnector port 8082 minPro
174. K KKK K KK KKK KK KK OK OK OK 2K 2K 2K OK KK OK OK OK OK OK OK 2K 2K OK In case of Solaris agents if you have chosen to configure a ColdFusion server Sybase server and a web server for monitoring then agent configuration ends only when all the three components are properly configured You can however configure each of these servers at a later point of time also without reconfiguring the agent To configure a Coldfusion server use the command opt egurkha bin setup_cf Similarly for configuring a Sybase Adaptive server use the command opt egurkha bin setup_sybase sh To configure the iPlanet SunONE web server on the agent host then configure the web adapter using the command loptiegurkha bin setup_webadapter To configure different applications at a later time for monitoring by eG please follow the steps below 66 Installing and Configuring on Unix Database Servers Configure database servers for monitoring by the eG Agent through th G user interfac Web Servers To configure any web servers running on sun08 for monitoring by th G Agent please hav achor the web server s administrators execute the script opt egurkha bin setup webadapter This script will augment the web server s startup files with eG monitoring capability Coldfusion Servers To configure a Coldfusion server for monitoring please have the Coldfusion server s administrator execute the script opt egurkha bin setup cf Sybase Adaptive Se
175. KK Once you are through with the configuration go to the SQL Server Enterprise manager Select the appropriate server followed by the databases On clicking the database folder a list of databases currently available on that server will pop up Now select an appropriate database right click on it and select Properties From the dialog box that comes up select the Data Files tab A screen as shown in Figure 2 11 below will appear 32 Installing and Configuring on Unix guitar Properties S x General Data Files Transaction Log Filegroups Options Permissions Database files Space allocated MB e Program Files Mictos 4 PRIMARY Delete File properties AJY Automatically grow file File growth Maximum file size C In megabytes fi Unrestricted file growth By percent 10 E C Restrict fle growth MB E Figure 2 11 Configuring the database 12 Here you can configure your database appropriately and save the configuration by clicking the OK button 2 2 3 Using a Microsoft Azure SQL Database Microsoft Azure SQL Database is a relational database as a service that delivers predictable performance scalability business continuity data protection and near zero administration to cloud developers and solution architects If you have already created a SQL database on Azure then you can configure the eG manager to use this database as its backend The procedure for thi
176. KKKKKKKKK To set up the eG database pleas nsure that you have an Oracle database instance running kkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk Once a database instance has been configured to conform to the sizing requirements of eG Enterprise enter y here to proceed with configuring the eG manager Do you want to continue the setup y n y Configure eG Enterprise for database access by entering the following 19 Installing and Configuring on Unix e The hostname or IP address of the server that hosts the Oracle database use the hostname if DNS is supported e The port number of the Oracle server default is 1521 e The name of an Oracle instance SID that the eG manager should use Enter the hostname or IP address of the Oracle server Enter the port number of the Oracle server 1521 Enter the name of an Oracle instance SID that the eG Manager should use egurkha 3 The eG manager requires a special database user account to store its measures The user should next enter e the eG database user name default is egurkha e the password for the database user default is egurkha KKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK Database access configuration for the eG Manager KKEKEKKKKKKKKKKEK KK KK KKKKKK KK KK KK KK KK KK KK KK KKK KKK KK KK KK KKKKKKKKKKKKKKKKKKK The eG Manager requires a special database user account to store its measures
177. L Server Authentication Password Ee Defaults Specify the default language and database for this login Database master Language lt Defaut gt 7 Figure 3 30 Creating a new user SQL Server Login Properties New Login xj General Server Roles Database Access Server Roles Server roles are used to grant server wide security privileges to a T login erver Role S System Administrators Security Administrators Server Administrators S Setup Administrators d Process Administrators O Disk Administrators Y Vp Database Creators xl Description s Ei Can perform bulk insert operation Properties Figure 3 31 Granting the requisite privileges to the new user and public roles are assigned to the user Also either provide a strong password for the user or make sure that the Enforce password policy option is disabled while creating the user Note ao profile in the SQL Enterprise Manager If MS SQL 2008 is used as the eG backend then ensure that the dbcreator securityadmin Installing and Configuring on Windows Environments While Figure 3 30 and Figure 3 31 illustrate the procedure to be followed to create a new user on an MS SQL server with SQL Server Authentication enabled remember the following while creating a user on an MS SQL server with Windows Authentication enabled e The username you specify should be that of a v
178. Locality known Bridge Water t is the name of your State or Province known New Jersey t is the two letter country code for this unit known US Is CN eG Innovations Inc OU United States O eG Innovations Inc L Bridge Water no ST New Jersey C US correct yes 45 Installing and Configuring on Unix When requested for the first and last name indicate how you will be accessing the eG manager For instance if you will be accessing the eG manager for which the certificate is being generated via the intranet then specify the IP address of the eG manager here On the other hand if the eG manager is to be accessed via the public Internet then specify the fully qualified host name of the manager eg http www manager com here Once all the required inputs are provided a keystore file will be generated in the lt JAVA_HOME_DIR gt bin directory with the lt Filename gt you had provided while issuing the command 2 4 2 2 Generating a Certificate Request Once a keystore file is generated proceed to request for a certificate from a valid certifying authority The procedure for this is as follows 1 Login to the eG manager and go to the Windows command prompt 2 Execute the following commands one after another cd JAVA_HOME bin keytool certreq alias egitlab1 keyalg RSA file lt Name_of_the_text_file gt keypass mykey keystore lt filename gt keystore storepass mykey The text
179. Manager Redundancy If you had not chosen to configure manager redundancy while configuring the eG manager then you can do so at a later point in time by executing the setup_cluster script in the opt egurkha bin directory To execute the script do the following 1 First login as the eG user 2 From the command prompt move to the opt egurkha bin directory and execute the following command setup_cluster 3 Upon execution the setup_cluster script will first request for the location of the Java home directory Pleas nter the location of your Java home directory usr jdk1 6 1 06 4 Once the location is specified setup will request your confirmation to proceed with enabling manager redundancy Would you like to enable eG Manager Redundancy y n n y 5 While specifying n at step 4 will terminate the script execution entering y will enable you to proceed with the setup by providing the IP or hostname and port number of the manager being configured Pleas nter the hostname or IP address of this host 192 168 10 87 Pleas nter the port at which this eG Manager listens 7077 e If an eG manager primary secondary in a cluster supports only an IPv6 address then its best that you configure redundancy for that manager using its hostname and not its IP address Note e If the eG manager is configured using the hostname then ensure that cluster setup is also performed using the hostname only Likewise if the eG
180. Move First Move Up Move Down and Move Last buttons adjacent to your selection to re arrange the sequence of the logging fields The desired sequence is as follows 219 Installing and Configuring on Windows Environments 11 Time Local Host Server IP Server Port Status URI stem URI QueryString CPU utilization Bytes Sent Bytes Received Time Taken Server Name Site Name User Name Client Ip Date local Internet Information Services IIS Manager AEE 6 gt S gt WIN DXMESFXBON3 gt ja 1 Be view Hep q E o L Definition Actions e Hiie ml o GY Apply Gy Start Page webadopterrie 5 S cancel q1 4 WIN DXMEBFXEONS WIN DXMEi O 2 Application Pools F Enabled few Log Files z z a Sites a a events Return To Advanced Logging FZ write to disk Help Log File Rollover Online Help schedule Daily gt TT start new log file when configuration changes Maximum duration in seconds E5400 C Maximum file size in kilobytes m Selected Fields 1D Header Name Required Default Yale Time Local time ocal No Edt Host cs Host No Server IP sip No Server Port s port No Status sc status No URI Stem cs uri stem No mere URI Querystring cs ur query No eeth CPU Utiization CPU Ltlization No Bytes Sent sc bytes No Move Down Bytes Received cs bytes No z 4 gt Move Last Select Fields Remove x 4 gt E Feature
181. N N O IN OEE OEE E EE N Figure 3 88 Stopping the 6G manager ccs ssc testre E aeaea ea ot ig savavedesvenecsdhsveusdes seed dhasnaed davevaecdvasuaed caveat TENESSE EEEE EOE E EEE 171 Figure 3 89 Selecting the Internet Information Services IIS Manager Option cc ccc esceeseceeseesceeeseescsesseecsececsecsesesseeesseesesesseseesesseeeeaseeees 172 Figure 3 90 Deleting the egurkha web site Figure 3 91 The uncommented block in the server xml file containing the AJP Connector definition 0 ccc eee eseseseceeeecseteesetseeeeseeeees 173 Figure 3 92 Commenting the AJP Connector block ceceecseseeseeseeseeeesecsecseceseeseesecsecsecseesaeesecsecsecseesaeeseesecaececsaeeseeaeeseesecaeceseaeeaeeaecaeeeserseaeeaees 174 Figure 3 93 Uncommenting the block containing the HTTP Connector port definition 175 Figure 3 94 Changes made to the HTTP 1 1 connector block 000 cceeceeeeseeceeeeeseeeeeteeeeeeeeeneenes 176 Figure 3 95 The error message that appears upon starting the eG manager on a 64 bit Windows host LITT Figure 3 96 Welcome screen of the eG agent Setup program ccescsecceseesceseeseeseeseeceeseeseesecsecsecseeeaeeseesecsecseeeeeeaeeaecsecsecseseeseaeeaeeaeeaeeeseeseneenees 178 Figure 3 97 License agreement for the eG agent osiin n aeneis iii TN KESEN EAE EE EEEN A ETAS 179 Figure 3 98 Location of the eG agent Figure 3 99 A message box requesting the user s confirmation to enable SSL supp
182. Name Type Data f D dac2w2k ab Default REG_SZ value not set m daca6ont ab DisplayName REG_SZ eGurkhaAgent H Def Watch RE Errorcontrol REG_DWORD 0x00000001 1 delcerc ab imagePath REG_EXPAND_SZ C eGurkhallib js exe Dfs ab objectame REG_SZ LocalSystem DfsDriver a start REG_DWORD 0x00000003 3 H a Re Type REG_DWORD 0x00000010 16 dmadmin E dmboot E dmio E dmload E dmserver E DMusic E Dnscache E dptizo E drmkaud E1008 E ecmon 3 E eGurkha Expand E Encryptic Mew G ERSve Find iea 2G Eventsy aA Fastfat Rename E a Fde Export 2 Fips Permissions C Flpydisk m Fs_Rec __ Copy Key Name H E Ftdisk m GoTomypc B E Gpe H A helpsvc H E Hidserv aE hpn B hpt3xx H E HTTP HTTP Filter E i2omamt wg L aa a 4 Pi My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services eGurkhaAgent Figure 3 334 Deleting the eGurkhaAgent key Likewise delete the My Computer HKEY_LOCAL_MACHINE SYSTEM ControlSet001 Services eGurkhaAgent and My Computer HKEY_LOCAL_MACHINE SYSTEM ControlSet002 Services eGurkhaAgent keys 2 2 S 2 2 2 a EE ERE E In the same manner remove the My Computer HKEY_LOCAL_MACHINE SYSTEM ControlSet001 Services eGAgentMon and the My Computer HKEY_LOCAL_MACHINE SYSTEM ControlSet002 Services eGAgentMon keys Deleting the registry keys corresponding to the agent services will only disable the services and not completely
183. New Protocol Rule Wizard E x Welcome to the New Protocol Rule Wizard This wizard helps you create a new protocol rule for this array Protocol rules determine which protocols clients can use and when Protocol rule name http_rule To continue click Next Figure 3 176 The Welcome screen of the new protocol rule wizard 14 From the Protocols list of Figure 3 177 that appears next select the HTTP or HTTPS protocols or both as need be see Figure 3 177 If the agent is to communicate with an SSL enabled manager then select HTTPS If not select HTTP Then click the Next gt button 241 Installing and Configuring on Windows Environments New Protocol Rule Wizard Protocols Select the protocols to which this rule applies Selected protocols 7 O FTF client O FTF client Read Only Figure 3 177 Selecting protocols 15 When Figure 3 178 appears click on the Next gt button therein so that the default schedule selection Always applies to the protocol rule New Protocol Rule Wizard Schedule Select a schedule for applying this rule Figure 3 178 Selecting a schedule 16 Since the protocol rule applies to the newly created client address set only choose the Specific computers option in Figure 3 179 and then click the Next gt button 242 Installing and Configuring on Windows Environments New Protocol Rule Wizard Client Type You can specify client type by us
184. OD079AF64 E 42397 1F 2CEE 48FC B64D 7F74A6EF90F0 31 F42B 4B4E 45FEA005 CASA E Ad Aware SE Personal Expand E AddressBook New E Adobe Acrobat 5 0 Find Branding D Connection Manager pal E CuteFTP Rename Desktop Calendar_ist Export DirectAnimation Permissions DirectDrawEx amp Download Accelerator Plus Beta DXM_Runtime EditPlus 2 Fontcore 2 HP LaserJet 2200 Uninstaller cw E E40 E Ie4Data IE5BAKEX lEData E ireasoning E Java Web Start kB819696 kKB823182 kKB823353 KB823559 KB823980 xp824105 E KB824141 KB824151 SSR p My Computer HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Uninstall E COBSES1 F42B 4B4E B764 45FEAQ05SC954 comprising of the eG Agent entry Copy Key Name Figure 3 332 The registry key containing an eG Agent entry Next delete the registry key by first selecting it from the tree structure in the left pane of Figure 3 332 right clicking on it and choosing the Delete option from the shortcut menu that appears see Figure 3 332 This will ensure that the eG Agent program no longer appears in the Add Remove Programs list of the Control Panel Next proceed to disable the eGAgentMon and eGurkhaAgent services To do so select the registry key corresponding to My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services eGAgentMon right click on it and choose the Del
185. R ATETEA 58 2 9 6 Installing an eG Agent on an HP UX Server Running an Itanium Processor eessseseeeeeesssererrresestererersrerrerersree 61 2 9 7 Manually Installing Uninstalling the Auto restart Feature for the eG Agent Manager seseeeeeeerererererrerree 63 2 10 Configuring the eG Agent iiieoo rtie E EERE E EN EEEE EE EE EE E 64 2 11 Enabling the eG Agent to Allow Trusted Certificates sesesesseeeesesseesesesererereesssestsesesesteeeesesertreessseerersesesesreeeeesesene 67 2 12 Silent Mode Installation of the eG Agent on Unix eecccccsceseescseesecseeecseeseesceececseesessecaeeseeecsasseesessesaeeaseaeeeeseeaees 69 2 12 1 Installing an eG Agent on Linux in the Silent Mode cece esecseeseeseeeceeceeecsecsesseeaceeesecsecseesesseeaeeaseaseeeaeens 69 2 12 2 Installing an eG Agent on Solaris in the Silent Mode 0 e ce eeeesseesceeeseeeceeseeesecaeeseeaeeeceesseesesaesaesaesaceeseaeeeanens 72 2 12 3 Installing an eG Agent on AIX in the Silent Mode oie ececssesessecseeseeeceeceesecsessessesaceesseesesseesesseeaeeaseessesaeens 73 2 12 4 Installing an eG Agent on HPUX in the Silent Mode wee eceeseeseeseeseeeceeeeesecaeeseseeeaceessecsesaesaeseesaeeeseaeseeatens 73 2 12 5 Installing an eG Agent on HPUX Host with Itanium Processor in the Silent Mode 0 cee eeseeseeseeseeseeeeeeeseens 74 2 13 Dealing with Operating System Variations kossinense iiion ie iiei ii ereinak E ideii a driik n 75 2 13 1 Deploying the eG Agent on Solaris En
186. S gt lt Connector gt Then proceed to make the changes indicated in Bold below in the SSL XML block lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector className org apache coyote tomcat4 CoyoteConnector port lt eG Manager Port gt minProcessors 5 maxProcessors 75 enableLookups true acceptCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory className o0rg apache coyote tomcat4 CoyoteServerSocketFactory clientAuth false protocol TLS keystoreFile opt egurkha manager tomcat conf lt filename gt keystore keystorePass mykey gt lt Connector gt Set the port parameter in the XML block to reflect the port number that you have configured for the eG manager Also note that two new parameters namely keystoreFile and keystorePass have been inserted into the SSL block While the keystoreFile parameter has to be set to the full path to the keystore file that you generated earlier the keystorePass parameter should be set to the keystore password that you specified while issuing the keytool command With that change the eG manager on Linux has acquired the capability to listen on two ports the SSL port and the non SSL port To configure the eG manager to listen only on the SSL port simply comment that section of the server xml file where the non SSL Coyote HTTP connector on port 8081 has been defined as indicated below lt Defi
187. S N v gt E uU L In the General tab of Figure 2 3 that appears next check whether the Multiprotocol option is available in the Enable protocols by order list If not then select it from the Disabled protocols list and select the Enable button to enable it 23 Installing and Configuring on Unix L Server Client Network Utility F tiukige eles Figure 2 3 Enabling Multiprotocol support using the SQL Client Network Utility e Finally click the Apply and OK buttons in Figure 2 3 to register the changes e Next follow the menu sequence depicted by Figure 2 4 to open the MS SQL server s Server Network Utility Windows 2000 Server e When Figure 2 5 appears check whether the Multiprotocol option is available in the in the Enable protocols by order list If not then select it from the Disabled protocols list and select the Enable button to enable it 24 Installing and Configuring on Unix E SQL Server Network Utility xj General Network Libraries Instance s on this server JEGTESTLABOT gt Disabled protocols Enabled protocols NVeLink IPX SPX AppleTalk Enable gt gt Baran Vi co lt lt Disable I Force protocol engyption Properties I Enable WinSock proxy Winsock proxy addtess Figure 2 5 Enabling Multiprotocol support using the SQL Server Network Utility e Finally click the Apply and OK buttons in Figure 2 5 to register the changes e The SQL Serve
188. To make these changes to a script file and then use it to install an agent in the silent mode follow the steps given below 1 Copy the script file to the target host 2 Open the script file in an Editor 3 Change the values of the required configuration parameters For instance to assign a different nick name to the new agent search the script file for the parameter szEdit1 then change the value of the last occurrence of this parameter to change the nick name Count 14 Dlgl ECOB5E31 F42B 4B4E B764 45FE4005C954 SdLicense 0 Dlg2 ECOBSE31 F42B 4B4E B764 45FEA005C954 SdaskDestPath 0 Dlg3 ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 0 Dlg4 ECOBSE31 F42B 4B 4E B764 45FEA005C954 AskYesNo 1 Dlg5 ECOBS5E31 F42B 4B4E B764 45FE4005C954 SdShowDlgEdit2 0 Dlg6 ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 2 Dlg ECOBSE31 F42B 4B4E B764 45FEA005C954 SdShowDlgEdit2 1 Dlg ECOBSE31 F42B 4B4E B764 45FEA005C954 AskYesNo 3 Dlg9 ECOBSE31 F42B 4B 4E B764 45FEA005C954 SdShowDlgEdit3 0 Dlgl0 ECOBSE31 F42B 4B 4E B764 45FEA005C954 SdStartCopy 0 Dlgll ECOBSE31 F42B 4B 4E B764 45FEA005C954 AskYesNo 4 Dlgl2 ECOBSE31 F42B 4B 4E B764 45FEA005C954 SdShowD1lgEditl 0 Dlgl3 ECOB5E31 F42B 4B4E B764 45FEA005C954 5dFinish 0 ECOBSE31 F42B 4B 4E B764 45FEA005C954 SdWelcome 0 Result 1 ECOBSE31 F42B 4B8 4E B764 45FEA005C954 SdLicense 0 Result 1 ECOBSE31 F42B 4B 4E B764 45FEA005C954 SdaskDestPath 0 szDir C Result 1
189. Windows 2003 this will be the Internet Information Services IIS Manager option from the Start gt Programs gt Administrative Tools menu of the IIS web server 330 Installing and Configuring on Windows Environments gt Computer Management ay Configure Your Server connection Manager Administration Kit P Data Sources ODBC gt ale Distributed File System Event Viewer 3 Netscape Communicator gt Local Security Policy GB Real gt MP Network Monitor WinZip B Performance Symantec Client Security gt Routing and Remote Access E Server Extensions Administrator By Services iJ Telnet Server Administration Terminal Services Client Creator Terminal Services Configuration Windows 200 Figure 3 323 Selecting the Internet Information Services IIS Manager option 3 From the window that appears select the IIS web server s host from the left pane right click on it and choose the Properties option see Figure 3 324 Internet Information Services IP Addres EA Default FTP Site Running All Unas S lt Web Site Running All Unass istration Web Site Running All Unas E 2 Running all Unas Running All Unass Opens property sheet for the current selection ike Figure 3 324 Editing the properties of the IIS web server s host 331 Installing and Configuring on Windows Environments 4 Upon selecting the Properties option the following dialog
190. _linux_x64 A A The agent installation must be performed from a super user account Note 2 Next specify the user account to be used for executing the eG agent First enter the name of the eG user The default value taken is egurkha Wais SCriogr wal insrtelll ta G agent Th G agent must be installed and executed by a separate user If you have installed the eG manager on the same system you must use the same user and the same installation directory for the manager and the agent Enter the name of th G user egurkha If the agent is being installed on the same system as the manager the eG user configured Note for the agent should be the same as that used for the manager 3 Enter the group to which the eG user is to be associated egurkha Then enter the group to which the eG user is to be associated with The default value taken is egurkha The installation will attempt to create the user account if it does not exist on the system If you specify an existing user name then this group prompt will not appear 4 Enter the directory in which the eG agent should be installed opt Next enter the path to the directory in which the eG agent will reside The default base directory for the eG agent is opt A subdirectory named egurkha will be created under the base directory If the base directory is not opt a symbolic link will be created from the egurkha subdirectory of the base director
191. a 2 x Lookin GenieDietoy OO CES e A lt 4 Babu Sundaram Babu E GITL4B COM EGITLA4B COM eG Testers el 1S Sridhar Sridhar EGITLAB COM EGITLAB COM eG Testers vinware_user_ EGITLAB COM Users Sivab Sivab EGITLAB COM EGITLAB COM Users zl Add Check Names lt lt Type names separated by semicolons or choose from list gt gt Figure 3 224 Selecting the users to be added to the set 265 Installing and Configuring on Windows Environments Select Users or Groups D 2x Look in A Entire Directory a AA Ae E A EA 4 Babu Sundaram Babu EGITL4B COM EGITLA4B COM eG Testers ia 3 Steve Steve EGITLAB COM EGITLAB COM eG Testers Kevin Kevin EGITLAB COM n EGITLAB COM eG Testers l EGITLAB COM eG Testes loe EGITLAB COM e f _vmware_user_ EGITLAB COM Users Sivab Sivab EGITLAB COM EGITLAB COM Users xl Add Check Names Steve Steve EGITLAB COM Kevin Kevin EGITLAB COM Tim Tim EGITLAB COM Figure 3 225 The selecting being transferred to the second list box 29 Figure 3 223 will then reappear wherein the selected users will be displayed see Figure 3 226 Then click the Next gt button to proceed New User Set Wizard Ixi Users Select users to include in the user set Namespace Domain A Windows Steve EGITLAB Add A Windows Kevin EGITLAB n A Windows Tim EGITLAB Remove Figure 3 226 Viewing the selected users 30 F
192. able logging Active log Format Jwac Extended Log File Format x Properties Figure 3 128 Enabling logging for all the web sites 4 Finally click on the Apply and OK buttons to register the changes 5 If only a few selected web sites on the IIS web server are being monitored by the eG Enterprise suite then logging needs to be enabled for those specific sites only To achieve this right click on the web site being monitored from the tree structure in the left pane the IIS Manager and select Properties from the shortcut menu see Figure 3 129 Internet Information Services 115 Manager Cs Bile Action wew Window Help ale x e om xren AlS au Internet Information Services E I EGURKHA06 local computer H Application Pools El Web Sites Default Web Site Ff Myweb or BG Web Se Explore Open Permissions Browse Start Stop Pause New All Tasks vi New Window From Here Delete Rename Refresh Export List Opens property sheet for the current selection I Figure 3 129 Selecting the Properties option for the egurkha web site 202 Installing and Configuring on Windows Environments 6 Next select the Web Site tab from the Properties dialog box and select the Enable Logging check box as depicted by Figure 3 130 Finally click on the Apply button and then the OK button ax Directory Securty HTTP Headers Custom Errors Service
193. address of the eG manager here On the other hand if the eG manager is to be accessed via the public Internet then specify the fully qualified host name of the manager eg http Mwww manager com here Once all the required inputs are provided a keystore file will be generated in the lt JAVA_HOME_DIR gt bin directory with the lt Filename gt you had provided while issuing the command 3 4 2 2 Generating a Certificate Request Once a keystore file is generated proceed to request for a certificate from a valid certifying authority The procedure for this is as follows 1 Login to the eG manager and go to the Windows command prompt 2 Execute the following commands one after another cd JAVA_HOME bin keytool certreq alias egitlab1 keyalg RSA file lt Name_of_the_text_file gt keypass mykey keystore lt filename gt keystore storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 2 1 of this document gt keyalg specifies the algorithm that was used to generate the keys this can be RSA or DSA depending upon which algorithm was used for key generation in the procedure detailed in Section 3 4 2 1 file
194. agent is operating on Windows 2008 In which case selecting the Modify option will lead you to step 3 directly The setup then provides an option for the user to configure a Coldfusion application server in his environment for monitoring as in Figure 3 155 The default option is No Question cms A Would you like the eG Agent to monitor any Coldfusion servers on this system Figure 3 155 Setup providing an option to configure a Coldfusion server for monitoring If the user desires to configure a Coldfusion server at this stage he she needs to specify the document root of the associated web server as in Figure 3 156 226 Installing and Configuring on Windows Environments eG Agent Setup Choose Destination Location Select folder where setup will install files Please enter the Document root directory of the associated Web server for the Cold Fusion server D Inetpub wwwroot Back Cancel Figure 3 156 Setup requesting for the document directory of the web server used with the Coldfusion server 3 20 Starting the eG Agent 3 20 1 Starting the eG Agent on Windows 2003 XP To start the eG agent on a Windows 2003 XP operating system just click the Start button on the task bar From thereon select Programs gt eG Monitoring Suite gt eG Agent gt Start Agent see Figure 3 157 227 Installing and Configuring on Windows Environments Figure 3 157 eG menu options to start stop and uninstall
195. aging from any combination of the following modules web email commandline ascii serial TAP in and GUI windows workstations The eG manager can be integrated with PageGate so that the alarms generated by the eG manager are sent as SMS to pagers via PageGate The sections to come discuss both these options in great detail 7 1 Integrating the eG Manager with NowSMS Lite The NowSMS Lite is a software gateway that allows sending of SMS messages using a GSM GRPS EDGE 3G modem It allows clients to submit SMS messages for delivery via the GSM modem using HTTP interface that supports HTTP GET method 354 Configuring the eG Manager to Send SMS Alerts You can integrate the eG manager with NowSMS Lite so that e the alerts generated by the eG manager are automatically converted into SMS format and forwarded to the NowSMS server through a HTTP interface e the SMS alerts received by the NowSMS server are then delivered to configured mobile phones using a GSM modem connected via serial port or USB Mobile Phone HTTP USB Serial m am am Se a a an Connection eG Manager Now SMS Server Server GSM Modem Figure 7 1 How the eG manager NowSMS Lite integration works 7 1 1 Pre requisites for Integrating eG Manager with NowSMS Lite The following pre requisites should be fulfilled before attempting to integrate the eG manager with NowSMS Lite o Make sure that a licensed NowSMS Lite software purchased from NowMobi
196. alid user to the Windows domain of which the MS SQL server is a part e The username specification should be of the format domainname username 7 The eG database is created in the MS SQL server s database using a special user account Next specify the user name and password to be used for this account Here again if Windows Authentication is enabled on the MS SQL server then the new user should be a valid Windows domain user Accordingly the user name should be of the format domainname username For eg if the name of the new user is egdb and the domain name is sig the user name you specify in Figure 3 41 should be sig egab On the other hand if Mixed Mode Authentication is enabled on the MS SQL server then the special user account you create need not necessarily be preceded by the domain name In this case therefore your user name specification can be of either of the following formats username or domainname username However if SQL Server Authentication is enabled on the MS SQL server then the user name should not be prefixed by a domain name Your specification should then be only username eG Manager Setup Database Settings The eG Manager requires a special database user account to store its measures Please enter the eG Manager database user name egdbuser Please enter the password for the above database user Retype the password lt Back Ciad Cancel Figure 3 32 Specifying the user name and pas
197. ame keystore password you provided when generating the keystore file see Section 3 4 1 1 or 3 4 2 1 as the case may be For the default certificate bundled with the eG manager the password should be eginnovations Finally the command will request your confirmation to make the imported certificate a trusted one Enter yes to trust the certificate If the processing was successful then a message stating that the Certificate was added to keystore will appear Figure 5 depicts the processing explained above 199 Installing and Configuring on Windows Environments WINNT System32 cmd exe C SAUE gt set path c progra 1 egurkha jre bin pathz C SAVE gt keytool import alias egcert file certnew cer keystore c progra 1 eg urkha jre lib security cacerts Enter keystore password changeit Ensure that the Owner CN egtesti OU Testing Lab O eG Innovation L Chennai ST Tamil Nadu name IP of th Issuer CN support OU Testing Lab O eG Innovations L Chennai ST Tamil Nadu a e of the gt C IN Emailfddress support eginnovations com manager Serial number 1438c43600600000000a Valid from Mon Jun 9 12 37 19 IST 2663 until Sun Jun 5 15 61 41 IST 2665 i Certificate fingerprints appears against MDS 23 94 DB 66 B8 98 A3 B1 23 7A DE 2E 45 C 7 5B ES SHALL EE AO Di 1D B5 CD 91 45 57 65 54 5A AA 27 23 E7 A4 7D FF 8A e 577 Trust this certificate no yes Owner CN Certificate was added to keystore C SAUE gt
198. an IIS web server check whether any other ISAPI filters pre exist If so ensure compatability of the filters before deployment 177 Installing and Configuring on Windows Environments 3 11 Installing and Configuring the eG Agents on Windows 2003 XP The standard eG agent software for Windows is provided as a self extracting set up program called eGAgent_win2003 exe for installing on a Windows 2003 Windows XP operating system By default the eG agent is a 32 bit application For agent deployments on 64 bit Windows 2003 Windows XP hosts therefore use the eGAgent_win2003_x64 exe 1 To start the installation process run the corresponding eGAgent exe file The Welcome screen see Figure 3 96 of the eG agent Setup program appears Clicking on the Next gt button at the bottom of this screen takes the user to the next step of the setup eG Agent Setup Welcome Welcome to the eG Agent Setup program This program will install the eG Agent on your computer It is strongly recommended that you exit all windows program before running this Setup program Figure 3 96 Welcome screen of the eG agent setup program 2 Now the user can view the eG license agreement see Figure 3 97 Also the setup program seeks the confirmation of the user regarding his her acceptance of the terms and conditions of the license agreement It is mandatory that the user must accept the license agreement to proceed with the setup The user now needs to go thr
199. ap eginnovations com Figure 3 79 A lock symbol in the address bar indicating that the SSL certificate used by the eG manager is a public certificate To view the certificate click the lock symbol From the options that drop down select the Connection tab page see Figure 3 80 163 Installing and Configuring on Windows Environments amp https egontap eginnovations com egontap eginnovations com Identity verified Permissions Connection The identity of this website has been verified by DigiCert High Assurance CA 3 but does not have public audit records Certificate information Oo Your connection to egontap eginnovations com is encrypted with 128 bit encryption The connection uses TLS 1 0 The connection is encrypted using AES _128_CBC with SHAI for message authentication and DHE_RSA as the key exchange mechanism Site information You have never visited this site before today What do these mean Figure 3 80 Viewing the connection details To view the certificate details click the Certificate Information link in Figure 3 80 Figure 3 81 will then appear revealing the details of the SSL certificate 164 Installing and Configuring on Windows Environments General Details Certification Path R Certificate Information This certificate is intended for the following purpose s e Ensures the identity of a remote computer Proves your identity to a remote computer
200. appkaon ad one or more server nodes a magate serce ard appie whens hom a custe arning Window Server 200 Window Server 08 o Window Server 2008 A2 O Caina aimi aispa E vahine ha Onta O Ente Oan Shared ohne Adition ou Mepa sarees gnd spec gers on w aw 3 P timate te Simaa to ahd dats i Nomgaie 0 00 Modes imos and nokan Seem Ossie 1 beon ad oitan ree can oraa ba aah eaat Under tanna Aate abdanen teats Understands Cate Sheni yane di amen to raa chae E Eann chanm oei on te wst E Ern ciam commutes on te web B Haano neoan azm on te web Figure 3 302 Choosing to configure a service or application When the wizard opens click the Next button in the welcome screen of the wizard to proceed to the next step 2 of the service configuration process 318 Installing and Configuring on Windows Environments Da ragh Availabe y Wizard t Before You Begin Thir waad configures hih awedabilty lor a service o application Alter you socesihiiy complete fhis waned d a chatered server lads whio running e serice of appkcahon arcther chntered serrer aondoa resumes the service a appkcston la process knows as faiover lf the serice or sppkcaton toed iadi can be atomancally stated ether on the came server or on another perver m te chatar Greening on opona that you pecty WW pou wart to cluster complies a p cshon such a a mal server or database appacabon see tit apokon documentaton ku nication a
201. ard 16 In the Computer name text box of Figure 3 254 specify Node2 as the name of the computer that you wish to 283 Installing and Configuring on Windows Environments add to the cluster Then click the Next button Add Nodes Wizard Select Computers The computers must be a member of the domain you specified Enter the names of the computers that will be added to the cluster Computer name Node2 Browse Selected computers Figure 3 254 Specifying the name of the new cluster node 17 Figure 3 255 that then appears will analyze the configuration required for creating the cluster Ignore the warning messages related to the Quorum and additional network card requirements The quorum will be created later and the additional network is not required by the type of cluster Majority Node Set that the eG agent requires Click the Next button in Figure 3 255 to proceed 284 Installing and Configuring on Windows Environments Add Nodes Wizard Analyzing Configuration Please wait while the wizard determines the cluster configuration Checking for existing cluster Establishing node connection s E v Checking node feasibility amp Finding common resources on nodes Checking cluster feasibility View Log Details Re snabze Click Next to continue Click Back to change the configuration Figure 3 255 Analyzing the cluster configuration 18 Enter the Password for the domain administra
202. are to a DFS namespace by Linacre wy isin inn tefl de ys AEN namespace path wall have tie mew share as a tober target T Publish the SMB share to 2 OFS namespace Parent toide n namespace Een Example Doman ame older New folder name For more information about DFS Namespaces see Namespaces Peron Net cca Figure 3 294 Accepting the default settings of DFS Namespace Publishing section Figure 3 295 then appears displaying the configuration of the File share that you intend creating Review the configuration and click the Create button therein if you want to confirm creation of a file share with the displayed settings 312 Installing and Configuring on Windows Environments P Provan a Shored oiber aw Review Settings and Creste Share Steps Shared Folder Locston NTFS Pemicnona Share Protocols SNE Sener SMB Peres sons OFS Namense Pubkiteng Son se ioe Cortenahon 16 to close the wizard To provision a shared folder with the follomang settings cick Oeste To change ary of unr aD Gua PARANA a tied On AOAI A DA ANANS ATTP ATTPEGIRACNIO2S Allow Ful Control apici ATTPATTPEGIRACNJOIS Alon Ful Control apkc NT AUTHORITYASYSTEM Aloe Ful Corbo frhened BUR TIN Acdmrusiaiors Aloy Ful Control irherted BUILTIN Wan Allow Read Execute List Fokder Contents BUR TIN Wears Alp Creute Fobders Append Data frieme BUETIN W sai Allow Gosie Fies Wite Date indented CREATOR OWNER
203. arget host with the backed up eGurkha directory and then restart the eG manager On the other hand if you want to completely scrap the existing manager installation and replace it with the backed up version then follow the steps below o Uninstall the existing eG manager o Next install the eG manager with the same specifications as the backed up manager for instance if the backed up manager was installed using Tomcat and not IIS make sure the new manager also uses Tomcat Similarly install the new manager in the same directory as that of the backed up manager However during installation make sure that you do not provide the name of the database used by the backed up manager 347 Backing up and Restoring eG Enterprise Instead provide the name of a new dummy database for use as the eG backend o Replace the eGurkha directory of the new manager with that of the manager in backup o Next run the changeManagerSettings bat and changeAgentSettings bat files from the lt EG_INSTALL_DIR gt lib directory to change the IP address host name of the eG manager and agent o Replace the old eG manager license with a new license generated for the new IP address hostname o Finally start the eG manager 5 3 Backing up and Restoring the eG Database eG uses MS SQL and Oracle databases to store its persistent data The best practices for backing up and restoring the eG database are the ones recommended by the database vendor
204. ase Server Port 1433 Database User Name 2 egdemo Figure 3 70 Summary of the installation settings 9 If the configuration process succeeds the following screen will be displayed see Figure 3 70 The Setup requires the user to restart the system This can be done immediately or at a later point of time A valid license must be obtained for the eG manager to function This license should be placed in the bin directory of the egurkha folder for e g C Program Files egurkha bin Clicking on the Finish button will exit the Setup eG Manager Setup Setup has completed installing the eG Manager Before starting the eG Manager you will need to restart the computer Please choose one of the following options O Yes want to restart my computer now No will restart my computer later valid license is required for the eG Manager to start functioning Please contact license eginnovations com to obtain the license Place this license file in the C eqgurkha bin directory Figure 3 71 Setup program indicating the completion of the eG manager installation 138 Installing and Configuring on Windows Environments 3 2 Silent Mode Installation of the eG Manager and Agents Silent mode installation is a standard way to ensure repeatability of the installation process Administrators use this process when installing the same software in multiple locations servers Usually the process of a silent install involves sa
205. ase Settings The eG Manager requires a special database user account to store its measures Please enter the eG Manager database user name eguser Please enter the password for the above database user Retype the password lt Back _ Next gt Cancel Figure 3 46 Specifying the user name and password to be used to store measures in a SQL database on Azure 120 Installing and Configuring on Windows Environments A By default the SQL database on Azure uses SQL authentication only Therefore make sure Note you specify the user name in Figure 3 98 without prefixing it with a domain name 9 The installation process then prompts the user to select the destination location for the eG manager see Figure 3 34 eG Manager Setup Choose Destination Location Select folder where setup will install files Setup will install eG Manager in the following folder To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder lt Back Next gt Cancel Figure 3 47 Location of the eG manager 10 The next step summarizes all the details that have been provided so far by the user as in Figure 3 35 121 Installing and Configuring on Windows Environments eG Manager Setup Start Copying Files Review settings before copying files Setup has enough information to start copying the program files If you want to
206. aste a base 64 encoded CMC or PKCS 10 certificate request or PKCS 7 renewal request generated by an extemal source such as a Web server in the Saved Request box Sa Certificate Template Web Server z Additional Attributes Atributos A f Internet Protected Mods On taal A Figure 2 12 Requesting for a certificate Open the text file containing the certificate request which was created using the procedure detailed in Section 3 4 1 2 above copy the contents of the file and then paste it to the text area of the Base 64 encoded certificate request text box of Figure 2 12 Then click the Submit button The certificate will thus be generated Download the certificate 39 Installing and Configuring on Unix K merosoht active Oectry Certficate Services Pe gt Bl Some Pager Safety Took gt Qe Internat Explorer has blocked this ste from using an ActiveX control in an unsafe manner As a resu this page might not display correctly Certificate Issued The certificate you requested was issued to you DER or Base 64 encoded 0 fe Internet Protected Mode Gn fa gt Rion Figure 2 13 Downloading the certificate 2 4 1 4 Importing the Certificates into the Keystore File The downloaded certificate can be in one of the following forms e Can bea single combined certificate e Can be accompanied by a certificate chain e Can be in a PEM format
207. atabase and an eG user on the MS SQL Server 2005 do the following 1 Open the SQL Server Management Studio follow the menu sequence depicted by Figure 3 51 chr M T Crei ICA Clent T Java 2 SDK Standard Editen v1 3 1_15 gt i wer i ea J 11 39AM Figure 3 51 Opening the SQL Server Management Studio 2 Login using the sa user by providing the appropriate password 3 Next from the tree structure in the left pane of the Microsoft SQL Server Management Studio select the Databases node right click on it and select the New Database option to create a new database for the eG manager see Figure 3 52 124 Installing and Configuring on Windows Environments a Microsoft ver Management Studio Figure 3 52 Selecting the New Database option 4 In the right pane of Figure 3 53 that appears enter the name of the eG database and click the Add button therein 125 Installing and Configuring on Windows Environments E New Database Select 3 page gt General ia Options Database name eadtt Fiegroups Quine edetauk gt ee I Use fulltext indexing Database fles Data PRIMARY i By 1 MB urrestncted growth egdb_kg Log NotApplicable 1 By 10 percent urvestiicted growth Server EGURKHASAP Cormectiorc sa 5 View connection properties Ready i Add Remove Figure 3 53 Creating the eG database 5 You will then return to the main wi
208. be installed from a super user account Note The steps involved in installing the eG manager are as follows 1 To start the installation process locate the eGmanager_linux tar and iManager_linux files in the same directory and execute the iManager_linux command We recommend that eG Enterprise be executed by a special user account that is exclusively created for this purpose Next the installation process attempts to create the eG user account For this process to continue specify the user account to be used for executing eG Enterprise The default value is egurkha This script will install the eG manager The eG manager must be executed by a separate user If you have already installed the eG agent both the manager and agent must use the same user accounts and must be installed in the same directory Enter the name of th G user egurkha Enter the directory in which the eG manager should be installed opt Next the installation process prompts the user to choose the path of the directory in which the eG manager is to reside If possible the eG manager should be installed in the opt directory If space considerations preclude this the eG manager can be installed in any other directory on the system At the end of the installation process a symbolic link is created to link the installation directory eg usr egurkha to the optiegurkha directory Also specify the group to which this user account should be assoc
209. being configured is to be set as the primary manager Is this a primary eG Manager y n n n If the current manager is not a primary manager i e if n is specified at step 21 then it means it is a secondary manager Therefore proceed to provide the IP address and port number of the primary manager with which this secondary manager communicates Pleas nter the hostname of the primary eG Manager 192 168 10 59 Pleas nter the port of the primary eG Manager 7077 e A target environment can have only one primary manager and one secondary manager e An admin user can login to the primary manager only e When running setup_cluster on a secondary manager make sure that you specify the IP hostname of the primary manager depending upon how you have configured the cluster in the primary manager In other words if when running setup_cluster on the primary manager you have provided the IP address of the primary manager then make sure that you provide the IP address only when setup_cluster prompts you for the details of the primary manager on the secondary manager 18 Installing and Configuring on Unix 22 23 Finally indicate whether the primary manager uses SSL or not by specifying y or n Please indicate if your primary eG Manager uses SSL y n n n Once this is specified the setup_cluster script will exit and the setup_manager script will resume n A While configuring multiple managers ensure
210. bout the conect way to naiai Figure 3 303 The welcome screen of the High Availability wizard 3 When Figure 3 304 appears select the Generic Service option and click the Next button Da iagh Availabilty Wizard es Select Service or Application Betore You Begn Select the service of appkcation that you mani to con gae ke high availabilty DFS Namespace Server Deserpten P OHCP Server You can contgure haf are ababdty tor Distitted Transacton Coodinater DTC some serene that mere net ongeaihy P Fhe Server designed lo an on chaie Formare a r omsion see d Gerenc Apg cadon Geren Sot Anss hed Q irora Snoeage Name Service ISNS Server rigan Hy vaita ag Manege uning zj ED on T EGON EN __Corca_ Figure 3 304 Selecting the Generic Service option 4 In Figure 3 305 select the eGurkhaAgent service from the list of services displayed therein and click the Next button 319 Installing and Configuring on Windows Environments High Availabiity Wizard Select Service t Select the sence you wart to use hom Ge kat winor miga Hep Digorit Serca Host Dargnostic System Host Dai Deh agrartm Daitsted Link Tischrg Cieri DNS Cieri eG griMon Encrypting Fie Sprter EFS Erterabie Authentic ahon Protocol The Diagnosi Policy Service enables protien The Disgrentae Service Host it used by the Dia The Daagrestic System Host i used by the Diag Prowsders Dak Oetragmert ation Capsb im Martane irks
211. box needs to be selected Also ensure that the Integrated option is deselected To make sure that all users are authenticated by the ISA proxy server before allowing access select the Require all users to authenticate option in Figure 3 237 Specify authentication methods and settings used to authenticate clients connecting to the ISA Server computer Help about authentication Method gaits Descriction A A O Digest O Integrated Basic O ss certificate o F rapius Authenticates a user using the RADIUS protocol Authentication Servers Select a default domain For authentication Solect Domna Select RADIUS servers for authentication RADIUS Servers Figure 3 237 Selecting an Authentication option 41 Next assign a default domain for authentication by clicking on the Select Domain button in Figure 3 237 Figure 3 238 will then appear wherein a domain name needs to be provided Then click on the OK button in Figure 3 238 Authentication Domain The default Windows domain used For authentication is the local domain where the ISA Server is active IF a domain other than the default local domain should be used for authentication specify the domain name of that domain Domain Name EGITLAB COM E OK Cancel Figure 3 238 Assigning an authentication domain 272 Installing and Configuring on Windows Environments 42 You will then return to Figure 3 237 where once
212. box will appear see Figure 3 325 egtest02 Properties 21x Internet Information Services Server Extensions m Master Properties Edit the properties inherited by all sites created on this computer Master Properties www Service head HT Enable Bandwidth Throttling Limit network bandwidth available for all Web and FTF sites on this computer Maximum network use fi 024 kb s m Computer MIME Map Configure the MIME types for all web E sites on this computer Edit OK Cancel Apply Help Figure 3 325 The Properties dialog box 5 As indicated by Figure 3 325 select WWW Service from the Master Properties list and click the Edit button to edit the properties of the selected service Doing so will result in the display of a dialog box containing many tab pages Click on the ISAPI Filters tab page see Figure 3 326 WWW Service Master Properties for egtest02 g x Documents Directory Security HTTP Headers Custom Errors Service Web Site Operators Performance ISAPI Filters Home Directory Filters installed here are active for all web sites on this computer and are executed in the order listed below These filters are not displayed on individual web sites Add Remove Compression WebTransFilter High md 5filt Low _ fat fpexedil dll Low Disable eG s WebTransFilter Cancel Apply Help Figure 3 326 Viewing the
213. button 329 Installing and Configuring on Windows Environments 3 eG Agent Setup Welcome Modify repair or remove the program Welcome to the eG Agent Setup Maintenance program This program lets you modify the current installation Click one of the options below C Modify amp Select new program features to add or select currently installed features to remove Repair F Reinstall all program features installed by the previous setup i vE Remove all installed features InstallShield E Figure 3 321 Uninstalling the eG agent This process requires the confirmation of the user to remove the package and its related components as in Figure 3 322 Click the OK button Confirm File Deletion 3 xj Do you want to completely remove the selected application and all of its components Cancel Figure 3 322 Uninstall process seeking the confirmation of the user to delete the eG agent 3 30 1 Removing the WebTransFilter You are strongly advised to manually remove the WebTransFilter if configured on an IIS web server running on Windows 2003 after uninstalling the eG agent monitoring that server This is because the IIS web server when up and running will not permit the eG agent uninstall procedure to automatically remove the WebTransFilter To manually remove the WebTransFilter do the following 1 2 Stop the IIS web server Select the Internet Services Manager option in
214. cations running on the host by using the nick name IP address While providing multiple nick Note names ensure that they are separated by a Also ensure that a nick name does not contain any white spaces and that all nick names are in lower case 14 If the configuration process succeeds the following screen will be displayed see Figure 3 125 Clicking on the Finish button will exit the Setup 195 Installing and Configuring on Windows Environments eG Agent Setup Setup has completed installing the eG Agent Figure 3 125 The completion of the eG agent setup It is not necessary to reboot a server after installing the eG agent on Windows If certain supported Microsoft operating systems and applications are to be monitored in an agentless manner then in order to enable the eG remote agent to collect measurements from these applications using Perfmon counters the following are required A remote agent can monitor a Windows environment only if it is installed with a domain administrator s privileges NetBIOS should be enabled on the target host PerfMon should have at least READ access to the Perflib LanguagelD subkey on the remote computer which allows external access to PerfMon The Perflib LanguageID subkey is located in the following Registry path HKEY_LOCAL_MACHINE Software Microsoft WindowsNT CurrentVersion Perflib Langua gelD The LanguageID is a numeric code for the spoken language of the insta
215. ce should be created KKKEKKKKKKKKKKKKKKKKKKKKK KK KK KKKKKKKKKK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK Database access configuration for the eG Manager KREKEKKKKKKKKKKEKKKKKKK KK KK KK KK KKKK KK KK KK KK KK KK KK KEK KK KKKKKKKKKKKKKK KK KK KK The eG Manager requires a database to store its measures Do you want to use an existing database y n y n If you choose to use a new database press n and proceed to specify the name of the new database Enter the new database name egurkha 28 Installing and Configuring on Unix As new database creation warrants administrator privileges the credentials of the administrator will then be requested New database creation requires database administrator privileges Enter the DBA user name eg sa or in the form domainname db admin username sa Enter the DBA password If Windows Authentication is enabled on the MS SQL server then ensure that the credentials of a valid Windows domain user with database administrator privileges are provided when setup requests for a DBA user name Also make sure that the user name is of the format domainname username For eg if the name of the database administrator is dbadmin and the domain name is chi the user name you specify should be chi dbadmin On the other hand if Mixed Mode Authentication is enabled on the MS SQL server then the database administrator name that you specify need not necessarily be preceded by the domain name In this cas
216. ces node in the tree expand its GetAscii sub node and select Settings see Figure 7 20 370 Configuring the eG Manager to Send SMS Alerts 10 When Figure 7 20 appears select the Enabled check box to enable the GetAscii interface and then proceed to provide a Polling Directory and a Polling Interval At a configured Polling Interval the GetAscii interface polls the Polling Directory for any messages to be sent out via pager To ensure that the GetAscii interface polls the tmp directory of the eG manager for SMS messages to be paged set lt EG_MANAGER_INSTALL_DIR gt tmp as the 11 PG Admin PageGate Program Database Scheduler H GetMail H GetSerial H S GetTap f GUI Client H A GetWeb H T Connectors Carriers 95918603 Recipients Logging Reports Vv DeGun a ETJ Figure 7 21 Configuring ASCII settings Polling Directory Finally click the Apply button Then proceed to start the GetAscii interface For that right click the GetAscii sub node of the Interfaces node in the tree structure and pick the Start option from the shortcut menu that appears 371 Configuring the eG Manager to Send SMS Alerts PG Admin Program Database Scheduler Interfaces GUI Client ae GetWeb f Connectors 4 Carriers 95918603 eg SingTel E Settings Recipients Groups Logging Reports Figure 7 22 Starting the GetAscii interface 12 You can confirm whether the interface ac
217. cess Typically the IP range specified here should include the IP addresses of the agents in 236 Installing and Configuring on Windows Environments your internal network which need to communicate with the manager outside the network Finally click on the OK button to register the specifications If the agent IPs do no fall within a specific IP range then add each of the IPs as a separate client set For example if manager communication is to be enabled for the agents 10 0 0 10 and 10 0 0 95 then add 10 0 0 10 as a separate client set by specifying the same IP against the From and To fields Similarly add 10 0 0 95 as a separate client set Add Edit IP Addresses Client set IP addresses From 10S core Cancel Figure 3 167 Adding an IP range 5 Clicking on the OK button in Figure 3 167 will lead you back to Figure 3 166 but this time the Include these IP 6 addresses section therein will list the newly created IP range see Figure 3 168 Client Set xi Name Internal client Description Include these IP addresses From To 10 0 0 1 10 0 0 15 Edit Delete OK Cancel Figure 3 168 The details of the new client set being displayed Upon clicking on the OK button in Figure 3 168 you will return to Figure 3 165 The Current client computer sets section in this page will now display the name of the newly created client set see Figure 3 169 237 Installing and Configuring on Win
218. cessors 5 maxProcessors 75 enableLookups true acceptCount 10 Gebugr 0 connect ionTiweout 20000 proxyPort 30 useURIValidationHack false gt gt lt Define a non SSL legacy HTTP 1 1 Test Connector on port 8083 gt Cy lt Connector className org apache catalina connector http HttpConnector porc S083 minProcessors 5 maxProcessors 75 enableLookups lt true redirectPort 6443 ncceptCount 10 debuge 0 gt __ si For Help press Fl 5 Figure 3 92 Commenting the AJP Connector block 6 Next proceed to open any of the HTTP connector ports by uncommenting the corresponding connector definition block by default this block will be commented To uncomment the block remove the lt symbol at the beginning of the block i e just below the block header and the gt symbol at the end of the block as depicted by Figure 3 93 If the eG manager is SSL enabled then you will have to open the SSL HTTP 1 1 definition For Note a non SSL eG manager open the non SSL HTTP 1 1 definition 174 Installing and Configuring on Windows Environments B server xml WordPad E lej xj Ee Edt yew Insert Format Help olala SI al gt e Sl VAL a papsvuLu VALUE Ua UNANJEAL AUL VULH LIG VCLLALACALE ana the keystore itself By default DNS lookups are enabled when a web application calls request getRemoteHost This can have an adverse impact on performance so you can
219. chart jar D PROGRA 1 ss Itest egurkha lib mail jar D PROGRA L ss Itest eg urkha Tibipop3 Jar D ApRocha Nes TrestregurkhaNlibAparser Jar D NPROGRA TAsSTtesthegurkhamanageripJaipja Jar D oa Iss Itest egurkha manager p a rtgr aphics Tar 3D AEROGRA INTS test egurkha manager tomcat shared classes C JDK13 1 1_0 1ib tools jar C IDK13 1 1_o lib dt jar c IDK13 1 1_o0 jre lib rt jar pb prRoGRA 1 ssItest ecurkha 1 ib eg_util jar D PROGRA 1 BRO a ar ag peel Jar ES adage lee Vegur haNlibichar t ext Jar Pa Rae ae TEST ecurkha lib ja Hee eee ee eee ee eee ee ee IBAT ext Jar 0 PROGRA L ssTtestiecurk a lib jnet jar D PROGRA 1 ss5 1test eG lib jcert jar D PROGRA 1 ssItest ecurkha lib jsse jar set classpath eg_classpath set EGURKHA_INSTALL_DIR D PROGRA 1 s5 Itest egurkha set JAVA_HOME C JDK13 1 1_0 net stop egurkhaTomcat 2 gt D PROGRA 1L ss Itest egurkha ib startmanager_err txt 1 gt D PROGRA L ss Itest egurkha lib startmanager_out txt del D PROGRA 1 ss Itest egurkha manager tomcat webapps final wEB INF 1 ib eg_manager jar e opy D PROGRA 1 s5 Itest egurkha lib eg_manager jar D PROGRA 1 ssItest egurkha manager tomcat webappsfinaT wEB INF Tib cls echo starting the eG Manager components G net start egurkhaTomcat 2 gt D PROGRA 1 s5 Itest egurkha lib startmanager_err txt 1 gt D PROGRA L ss Itest egurkha lib startmanager_out txt 6c IDK13 1 1_O bin java exe c Di PROGRAWI SS test equrk
220. coded binary X 509 CER Base 64 encoded X 509 CER Cryptograph E Include a ic Message Syntax Standard PKCS 7 Certificates P7B certificates in the certification path if possible Personal Information Exchange PKCS 12 PFH T Include a certificates in the certification path if possible Delete the private key if the export is successful F Export al extended properties Microsoft Serialized Certificate Store 557 Learn more about certific ate File formats lt Back Cancel Figure 3 83 Converting the certificate into PEM format 8 You will now be prompted for a File name Provide a name for the converted digital certificate and click Next 3 5 Starting the eG Manager 3 5 1 Starting the eG To start an eG manager on a Window Manager Without SSL Support s 2008 Windows 7 server administrator privileges are required In this case therefore follow the Start gt Programs gt eG Monitoring Suite gt eG Manager menu sequence right click on the Start Manager menu option and pick the Run as administrator option If the manager starts successfully the following message appears 167 Installing and Configuring on Windows Environments Starting the eG Manager compo Starting the admin components Starting the eghelp components 9999999999990 The eG manager has been started successfully Please go to the Browser and type the following URL http
221. conasesassvensozesnsanaaveveneazecs Figure 3 258 Figure 3 259 Figure 3 260 Figure 3 261 Figure 3 262 Figure 3 263 Figure 3 264 Figure 3 265 Figure 3 266 Figure 3 267 Figure 3 268 Figure 3 269 Figure 3 270 Figure 3 271 Figure 3 272 Figure 3 273 Figure 3 274 Figure 3 275 Figure 3 276 Figure 3 277 Figure 3 278 Figure 3 279 Figure 3 280 Figure 3 281 Figure 3 282 Figure 3 283 Figure 3 284 Figure 3 285 Figure 3 286 Figure 3 287 Figure 3 288 Figure 3 289 Figure 3 290 Figure 3 291 Figure 3 292 Figure 3 293 Figure 3 294 Figure 3 295 Figure 3 296 Tracking the progress of the new node addition cceeseceseeseeseeseeseceececeeseesecsecsecseceeeaeeseesecsecseceaeeseeseeaecseceeseeeeaeeaeeaeeeeeesereeaeens 287 Clicking the Finish button cccceceecceceeceeceeteesecseeeeceeeeeeeseeaeeaees NODE2 appearing as a sub node of the EXTERNALAGENT node Adding the eGurkhaAgent service as a cluster resource 00 Providing th details of the New cluster TESOUICeeccises ciescvcuecscncarcessvcunescavcayedeosceccadaveasanesveecuncvansceevesaust covenseaeedvavstevveaseasssesesnsuweteees Adding nodes to the Possible owners listes sorore eni ooe eo EEE casvesccabsvedcasusvenccuhevades eobeuecanhevadecessvencoheoaasecebsvenecte Adding available resources to resource dependencies Viewing the service name issi toeten eiretie te ITE ANTEE A VEEE EE EER EEE REEE EEE EEA Finishing Clust
222. cvf tmp eGagent_solaris tar egurkha Manual installation will also automatically create a silent_install script and an iAgent_solaris in the loptiegurkha bin directory of the agent host Copy these two script files as well to the temporary folder ay tmp Then copy the eGagent_solaris tar silent_install and iAgent_solaris files to any location say tmp on that Solaris host on which you want to install an eG agent in the silent mode Next login as root user to the target Solaris host and edit the silent_install script so that it contains the inputs required for the agent installation on that host For this follow the procedure explained in step 4 of Section 1 1 of this document Once all the aforesaid parameters are configured with the values relevant to your agent installation save the file Eal Make sure that the eGuser account exists on the target system before you run the silent_install script Provide execute permissions for the silent_install script and run the script on the target host To grant execute permissions issue the following command from the directory that holds the silent_install script say tmp chmod x silent_install Upon successful execution of the script the eG agent will be automatically installed and started on the host 72 Installing and Configuring on Unix If the silent install script on a target Solaris host fails with the exception su No directory it indicates that the eG user on
223. d in the eG admin interface for the application that is managed using that agent s IP address For instance if no nick name has been assigned to the eG agent on host 192 168 10 10 and a Windows server has been managed on this host with the nick name win10 using the eG admin interface then this nick name will be automatically mapped to the eG agent on the IP address 192 168 10 10 352 Configuring eG Enterprise to Work in NATed Environments e If you have already assigned nick names to one more agents in your environment then setting UpdateNicks to Yes will not change the original nick assignments of those agents e If UpdateNicks is set to Yes then for this setting to take effect you need to enable auto upgrade for all eG agents for which nicks are to be automatically assigned e By default it will take 1 day for the eG manager to update all eG agents with nick names To override this default setting do the following o Follow the Agents gt Upgrade gt Enable Disable menu sequence in the eG admin interface o Select the Upgrade Settings option from the AGENTS UPGRADE page that appears next Alternatively you can also follow the menu sequence Agents gt Upgrade gt Settings to access this page o Then from the How often agents should check for Auto Upgrade package list box select the time interval at which you want the eG agents to be updated with nicks o If you want the updates to occur within the ne
224. d line indicates those inputs that can change according to the requirements of your environment These inputs have been described below alias an alias name for the certificate being generated keypass a password used to protect the key that is generated ensure that you provide the same values for keypass and storepass gt keyalg specifies the algorithm that is used to generate the keys The options are as follows o DSA Digital Signature Algorithm o RSA An algorithm used for publick key cryptography gt keystore the keytoo command stores the generated key in a keystore file provide a name for this file as input to the keystore command gt keysize the size of the key that is generated the default key size is 1024 bits the key size must be in the range 512 bits 1024 bits gt validity indicates the number of days for which the key certicate will be valid 1095 days refer to 3 years The command upon execution will request the following inputs What is your first and last name Unknown lt Type the eG manager s IP address fully qualified host name here gt What is the name of your organizational unit Unknown United States What is the name of your organization Unknown eG Innovations Inc What is the name of your City or Locality Unknown Bridgewater What is the name of your State or Province Unknown New Jersey What is the two letter country code for this unit Unknown
225. d validation failed The password does not meet Windows policy requirements because it is too short Microsoft SQL Server Error 15116 Figure 3 56 The error message that appears if a strong password is not provided when the password policies are being enforced 8 Finally register the changes by clicking on the OK button in Figure 3 55 9 Now log out of the Microsoft SQL Server Management Studio and relogin as the newly created eG user say John 10 Try accessing the eG database that you had previously created say egdb by clicking on the corresponding database name under the Databases node in the left pane of the studio Doing so invokes the error message depicted by Figure 3 57 128 Installing and Configuring on Windows Environments Microsoft SQL Server Management Studio my Xt x The database eadb is not accessible ObjectExplorer aa Figure 3 57 The error message that appears if the eG user does not have access to the database that is to be used 11 12 This error message appears because the user john has not been allowed access to the egdb yet To provide access to the egdb database to user john login to the SQL Server Management Studio as the sa user Then expand the Logins sub node in the Security node of the tree structure in the left pane of the studio right click on the john node therein and select Properties see Figure 3 58 Rx Microsoft SQL Server Management Studio Eile Edt W
226. d x Welcome to the New Access Microsoft Rule Wizard Internet Se amp Acceleration 2004 This wizard helps you create a new access rule Access tules define the action that is taken and the protocols that may be used when specified clients from one network attempt to access specific destinations or content on another network Access rule name feGCommn To continue click Next lt Back Cancel Figure 3 200 Providing a name for the access rule 6 Next indicate the action to be taken when the rule conditions are met To deny access select Deny and to permit access choose Allow see Figure 3 201 Since we need to allow the eG agent to communicate with the eG manager choose Allow New Access Rule Wizard xi Rule Action Select how client requests for content from the specified destination are dealt with if the conditions specified in the rule are met Action to take when rule conditions are met O Me C Deny lt Back Cancel Figure 3 201 Selecting Allow or Deny 7 From Figure 3 202 that appears select the protocols to which this rule applies As the proxy server needs to support only the HTTP and HTTPS communication between the manager and the agent choose the Selected Protocols option from Figure 3 202 and click the Add button therein 254 Installing and Configuring on Windows Environments New Access Rule Wizard E xi Protocols Select the protocols th
227. ded log definition displayed in the list of log files that pre eXist eee ecesceceesecseeeesseeesetsesecseeecsesaeeeeaseees 221 Figure 3 151 Changing the server log and default site log directories ececeseeteeees Figure3 152 Enabling advanced log ging i cacesurevceasvsecacasuetva es asteceanaena vase seduranapuscon euavasause ance capuavasessn ues RETIREE ETR A ETER Figure 3 153 List of log files saved to the AdvancedLogs directory ccccecessseseesecseeeseeseeseesecsecsecseceseeseesecsecsecsaeeaeeaesaecsececeeseaeeseeaecaeeeeeeseneenees Figure 3 154 Viewing the log file Figure 3 155 Setup providing an option to configure a Coldfusion server for monitoring Figure 3 156 Setup requesting for the document directory of the web server used with the Coldfusion SOLVED EATE TTE 227 Figure 3 157 Figure 3 158 Figure 3 159 Figure 3 160 Figure 3 161 Figure 3 162 Figure 3 163 Figure 3 164 Figure 3 165 Figure 3 166 Figure 3 167 Figure 3 168 Figure 3 169 Figure 3 170 Figure 3 171 Figure 3 172 Figure 3 173 Figure 3 174 Figure 3 175 Figure 3 176 Figure 3 177 Figure 3 178 Figure 3 179 Figure 3 180 Figure 3 181 Figure 3 182 Figure 3 183 Figure 3 184 Figure 3 185 Figure 3 186 Figure 3 187 Figure 3 188 Figure 3 189 Figure 3 190 Figure 3 191 Figure 3 192 Figure 3 193 Figure 3 194 Figure 3 195 Figure 3 196 Figure 3 197 Figure 3 198 Figure 3 199 Figure 3 200
228. dger tint dM kha ea Ay onl Naas hie ae HLL Nr pel ine jar D PROGRA kace ltestyegurkhas Tibi ldap dk Jar D APROGRALyssItestiegur ha manager tomcat server lib D PROGRA 1 ss5 Itest e urkhannanag er tomcat common lib serv let jar D PROGRA 1 ssltest egurkha manager tomcaticommoni Tib ant jar D PROGRA 1 ssTtest egurk A TE Ned troubleticket arya procna d ss Itest egurkhalib eg subecr Tbermanagement jar D pRosued ss test qurehaynanane r tomcat bin bootstrap jar D PROGRA 1 ss5 Itest egurkha manager tomcat common 1ib activation jar D PROGRA 1 Ss5 Itest egurk ha lib Acme jar D PROGRA 1 ss Itest egurkha lib chart jar D PROGRA 1 ss Itest egurkha lib mail jar D PROGRA 1 ss Itest eg He a eee ee eee eee ee ee EOE ena T IDAparser Jar p APROGRA IASSTtesthegurkha managerip aip a Jar Oe ear Ass Trest egurkha manager p a rtgr aphics Jar 3D PROGRA L ss test egurkha manager tomcat shared classes C JDK13 1 1_0 1ib tools jar C IDK13 1 1_o lib dt jar c IDK13 1 1_0 jre lib rt jar Db pRoGRA L ss Itest ecurkha 1 ib eg_util jar D PROGRA 1 hee test iecur khat Upc supermanager hal p PROGRA Z sS ake Act eg pet ala ect a WP uel ea SE ecurkha lib ja Roe eee eee a ee ee eee ae IBNITExT Jar D PROGRA I ssTtest ecurk a lib jnet jar D PROGRA 1 ss Itest eG urkha lib jcert jar D PROGRA 1 ss5 Itest ecurkha lib jsse jar set classpath eg_classpath set EGURKHA_INSTALL_DIR D PROGRA 1 s5 Itest egurkha set JAVA_
229. disable it by setting the enableLookups attribute to false When DNS lookups are disabled request getRemoteHost will return the String version of the The header of the block _ig IP address of the remote client that defines the HTTP connector lt Connector className org apache coyote tomeat4 CoyoteConnector port 8e8e minProcessors S maxProcessors 75 The uncommented block enebleLookups true redirectPorty 6t43 ini TT acceptCount 10 Gebug 0 connect ionTiweout 20000 defining the H P useURIValidationHack false gt connector lt Note To disable connection timeouts set connectionTiweout value to g gt lt Define a SZL Coyote HTTP 1 1 Connector on port 5443 gt mie lt Connector className org apache coyote tomeat4 CoyoteConnector port 8443 minProcessors S maxProcessors 75 ena LleLookups true accepeCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory className org apache coyote tomeat4 CoyoteServerSocketfactory clientAuth false protocoi TLS gt lt Comnector gt e lt e Define a Coyote JK2 AvP 1 3 Connector on port 8009 gt lt Connector className org apache coyote tomcat4 Coyoreconnector port S009 minProcessors 5 maxProcessor2 75 enableLookups lt true redirectPort 6443 acceptCount 10 debug 0 connectionTimeout 20000 useURIValidationHack false F For Hep press Figure 3 93 Unc
230. dows Environments 8 Microsoft Internet Security and Acceleration Server 2000 Administration __ 5 x action view e gt Elm e Tree Configure Client Address Sets EGISASERVER Array Client address sets include one or more computers For access policy rules client address sets include computers that are on your intemal network For publishing policy rules client address sets include computers extemal to your network GIG Internet Security and Acceleration Server 2000 B Arrays E EGISASERVER Array e Monitoring Server SF Access Policy m Publishing E Bandwidth Rules E G Policy Elements E Schedules Bandwidth Priorities E Destination Sets SJ Client Address Sets E Protocol Definitions E Content Groups fs Cache Configuration Monitoring Configuration Extensions ER Network Configuration Client Configuration fb H323 Gatekeepers Curent client computer sets internal client fii Invoke User Manager Delete client set Modify client address sets Figure 3 169 The name of the new client being displayed Once the client address set is created proceed to configure the destination sets A Destination set represents that particular external IP range of external IPs that the computers in the internal network are allowed to communicate with To add a new destination set first click on the Destination Sets node in the tree structure o
231. e 323 Installing and Configuring on Windows Environments check box corresponding to the other node You can also have both nodes as the owners of the clustered resource and configure the order of preference i e which node should be owner 1 and which should be owner 2 To toggle the order use the Up and Down buttons adjacent to the Preferred owners box Then click the Apply and OK buttons in Figure 3 313 to save the changes you made ATIP EGIRGen tc Properties for thes service appica on Use the buom to bet then n order from most peatened af he lop to beast geetemed af the bottom Pretened owners B ATTPEGRaACKON 5 T Enatie persistent mode tuto het Suas Fated Node ATTPEGIRAONJOI Figure 3 313 Configuring the preferred owners of the clustered eGurkhaAgent service 14 Finally bring the service online For this right click on the node representing the clustered service in the tree view in the left panel of the Failover Cluster Manager and choose the Bring service or application online option see Figure 3 314 324 Installing and Configuring on Windows Environments X E Failover Cluster Manager Op ATTAEGRAOOD ate cd MB servees anc appicatons sfa Create tatower Anei vakdate Medam tor potent laire cA ard peta confgaahon Changes to you ishe cister Ot es Computer hat mh together to moesie the wesistilty of services and sppaceters The chutesed servers called noder me conmected ty physcal cable ard by
232. e then follow the steps below to import that certificate into a keystore file 1 Run the following command from the command prompt to export the certificate and private key file into the pkcs12 format openssl pkcs12 export in certificate crt inkey private key certfile certificate crt name My certificate out keystore p12 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below in the name of the certificate that is included in the PEM container inkey the name of the private key file the PEM container consists of certfile the name of the certificate that is included in the PEM container name Provide a unique name for the certificate file that is being exported Y Y VV V out Specify the name of the keystore file to which the certificate and private key are to be exported The keystore file can have any name of your choice 42 Installing and Configuring on Unix Next you need to convert the keystore file which is currently in the pkcs12 format into the Java keystore i e JKS format For this issue the following command at the command prompt keytool importkeystore alias egitlab1 deststorepass mykey destkeypass mykey destkeystore keystore jks srckeystore keystore pk12 srcstoretype PKCS12 srcstorepass mykey The text in Bold in the above command line indicates those inputs tha
233. e therefore your user name specification can be of either of the following formats username or domainname username However if SQL Server Authentication is enabled on the MS SQL server then the database administrator name should not be prefixed by a domain name Your specification should then be only username By default manager setup displays the sa user name at this prompt If due to security concerns you decide not to use the sa user name and password then you can create a user with the following server roles Security Administrators and Database Creators and then provide that user s credentials when setup prompts you for the DBA s user name and password Figure 2 10 depict how to create a new user with the aforesaid privileges using the SQL Server Enterprise Manager SQL Server Login Properties New Login 3 xj General Server Roles Database Access amp Name Jequser Authentication Windows Authentication Deny access z SOL Server Authentication Password pam Specify the default language and database for this login Defaults Database master ead Language lt Default gt Y Cancel Help Figure 2 9 Creating a new user 29 Installing and Configuring on Unix SQL Server Login Properties New Login x General Server Roles Database Access Server Roles 54 Server roles are used to grant server wide security privileges to a login erver Role C
234. e Generate a certificate request e Submit the certificate request to the internal certificate Authority CA and obtain a certificate e Import the certificate into a keystore e Configure Tomcat for using the keystore file Each of these steps has been discussed in the sections that follow 2 4 1 1 Generating the Keystore File The keystore file stores the details of the certificates necessary to make the protocol secure Certificates contain the information pertaining to the source of the application data and helps validate the source To generate the keystore use the keytool command For this purpose login to the manager and go to the shell prompt Then execute the following commands one after another cd JAVA_HOME bin keytool genkey alias egitlab1 keyalg RSA keypass mykey keystore lt Filename gt keystore storepass mykey keysize 2048 validity 1095 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below alias an alias name for the certificate being generated keypass a password used to protect the key that is generated ensure that you provide the same values for keypass and storepass gt keyalg specifies the algorithm that is used to generate the keys The options are as follows o DSA Digital Signature Algorithm o RSA An algorithm used for publick key cryptography gt keystore the key
235. e a a aS OSEE EEEn a R DE EEEE EiS E EENE ENERE 350 6 4 Managing Agents in Multiple Private Networks ssesssssssssssssestsrsrsrsreresesrstststsreserenrsrerstsrerestntnrsrstntetestsrnrsrststerererstet 351 CONFIGURING THE EG MANAGER TO SEND SMS ALERTS csccssssssssssssssscssessssenscesssessecesssssenecessssuseceseesseeseseesees 354 7 1 Integrating the eG Manager with NowSMS Lite ssesesiesisorssossinesisetonisssisuoistsisosiuocosisaeissenisiass uneis ousa oeiia ois 354 7 1 1 Pre requisites for Integrating eG Manager with NowSMS Lite occ eceeceeeneceeseeseeeceeeeesesseesesseeaeeeseeees 355 7 1 2 Verifying the Proper Setup of the NowSMS Lite Software 0 eeeesesseescesseseseeeeesessesseeeeeecesseesesaetaeeeseeeseeaes 356 7 1 3 Configuring the eG Manager to Work with NowSMS Lite eessseesesssssssssesssesesesrsrsrsreresrsrstsrsreseenrerersrseeerersrsest 356 7 2 Integrating the eG Manager with the eG SMS Manager ou cece eceseeseseeseeseeeeseeecesseeesesaeeaeseesaceeseacsesaeeaesaesaeeeseasesaes 357 7 2 1 Architectureofthe 6G SMS Mata ger xs2isc 6 1205 ecstheas isons ardins E TVR T learn T nie 357 1 2 2 Installing the eG SMS managet ssiri atie a e EaP NE Arra SEE NEE ERRANEN NNER savetagadeass 357 1 2 3 Configuring the eG Manager to work with the eG SMS managet ssessessssesseeeeieressereriersrerererrrsrsrerernrerrererererst 360 7 24 Starting the G SMS Manager ss sss sssersdensssassvsvsvssdasssesssonsswsess ot ise NEEN O E TEETE
236. e applications on the hosts are monitored By using the silent mode installation in such environments you can ensure that agents are installed easily in a secure non intrusive manner This document discusses how to install an agent on Unix hosts in the silent mode 2 12 1 Installing an eG Agent on Linux in the Silent Mode To install an eG agent on Linux in the silent mode do the following 1 First manually install the eG agent on any of the target Linux hosts in your environment by following the procedure provided in Section 2 7 3 of the eG Installation Guide Typically this is achieved by executing the iAgent_linux sh script with the eGagent_linux tar file located in the same directory as the script 2 Upon successful installation a silent_install script and an iAgent_linux file will get automatically created in the loptiegurkha bin directory of the agent host 3 Next copy the iAgent_linux file and silent_install script from the opt egurkha bin directory to any location on the Linux host on which you want to install an eG agent in the silent mode To the same location copy the eGagent_linux tar file as well 4 Next login to the target host as the root user and edit the silent_install script so that it contains the inputs required for your specific agent installation An extract from the silent_install script is provided below eGuser john G user please make sure that the user account exists eGgroup ainstallgrp eG use
237. e eG Manager menu The screen depicted by Figure 3 319 will appear Here select the Remove option and click the Next gt button 328 Installing and Configuring on Windows Environments eG Manager Setup Welcome Modify repair or remove the program Welcome to the eG Manager Setup Maintenance program This program lets you modify the current installation Click one of the options below CO Modify Select new program features to add or select currently installed features to remove Reinstall all program features installed by the previous setup Remove all installed features Figure 3 319 Uninstalling the eG manager 3 This process requires the confirmation of the user to remove the package and its related components as in Figure 3 320 Click the OK button Confirm Uninstall Do you want to completely remove the selected application and all of its features Figure 3 320 Uninstall process seeking the confirmation of the user to delete the eG manager 3 30 Uninstalling an eG Agent 1 Itis essential to stop the agent before uninstalling it To stop it first choose the eG Monitoring Suite option of the Windows Programs menu Next choose eG Agent Finally select Stop Agent from the options available 2 To uninstall the eG Agent select Uninstall Agent from the options available under the eG Agent menu The screen depicted by Figure 3 321 will appear Here select the Remove option and click the Next gt
238. e eG manager Edit the server xml file in the lt CATALINA_HOME gt conf directory In the file search for the XML block where the SSL Coyote HTTP connector on port 8443 is defined If this block is commented it indicates that the eG manager is not SSL enabled and is hence listening on an HTTP port only To SSL enable the eG manager first uncomment this block as indicated below lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector className org apache coyote tomcat4 CoyoteConnector port 8443 minProcessors 5 maxProcessors 75 enableLookups true acceptCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory className org apache coyote tomcat4 CoyoteServerSocketFactory clientAuth false protocol TLS gt lt Connector gt Then proceed to make the changes indicated in Bold below in the SSL XML block lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt 43 Installing and Configuring on Unix lt Connector className org apache coyote tomcat4 CoyoteConnector port lt eG Manager Port gt minProcessors 5 maxProcessors 75 enableLookups true acceptCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory className org apache coyote tomcat4 CoyoteServerSocketFactory clientAuth false protocol TLS keystoreFile opt egurkha manager tomcat conf lt filename gt keystore keystorePass mykey gt
239. e eG mansnanai 192 168 10 7 209 16 2 3 eG manager on 10 5 20 12 Nick name sun07 209 15 165 127 Figure 6 2 Agent behind a NAT In this case e When installing the agent the address of the manager to which the agent must communicate has to be specified as its public IP i e 209 15 165 127 e On the manager side the authentication setting in the Agents gt Settings gt Communication Menu has to be set to Off This is because the private IP address 192 168 10 7 is not accessible to the eG manager which is actually running on a different Intranet with IP 10 5 20 12 Hence the manager cannot check the validity of the agent s IP address directly e When managing the server via the eG admin interface the server s IP address must be specified as 192 168 10 7 To see why this is the case consider how the agent manager communication works When the agent connects to the manager it presents its identity IP address nick names hostname etc The manager determines the tests that must be executed by the agent based on its identity and passes this information back to the agent In this case the NATed public IP of the agent system 209 15 2 3 is NOT known to the agent as this is not explicitly configured on the agent system Hence servers applications on the target system must be managed using the private IP address i e 192 168 10 7 Although the above scenario has been described in the context of a NATed environment the same step
240. e following command to install the eG agent in the silent mode eGAgent_ lt OS gt exe a s f1 lt Full path to the script file containing the inputs for the installation gt In other words to extract installation inputs from the eGAgent iss file that was created in our example above the command will be eGAgent_ lt OS gt exe a s f1 c scriptleGAgent iss 4 The eG agent installation will then begin and proceed in the silent mode Setup will extract the required inputs from the iss file specified in step 3 above and perform the installation automatically requiring no user intervention of any kind 3 2 2 2 2 Silent A ale Installation of an eG Agent after making Minor Changes to the Script File Note that all the eG agents deployed in a target environment will not possess the same configuration at least the nick name will be different for each agent Since the iss file holds a particular agent s configuration you cannot use the same script file as is for installing eG agents on multiple hosts In such cases besides the mandatory nick name change a few more minor changes to the script file may become necessary The other changes that qualify as minor changes have been listed below o The manager IP and or port o The agent install directory o The Proxy server IP and or port o The user name and or password for authenticating the Proxy server communication 142 Installing and Configuring on Windows Environments
241. e object names to select text area of Figure 3 285 type the name of the cluster you created using the procedure detailed in Section 3 23 1 and click the Check Names button Figure 3 286 will then appear listing all objects that match the cluster name that you specified 306 Installing and Configuring on Windows Environments Multiple Names Found peony gripe aor idaran hiaai Select one of mone names hom thes ist of reenter the name Matcheg names iA ATTP EGESNIO ATTPEGIPSNJO Figure 3 286 A window displaying all objects with names that match the specified cluster name 7 Select the name of the cluster you created from Figure 3 286 and click the OK button therein Figure 3 287 will then appear From the Group of user names list of Figure 3 287 select the cluster name Then select the Allow check box against Full Control permission in the Permissions for list and click the OK button BB Permissions for eqi_attp L SYSTEM R Adraraatsatons AT TP EGIFSNIOT Adewriatr ators BP ATTPEGIRACN ATTPVATTP EGACNIONS Be AT TPEGIRAONJO IATIPLATIPLGRACHIOOS R Users AT TP EGIFSNIO Wiser Ful Corot Modty Read L Execute List Folies Conteris Fasi Figure 3 287 Granting Full Control to cluster 8 This will lead you straight to Share Protocols section of the Provision a Shared Folder wizard Click the Next button in this section to accept the default settings and move on 307 Installing and Configuring on Windows
242. e proceeding with the setup ensure that the Prerequisites discussed under Section 2 2 2 1 of Chapter 2 of this document are fulfilled Subsequently follow the steps given below 1 If an existing MS SQL server is chosen to host the eG database then first enter the location of the MS SQL server by specifying the hostname and port on which the MS SQL server is hosted If the MS SQL server being configured uses named instances then specify none instead of the port number in Figure 3 22 Then click the Next button to proceed 105 Installing and Configuring on Windows Environments eG Manager Setup Database Settings This step involves setting up of the eG Manager for database access Please enter the host name or IP address of the MsSql server 192 168 10 100 Please enter the port number of the MsSql server If the MsSql server uses named instances specify the port number as none 1433 lt Back Cancel Figure 3 22 Specifying the location of the MS SQL server to be used for the eG database 2 If none is specified in Figure 3 22 then clicking on the Next button will open Figure 3 23 wherein the instance name is to be specified Then click the Next button in Figure 3 23 eG Manager Setup Database Instance Settings This step involves setting up of the eG Manager for database access Please enter the name of the MsSql server instance to use mssql lt Back Cancel F
243. e temporary folder ay tmp Then copy the eGagent_hpux tar silent_install and iAgent_hpux_silent files to any location say tmp on that HPUX host on which you want to install an eG agent in the silent mode Next login as root user to the target HPUX host and edit the silent_install script so that it contains the inputs required for the agent installation on that host For this follow the procedure explained in step 4 of Section 1 1 of this document Once all the aforesaid parameters are configured with the values relevant to your agent installation save the file Eal Make sure that the eGuser account exists on the target system before you run the silent_install script Provide execute permissions for the silent_install script and run the script on the target host To grant execute permissions issue the following command from the directory that holds the silent_install script say tmp chmod x silent_install Upon successful execution of the script the eG agent will be automatically installed and started on the host 2 12 5 Installing an eG Agent on HPUX Host with Itanium Processor in the Silent Mode To install an eG agent on HPUX Itanium in the silent mode do the following 1 First manually install an eG agent on a target HPUX host using the installation instructions provided in Section 2 6 6 of the eG Installation Guide Typically this is achieved by executing the iAgent script from the super user account
244. e the file 5 Once this is done then the next time the eG manager generates alerts on a component the same will be routed to the HTTPSMSURL that has been configured in the following format In case of a single alert Mobile number eG Alarm Component name Component type Priority Test name Measure name Problem description Site name Last measurement value Problem time Where multiple alerts are clubbed into one Mobile number eG Alarm Component name Component type Priority Test name1 Measure name1 Problem description1 Site name1 Last measurement valuel Priority Test name2 Measure name2 Problem description2 Site name2 Last measurement value2 Problem time If multiple alerts are clubbed in a single alert then note that the Problem Time will appear only once for all the alerts 7 6 Logging of SMS Alerts By default all the eG alarms forwarded to an HTTP HTTPS address will be logged in the lt EG_INSTALL_DIR gt manager logs HTTPSMS log file The details and status of all other SMS alerts are logged in the lt EG_INSTALL_DIR gt manager logs egsmsaudit_log file Both these files are governed by the following parameters in the HTTP_SMS_ALERTS section of the eg_services ini file Meos log ita les 110 Log file size tl 374 Configuring the eG Manager to Send SMS Alerts If say the HTTPSMS log file grows to the size of 1 MB by default another HTTPSMS log file is automatically created to which the con
245. e user interface presents the results of the measurements in a logical and coherent manner The eG manager s interpretation of the state of each element of an IT infrastructure is first displayed before the results of the individual measurements are made available e g by displaying graphs indicating the change in value of the measurement with time of day An alarm window immediately highlights the pending alarms in the target environment prioritized based on the eG manager s assessment of the severity of the associated problems Introduction The previous sections have highlighted the key components of eG Enterprise In the following chapters we will describe the first two stages involved in deploying eG Enterprise namely 1 Installation of the eG manager and the agents This stage mainly involves deployment of the software on the appropriate servers creating user accounts and setting up the directory structures 2 Configuration of the eG manager and the agents In this stage the environment is set up for the proper operation of eG Enterprise and the manager and agent processes are started 1 2 Factors Governing the Location of the Manager The first step in installing eG Enterprise is the installation of the eG manager To understand the considerations that govern the exact location where the eG manager should be installed in a target environment consider Figure 1 4 which depicts the various components of the eG manager The discovery p
246. e user is prompted to specify if his her environment contains the required JDK see Figure 3 3 It is recommended that you use JDK 1 6 or its variants for installing the eG manager Question The eG Manager software uses Java extensively Do you have JDK version 1 6 or higher Figure 3 4 Setup enquiring the availability of JDK in the environment 6 If JDK is already available in the environment specify the Java home directory to enable the setup process to configure the eG user s execution environment to execute Java programs as in Figure 3 5 The user can also use the Browse button to select the location of the Java home directory 94 Installing and Configuring on Windows Environments eG Manager Setup Choose Destination Location Select folder where setup will install files Please enter the path of the Java home directory in your environment or Click Browse and select the location C idk1 6_14 lt Back C ne gt Cancel Figure 3 5 Specifying the location of the Java home directory for installing the eG manager If the message box of Figure 3 14 appears even after you have specified selected JDK 1 6 E or higher then check whether the lt JDK_INSTALL_DR gt bin directory on the eG manager host is Note a Read only directory If so grant Read Write permissions to that directory and then proceed with the eG manager installation 7 The setup process now requires the ho
247. eG Agent on your computer It is strongly recommended that you exit all windows program before running this Setup program Figure 3 111 Welcome screen of the eG agent setup program 2 Now the user can view the eG license agreement see Figure 3 112 Also the setup program seeks the confirmation of the user regarding his her acceptance of the terms and conditions of the license agreement It is mandatory that the user must accept the license agreement to proceed with the setup The user now needs to go through the license agreement thoroughly and click the Yes button at the bottom of the screen to accept and proceed with the setup process 187 Installing and Configuring on Windows Environments 4 eG Agent Setup License Agreement Please read the following license agreement carefully Press the PAGE DOWN key to see the rest of the agreement END USER LICENSE AGREEMENT FOR THE eG Products IMPORTANT PLEASE REVIEW CAREFULLY By choosing Yes when prompted to accept this license agreement or by installing the software you are consenting to be bound by and are becoming a party to this agreement If you do not agree to all of the terms of this agreement choose the No option and DO NOT INSTALL Do you accept all the terms of the preceding License Agreement If you select No the setup will close To install eG Agent you must accept this agreement Figure 3 112 License agreement for the eG agent
248. eG manager on the same host you can do so in the Silent mode following the steps given below 1 Uninstall the eG manager on the host if it already exists 2 Ensure that the eGManager_ lt OS gt exe is present on the host go to the command prompt and then switch to the directory containing the manager executable 3 From that directory execute the following command to install the eG manager in the silent mode eGManager_ lt OS gt exe a s f1 lt Full path to the script file containing the inputs for the installation gt In other words to extract installation inputs from the eGManager iss file that was created in our example above the command will be eGManager_ lt OS gt exe a s f1 c scriptleGManager iss 4 The eG manager installation will then begin and proceed in the silent mode Setup will extract the required inputs from the iss file specified in step 3 above and perform the installation automatically requiring no user intervention of any kind o Tf the silent mode installation is to be carried out on a different host then inputs such as manager IP hostname will undergo a change To ensure that such changes are effected during the silent mode install edit the inputs registered with the iss file using an Editor Note o The silent mode installation procedure applies only to the eG manager on Windows with Oracle MS SQL backend If the backend is MSDE then the eG manager cannot be reinstalled in the si
249. ease of the JDBC driver that is compatible with the version of the Oracle database server that is in use in your environment using the link http www oracle com technology software tech java sqlj_jdbc index html Rename the downloaded driver as classes12 zip in case of Windows or as classes11 zip in case of the Unix manager Copy the renamed file to the lt EG_INSTALL_DIR gt lib directory in case of the Windows manager or the opt egurkha lib directory in case of the Unix manager Restart the eG manager 8 4 Starting the eG Manager e The eG installation went through fine but I am not able to start the manager What could be wrong O Check to make sure that you have a valid license The license must be stored in a file named lt eG home Dir gt bin license Run the command viewCert license from the lt EG_HOME_DIR gt bin to make sure that your license has not expired Make sure that the eG user has permissions to read and write from all the eG directories When installing the eG manager you will be asked to enter an IP address or hostname for the host on which the manager is being installed Make sure that this IP address or hostname what you specified during the installation is accessible over the network E g if you specified a hostname and the DNS service is not configured to resolve this hostname the eG manager will not start Please make sure that you are logged in as the eG user Other users will not be
250. ecseeereneseaeenes 22 Opening th Client Network Utility cesses cies e es E R sacs EEE dana KEEKEEKE EREEREER NEKEEN ER 23 Enabling Multiprotocol support using the SQL Client Network Utility Opening the Server Network Utility seseseseeeeeeeeeeeerereeeresses Enabling Multiprotocol support using the SQL Server Network Utility Enabling long running queries to be executed on the MS SQL Server ececceceseceseseeecsseseecscescsecseecseceesessesesaseecsessesessesessssesseeaaeeees 26 The list of protocols on the SQL Server Configuration Managert cscceccesssseeseesecseceseeseeseesecsecseceeeeaeeseesecaeceeeeeseaeeaeeaeeseeeecneeereeaeeas 27 Disabling the VIA protocol Figure 2 9 Creating a NEW USET eeeeseeseeseceeeeeeeeeeseeseeneees Figure 2 10 Granting the requisite privileges to the NCW USEV cessscceseeseesceseesecseesecseeseesecsecsecsecsaeseesecsecsecsecaeeaecseesecsecseeeceeseeaeeaecaeeeseneeneeaee 30 Figure 2 11 Figure 2 12 Figure 2 13 Figure 2 14 Figure 2 15 Figure 2 16 Figure 2 17 Figure 2 18 Figure 2 19 Figure 2 20 Figure 2 21 Figure 2 22 Figure 2 23 Figure 2 24 Figure 2 25 Figure 2 26 Figure 2 27 Figure 2 28 Figure 3 1 Figure 3 2 Figure 3 3 Figure 3 4 Figure 3 5 Figure 3 6 Figure 3 7 Figure 3 8 Figure 3 9 Figure 3 10 Figure 3 11 Figure 3 12 Figure 3 13 Figure 3 14 Figure 3 15 Figure 3 16 Figure 3 17 Figure 3 18 Figure
251. ed below gt in the name of the certificate that is included in the PEM container gt inkey the name of the private key file the PEM container consists of 151 Installing and Configuring on Windows Environments certfile the name of the certificate that is included in the PEM container name Provide a unique name for the certificate file that is being exported out Specify the name of the keystore file to which the certificate and private key are to be exported The keystore file can have any name of your choice 2 Next you need to convert the keystore file which is currently in the pkcs12 format into the Java keystore i e JKS format For this issue the following command at the command prompt keytool importkeystore alias egitlab1 deststorepass mykey destkeypass mykey destkeystore keystore jks srckeystore keystore pk12 srcstoretype PKCS12 srcstorepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the aliasname of the certificate being requested make sure that you provide the same alias name that you specified in Section 3 4 1 1 of this document gt deststorepass this refers to the storepass of the destination keystore file i e the keystore file in the JKS format The storepass of the destination keystore should be the same as the storepass of the
252. ed by the IT infrastructure are functioning properly or not Often external agents alone may not be sufficient to completely gauge the health of an IT infrastructure and to diagnose problems when they occur For example it may not be possible to measure the CPU utilization levels of a web server from an external location To accommodate such situations eG Enterprise uses internal agents An internal agent runs on a server that supports the IT infrastructure and monitors various aspects pertaining to the server e g CPU memory and disk utilization the processes executing on it and the applications For making measurements eG agents support various mechanisms The Simple Network Management Protocol SNMP continues to be the standard for monitoring network elements routers load balancers WAP gateways etc Besides monitoring network elements eG agents also manage systems and applications SNMP is rarely supported at the application layer Hence for monitoring applications eG agents support various other mechanisms 1 Emulated transactions By emulating typical transactions from clients to different applications eG agents monitor various aspects of the server For example to measure the health of a web server eG Enterprise uses an HttpTest that emulates user accesses to the web server Depending on whether and when a response is received or not as well as based on the status code returned by the server in the Hyper Text Transport Protoc
253. ed in the opt egurkha directory namely gt The jre1 6 folder containing the default JRE 1 6 gt The jre folder containing JRE 1 5 After installing the eG agent on a Linux host try starting the agent and check for errors that say that Java cannot be run If such errors do not occur it is a clear indicator that the Linux system hosting the eG agent is JRE 1 6 compatible On the contrary if the agent startup process throws the Java cannot be run errors it could mean that the Linux host supports JRE 1 5 only In such a case do the following gt Open the opt egurkha folder on the Linux system that is hosting the eG agent gt Remove the jre1 6 folder therein gt Restart the eG agent A To install the eG agent on 32 bit 64 bit Tru64 FreeBSD CentOS openSUSE operating systems you will have to use the corresponding Linux package and follow the Note installation procedure discussed in Section 2 9 3 of this document 76 Installing and Configuring on Unix 2 13 3 Deploying the eG Agent on HPUX Environments PA RISC HPUX To deploy the eG agent on an HPUX host running a PA RISC processor use the standard Hpux agent package Itanium HPUX To monitor an HPUX host running an Itanium processor use the Hpux_Itanium agent package The install procedures for both the above mentioned options are available in Section 2 9 5 and Section 2 9 6 respectively of this manual 2 13 4 Deploying the eG Agent on AIX Environments
254. eds 4 Finally save the file and run the debugoff bat or debugon bat file as the case may be 3 25 Configuring the ISA Proxy Server to Enable Agent Manager Communication 3 25 1 Configuring the ISA Proxy Server on Windows 2000 In order to enable an eG agent to communicate with an eG manager via an ISA Proxy server on Windows 2000 do the following 1 Open the ISA Proxy server s administration tool using the menu sequence depicted in Figure 3 164 gt f Accessories Administrative Tools Startup A E Internet Explorer SJ Outlook Express fn VMware fn Java 2 Runtime Environment and dition v1 3 1_11 H Monitor Microsoft ISA Server Performance WE ISA Admi 1 Tool Windows 2000 Server BBS 2 27PM 5 i B g Figure 3 164 Opening the ISA Administration Tool 2 Figure 3 165 will then appear First click on the Client Address Set node in the tree structure on the left pane of Figure 3 165 The Configure Client Address Sets page will then appear in the right pane see Figure 3 165 Client address sets include one or more computers in your internal network By configuring client address sets you can allow external access to specific computers in your network To configure a new client address set click on the Add client set option in the right pane of Figure 3 165 235 Installing and Configuring on Windows Environments Microsoft Internet Security and Acceleration Server 2000
255. eesosueesoetsenese caseasdeesbecteonssasuseotisunncessdsopeonsceovessaventesadovenusoubinavi EN E TEITE OK OSS 382 5 Unstallangthe eG Agenti esea e erea AEN aT EE EPE iE Ete EA EEn tad sivacest danse reassbeartadass REER E ETE 383 3 6 Configuring the eG A cenit onnan en EE E E AE E EEAS EA E S EAr a ENEAS ETEA AE A nein de 383 aE oa EE Agent E A A a ahdeteaersesouadids ence 384 8 Configuring Double byte SUppPoti s sense es ass nE EnEn A E S AaS EN AESA ESSASI E EANET APEE E EA 385 CONCLUSIONS waziscecsessasietasietecsseccbsdescetestasssebasebsestenscsostabasasadctescasteusecs S E aat o Eaa E Oa 387 Figure 1 1 Figure 1 2 Figure 1 3 Figure 1 4 Figure 2 1 Figure 2 2 Figure 2 3 Figure 2 4 Figure 2 5 Figure 2 6 Figure 2 7 Figure 2 8 Table of Figures The main components of CG Enterprise essiri iria oon a EE SE cusses cuasencesaevececgasancdeassvesccenvencccduswesccahevedccgessencstaevavedeuoees 1 The manager agent communication in the eG architecture 0 cceccescessesecseceseeseeseesecsecsecceeseeseesecsececeeeeaeesecsecseeseseeseaeeseeseeeceeeeeeeaseaees 3 A typical deployment architecture of eG Enterprise cceesceescssseeeseeeeceeceseeseeseesecsecscceceseeaecsecsecaeeceeseesecsecsececseaeeaeeaeeseeaeseeeeeseesenees 4 The main components of the eG manager es Setting the maximum concurrent ser CONNECTIONS sessecceeceseeseeseeseesecsseseseesecsecsecsecsaeeseesecsecsecseceaeesecsecsecseceesesseseesecs
256. empting to start the eG manager 176 Installing and Configuring on Windows Environments LinkError C eGurkha lib Sones aoee il 4 a lang Syst at at EgStartManas C eGurkha s lib gt Figure 3 95 The error message that appears upon starting the eG manager on a 64 bit Windows host In such a case you have the following options o You use the JDK that is bundled with the eG manager OR o Download and install a 32 bit JDK on the Windows host and configure the eG manager to use the 32 bit JDK instead of the 64 bit one 3 10 Pre requisites for Installing the eG Agent on Windows Environments For the eG agent to function effectively the system on which the agent is being installed should support o Windows 2003 server OR Windows 2008 server OR Windows 2000 Professional workstation OR Windows XP workstation OR Windows Vista OR Windows 7 OR Windows 8 OR Windows 2012 o 512 MB RAM with at least 1 GB of disk space free for installing the agent o On Windows systems the user account used to run the eG Agent on a system has to be a part of the local administrator group of that system The two basic privileges that the user running the eG agent should have are allow log on locally and log on as a service If the proper privileges are not provided to the user running the eG agent service the eG agent will stop after running for a while ill S o Before deploying the web adapter to monitor
257. er as a super user and run the following command to instruct the operating system to allow the eG user to open a privileged port usermod K defaultpriv basic net_privadd lt eG_user gt Log out and log back in as the eG user and then start the eG manager On Linux systems follow the steps below a Install the eG manager on a port higher than 1024 e g 7077 b Use the iptables command to set up redirection from a privileged port to the port that the eG manager is using For example suppose you have installed the eG manager on port 7077 with SSL support and you would like the manager to listen on port 443 then do the following o Start the Manager on port 7077 using the start_manager command o Execute the iptables command as below on the Linux system hosting the eG manager These commands should be executed from a super user account iptables t nat A OUTPUT d lt IP HostName of the eG Manager gt p tcp deort 443 J REDERECL Po ports TOTT iptables t nat A PREROUTING d lt IP HostName of the eG Manager gt p tcp dport 443 j REDIRECT to ports 1077 o Once these commands are executed the eG manager will be accessible on port 443 as well c Entries configured using iptables are lost when the manager reboots To save the iptables configuration do the following o Run the following command as root user sbir iptables save gt opt egurkha iptables fw d o Edit the file
258. er name group name or IP address Figure 3 179 Selecting the Specific computers option 17 Next click the Add button in Figure 3 180 to select the client set to which the chosen protocol s applies New Protocol Rule Wizard Client Set Specify the client sets to which this rule applies Remove Figure 3 180 Clicking on the Add button 18 From the Available list of Figure 3 181 select the newly created client set and click the Add button to add it to the empty list Then click the OK button therein This automatically applies the protocol rule to the chosen client set 243 Installing and Configuring on Windows Environments Available in Internal client in Internal client lt Remove Figure 3 181 Adding the newly created client set 19 Upon clicking the OK button in Figure 3 181 you will return to Figure 3 180 The Client Sets list of Figure 3 180 will now display the chosen client set see Figure 3 182 Then click the Next gt button to switch to the next step New Protocol Rule Wizard Client Set Specify the client sets to which this rule applies Applies to requests coming from Client Sets in Internal client Figure 3 182 The chosen client set being displayed in the Client Set dialog box 20 Finally click on the Finish button to end the protocol rule configuration see Figure 3 183 244 Installing and Configuring on Windows Environments New
259. er resource Creation enren EE h Ea Si e SEE E EAA TEE E A E EE E A message box indicating the successful creation of the eG agent cluster resource Starine the eG agent on Node Lecce ssc ce ceases ceca iaria saga vese ORERE EAA EEEE ERA ESR Move cluster resources from NODE to NODE2 cccssessscsssecsscscstossstevnssstesssassaeseecssesessenseeesssecsaosensessssonsosessesasacnsosensonssestos Specifying a file share witness 0 0 cceseeeeeeeeeeee Clicking the Add Features option in the Server Manager Installing the Failover Clustering feature Creating a failover cluster ce eeeeeeseeeeeeee The Welcome screen of the Create Cluster Wizard 0 0 0 ioar iieii issoeesieisi resinte terei orrik Kia EE EEGEN EEEE ESEE ERE Ei ERA Adding nodes to a cluster Skipping the validation tests Specifying the name and IP address of the cluster niise ore ii E EEA ETRE ie Confirming the cluster configuration Cluster creation in progress Completion of cluster creation Selecting the Provision Share option sisi sssassessescsstevasvssvesesevacesssacevessaevs covasnsaxcvdenancansansavavsssongonsanasedeanesatonsevaedeanesavatsivaradesavansatereazess Selecting the folderto shaves o ccecesstegecesswenes ioia E A EE E ETARE AA iiS Choosing to change the NTFS permissions of the specified folder Adding A USEL SHOU gnie eA AEREE SEs ERA SEENE T AAE RESA EAEAN DONC SLEEN AEAEE NE Clicking the Object Types Dutton nner a E O S A
260. ering allows multiple servers to work together to provide high availability of services and applications Failover Clustering is often used for file and print services database and mail applications Figure 3 272 Installing the Failover Clustering feature When installation completes close the wizard 6 Now repeat the process on each of the nodes that you want to include in the cluster 7 Once this is done you are ready to create your cluster For this first launch the Failover Cluster Manager by following the Start gt Administrative Tools gt Failover Cluster Management menu sequence see Figure 3 273 Then click on the Create a Cluster link therein see Figure 3 273 298 Installing and Configuring on Windows Environments Failover Cluster Manager z Dese lakove cisterns vakdate hardveare for potents isiove cinten and potom configurston changes to you talover chuster A ladove chaim n a set of mdepenctert computers that mo together to noreste the avedstiity of ences and app cators The cinimed pervert caled noder are connected by phyecal cabler ard by softmare I ora of the nodes lade another nade beg to ponde servon a grocers krosn as akyver To begn to use tadower clustenng frit vakdate you hardware configuration then aese a cluster Alter these steps we complete pou can manage the chuiter Managng a ciater can nchade magating semces and sppacatore to i from a ciate urmang Windows Server 2003 Windows Server 200
261. errors occur in the user creation process the following message will come up Database user may not be created possible reasons are Database connection failed Once the user account is created the configuration process proceeds to create the various database tables required by eG Enterprise The following error message appears next KKKKKKKKKKKKKK KK KK KK KK KKKK KK KK KK KKKKKKKK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK Attempting to load the eG tables into the database If any error appears during the configuration there may be a problem with the MS SQL database parameters you supplied Please check and restart the manager CONE LCEMIEENE LOI Press lt Enter gt to continue lt CTRL C gt to end Database table creation started Database table creation completed successfully KKKEKKKKKKKKKKKKKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKK Upon successful installation of the manager the following message will be displayed to the user KKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KKKK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK If there were no errors the eG Manager has been configured Please use th command opt egurkha bin start manager and opt egurkha bin stop manager to start and stop the manager You will need a valid license to start the eG Manager Please contact mailto support eginnovations com to request for a license KKKKKKKKKKKKKKAKKKKKKKKKKKKKKAKKKKAKKKKKKKKKAKKKKKKKKKKKKKKAKKKKAKKKKKKKKK KK K
262. es list displayed in the right pane of Figure 3 62 select the eG user john To grant all permissions to user john click on the Grant check boxes against each of the privileges listed in the Explicit permissions for john section When the Grant check box is clicked the With Grant check box also gets selected 132 Installing and Configuring on Windows Environments 15 x Filegroups 2 Options _ Permissions Extended Properties Effective Permissions Add Bemove Explick permissions for john Server Alte any application r Vv Vv m israel Alter any assembly john A F Ci me Alter any asymmetric john CA K a Alter any ceitificate john v Vv 6 Bf View connection promerties Alle any contact john iv Vv n Altes any database D john m m 5 Progress m Alia any databonn 0 john aa r Ready Alter any dataspace john C m 5 Alter any fulltext catal john Bj B Ei xl Cancel A Figure 3 62 Granting permissions to the eG user 17 Once all permissions are Granted click on the OK button to register the changes 18 Next proceed to install the eG manager using the MS SQL Server 2005 backend While doing so remember to use the eG database and the eG database user which were manually created i e egdb and john in our example As indicated earlier if the eG manager installation fails before clicking on the OK button to close the installation program check the contents of the file
263. es mod_egurkha dll 3 Copy the file mod_egurkha dll from the lt EG_AGENT_INSTALL_DIR gt lib directory to lt APACHE_HOME gt modules 4 Stop and restart the Apache server To manually configure the eG web adapter on an Apache web server 2 0 on Windows do the following 1 First login to the Windows server 2 Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule egurkha_module modules mod_egurkha2_0 dll 3 Copy the file mod_egurkha2_0 dll from the lt EG_AGENT_INSTALL_DIR gt lib directory to lt APACHE_HOME gt modules 4 Stop and restart the Apache server To manually configure the eG web adapter on an Apache web server 2 2 on Windows do the following 1 First login to the Windows server 2 Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule egurkha_module modules mod_egurkha2_2 dlll 3 Copy the file mod_egurkha2_2 dll from the lt EG_AGENT_INSTALL_DIR gt lib directory to lt APACHE_HOME gt modules 4 Stop and restart the Apache server 3 18 Configuring the eG Agent to Monitor an IBM HTTP Server To manually configure the eG web adapter on an IBM HTTP server 1 x on Windows do the following 1 First login to the Windows server 2 Edit the lt IBM_HTTPSERVER_HOME gt confihttpd conf file to append the following line LoadModule ibm_egurkha_module modules ibm_mod_egurkha dll 225 Installing and Configuring on Windows Environments 3 4 C
264. eseceeceeeeseeseeseesecsecaeeseeaesaecseceeeeeeaeeaeeaeeeesneseneeneeas 260 Clicking on the Add button to define the destinations cceceeseseesecseceseeseeseesecsecscceeeaeeseesecsececeaeeseesecsecseceeeeeeseeseeaeceseeeeeeeaeens 261 Selecting the Computer option c eeeeeneeees 261 Clicking on the Add button 262 Adding the newly created client set ee 262 The chosen computer being displayed in the destinations list ccccceceseeseeseeseceeceeeeeeeseeseeseesececeseeseeseeaecseeeceeeeaeeseeaeseeneeeeeeaeens 263 Clicking the Add button to configure New USETS cscessesesseeseeseeseeseceeeseeseesecsecsecsecseeaeeseesecsecneceaseaeesessecaeeseseceeaeeaeesereeneeeeeeneeas 263 Clicking on the New button to create a new user Naitnin g the User Setii arrie Esar an AAEE E CEAT EEEIEE ERAR AEE E TORN Clicking the Add button to add users to the user Set ccseccescesseseeseeseceeceseeseeseesecsecscceeeseeseesecseceeceaeeaeeaeeaecseceeeaeeaeeaeeaesareneeeeeeaeeas 265 Selecting the users to be added to the set The selecting being transferred to the second list DOX cceceeceeseeseeseeseceeeeseeseeseesecsecsecseeeaeeseesecsececaceseeaecaeesececeaeeaeeseeaeseeneeeeeeaeeas 266 Viewing the sclected Users icv evade sescuvevevevasunccscosveuvercv sieshcnitetdesvsvacgadeveaveverieecsaconsaseverrasseeshsasced EES AEEA EESE EA ENEEIER E EEEE 266 Figure 3 227 Figure 3 228 Figure 3 229 Figure 3 230
265. essesesseessessesesaseesseeaeegs Message box specifying the conditions to be checked for hosting the eG database A message box requesting the user s confirmation to proceed with the setup 0 cece ese ceee ce ceesecsceesseeecsesecsessesessesseesaseesseeeeees Hostname and port of the database server hosting the eG database 00 eee eesseeeeeseeseseescsecseeeesesscsesseeessessesesseeessessesesaseesseeasegs Specifying the Oracle instance for eG database art Specifying the user information that is to be used to create the eG database Specifying the destination directory for the eG manager Information specified by the user at the various stages of the Setup ccesessssseseeesceeceseeseeseeseceececeeseesecsecsecseceeeaeeseesecaeeeeereeaeeaees The setup program requests for the default and temporary tablespaces in order to create a new user ACCOUNL eee eee eee eects 103 Setup program seeking the name and password of a database administrator Setup program indicating the completion of the eG Manager ceeeceeeceseeseeeesecseceseesceseeseeseceeceeceaeeseesecsececeeeeseeaeeseeaecereeeeeeeeaeeas Figure 3 20 Figure 3 21 Figure 3 22 Figure 3 23 Figure 3 24 Figure 3 25 Figure 3 26 Figure 3 27 Figure 3 28 Figure 3 29 Figure 3 30 Figure 3 31 Figure 3 32 A message box requesting you to confirm whether or not the Microsoft SQL server is NTLMv2 enabled eects 105 A message box re
266. ete option in the quick menu that appears see Figure 3 333 336 Installing and Configuring on Windows Environments 11 Registry Editor File Edit View Favorites Help 3 cpafcalm E eredisk cCryptsve E etxsmedry dacaw2k E dacseont Def watch G delcerc dfs E Dfsbriver Dhep Disk E dmadmin E dmboot dmio 9 dmload E dmserver DMusic E Dnscache dptizo drmkaud E100 a E eGmon E eGurkhay E eGurkha Encryptic ERSve E Eventsy E Fastfat G Fd Fps G Fipydisk E Fs Rec Ftdisk E Gpe E helpsvc Hidsery E hpn A Aaa E Eventlog Permissions Copy Key Name GoToMyPC aj Name Type Data ab Default REG_SZ value not set b Description REG_SZ The eG Agent Self Recovery Process ab DisplayName REG_SZ eGAgentMon fe ErrorControl REG_DWORD Ox00000000 0 ab IimagePath REG_EXPAND_SZ C eGurkhallib srvstart exe svc eGAgentMon c C eG ab ObjectName REG_SZ LocalSystem g start REG_DWORD 0x00000003 3 BE Type REG_DWORD 0x00000010 16 My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentContralSet Services eGAgentMon Figure 3 333 Deleting the eGAgentMon key Similarly delete the My Computer HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services eGurkhaAgent key see Figure 3 334 337 Installing and Configuring on Windows Environments 12 13 14 15 alae File Edit Yiew Favorites Help FQ ctxsmedrv aj
267. etworks see Figure 3 213 The newly created network will appear therein Select the new network and click the Add button in Figure 3 213 Add Network Entities Exi Network entities New Edit Delete E amp Networks meee Agents External ets Internal ds Local Host ets Quarantined YPN Clients L VPN Clients O Network Sets C Computers O Address Ranges C Subnets O Computer Sets Figure 3 213 Selecting the Network in which the source IPs exist 18 Clicking on the Add button in Figure 3 213 will lead you back to Figure 3 205 but this time the selected network will be listed in it see Figure 3 214 Now click the Next gt button to proceed New Network Wizard o x Network Addresses Define the IP addresses for this network You can add IP address ranges IP address ranges associated with a network adapter and private IP ranges Address ranges Start Address End Address eG Agents Edit Remove Add Adapter Add Private lt Back Next gt Cancel Figure 3 214 The chosen network being listed in the Address ranges list box 19 Next you will have to define the destinations for the traffic that is originating from the specified sources To do so click the Add button in Figure 3 215 260 Installing and Configuring on Windows Environments New Access Rule Wizard k E x Access Rule Destinations This rule will apply to traffic sent from the r
268. ew Tools Window Community Help Devoe DDD Sib Fa OD Om wr Summary x Connect 32 a J Y aag Yma Resse B EGURKHASAP SQL Server 9 0 1399 sa 0 Databases gt O System Databases E john C Database Snapshots EGURKHASAP Security Lognsljohn 0 Item s a eqdatabase egdb a J unis Noe o_O ReportServer a a ReportServerTempOB OB Securty E iy Logins A fabe j BUILTIN Administrators eodatabase A egdbuser AY EGURKHASAP Administrator Bj EGURKHASAPISQLServer200SMSFTEL Am EGURKHASAP SQLServer2005MSSQLL EGURKHASAP SQLServerZ0055QLAg equser C Server Objects B Replication L Management 4 Notfcation Services E SQL Server Agent Agent XPs disabled Ready Figure 3 58 Selecting the Properties option of the eG user Next select the User Mapping option from the left pane of Figure 3 59 that appears All the available databases will then be displayed in the right pane Click on the Map checkbox preceding egdb in the database list to map the egdb database to user john 129 Installing and Configuring on Windows Environments 13 14 E Login Properties john i Select a page A Genetal gt Server Roles ILA User Mapping 44 Securables Meo LA Stotus aah fe ad m juks m master C mokel O m l M hesh m ReportServer G ReportServerTemeD8 O tempdb P Guest acceunt enabled for eadb Database tole membership for egdb Connection
269. f you want to review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings Destination Folder i G eG Manager IP Host name 192 168 11 214 eG Manager Port 7077 Figure 3 107 Information specified by the user at the various stages of the setup process 12 Next the user has to decide whether to assign a nick name for the eG agent In many environments servers and routers may not be assigned host names Furthermore the host names may not be easy to remember or recall It is not easy to refer to servers and network devices using their IP addresses To make it easy for administrators operators to refer to the monitored servers devices the eG manager and agents can identify these devices using nick names A nick name is a logical easy to understand name assigned to a server device Nick names can be assigned to a server when installing the agent The nick name assigned to a server when installing an agent must also be specified in the eG admin interface when adding an application on that server Figure 3 108 provides the user the option of specifying a nick name Nick Name s support 9 The eG system allows you to assign a nick name For an eG Agent You can manage all applications running on this host using the nick name rather than having g7 to remember the host s IP address or its domain host name An eG Agent can be assigned one or more n
270. f1 lt Full path to the script file gt 5 For example to create a script file named eGAgent_ lt OS gt iss in the c script directory the command should be eGAgent_ lt OS gt exe a r f1 c scriptleGAgent iss 6 The Normal mode agent uninstallation will then begin The inputs supplied during the normal mode will automatically be saved in the iss file that was created in step 4 Refer to the eG Installation Guide for the detailed procedure for uninstalling an eG agent on Windows in the normal mode 7 Once the script is created you can use the same script to uninstall agents in the silent mode from multiple hosts For this do the following Ensure that the script file to be used for the silent mode uninstallation process is also copied to the host Next go to the command prompt and then switch to the directory containing the agent executable From that directory execute the following command to install the eG agent in the silent mode eGAgent_ lt OS gt exe a s f1 lt Full path to the script file containing the inputs for the installation gt In other words to extract installation inputs from the eGAgent iss file that was created in our example above see step 4 the command will be eGAgent_ lt OS gt exe a s f1 c scriptleGAgent iss 144 Installing and Configuring on Windows Environments The eG agent uninstallation will then begin and proceed in the silent mode Setup will extract the requ
271. following fields o UserName o URI Stem o _URI QueryString o Time Local o Time Taken o Status o Server IP o Server Port o Server Name o Site Name o CPU utilization o Bytes Sent o Bytes Received o Host o Client Ip o Date local 218 Installing and Configuring on Windows Environments Select Logging Fields 21x Group by no Grouping 7 ID Sure Name Source Type Category Header Name O win32status Win32Status Built In Default sc win32 status C w3wp PrivateBytes Process w3wp Pri Performance C Default W3WP PrivateB UserName UserName Request Header Default cs username O user Agent User Agent Request Header Default cs User Agent URI Stem URI Stem Built In Default cs uri stem URI Querystring URI Querystring Built In Default cs uri query O Time utc Time UTC Built In Default time Time Local Time Local Built In Default time local Time Taken Time Taken Built In Default TimeTakenMS O Substatus Substatus Built In Default sc substatus Status Status Built In Default sc status Site Name SiteName Built In Default s sitename Server IP Server IP Built In Default s ip Server Port ServerPort Built In Default s port pagr a ai nasil ees Figure 3 148 Selecting the logging fields to be logged 10 Click on the OK button in Figure 3 148 to confirm the selection When this is done the Selected Fields section of the Log Definition page will get updated with your selection see Figure 3 149 Use the
272. g and Configuring on Windows Environments Paese e lingua xi Formati Localit Tastiere e lingue Opzioni di amministrazione M Schermata iniziale e nuovi account utente Consente di visualizzare e copiare le impostazioni internazionali nella schermata iniziale negli account di sistema e nei nuovi account utente Informazioni su questi account m Lingua per programmi non Unicode Questa impostazione impostazioni locali del sistema controlla la lingua utilizzata per visualizzare testo in programmi che non supportano Unicode Lingua corrente per i programmi non Unicode Inglese Stati Uniti Pp Cambia impostazioni locali del sistema Informazioni sulle impostazioni locali del sistema OK Annulla Applica Figure 3 162 The Administrative tab page 3 When Figure 3 163 appears select the Schermata iniziale e account di sistema check box i e the Welcome screen and system accounts check box in English therein and click the OK button to copy the current user s settings to the system accounts 232 Installing and Configuring on Windows Environments kd a Impostazioni schermata iniziale e nuovi account utente Di seguito sono visualizzate le impostazioni per l utente corrente la schermata iniziale account di sistema e i nuovi account utente Utente corrente Lingua di visualizzazione Lingua di input Formato Localit Scher mata iniziale Lingua di visua
273. g on Windows Environments 10 Click on the New option in Figure 3 206 that appears and select the Network option from the New menu see Figure 3 206 to add a new network object as the traffic source Add Network Entities x Network entities New Edit Delete Network Network Set Computer Address Range Subnet Computer Set Add Close Figure 3 206 Selecting the Network object from the New menu 11 To begin network object creation first provide a Network name in Figure 3 207 that appears New Network Wizard xj Welcome to the New Network icrosoft Wizard internet Security amp Acceleration 2004 This wizard helps you create a new network Networks specify one or more ranges of IP addresses as a network object that can be used in rules Network name fea Agents To continue click Next lt Back Cancel Figure 3 207 Specifying the name of the network object 257 Installing and Configuring on Windows Environments 12 Next select the type of network being defined If the eG agents to be protected by the ISA proxy server are client computers belonging to the same network select the Internal Network from Figure 3 208 Click the Next gt button to move on New Network Wizard x Network Type Specify the type of network you are defining Internal networks contain client computers that ISA Server will protect C Perimeter Network Perimeter net
274. gement local autoallocate create temporary tablespace egurkhatemp01 tempfile C Oracle ORADATA egurkha eGurkhaTemp01 dbf size 512M autoextend off extent management local uniform g lil e Create rollback tablespaces and rollback segments as needed e The usage of an Oracle backend for the eG manager also necessitates the resetting of the following Oracle initialization parameters The processes parameter should be set to a minimum of 100 The open_cursors parameter should be set to a minimum of 200 These parameters might have to be tuned further based on an increase in server load 7 Database administrator privileges are required for creating a new database user The setup now prompts the user to enter the database administrator s name and password New user creation requires database administrator privileges Enter the DBA user name Enter the DBA password 8 Once the user account is created the configuration process proceeds to create the various database tables required by eG Enterprise The following error message appears if the configuration process does not succeed Database user creation started Database user created successfully Configuration of the eG Manager continues KEKKKK KK KKKKKEK KK KKKKKKKK KK KK KK KK KK KK KKK K KK KK KKKKKK KK KKKKKKKKKKKK Attempting to load the eG tables into the database If any error appears during the configuration there may be a problem with the Oracle databa
275. generated make sure that you provide the same password that you provided while generating the keystore file see Section 2 4 1 1 of this document Also note that storepass and keypass should be the same 38 Installing and Configuring on Unix gt keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 2 4 1 1 of this document 3 If this command executes successfully then a certificate request will be generated and automatically stored in the text file you specified in step 2 above 2 4 1 3 Obtaining the Certificate from the Internal CA 1 The first step towards obtaining a certificate is to submit the certificate request to the internal CA For this connect to the Certificate server of the internal CA and select the option to submit the certificate For instance if you are using Microsoft Active Directory Certificate Services to request for a self signed certificate then you need to connect to http lt YourWebServerName gt certsrv and then pick the option to submit the certificate Figure 2 12 will then appear Microsoft A dows Interne k y Sk Fevortes Jy E sucomsted stes gt EE web Ske Galery ctive Directory Certificate Services net Explorer 10 12 2 94 PEIE Mikrosoft Active Owectory Certficate Services ll Submit a Certificate Request or Renewal Request To submit a saved request to the CA p
276. gure 3 135 206 Installing and Configuring on Windows Environments m Di i View the health of the roles installed on your server and add or remove roles and features E Configuration E SS Storage A Roles Summary H Roles Summary Help IA Roles 1 of 16 installed Fo Add Roles ie Remove Roles Fie Services File Services File Services Help Provides technologies that help you manage storage enable file replication manage shared folders ensure fast file searching and enable access for UNIX client computers Role Status CE Goto Fle Services Messages None System Services Al Running Events None in the last 24 hours Role Services instaled EB Add Role Services Remove Role Services Distributed File System DFS Namespaces DFS Replication File Server Resource Manager Not instelled Services for Network File System Not installed Windows Search Service Not installed Windows Server 2003 File Services Not installed File Reptcation Service Not installed Figure 3 135 Clicking on the Roles node in the tree structure 5 This will invoke the Add Roles Wizard Click on the Next button in the welcome screen of Figure 3 136 to proceed with the role creation 207 Installing and Configuring on Windows Environments Figure 3 136 Clicking on the Next button in the welcome screen of the Add Roles Wizard 6 The next step of the wizard prompts you to pick one more roles to install on the Windows 2008 2
277. gure 7 11 A screen indicating that the eG SMS manager has successfully started 00 0 eseeeeseeseeesceecsececsetseseesessesesassesseeeesesseesaeeees Figure 7 12 Stopping the SMS manager 3 Figure 713 Uninstalling the eG SMS Manager soi enorer iiini TR Ei NS E A EEEE EA SAA A iN i iE Figure 7 14 Selecting the Remoyeoptiohinies ronte aani erar ora Ea OE EEE E EARE EAA EE EERS EE EREA aN Figure 7 15 Confirming the complete removal of the eG SMS manager Figure 7 16 Figure 7 17 Figure 7 18 Figure 7 19 Figure 7 20 Figure 7 21 Figure 7 22 Figure 7 23 Figure 7 24 Figure 7 25 Starting the PageGate server Clicking on the PageGate icon to view a pop up menu Launching the PG Admin console tiiri i hott t NEEE AE EEE E EE R EEE Adding acariciar en e E aE T E E T E AS E S E E E A EE E Ea O A RSA Specifying the details of the new carrier Configuring AS CIP sett 88 ve cvscscccazecusteccesesnccaasnserscossteccennsunecosaseeuu EORR EIENEN EERTE ETS Starting the GetAscid interface x vasscsccsecscessseicscossvsacosasudateu seve EAE SKE IEN VEERE T ESTESI ESEESE IERES EISERES SEEEN EE PETER EE eRe toS Confirming the status of the GetAscii service Adding a NEW recipient ass scccssevesazesclesevs devs EnS A E OEV EA E EVTL SKAK SE TORS EERNISSE RS PETECE ESTONE ERE ERSE ENEN EE Sera rRe Providing the recip ints details iorsin soises tosteas s Kai vv uacensovaesesvrvunceevevayetcuvesncesevessavevsvancecessasusevsvorsvcevensta EENE EEEE
278. guring on Unix gt srckeystore the name of the destination keystore file i e the keystore file in the PKCS12 format gt srcstorepass The storepass of the source keystore file i e the keystore file in the PKCS12 firmat make sure that you provide the same storepass you specified in Section 2 4 2 1 of this document 2 4 2 5 Configuring Tomcat for Using the Keystore File The eG manager on Unix uses Tomcat 6 0 as the web server Therefore to SSL enable the eG manager you need to configure the server xml file of Tomcat with the name and full path to the keystore file which was created earlier For this purpose do the following 3 4 5 Stop the eG manager Edit the server xml file in the lt CATALINA_HOME gt conf directory In the file search for the XML block where the SSL Coyote HTTP connector on port 8443 is defined If this block is commented it indicates that the eG manager is not SSL enabled and is hence listening on an HTTP port only To SSL enable the eG manager first uncomment this block as indicated below lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector className org apache coyote tomcat4 CoyoteConnector port 8443 minProcessors 5 maxProcessors 75 enableLookups true acceptCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory className org apache coyote tomcat4 CoyoteServerSocketFactory clientAuth false protocol TL
279. h the manager is being installed should support e JDK 1 6 0_10 and above e Windows 2008 server OR Windows 7 OR Windows 8 OR Windows 2012 e Only systems with a static IP address i e no DHCP address should be used for installing the eG manager e Aminimum of 1 GB disk space 91 Installing and Configuring on Windows Environments e Oracle database server version 10G 11G 12c Microsoft SQL Server version 2008 2012 2014 for the eG database The database can be installed on the same system as the eG manager or it can be installed on a separate system For implementations with 100 monitors or more the database should ideally be hosted on a separate system Both the eG manager and the eG database can be hosted on virtual machines or physical machines e Internet Explorer 10 or higher Mozilla Firefox v25 or higher or Chrome as the browser e A valid eG license 3 1 2 Installing and Configuring the eG Manager on Windows 2008 Windows 7 Windows 8 Windows 2012 Platforms To install the eG manager on a Windows 2008 Windows 7 Windows 8 Windows 2012 platforms you have to choose from the following self extracting programs e The eGManager_win2008 exe if you are installing the eG manager on a 32 bit Windows 2008 Windows 7 host e The eGManager_win2008_x64 exe if you are installing the eG manager on a 64 bit Windows 2008 Windows 7 host e The eGManager_win2012 exe if you are installing the eG manager on a 32 bit Windows 8 W
280. ha ibyeq_manager jar D PROGRA 1 ss1test egurkha ib classes12 21p D PROGRA 1 ss1test egurkha manager t omcat webapps final wEB INF classes D PROGRA 1 ss Itest egurkha ib GsmMengine jar D PROGRA 1 ss Itest egurkha 1i FN S52 ae a acer soos bavlib jcert jar D PROGRA 1 s51test egurkha lib jnet jar EqgstartmManager Mttps 192 168 10 43 7077 Final serv let up loa Figure 3 86 SSL enabling the startmanager script SSL enabling the start manager script by making the indicated change 2 Finally start the eG manager as discussed in Section 3 4 3 6 Testing the SSL Installation To test whether the eG Manager is SSL enabled or not do the following 1 Try to access the eG manager with a secured connection https by typing https lt eGmanagerlP gt lt eGmanagerPort in the browser If you receive a security message that states that the certificate is not from a trusted root certification authority click Yes to continue to the web page see Figure 3 87 This page will appear every time you try to access the web page using https until you receive a certificate signed by a proper CA such as Verisign or Thawte 169 Installing and Configuring on Windows Environments Security Alert E x Information you exchange with this site cannot be viewed or Q changed by others However there is a problem with the site s security certificate The security certificate is from a trusted certifying authority T
281. has completed installing the eG Manager Before starting the eG Manager you will need to restart the computer Please choose one of the following options D Yes want to restart my computer now 4 valid license is required for the eG Manager to start functioning Please contact license eginnovations com to obtain the license Place this license file in the C egurkha bin directory Click Finish to exit eG Manager Setup Back Cancel Figure 3 50 Setup program indicating the completion of the eG manager installation 3 1 4 Configuring the eG Manager to use an MS SQL Server 2005 on Windows 2003 The eG Enterprise manager can use an Oracle server MS SQL Server 2005 or 2008 or 2012 as the eG backend and this MS SQL server can support any of the 3 authentication types Windows Only Authentication SQL Server Authentication or Mixed Mode Authentication If SQL Server Authentication is enabled the installation of the eG manager is straightforward On the other hand if Mixed Mode Authentication is enabled for the MS SQL Server 2005 operating on a Windows 2003 system several precautions must be taken when installing the eG manager to use this database backend By default a Windows 2003 Active Directory server imposes strict local and domain based group policies One such policy relates to password complexity Windows 2003 by default mandates the use of strong passwords Strong passwords are defined by the following parameters
282. he Create New Access Rule option provided by the Tasks tab see Figure 3 199 Microsoft Internet Securi action view gt Tree Microsoft Internet Security and Accel intern z 3 nternet Security amp fad tere Acceleration Server 2004 Firewall Policy E Monitoring Standard Edition LZ Firewall Policy I Virtual Private Networks veN IJ Firewall Policy Wo Tasks nab 3 Configuration Order Action Protocols From Listener To E F 1 Block Egtesters Deny L3 All Outbound Traffic lt 4 Internal Exte i A a a Sov b Firewall Policy Tasks W Create New Access Rule Publish a Web Server S F 2 allopen alow DlH All Networks and Local Host 2 All Nd a R3 Shva Alow G Al outbound Traffic All Networks and Local Host Exte Se alld Publish a Secure Web Server 1S Publish a Mail Server ee Sy Create New Server Publishing Rule System Policy Tasks SF Edit System Policy S Show System Policy Rules Export System Policy amp Import System Policy Related Tasks Define IP Preferences Export Firewall Policy Import Firewall Policy Figure 3 199 Selecting the Create a new access rule option 253 Installing and Configuring on Windows Environments 5 Figure 3 200 will then appear allowing you to configure a new access rule Begin by specifying an Access rule name see Figure 3 200 Then click on the Next gt button New Access Rule Wizar
283. he directory opt SUNWwbsvr and the name of the server is https test then you will have to append the following lines in the magnus conf file Init fn load modules shlib opt egurkha lib sun1webadapter_6 so funcs onServerInit onChildinit onLog Init fn onServerInit WEB_SERVER_ROOT opt SUNWwbsvr https test 3 Save the file 4 Next open the obj conf file from the same location and insert the following line as the last line of the series that begins with the string PathCheck fn PathCheck fn onChildinit Similarly insert the following line as the last line of the series that begins with the string AddLog fn AddLog fn onLog 5 Save the file 6 Finally restart the web server The web adapter for an Apache or an IBM HTTP web server on the other hand can be configured only manually and not through the eG agent setup procedure The steps involved in the manual web adapter configuration process have been detailed hereunder 2 17 3 Configuring the eG Web Adapter for an Apache IBM HTTP Web Server on a 32 bit Unix Operating System To manually configure the eG web adapter on an Apache web server 1 x on Unix do the following 1 First login to the Unix server as the Apache install user 2 Edit the lt APACHE_HOME gt conf httpd conf file to append the following lines to the end of the file LoadModule eg1_module libexec mod_eg1 so 3 Copy the file mod_eg1 so from the opt egurkhallib directory to lt APACHE_HOME gt libe
284. he egurkha subdirectory of the base directory to opt egurkha Enter the group to which the eG user is to be associated egurkha Then enter the group to which the eG user is to be associated with The default value taken is egurkha The installation will attempt to create the user account if it does not exist on the system If you specify an existing user name then this group prompt will not appear Would you like the eG Agent to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the agent to start automatically every time the system hosting the agent reboots Now press y to install the auto restart feature or n to proceed without installing the same If the agent is installed on the same system as the manager some common files need not be reinstalled When the installation process seeks the confirmation regarding installing the conflicting files specify n The following files are already installed on the system and are being used by another package Do you want to install these conflicting files y n q n A message indicating that installing the package requires super user permission appears and now the user needs to inform whether the process can proceed If the user does not have the super user permissions he she needs to login as the super user before proceeding with the installation This package contains sc
285. he existence of the user and or group and creates a new user or group only if necessary e If the eG agent has been installed on the same system use the same user and installation directory for both the manager and the agent 5 Next the installation process prompts the user to choose the path of the directory in which the eG manager is to reside If possible the eG manager should be installed in the opt directory If space considerations preclude this the eG manager can be installed in any other directory on the system At the end of the installation process a symbolic link is created to link the installation directory to the opt egurkha directory Enter the directory where the eG manager should be installed opt 6 Would you like the eG manager to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the manager to start automatically every time the system hosting the manager reboots Now press y to install the auto restart feature or n to proceed without installing the same 7 A message indicating that installing the package requires super user permission appears and now the user needs to inform whether the process can proceed If the user does not have the super user permissions he she needs to login as the super user before proceeding with the installation This package contains scripts which will be executed wi
286. he following sections 2 9 2 Installing an Agent on Solaris The eG agent software for Solaris is provided as a standard Solaris package called eGagent To install the agent follow the steps below 1 Type the following command at the command prompt pkgadd d lt path of the package eGagent gt K z Only a super user can execute the above command Note 2 The list of packages available are displayed next as shown below The following packages are available 54 Installing and Configuring on Unix 4 1 eGagent eG Agent Sparc AMD64 version 6 0 Select package s you wish to process or all to process all packages default all q Choose the all option to install all the packages pertaining to the eG agent Enter the name of th G user egurkha Next decide the user account used for executing the eG agent First enter the name of the eG user The default value taken is egurkha A If the agent is being installed on the same system as the manager the eG user configured Note for the agent should be the same as that used for the manager Enter the directory where th G Agent should be installed opt Next enter the path to the directory in which the eG agent will be installed The default base directory for the eG agent is opt A subdirectory name egurkha will be created under the base directory If the base directory is not opt a symbolic link will be created from t
287. he machines Both nodes in the cluster must be in the same Active Directory domain as a best practice Both the clustered nodes should have the same domain role The recommended role is member server The File Share Server should also be in the same Active Directory domain as the clustered nodes Install an eG agent each on Node 1 and Node 2 Then proceed to create the Windows cluster Follow the steps detailed in Section 3 23 1 for this purpose Next create a Windows file share from a File share server This file share will be used as a third vote in the Node and File Share Majority quorum mode that is to be set for the cluster The steps to achieve this have been detailed in Section 3 23 2 of this document Configure cluster quorum settings using the procedure discussed in Section 3 23 3 Add eG agent service as a cluster resource as outlined in Section 3 23 4 of this document 3 27 1 Creating a Windows Cluster To achieve this follow the steps discussed below 1 2 Install the Failover Clustering feature on both nodes of the cluster For this first do the following on Node 1 If you recently installed Windows Server 2008 R2 on the server and the Initial Configuration Tasks interface is displayed look for the Customize This Server option and click the Add features option under it If Initial Configuration Tasks is not displayed add the feature through Server Manager If Server Manager is already running click Features see
288. he manager You will need a valid license to start the eG Manager Please contact mailto support eginnovations com to request for a license KEKKKKKKKKKKKEKKKKKKKKKKK KK KK KK KK KKK KKK KK KK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKEKK Before starting the manager make sure that you have the proper license file in opt egurkha bin 2 To view the license execute the command optilegurkha bin viewCert lt License File Name gt 3 When the eG manager is started properly the following processes will be started up a One Tomcat process b The eG manager s recovery process eGmon 4 By default the eG manager is configured for agent based monitoring i e when a server is auto discovered and then managed it is monitored in an agent based manner Administrators have an option to set agentless monitoring as the default for the eG manager On Unix systems the script opt egurkha bin set_manager_default can be used for this purpose The output below specifies how the set_manager_default script can be used opt egurkha bin set manager default Do you want to set the eG manager for agentless monitoring by default y n Dals y KKEKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKK Changes to the eG manager default setting have been successfully made KEKKKKKKKKKKK KK KK KK KK KK KK KK KEK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK 35 Installing and Configuring on Unix 2 3 Configuring
289. he security certificate date is valid The name on the security certificate does not match the name of the site Do you want to proceed View Certificate Figure 3 87 A security message You can view the eG Manager Login page which indicates that enabling SSL support for the eG installation has been successful 3 7 Increasing the Memory of the eG Manager The eG manager runs as a Java process The maximum heap memory that can be allocated to a 32 bit eG manager process is limited to 1 5 GB The maximum heap memory allocation to a 64 bit eG manager process on the other hand is limited to 3 GB Where a large number of components are to be monitored you may want to allocate more memory heap to the eG manager process In such a case follow the steps discussed below on an eG manager on Windows 1 2 3 gi Login to the eG manager host Edit the lt EG_INSTALL_DIR gt lib setEnv bat file Search for the following entries set XMX set XMS The XMX and XMS specifications govern the heap memory allocations to the eG manager If you want to increase it to say 2 GB i e 2048 MB change these specifications as indicated below set XMX 2048 set XMS 2048 Finally save the file 3 8 Stopping the eG Manager To stop the manager click the Start button on the task bar From thereon select Programs gt eG Monitoring Suite gt eG Manager gt Stop Manager see Figure 3 88 170 Installing and Configuring
290. hly concurrent systems How to view or set Set this parameter through the etc system entry semsys seminfo semopm 16384 Default value None Recommended value 16384 11 Installing and Configuring on Unix gt Connection backlog Description Change the following parameter when a high rate of incoming connection requests result in connection failures How to view or set ndd get dev tcp tcp conn req max q ndd set dev tcp tcp conn req max q 8192 Default value For Solaris 8 the default value is 128 Recommended value 8192 n A Please note that the actual implementation and syntax may vary from one version of the operating system to another and from one version of kernel to another Please verify Note compatibility with your system The eG manager software is provided as two standard Solaris packages both named eGmanager one for Solaris hosts supporting the AMD processor and another for those hosts usng the Sparc processor Both these packages can be installed using the pkgadd utility Using the pkgrm utility the eG manager can be uninstalled The broad steps for installing or uninstalling the eG manager do not vary based on what processor is used by the target Solaris host However make sure that you use the correct package for installation A The eG manager software has to be installed from a super user account Note The steps involved in installing the eG manager are as
291. hooting SSL Enabling the eG Manager How to differentiate between a public and private certificate A private certificate is often a self signed certificate that is not validated by any certifying authority This is why when connecting to an eG manager that has been SSL enabled using a self signed certificate the following error message appears This Connection is Untrusted You have asked Firefox to connect securely to 192 168 10 248 7077 but we can t confirm that your connection is secure Normally when you try to connect securely sites will present trusted identification to prove that you are going to the right place However this site s identity can t be verified What Should I Do If you usually connect to this site without problems this error could mean that someone is trying to impersonate the site and you shouldn t continue Get me out of here gt Technical Details I Understand the Risks Figure 3 78 The error message that appears when connecting to an eG manager using a self signed SSL certificate A public certificate on the other hand is a trusted certificate issued by a valid Certificate Authority If such a certificate is used to SSL enable an eG manager then a lock symbol will appear in the address bar of the browser when attempting to connect to that manager see Figure 3 79 162 Installing and Configuring on Windows Environments e C fif amp Pittps egont
292. host the eG database eG Manager Setup e The eG Manager requires an Oracle database for storing its measurements Please ensure that you have an Oracle database instance SID running and that you have sufficient space atleast 100MB to host the eG Manager database Figure 3 10 Message box specifying the conditions to be checked for hosting the eG database 2 To proceed click on the OK button in Figure 3 10 When this is done a message box prompting the user for his confirmation to continue with the setup will appear see Figure 3 11 98 Installing and Configuring on Windows Environments Question Qe Do you want to continue the Setup Figure 3 11 A message box requesting the user s confirmation to proceed with the setup 3 To configure the eG manager system to use an Oracle database server next enter e the hostname or IP address of the server that hosts the Oracle database use the hostname if DNS is supported in Figure 3 12 e the port number of the Oracle server default is 1521 in Figure 3 13 e the name of an Oracle instance that the eG manager should use in Figure 3 14 eG Manager Setup Database Settings This step involves setting up of the eG Manager for database access Please enter the host name for IP address of the Oracle server 192 168 11 11 Please enter the port number of the Oracle server 1521 eremi Next gt Cancel Figure 3 12 Hostname and p
293. iated The default value taken is egurkha Enter the group to which the eG user is to be associated egurkha 14 Installing and Configuring on Unix e An existing user and or group can be specified during this step A e The installaxtion process checks for the existence of the user and or group and creates a new user or group only if necessary Note e If the eG agent has been installed on the same system use the same user and installation directory for both the manager and the agent Would you like the eG manager to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the manager to start automatically every time the system hosting the manager reboots Now press y to install the auto restart feature or n to proceed without installing the same Upon successful completion of the installation process the following message will be displayed DR A AK KK A K KE K K KK KK K K KK K K A AK K K KK KK K K K KKK KKK KKK KK KKK KK KKK KKK KK KK KKK KK KK F The eG manager has been successfully installed Please login as lt user name gt and run the script opt egurkha bin setup manager to configure the manager The licensing terms for eG products are mentioned in the file opt egurkha license agreement PLEASE READ THIS FILE BEFORE PROCEEDING FURTHER Note that the eG manager requires JDK 1 6 or higher
294. ibed below gt alias the alias name of the certificate being requested make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 1 1 of this document gt keyalg specifies the algorithm that was used to generate the keys this can be RSA or DSA depending upon which algorithm was used for key generation in the procedure detailed in Section 3 4 1 1 gt file Provide a name for the text file to which the certificate request will be saved gt keypass the password used to protect the key that was generated make sure that you provide the same password that you provided while generating the keystore file see Section 3 4 1 1 of this document Also note that storepass and keypass should be the same gt keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 3 4 1 1 of this document 3 If this command executes successfully then a certificate request will be generated and automatically stored in the text file you specified in step 2 above 3 4 1 3 Obtaining the Certificate from the Internal CA 1 The first step towards obtaining a certificate is to submit the certificate request to the internal CA For this connect to the Certificate server of the internal CA and select the option to submit the certificate For instance if you are using Microsoft Active Directory Cer
295. icate whether not the Microsft SQL server in your environment is NTLMv2 116 Installing and Configuring on Windows Environments enabled see Figure 3 40 Select No here to proceed Question Figure 3 40 A message box requesting you to confirm whether or not the Microsoft SQL server is NTLMv2 enabled 3 Next setup will request you to confirm whether not a Microsoft SQL server is running in your environment Select Yes here to use the Microsoft Azure SQL database Question 2 Do you have the Microsoft SQL Server running in your environment Figure 3 41 A message box requesting you to confirm whether not a Microsoft SQL server is running in your environment 4 When Figure 3 87 appears specify the following and then click the Next button e the fully qualified SQL server name that Azure auto generates when creating a SQL database e the port number of the SQL server instance that Azure auto generates default is 1433 Installing and Configuring on Windows Environments eG Manager Setup Database Settings This step involves setting up of the eG Manager for database access Please enter the host name or IP address of the MsSql server swo2fnShhb database windows net Please enter the port number of the MsSql server If the MsSql server uses named instances specify the port number as none 1433 lt Back Cancel Figure 3 42 Specifying the location of the MS SQL server to be used for the e
296. ick names Would you like to assign a nick namets For this eG Agent Figure 3 108 Setup requesting the user s confirmation to assign a nick name for the eG agent 13 Clicking on the Yes button will then require the user to specify the nick name see Figure 3 109 184 Installing and Configuring on Windows Environments eG Agent Setup Please enter the nick name s to be assigned to this host Please use to seperate multiple nick names agent_vm Figure 3 109 Assigning a nick name for the eG agent s host n Once a nick name is specified for a host the user has the option of managing applications running on the host by using the nick name IP address While providing multiple nick Note names ensure that they are separated by a Also ensure that a nick name does not contain any white spaces and that all nick names are in lower case 14 If the configuration process succeeds the following screen will be displayed see Figure 3 110 Clicking on the Finish button will exit the Setup 185 Installing and Configuring on Windows Environments eG Agent Setup Setup has completed installing the eG Agent Figure 3 110 The completion of the eG agent setup 3 12 Installing and Configuring the eG Agent on Windows 2008 Vista 7 8 2012 The standard eG agent software for Windows is provided as a self extracting set up program called eGAgent_win2008 exe which should be used to install
297. iew Options Actions Help use Tab to move from the list to the menubar use the arrow keys to move around use Return to pull down a menu or select a menu item use Tab to move from the menubar to the list without selecting a menu item use the spacebar to select an item in the list On any screen press CTRL K for more information on how to use the keyboard Presis UReruman to COnelmuer a 2 On pressing Enter the screen depicted by Figure 2 6 appears lection 1 01 gt comp Figure 2 14 The swinstall terminal interface 3 Highlight the software using the spacebar and mark the software by pressing m Then using the tab key move 59 Installing and Configuring on Unix to the menu bar on top and select Install from the Actions menu as depicted by Figure 2 15 below This will begin the install analysis process SD Install software Selection Chpux 1 1 t tions Figure 2 15 Commencing the install analysis process 4 The screen that displays the status of the install analysis will then appear see Figure 2 16 11 nal heduled 1 1 a i Cancel Figure 2 16 A screen displaying the status of the install analysis process 5 Once the status changes to Ready press Enter to bring up the screen depicted by Figure 2 17 60 Installing and Configuring on Unix 10 11 12 Install Software Selection Chpux01 1 g Tone Figu
298. igure 3 23 Specifying the name of the SQL server instance to use 3 Then you need to indicate whether the MS SQL server to be used as the eG backend is SSL enabled or not If not press the No button in Figure 3 24 If it is SSL enabled then click on the Yes button 106 Installing and Configuring on Windows Environments r Question Do you have MSSQL Server with SSL support enabled Figure 3 24 A message box confirming the SSL status of the MS SQL server 4 Next specify whether a new database has to be created to host the eG database Question Figure 3 25 Specifying whether a new database has to be created for the eG database 5 If a new database has to be created indicate the name of the database instance see Figure 3 27 If an existing database is to be used the installation process prompts for the name of the existing database instance see Figure 3 26 eG Manager Setup Enter Text Please enter information in the field below Enter an existing database that should be used for the eG Manager egutkha Figure 3 26 Indicating the name of the existing database to be used 107 Installing and Configuring on Windows Environments eG Manager Setup Enter Text Please enter information in the field below Enter the name of the database that you want to create for the eG Manager lt Back Next gt Cancel Figure 3 27 Indicating the name
299. igure the eG manager to work with the eG SMS manager valid values need to be provided for the above Therefore against SmsServer enter the IP hostname of the server hosting the eG SMS manager Then against the SmsPort entry in Figure 7 9 specify the RMlServerPort value available in the eGMSMgr properties file of Figure 7 9 Similarly against the SmsService entry enter the RMlServiceName displayed in the eGSMSMgr properties file of Figure 7 9 If for some reason you change the default port and service name settings in the eGSMSMogr properties file then ensure that the changes are reflected in the eg_services ini file Note also Once this is done save the eg_services ini file 362 That concludes the process of configuring the eG manager Now proceed to start the eG SMS manager cil iis ne E idi To start the eG SMS manager follow the menu sequence Start gt Programs gt eG Monitoring Suite gt eG SMS Manager gt Start SMS Manager see Figure 7 10 aii New Office Document a Lax Open Office Document a Windows Update Q Free AOL amp Unlimited Internet RealOne Player A eGurkha Enterprise gt Microsoft FrontPage Documents amp EditPlus 2 gt Settings gt B Adobe gt Search r A eGurkha gt fx eG Monitoring Suite ia eGSMS Manager gt Start SMS Manager Help y a Stop SMS Manager 3 Uninstall SMS Manager Run Shut Down Figure 7 10 Start
300. ile to the lt EG_INSTALL_DIR gt lib directory Ensure that the file extension is in upper case i e TTF 344 Configuring Double byte Support for eG Enterprise Next move to the lt EG_INSTALL_DIR gt lib directory and issue the following command jar cvf font jar CODE2000 TTF Then check whether the font jar is created in the lt EG_INSTALL_DIR gt lib directory If your eG manager is double byte enabled but the Language preference that you have set in the USER PROFILE page is English then you do not have to follow the steps discussed above to ensure that reports are saved as PDF documents However while using a double byte enabled eG manager if you have chosen to view data in a Language other than English then reports cannot be saved as PDF documents until the above mentioned steps are followed 345 Backing up and Restoring eG Enterprise Backing up and Restoring eG Enterprise This chapter outlines the procedures involved in backing up and restoring eG Enterprise on Windows and Unix environments 5 1 Backing up and Restoring the eG Manager on Unix Environments Linux and Solaris To backup and restore the eG manager on Unix environments do the following 1 2 Tar the opt eGurkha directory and save it in a convenient location To restore the eG manager to the same host from which the backup was taken untar the eGurkha directory to the opt directory If you restore the eG manager to a different
301. in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name that you provided while generating the keystore file see Section 2 4 2 1 of this document gt keyalg specifies the algorithm that was used to generate the keys this can be RSA or DSA depending upon which algorithm was used for key generation in the procedure detailed in Section 2 4 2 1 file Provide a name for the text file to which the certificate request will be saved keypass the password used to protect the key that was generated make sure that you provide the same password that you provided while generating the keystore file see Section 2 4 2 1 of this document Also note that storepass and keypass should be the same gt keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 2 4 2 1 of this document 3 If this command executes successfully then a certificate request will be generated and automatically stored in the text file you specified in step 2 above 2 4 2 3 Obtaining the Certificate from the CA 1 The first step towards obtaining a certificate is to submit the certificate request to the CA For this connect to the Certificate server of the
302. in the database an alert message as shown in Figure 3 36 appears The user needs to now specify if he she wants to use the same account or not If the user chooses not to use the same account he she is made to repeat step 5 to create a new user account However if the user chooses to proceed by selecting the Yes option in Figure 3 36 he she is directly taken to step 13 of this setup process Question hl 2 The database user already exists do you want to use the same user Figure 3 36 Message box indicating the existence of a database user A a oc Eal If you want to set an existing database user as the eG database user then make sure you grant Note dbowner privileges to such a user 11 Database administrator privileges are required for creating a new database user The Setup now prompts the user to enter the database administrator s name and password as in Figure 3 37 The default value for the DBA user name will be sa For more information about your environment contact your database administrator Installing and Configuring on Windows Environments 12 eG Manager Setup Database Settings New database creation requires administrator privileges e g sa or in the format domain dbaaccount if Windows authentication is enabled for the SOL database server Please enter the database administrator DBA user name 4 Please enter the password Please reenter the password Figure 3 37 Setup p
303. inProcessora 5 waxProcessors 75 enab LleLookups true acceptCount 10 debug 0 scheme https secure true useURIValidationHack false gt lt Factory classNamer org apache coyote tomeat4 CoyoteServerSocketFactory elientAuth false protocol TLS gt lt Connector gt gt lt Define a Coyote JK2 AJP 1 3 Connector on port 8009 gt Clams lt Connector className org apache coyote tomeat4 CoyoteConnector port 5009 minProcessors 5 maxProcessors 75 enableLookups true redirectPort 8443 acceptCount 10 debugt 0 connect tonTimeout 200007 useURIValidationHack false protvocolHandlerC lassName org apache jk server JkCoyoteHandler gt gt lt Define an AJP 1 3 Connector on port 8009 gt For Help press F1 Figure 3 94 Changes made to the HTTP 1 1 connector block 8 Finally save the server xml file 9 Restart the Tomcat server 10 Start the eG manager 11 While connecting to the eG manager use the URL http lt eG_manager_IP gt lt port gt final admin default htm In case of an SSL enabled manager https lt eG_manager_IP gt lt SSL_port gt final admin default htm 3 9 Dealing with Operating System Variations The eG manager is a 32 bit application which can be deployed on a 64 bit Windows operating system provided the Windows host uses a 32 bit JDK If a 32 bit JDK is not available on the Windows host then the following error message appears upon att
304. inally click the Finish button to complete the user configuration see Figure 3 227 266 Installing and Configuring on Windows Environments Completing the New User Set Microsoft Wizard Internet Pema He Acceleration 2004 You have successfully completed the New User Set Wizard You created a new user set with the following configuration Name E eG Users Users Windows EGITLAB Steve Windows EGITLAB Kevin i es Windows EGITLABS Tim K P To close the wizard click Finish Ta Figure 3 227 Ending the user configuration 31 Clicking on the Finish button will take you back to Figure 3 221 where the newly configured user set will be listed along with the existing sets see Figure 3 192 Select the new user set and click the Add button Ci x User sets New Edit Delete All Authenticated Users System and Network Service Figure 3 228 Selecting the newly added user set 32 Figure 3 220 will then reappear but this time it will additionally display the chosen user set see Figure 3 193 Since the rule seeks to restrict user access to the chosen users the All Users user set can be removed To do so select the All Users user set and click the Remove button in Figure 3 229 Then click the Next gt button 267 Installing and Configuring on Windows Environments New Access Rule Wizard User Sets You can apply the rule to requests from all users Or you can limit access to specific use
305. indows 2012 host e The eGManager_win2012_x64 exe if you are installing the eG manager on a 64 bit Windows 8 Windows 2012 host To begin the installation double click on the corresponding executable The installation wizard that then appears guides you through the installation process 1 The Welcome screen appears first Click the Next button here to continue with the setup 92 Installing and Configuring on Windows Environments eG Manager Setup Welcome Welcome to the eG Manager v6 Setup program This program will install the eG Manager in your environment It is strongly recommended that you exit all windows programs before running this Setup program Bact Cancel Figure 3 1 The Welcome screen of the installation wizard 2 Accept the license agreement that follows by clicking the Yes button therein see Figure 3 2 eG Manager Setup License Agreement Please read the following license agreement carefully Press the PAGE DOWN key to see the rest of the agreement END USER LICENSE AGREEMENT FOR THE eG Products IMPORTANT PLEASE REVIEW CAREFULLY By choosing Yes when prompted to accept this license agreement or by installing the software you are consenting to be bound by and are becoming a party to this agreement If you do not agree to all of the terms of this agreement choose the No option and DO NOT INSTALL Do you accept all the terms of the preceding License Agreement IF you select No the setu
306. ing the eG SMS Manager If the manager successfully starts then the following screen will then appear C gt net stop eGSMSMgr The eGSMSMgr service is not started More help is available by typing NET HELPMSG 3521 C gt net start eGSMSMgr The eGSMSMgr service is starting m Figure 7 11 A screen indicating that the eG SMS manager has successfully started 363 Configuring the eG Manager to Send SMS Alerts Now whenever the eG manager generates alarms to a monitor user who has been configured to receive SMS alerts then the eG manager will forward the alarms to the monitor user s mobile phone using SMS For more details about configuring a monitor user refer to the eG User Manual 7 2 5 Uninstalling the eG SMS Manager To uninstall the eG SMS manager do the following 1 Stop the eG SMS manager by following the menu sequence Start gt Programs gt eG Monitoring Suite gt eG SMS Manager gt Stop SMS Manager see Figure 7 12 ost Recycle Bin Figure 7 12 Stopping the SMS manager 2 Then begin uninstalling the SMS manager by following the menu sequence Start gt Programs gt eG Monitoring Suite gt eG SMS Manager gt Uninstall SMS Manager see Figure 7 13 364 Configuring the eG Manager to Send SMS Alerts New Office Document Open Office Document Windows Update Free AOL amp Unlimited Internet RealOne Player Programs Grom a Start SMS Manager SA Stop 5M5 Manager
307. int will be about 10 15 MB additional to that of the Java Virtual Machine In total the eG agent process consumes 30 50 MB of memory For an agent that monitors multiple applications on a server or for an agent that monitors components in an agentless external manner the CPU memory and network bandwidth usage will be higher 3 24 Increasing the Memory of the eG Agent The eG agent runs as a Java process The maximum heap memory that can be allocated to a 32 bit eG agent process is limited to 1 5 GB The maximum heap memory allocation to a 64 bit eG agent process on the other hand is limited to 3 GB If an eG agent has been configured to monitor many components then you may have to allocate more heap memory to the eG agent In such a case follow the steps below for a Windows agent 1 Login to the eG agent host 2 Edit the debugon bat or debugoff bat file in the lt EG_INSTALL_DIR gt lib directory 3 Look for the entry Xmx in the file If you do not find it then insert an entry of the following format Xmx lt Memory_allocation_to_the __eG_agent gt M For instance if you want to allocate 256 MB of memory to the eG agent your Xmx specification should be as follows 234 Installing and Configuring on Windows Environments Xmx256M On the other hand if you find the entry in the debugoff bat or debugon bat file as the case may be then simply alter the lt Memory_allocation_to_the __eG_agent gt to suit your specific ne
308. ion in progress for the eGurkhaAgent service 322 1 A message indicating the successful configuration of high availability for the eGurkhaAgent service 2 Editing the Properties of the eGurkhaAgent service that has been added as a cluster resource 3 Configuring the preferred owners of the clustered eGurkhaA gent service cccecceseeseeseeseesecseceeeeceeseeseesecsecececeeseeseeaeeaeeeeseeseneeaes 4 Bringing the clustered service Online saisies itirir it aR A cendsth E REEE REAREA EEEE KEERA 5 The right panel of the Failover Cluster Manager indicating that the service is online Gy Stopping the eG agents oreeson EE E ETEO ENVEE ETE OEA gaa dav EEE E EARE EE ESE E EATE EREE 7 Stopping theeG agent on Windows Vista ccsccscvsievesasseessasessevavaxavessaeva doxasacavevsaava seusacsascvinssntsnsanaasavarssavensevasaagaresaveracvarsdesaustvateieatees 8 Stopping an eG agent on Windows 2008 9 Uninstalling the eG manager 0 Uninstall process seeking the confirmation of the user to delete the eG Manager cseeeeseeceeseeseeseeseeseeeeeeceseeseeseeseeneeeeeeeeeneeaee 1 Uninstalling the eG agentieccs csescsciscoecedteshiestvnescecavistiaieyann lesen ste E dieses Figure 3 322 Uninstall process seeking the confirmation of the user to delete the eG agent Figure 3 323 Selecting the Internet Information Services IIS Manager option Figure 3 324 Editing the pro
309. ired inputs from the iss file and perform the uninstallation automatically requiring no user intervention of any kind 3 3 Configuring Redundancy for the eG Manager on Windows To enable redundancy for a manager on Windows a special batch file needs to be executed This batch file named setup_cluster bat resides in the lt EG_INSTALL_DIR gt lib directory and when executed requests the following inputs The setup_cluster batch file will first request your confirmation to proceed with enabling manager redundancy Would you like to enable eG Manager redundancy y n n y Specifying n here will terminate the script execution If you enter y steps 12 to 22 of Section 2 2 will follow 3 4 SSL Enabling the eG Manager The eG manager on Windows includes a default SSL certificate If you SSL enable the eG manager using this default certificate then all you need to do is click the Yes button when the eG manager setup process requests you to indicate whether the manager is to be SSL enabled or not Doing so will instantly enable the eG agent to communicate with the eG manager via HTTPS However if you choose not to use the default certificate then you have the following options c You can generate a self signed certificate and use this certificate to SSL enable the eG manager OR d You can obtain a signed certificate from a valid certifying authority and use this certificate to SSL enable the eG manager If you go with option a use
310. ironments sessesesessessssseeesrersrsrsrererererrsrersreeerersrstst 177 3 11 Installing and Configuring the eG Agents on Windows 2003 XP eeesssseeseesceseeeeseteeseeseeseeseseesesaeesesseeaeeeseeeeees 178 3 12 Installing and Configuring the eG Agent on Windows 2008 Vista 7 8 2012 ececeescsesceeeeeeeeeeenetseeseeseneesees 186 3 13 Enabling the eG Agent to Allow Trusted Certificates 0 cicccceccessecseesesseeseesceecescsecsessecsessesaceesseesesaeeaesaeeaeeeseeeeees 198 3 13 1 Extracting the SSL Certificate to a Certificate File 2 0 ccc eeeeeecssesesseesceseeeceecsecsecsecsecseeaesececsessesseeseeaeeeeeeseees 198 3 13 2 Importing the SSL Certificate into the JRE of the eG Agent oes cceceeceeenetseeseeseescesesessesseesesseeaeeeseeeees 199 3 14 Configuring the eG Agent to Monitor Web Site Transactions on an ITS Web Server on Windows 2003 04 200 3 14 1 Enabling Logging on the IIS Web Servet 00 cee eeesseescescesceseeeeeecseesesseeaeeseeacsecsecsecaesaeeseeaeeassessesaeeseeseeaeeaseaseees 200 3 14 2 Modifying the eG Agent Configuration to Enable Web Transaction Monitoring 0 ccccceseeeeeeseseeseeseeseeeeeees 203 3 15 Configuring the eG Agent to Monitor an IIS Web Server Operating on Windows 2008 Windows 2012 04 205 3 16 Cofiguring the eG Agent to Monitor the Web Site Transactions on an IIS Web Server on Windows 2008 2012 214 3 17 Configuring the eG Agent to Monitor an Apache Web Server
311. is rule applies to This rule applies to Protocols Edit Ports lt Back Canc Figure 3 202 The name of the new client being displayed 8 From Figure 3 203 select HTTP and click the Add button You will return to Figure 3 202 to find the Protocols list displaying the HTTP protocol Similarly add HTTPS to the list see Figure 3 204 Add Protocols E Protocols New Edit Delete Gy Common Protocols D pus oi D HTTPS D HTTPS Server D IMAPS Server SA MSN Messenger DA Ping Di pops DA POPS Server UL POP35 Server OU smtp DA SMTP Server SA SMTPS Server SA Telnet by Telnet Server E Infrastructure x Figure 3 203 Clicking on the Destination Sets node 255 Installing and Configuring on Windows Environments New Access Rule Wizard Protocols Select the protocols this rule applies to Selected protocols Figure 3 204 The selected protocols being listed 9 Next proceed to indicate the sources from which the traffic to which the rule applies originates In our case it is the traffic emanating from the eG agents To add the agent IPs as the source click on the Add button in Figure 3 205 New Access Rule Wizard Access Rule Sources This rule will apply to traffic originating from the sources specified in this page Figure 3 205 Defining the sources 256 Installing and Configurin
312. it the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg22 so Copy the file mod_eg22 so from the opt egurkha lib directory to lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt Stop and restart the Apache server To configure the eG web adapter on Apache 2 2 on HPUX AIX follow the same procedure explained above To manually configure the eG web adapter on an Apache web server 2 4 on Linux do the following 1 2 First login to the Unix server as the Apache install user Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg24 so Copy the file mod_eg24 so from the opt egurkha lib directory to lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt Stop and restart the Apache server To configure the eG web adapter on Apache 2 4 on HPUX AIX follow the same procedure explained above 84 Installing and Configuring on Unix To manually configure the eG web adapter on an IBM HTTP Server 2 x on AIX do the following 1 2 4 First login to the AIX server as the IBM HTTP install user Edit the lt IBM_HTTP_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_ibm_eg2 so Copy the file mod_ibm_eg2 so from the opt egurkhallib directory to lt IBM_HTTP_HOME gt modules under lt IBM_HTTP_INSTALL_USER gt Stop and restart the IBM HTTP server
313. ity to listen on two ports the SSL port and the non SSL port To configure the eG manager to listen only on the SSL port simply comment that section of the server xml file where the non SSL Coyote HTTP connector on port 8081 has been defined as indicated below lt Define a non SSL Coyote HTTP 1 1 Connector on port 8081 gt lt lt Connector className org apache coyote tomcat4 CoyoteConnector Port7077 minSpareThreads 32 maxThreads 512 enableLookups true redirectPort 8443 acceptCount 10 debug 0 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 gt gt 5 Save the file 6 Then SSL enable the start_manager bat script For this first open the start_manager bat file see Figure 3 77 residing in the lt EG_INSTALL_DIR gt lib directory Change the URL http lt eGmanagerlp gt lt eGmanagerdefaultTCPPort gt final servlet upload present in the last line of the batch file to https lt eGmanagerlp gt lt eGmanagerPort gt final serviet iupload see Figure 3 77 i start_manager bat Notepad File Edit Format Help set path path C IDK13 1 1_O bin D WINNT System32 set eg_classpath D PROGRA 1 ss Itest egurkha ib classes12 zip D PROGRA 1 ss Itest egurkha 1lib eg_manager jar D PROGRA 1 s5 Ttest egurkha manager tomcat webapps final weEB INF classes D PROGRA L ss Itest egurkha lib classesl2 zip D PROGRA 1 ss1t est egurkha manager tomcat webapps iL Bd aided ba
314. k on it and pick the Properties option from its quick menu see Figure 3 235 When the Properties dialog box appears click on its Web Proxy tab to view the proxy server details see Figure 3 236 eG Agents Properties 2 x General Addresses Domains Web Browser l Auto Discovey Firewall Client Web Proxy IV Enable Web Proxy clients HTTP IV Enable HTTP HTTP port feos0 SSL I Enable SSL SSL port a3 Certificate Jegurkha0t Configure allowed authentication methods Authentication Configure advanced properties Advanced OK Cancel Apply Figure 3 236 The Web Proxy tab 271 Installing and Configuring on Windows Environments 39 In Figure 3 236 ensure that the Enable Web Proxy clients check box is selected Since the access rule that was defined earlier supports the HTTP protocol select the Enable HTTP option and provide the HTTP port of the ISA proxy server Similarly since HTTPS support is also allowed click on the Enable SSL check box and provide the SSL port of the ISA proxy server The default SSL port for an ISA proxy server is 443 In addition ensure that you import the eG manager s SSL certificate to the ISA proxy server host and associate the Certificate with the SSL port specified in Figure 3 236 using the Select button alongside 40 Next click on the Authentication button in Figure 3 236 This will lead you to Figure 3 237 wherein the Basic check
315. k the Bring Online option 294 Installing and Configuring on Windows Environments a Cluster Administrator EXTERNALAGENT ExternalAgent smalibusiness local Le on Sask ee Sj oal xe Bl sale S E Groups A cluster IP Address B Cluster Group Q Cluster Name Resources a majority Node Set _ Cluster Configuration gj NODE g NODEZ Figure 3 268 Starting the eG agent on Node 1 31 Next simulate a manual fail over and test if NODE2 can successfully run the eG agent For that first expand the NODE1 node in the tree structure in the left panel and click on the Active Groups sub node within On the right panel right click on Cluster Group and select the Move Group option from the menu Now all the cluster resources available in Cluster Group will be moved from NODE1 to NODE2 and all the respective services will be automatically started on NODE2 Login to the NODE2 server and check the status of the eG agent service to confirm that the agent is automatically started after the fail over 295 Installing and Configuring on Windows Environments y EXTERNALAGENT ene 3 Groups Cluster Group Online N fa Cluster Group _ i Gritt E Resources Cluster Configuration 3 gj NODE Rename J Active Groups _ C Active Resources New J Network Interfaces Configure Application a g NODEZ i Properties Figure 3 269 Move cluster resources from NODE1 to NODE2 32 Next specify a file share witness f
316. keyAlias egitlab1 keystoreFile lt The_full_path_to_the_keystore_file gt keystorePass mykey gt Set the port parameter in the XML block to reflect the SSL port number that you have configured for the eG manager Also note that three new parameters namely keyAlias keystoreFile and keystorePass have been inserted into the SSL block While the keystoreFile parameter has to be set to the full path to the keystore file that you generated earlier the keystorePass parameter should be set to the keystore password that you specified while issuing the keytool command Likewise the keyAlias parameter is to be set to the alias name that you provided for the certificate file when you generated it in Section 3 4 1 1 above 4 With that change the eG manager on Windows has acquired the capability to listen on two ports the SSL port and the non SSL port To configure the eG manager to listen only on the SSL port simply comment that section of the server xml file where the non SSL Coyote HTTP connector on port 8081 has been defined as indicated below lt Define a non SSL Coyote HTTP 1 1 Connector on port 8081 gt lt lt Connector className org apache coyote tomcat4 CoyoteConnector Port7077 minSpareThreads 32 maxThreads 512 enableLookups true redirectPort 8443 acceptCount 10 debug 0 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 gt gt 5 Save the file
317. l import file C tmp eGCert cer alias egcert keystore lt EG_INSTALL_DIR gt jre lib security cacerts The parameters expected by this command are alias an alias name for the certificate being imported make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document depending upon whether the certificate is a self signed certificate or a certificate obtained from a valid certificate authority For the default certificate bundled with the eG manager the alias should be eg t ab1 file the full path to the cer file that was created in Section 3 13 1 keystore the keystore file that the JVM used by the agent checks for trusted certificates specify the same file name that you used to store the key see Section 3 4 1 1 or 3 4 2 1 of this document depending upon whether the certificate is a self signed certificate or a certificate obtained from a valid certificate authority For the default certificate bundled with the eG manager the keystore should be egmanager bin This command upon execution will request for the keystore password Provide the same keystore password you provided when generating the keystore file see Section 3 4 1 1 or 3 4 2 1 as the case may be For the default certificate bundled with the eG manager the password should be eginnovations Finally the command will request your confirmation to make the imported certificate a tru
318. l have to use the standard Linux package and follow the gt installation procedure discussed above Note e A license is not required for installing an eG agent However the licensing terms of the eG manager should support the number of agents being deployed 2 9 4 Installing an Agent on AIX The standard eG agent software for AIX has been provided as a tar file named eGagent_aix tar An accompanying script called iAgent_aix drives the installation process for the agent The steps involved in installing this agent are as follows 1 To start the installation process execute the iAgent_aix script with the eGagent_aix tar file located in the same directory as iAgent_aix A The agent installation must be performed from a super user account Note 2 Next specify the user account to be used for executing the eG agent First enter the name of the eG user The default value taken is egurkha Then enter the group with which the eG user is to be associated The default value taken is egurkha The installation will attempt to create the user account if it does not exist on the system 57 Installing and Configuring on Unix Mais sexeajat wall imerall ta G agent Th G agent must be installed and executed by a separate user If you have installed the eG manager on the same system you must use the same user and the same installation directory for the manager and the agent Enter the name of th G u
319. lassName org apache coyote tomcat4 CoyoteConnec port S009 mi ere sautrecessere n7en The header of the block containing a nae EE RAITT e AJP Connector definition acceptCount 10 debug 0 connect ionTiweout 20000 useURIValidationHack false protocolHandlerClassName org apache jk server Yoyotelandler gt lt Define an AJP 1 3 Connector on port 8009 gt lt Connector className org apache ajp tomeat4 amp 3p13Connector enab ieLookups talsa porte 7079 minProcessors 32 waxProcessorsa 256 The uncommented acceptCount 20 Ggebuge 0 gt block defining the lt Define a Proxied ATTP 2 1 Connector on port 8082 gt AJP 1 3 connector lt See proxy docwrentation for more information about using this gt xja Connector ciassName org apache coyote tomcat4 Coyoteconnector port 8082 minProcessors 5 maxProcessors 75 enableLookup true acceptCount 10 debug 0 connect ionTimeout 20000 proxyPorc 30 useURIValidationHack false gt lt Define a non SSL legacy HTTP 1 1 Test Connector on port 8083 gt cia Connector cliassName org apache catalina comnector htcp Htcpconnector port S083 minProcessors 5 maxProcessors 75 enableLookups lt true redirectPort 6443 acceptCount 10 debug 0 gt xl For Help press F1 Figure 3 91 The uncommented block in the server xml file containing the AJP Connector definition 5 In order to disable the A
320. lcome screen for the New Server Cluster Wizard 275 Specifying a cluster NAME i syer aani e eA EASE EEEE EAEE EAD E EEA EEE AE aE EEA OE ANA EAEE AES 276 Specifying the computer name of the first cluster NOdC cecceseeseeseeseceeceseeseeseeseesecceeseesecsecsecseceeeseesecsecseceeeseeseeaesseeecerseeeeaeeae 276 Determining the cluster configuration Entering the IP adress of the cluster service Providing the login information for the domain account under which the cluster service will be run cceeceeceeseeseeteeeeeneeeeeeneene 279 Reviewing cluster specifications vicacceaciessvescedescencessovseceesvcuacecsovascvesseunvereosauetonsdendensveasubesevendecevenncadse Selecting the resource to be used for the quorum resource Cluster creation in progresses issictcss descdesevacesaecedesshs curve dae enc excuneacessoaaeataneauceetcucestuvesuc stv E ESAE EE AE KEE N EARNE 281 Completion of cluster creation 282 Adding a new node seseseeseeeeeeee 283 The Welcome screen of the Add Nodes Wizard Specifying the name of the new cluster NodEscereiiesrer iia eaii iiao oiko na AEE EE EASRA EA eaS EAA AOA RERESET EEKAN e Analyzing the cl st r conf p rin s isisisi ain aa S RR ET RE ENRERE EAEE E ERE KE RN E EAR Entering the domaina administrator password igure 3 257 Verifying the configurations of the ClUSter i ciscsscasssesevevascossasssasavavancossusasssssavencsavasasdssscaacsveseaesesasancsvasssascesasan
321. ld communicate with For this purpose the setup process prompts the user for the hostname or IP address and the port number of the eG manager see Figure 3 117 However 7077 is the default port The hostname should be used if DNS is enabled in the target environment Otherwise the IP address should be used 190 Installing and Configuring on Windows Environments eG Agent Setup eG Agent Setup Please enter the following details eG Manager IP Host Name 192 168 8 147 eG Manager Port 7077 Figure 3 117 Hostname and port number of the eG manager to which the agent communicates 8 The setup process requires to know if the user needs a proxy for the eG manager agent communication The same has to be indicated via the dialog box depicted by Figure 3 118 The default option is No Question GE Please indicate if you want to use a Proxy server for the eG Agent to J P communicate with the eG Manager Figure 3 118 Setup enquiring if the user wants to use a proxy server for the eG manager agent communication 9 If the user chooses to use a proxy he she has to provide the name of the proxy server followed by the port number of the proxy server in Figure 3 119 The default port number of a proxy server is 80 However if the user chooses not to use a proxy server he she will be taken to step 12 of this setup 191 Installing and Configuring on Windows Environments eG Agent Setup eG Agent Setu
322. le com Limited is installed and fully operational in the target environment o The server desktop hosting NowSMS Lite should fulfill the following requirements o Should support a USB device driver for the GSM modem if the modem is USB based The driver must be explicitly obtained from the modem vendor and installed o Should support a serial port device driver if the modem is serial port based This driver will be typically installed and available in Windows OS by default o The environment should comprise of a GSM Modem that supports an extended AT command set for sending receiving SMS messages as defined in the ETSI GSM 07 05 and and 3GPP TS 27 005 specifications the recommended GSM modems for this integration are o Wavecom Fastrack M1306B o Sierra Wireless AirLink Fasttrack Xtend o The other requirements pertaining to GSM modems include o A GSM modem can be a dedicated modem device with a serial or USB connection o The GSM modem has to be placed in a location where the signal strength is good Measure the signal strength by connecting to the modem using HyperTerminal utility available in Windows and issue the below command 355 Configuring the eG Manager to Send SMS Alerts AT CSQ The output format of the command will be in the below format CSQ lt rssi gt lt ber gt In the output lt rssi gt represents the received signal strength indicator and lt ber gt denotes the channel bit error rate While
323. le configuration cceseseeeeeeeeeeeees The details of the new protocol rule being displayed cceceseesceseesecseceseeseeseesecseccceeceseeseeseeseceeeeaceseesecsecseceeeeeeeseeaeeaeseeeneseeeeneeas The Configure Site and Content Rules page vei cecccsne steasycxcescuntascecsvesccatenvancietvckcssdeveavcietvee EAEE E EREE KERN EEA RENE The Welcome screen of the New Site and Content Rule Wizard Allowing access to a SiC veassscsssecsscsesscasevssascecadsacavevssavavcossasazeuasexaveveenennscatesaecassaasuedessccvavsavesuoasa seseaveastevbdea saceavaaateveuse EO EENES Ea tees Selecting the destination set to which the rule applies ececescesseseesecseceseeseeseesecsececeeseesecsecsecseceeeesecsecsecseceseseeseesesaeeeeerseeeeaeeaee Selecting the schedule 0 0 0 eeeeseeeereeteeteeteeees 248 Selecting the Specific Computers option Clicking on the Add button 0 Selecting the client set to be added The name of chosen client set displayed in the Client Set dialog DOX oo cece cseeecseeseeecaceecsesecsecseeecsetecsesasessetessesseeeeaeseees 250 Finishing site and content rule configuration The Configure Site and Content Rules page displaying the details of the new rule oo cece cee eeeeceeeseeteceecsetessesseeeeaeeees 251 Opening the ISA Server Management Console csscssssceeseeseeseeseesecseccceseesecsecsecseeaeeaeeseesecsecaeeeaeeseesecaeeseceeeeeeaeeaeeaeeeeneeeeeeneeas 251 The administration c
324. led Ready Figure 3 54 Selecting the New Login option In Figure 3 55 that appears specify the user name of the eG user and then provide password for the user If you have not provided a strong password an error message such as the one shown in Figure 3 56 will appear If you prefer you override the password related policies by deselecting the Enforce password policy check box in Figure 3 55 Doing so automatically disables the options below this check box 127 Installing and Configuring on Windows Environments E Login New Selectapage Script i Help A General a 4 Server Roles 2 A User Mapping Login name L Securables Windows authenticabon Ji Status SOL Server authentication Password eoceseee T Confirm password owe seseo I Enoce password policy I Enforce pas excitation ja User mas ob Word al mest login C Mapped to certificate Cerificate name Hepped te asanmetric key Keyra SSS Sesver EGURKHASAP Default database eadatabase 7 Connection Default language lt default gt X sa 32 View connection piopeities Ready Figure 3 55 Creating the eG database user Microsoft SQL Server Management Studio OE td Create Failed for Login john Microsoft SqlServer Smo Additional information is An exception occurred while executing a Transact SQL statement or batch Microsoft SqlServer ConnectionInfo i gt Passwor
325. led for East Asian Languages Note that the eG database size requirement will double if you choose the eG Manager to be double byte enabled Figure 3 8 Enabling double byte support for the eG manager For a detailed discussion on how to enable double byte support for eG Enterprise refer to Refer Chapter 4 of this manual 9 Itis essential to ensure that a database server is available to host the eG database The database server used for the eG database can either reside on the eG manager itself or it could be hosted on an external server The installation process will attempt to connect to the database server and install the eG tables objects in the database In the next step shown in Figure 3 9 specify the type of database that should be used to host the eG database 97 Installing and Configuring on Windows Environments eG Manager Setup Setup Type Select the setup type that best suits your needs Please select the type of database that you want to use to host the eG database CO MsSql server tas Figure 3 9 Specify the type of database server to be used to host the eG database If you choose Oracle here refer to Section 3 1 2 1 for further details If you select Ms SQL Server then refer to Section 3 1 2 2 for more information 3 1 2 1 Using an Oracle Database 1 The user must now ensure that the Oracle database instance is running and that there is sufficient space atleast 100MB to
326. lent mode 139 Installing and Configuring on Windows Environments 3 2 2 Silent Mode Installation of the eG Agent To install an eG agent on Windows in the silent mode the following broad steps need to be followed o Create the silent mode script for the agent installation o Use the script along with the eG agent executable to install agents on other hosts Each of these steps has been explained in depth in the sections below 3 2 2 1 Creating the Silent Mode Script for Agent Installation The first step towards installing the eG agent in the silent mode is to create the silent mode script for an agent installation The script file will carry the extension iss and will contain the inputs provided by the administrator while installing the eG agent in the normal mode Before attempting script creation ensure that the eGAgent_ lt OS gt exe is available on the local host Then to create the script do the following 1 From the command prompt switch to the directory in which the eGAgent_ lt OS gt exe resides 2 Next issue the following command eGAgent_ lt OS gt exe a r f1 lt Full path to the script file gt For example to create a script file named eGAgent_ lt OS gt iss in the c script directory the command should be eGAgent_ lt OS gt exe a r f1 c scriptleGAgent iss 3 The Normal mode agent installation will then begin The inputs supplied during the normal mode will automatically be saved in the iss
327. les for error and output logging respectively the agent on Solaris can only be configured with a single log file both errors and output will be captured by this log file only Therefore to enable error and output logging replace the dev null entry in the nohup line with the full path to the log file see Figure 2 22 79 Installing and Configuring on Unix 4 2 3 4 4 4 6 9 t 8 4 E 4 0 1 4 bin sh if d opt egurkha manager J then XMX Xmx256m fi nohup java client Xrs XMX Dsun net inetaddr ttl 900 EgMainAgent tmp agenterrout 2 gt l amp Figure 2 22 The edited starta script 6 Finally save the starta script 7 Restart the agent Before attempting to administer the eG Enterprise system ensure that sysstat package is Ea installed on the component to be monitored check for the existence of the ostat command on the target system The DiskActivity Test will not function on Unix environments without the sysstat package 2 15 Performance Impact of the eG Agent The resource utilization of an eG agent is dependent on various factors including e the number of components that are being monitored by the eG agent e the specific component types to be monitored e the frequency of monitoring e whether the agent is monitoring applications in an agent based or an agentless manner For an internal agent m
328. licking a WWW Service Master Properties dialog box will appear The Web Site tab of the dialog box will open by default Change the TCP Port entry in that tab so as to make the eG manager listen to the new port 381 Troubleshooting Similarly you need to reconfigure all agents manually to talk to the manager using the new port You can do this by editing the debugoff script Windows in the lt EG_HOME_DIR gt lib directory or start_agent script file UNIX in the same directory Search for port 7077 and replace it with your port number Save the file and run the script file Restart the agent and check if it is talking to the new port 8 3 Configuring the eG Database e My eG manager is using an Oracle backend Lately my manager is experiencing a lot of connection issues When I checked the manager tomcat debug file If found the following error message java sql SQLException OALL8 is in an inconsistent state What is the reason for this error and how do I resolve the connection issues that have surfaced as a result This error message appears when there is a JDBC driver mismatch i e when the JDBC driver bundled with the eG manager is not compatible with the JDBC driver of the Oracle database that is in use in the monitored environment To resolve this issue do the following O Take a backup of the JDBC driver that is bundled with the eG manager from the lt EG_INSTALL_DIR gt lib folder Download the latest rel
329. lient side logging fields to 3 Application Pools g and to configure additional logging settings amp FTP Sites Group by No Grouping s S Sites Name _ Enabled oCOMPUTERNAME Server Enabled WebAdapterFile Enabled J OOo a Ere comer Figure 3 152 Enabling advanced logging Next restart IIS for the changes to take effect Add Log Definition Edit Log Definition Remove Log Definition Disable Log Definition Clone Log Definition Enable Advanced Logging lt f Enable Client Logging Edit Logging Fields Edit Log Directory View Log Files Help Online Help be If you now want to view the advanced log files first open the Internet Information Services IIS Manager console using the menu sequence Start gt Programs gt Administrative Tools gt Internet Information Services IIS Manager Then in the tree structure that appears click on the node representing the IIS web server host Next from the options displayed in the right panel click on Advanced Logging Figure 3 152 will then appear Select the WebAdapterFile entry in Figure 3 152 and click on the View Log Files option in the Actions list This will invoke Figure 3 153 where all the log files saved to the lt EG_INSTALL_DIR gt agent logs IISAdvlogs directory will be displayed 222 Installing and Configuring on Windows Environments 11SAdvlogs GO Computer Local Disk C eGurkha agent lags IISAdvlogs gt fiero
330. line Help p Crer vow J conten ew Configuration localhost applicationHost config Figure 3 150 The newly added log definition displayed in the list of log files that pre exist 12 Now select the WebAdapterFile entry in Figure 3 150 and click on the Edit Log Directory option in the Actions list as indicated by Figure 3 150 When Figure 3 151 appears change the default values of the Server log directory and Default site log directory text boxes to lt EG_INSTALL_DIR gt agent logs lISAdvlogs directory Then click the OK button therein Edit Log Directory 29x Server log directory C eGurkha agent lags I1SAdvlogs on Default site log directory C eGurkhalagent logs IISAdvlogs as Figure 3 151 Changing the server log and default site log directories 13 This will lead you to Figure 3 152 Click on the Enable Advanced Logging option in the Actions list of Figure 3 152 to enable advanced logging 221 Installing and Configuring on Windows Environments s Internet Information Services IIS Manager BEE E gt SH gt WIN DXMESFXBON3 gt Eile Yiew Help jg ao Alerts The Advanced Logging feature is disabled Configuration localhost applicationHost config 14 15 16 e ia le oy Advanced Logging amp Start Page Cn i i k r X ee a s WIN DXMESFXBON3 WIN OXME ee he feaa to free sid faaye k fenos which specify which server side and c
331. lizzazione Lingua di input Formato Localit Nuovi account utente Lingua di visualizzazione Lingua di input Formato italiano Inglese Stati Uniti Stati Uniti Inglese India Stati Uniti italiano Inglese Stati Uniti Stati Uniti Inglese Andia Stati Uniti italiano Inglese Stati Uniti Stati Uniti Inglese Stati Uniti Copia le impostazioni correnti in I Schermata iniziale e account di sistema I Nuovi account utente La lingua di visualizzazione per i nuovi account utente corrisponde attualmente a quella della schermata iniziale Figure 3 163 Copying the current user s settings to the system accounts 3 21 The eG Agent Services The following services are started when the eG agent is installed The services are e eGurkhaAgent core agent process e eGAgentMon agent recovery process If the status corresponding to the eGurkhaAgent service shows Started then it implies that the agent has been started successfully 3 22 Troubleshooting the Failure of the eG Agent Please check the lt EG_HOME_DIR gt agent logs error_log file to find out the reasons due to which the agent failed to start In Windows environments executing the eG agent in the debugon mode automatically triggers error logging The steps involved in this process are detailed below 1 Stop the eG agent 2 Run the debugon bat file in the lt EG_AGENT_INSTALL_DIR gt lib directory by double clicking on it 233
332. lled operating system A computer with a LanguageID of 009 the English LanguageID has the following Perflib Language subkey HKEY_LOCAL_MACHINE Software Microsoft Windows NT CurrentVersion Perflib 009 The Disk Performance Statistics Driver diskperf should exist on the target computer allow READ access explicitly to the user account for the following registry key and all subkeys HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services Diskperf 196 Installing and Configuring on Windows Environments The monitored computer should be able to connect to IPC The following registry entry enables connecting to IPC o Hive HKEY_LOCAL_MACHINE SYSTEM o Key CurrentControlSet Services LanmanServer Parameters o Name AutoShareWks o Type REG_DWORD o Value 1 At least READ access should be granted to the following registry subkey allowing it to remotely connect to the Windows registry HKLM SYSTEM CurrentControlSet Control SecurePipeServers winreg This permission determines who can remotely connect to a registry If this subkey does not exist all users can remotely connect to the registry To remotely connect to a registry a user must have at least READ access to the winreg subkey on the target computer At least READ access should be granted to the following registry keys on the remote computer o HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Control SecurePipeServ ers winreg o HKEY_LOCAL_MACHINE SOFTWARE Microsoft WindowsNT Curren
333. lling and Configuring on Windows Environments e While specifying the host name IP address of the manager please take care of the following aspects 3 a If the host name is provided when installing the manager use this name and not the IP address for accessing the user interface via the web browser Note b If the host name is provided make sure that forward and reverse lookups for this name are enabled via the DNS service in the target environment e When configuring the IP address of the eG manager note that both IPv4 and IPv6 addresses are supported 8 The eG Enterprise system provides users with the option to view and key in data in a language of their choice Different users connecting to the same manager can view data in different languages However some languages such as Chinese Japanese and Korean support a double byte character set To view data in the eG user interface in Chinese Korean or Japanese the eG manager should be explicitly configured to display and process double byte characters In such a case enable double byte support for the eG manager by clicking the Yes button in Figure 3 8 On the other hand for handling the character sets of other languages example French German Spanish Portugese etc the eG manager need not be double byte enabled At such times click the No button to disable double byte support for the eG manager Question x Do you require the eG Manager to be double byte enab
334. lt EG_HOME_DIR gt manager logs directory Likewise to detect problems with the eG agent please look at the error_log file in the lt EG_HOME_DIR gt agenti logs directory 384 Troubleshooting 8 8 Configuring Double byte Support e Ihave enabled double byte support for my eG manager My admin and monitor user interfaces now display double byte characters However I am unable to save any of the reports that eG Reporter provides as PDF documents What could be the problem O z S If you are working with an eG manager that is double byte enabled then you can save the reports that are generated by that manager as PDF documents only if the instructions given below are followed Until then eG Enterprise will not allow you to save any report as a PDF Download the font file Code2000 ttf from the web In fact there are many web sites that provide downloads of this file The site that we recommend is http www code2000 net code20000_page htm Copy the downloaded font file to the lt EG_INSTALL_DIR gt lib directory Next move to the lt EG_INSTALL_DIR gt lib directory and issue the following command jar cvf font jar CODE2000 TTF Finally check whether the font jar is created in the lt EG_INSTALL_DIR gt lib directory If your eG manager is double byte enabled but the Language preference that you have set in the USER PROFILE page is English then you do not have to follow the steps discussed above to ensure that repo
335. ly supercedes any SmsServer SmsPort or SmsService that you might have previously configured in the eg_services ini file The Air2WebUrl specification should be of the following format http lt IP_Address_of_Air2web_Service gt failsafe HttpPublishLink pcode lt Pass_code_provided_by_Air2web gt aco de lt Application_code_provided_by_Air2web gt amp mnumber amp message amp pin lt ldentification_code_provided_by_Air2 web gt 366 Configuring the eG Manager to Send SMS Alerts For instance say the details of your Air2Web subscription are as follows IP Address of Air2web service 192 168 10 112 Pass code provided by Air2web egaweb112 Application code provided by Air2web egapp112 Identification code provided by Air2web eginvi12 In this case your Air2WebURLspecification would be Attp 192 168 10 112 failsafe HttpPublishLink pcode egaweb1 12 acode egapp112 amp mnumber amp messa ge amp pin eginv112 Then save the eg_services ini file Once this is done then every time an SMS alert is to be sent to a user the following occur automatically The eG manager reads the mobile number configured for that user from the user profile oo eS This mobile number is then automatically inserted against the mnumber parameter in the Air2WebUrl specification 7 Likewise the eG manager also inserts the contents of the SMS alert against the message parameter in the Air2WebUrl specification 8 Once the entire URL is complete
336. manager is configured using the IP address then ensure that cluster setup is also performed using the IP address alone 6 Once the IP and port are provided steps 12 to 22 of Section 2 2 will follow 2 4 SSL enabling the eG Manager on Unix The eG manager on Unix includes a default SSL certificate If you SSL enable the eG manager using this default certificate then all you need to do is enter y when the eG manager setup process requests you to indicate whether the manager is to be SSL enabled or not Doing so will instantly enable the eG agent to communicate with the eG manager via HTTPS However if you choose not to use the default certificate then you have the following options a You can generate a self signed certificate and use this certificate to SSL enable the eG manager OR b You can obtain a signed certificate from a valid certifying authority and use this certificate to SSL enable the eG manager 36 Installing and Configuring on Unix If you go with option a use the procedure detailed in Section 2 4 1 If you pick option b use the procedure detailed in Section 2 4 2 2 4 1 SSL Enabling the eG Manager Using a Self Signed SSL Certificate If you do not want to use the default SSL certificate bundled with the eG manager then you can generate a self signed certificate and use it instead for SSL enabling the agent manager communication For this follow the steps given below e Generate the Keystore file
337. mitting SMS messages to configured recipients 151 x E PaceGate se Program Database Scheduler gt Interfaces Pi t 7 Connectors ag e a e 2 Carrig Reci Version 4 0 it Grou Cancel Messages at ji a aa This is a partialy disabled evaluation version of our product It will only allow W Reports two users to be active and will stop itself every three to five days Registration Q Help NotePage Inc Phone 781 829 0500 291 Rockland Street Fax 781 582 1869 Suite 13 sales notepage net Hanover M 02339 www notepage net Copyright 1997 2001 Notepage Inc Figure 7 19 Adding a carrier Upon selecting the Add option the right pane will change to display an interface using which the new carrier s details can be provided 369 Configuring the eG Manager to Send SMS Alerts PG Admin E E PageGate Program j Database R Scheduler E i Interfaces Connectors Recipients 4g Groups Eag Logging Reports Registration Figure 7 20 Specifying the details of the new carrier 7 In Figure 7 19 enter the carrier name and phone number and retain the default values for all other fields 8 Finally click on the Apply button to create the carrier 9 Next to enable the PageGate server to get SMS messages using a command line ASCII interface expand the Interfa
338. munication via the proxy server If setAuthentication is set to n then set proxyUsername to none m ProxyPassword This parameter is applicable only if setAuthentication is set to y In this case against proxyPassword provide the password that corresponding to the specified proxyUsername If setAuthentication is set to n then set proxyUsername to none n useSSL Set this flag to y if you want the eG agent to communicate with the manager via SSL If not set this flag to n o trustedCertificates This flag is applicable only if useSSL is set to y To allow trusted certificates only set this flag to y To enable the agent to accept any certificate set this flag to n If useSSL is set to n instead the trustedCertificates flag should be set to n as well p setNickName If you want to set a nick name for the agent set this flag to y If not set this flag to n q nickNameToUse This flag is applicable only if setNickName is set to y In such a case specify the nick name to be assigned to the agent By default the host name of the agent host will be set as the nick name You can change this nick name if need be 5 You cannot configure specific applications such as ColdFusion Sybase for monitoring in the silent mode For this purpose you will have to follow the separate configuration Note instructions provided for these applications in the eG Installation Guide 6 Once all the aforesaid parameters are configured with the
339. n in the case of a corporate Intranet that comprises of different independent domains Introduction Internal E 3 Agent ms C ustomer C External Operator Router Internal E E Agent External Figure 1 3 A typical deployment architecture of eG Enterprise 1 1 3 Database The eG database is responsible for persistent storage of the measurement results Separate tables are maintained for each of the tests being executed by eG agents Besides the measurement tables the database hosts threshold tables for each test A threshold table indicates the upper and lower ranges of the threshold values for each measurement The database design provides a way to periodically purge old data from the database The periodicity with which the data will be purged by the database is configurable by the user 1 1 4 User Interface A web based user interface enables a user to interact with eG Enterprise The recommended browser for the eG user interface is Internet Explorer 10 or higher Mozilla Firefox v25 or higher and Chrome Broadly the eG user interface allows a user to first customize the configuration of eG Enterprise i e what servers and web sites to monitor how frequently to monitor what specific tests to run etc and subsequently to monitor the measurements made by the agents To avoid overwhelming users with the variety and amount of results being generated based on measurements made by the eG agents th
340. n change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for every intermediate certificate file the name of the intermediate certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 2 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 2 4 2 1 above for details 3 Finally import the entity domain certificate into the keystore by issuing the following command keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 2 4 2 1 file the name of the domain certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 2 1 above 48 Installing and Configuring on Unix A
341. n of the eG agent setup program cescsecceceseeseeseeseceeeeseeseeseesecsecsecsecseeseesecsecsecsaeeaeeaeeaecsecseceseaeeaeeaeeaeeneserseaeenees 187 Figure 3 112 License agreement for the eG agent 188 Figure 3 113 Location of the eG agent is cscssscascissesssesesassncsesavasaievacanceesanasncavacancesavatsatevsastdvbavateatexcastaveeys 188 Figure 3 114 A message box requesting the user s confirmation to enable SSL support for the eG agent Figure 3 115 A message box requesting your confirmation to allow only trusted certificates 0 00 ccc eee cseeeeseeseeecseeecsesseecseseesecseeeaseeees Figure 3 116 Specifying the IP hostname and SSL port of the eG manager ceeceeeeseeseeseeseeeeceeceseeseesecsecseesceeaeeaeesecsecseceseseeaeeaeeaecneseeseasenees Figure 3 117 Hostname and port number of the eG manager to which the agent communicates Figure 3 118 Setup enquiring if the user wants to use a proxy server for the eG manager agent communication Lee eee eects eeeeeeeeeee 191 Figure 3 119 Specifying the proxy server that the agent may need to use to communicate with the eG manage eee eset ete teeeeeeeeee 192 Figure 3 120 Setup seeking the confirmation regarding authentication of the proxy Server cece 192 Figure 3 121 Username and password to be used for communication via a proxy server 193 Figure 3 122 Information specified by the user at the various stages of the setup process
342. n the left pane of Figure 3 170 This will open the Configure Destination Sets page in the right pane see Figure 3 170 E Microsoft Internet Security and Acceleration Server 2000 Administration a lol x action vew e alm ale Tree Configure Destination Sets EGISASERVER Array Destination sets include one or more computers or directories on specific computers For access policy rules destination sets include computers that are not on your internal network For Web publishing rules and server publishing rules destination sets include computers that are in your internal network Internet Security and Acceleration Server 2000 GS Arrays E EGISASERVER Array E e Monitoring 48 Server E 3 Access Policy m Publishing E Bandwidth Rules 8 e Policy Elements E Schedules Bandwidth Priorities fen f Destination Sets E Client Address Sets E Protocol Definitions E Content Groups t Cache Configuration K Monitoring Configuration H 3 Extensions EA Network Configuration mi Client Configuration m f H323 Gatekeepers Current destination sets servers tination set Delete destination sets Modify destination sets Figure 3 170 Clicking on the Destination Sets node The New Destination Set dialog box will then appear see Figure 3 171 Here assign a Name to the new destination set and then click the Add button therein to specify the computers that need to
343. nabled for SSL support If the user chooses y the setup process configures the web adapter for SSL support The following error message appears if the web server is not configured with Dynamic Shared Object DSO support KKKKKKKKKKKK KK KK KK KK KK KKKK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKK 5 This web server has not been configured with DSO support Th G SSL enabled web adapter cannot be installed Please reconfigure this web server with DSO support and run the command opt egurkha bin setup_ webadapter to configure the web server with eG agent s web adapter capability KREKKKKKKKKKKKEK KK KK KK KKK KKK KK KK KK KK KK KK KK KK KKKKKKKK KK KKKKKKKKKKKKK Next the configuration process prompts the user to determine if the user is the administrator of the web server that is to be configured for monitoring by an eG agent If the user is not the web server administrator the configuration process prompts the user for the web server administrator s login name and password The configuration process attempts to update the web server s startup file s to include eG specific start up information The configuration process terminates with the following message KKKKKKKKKK KK KK KK KK KK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKK If there are any errors in the above process you may not have permission to update the web server s configuration Please have the web server s administrator run the command opt egurkha
344. nager agent communication The same has to be indicated via the dialog box depicted by Figure 3 103 The default option is No Question 3 Please indicate if you want to use a Proxy server for the eG Agent to communicate with the eG Manager Figure 3 103 Setup enquiring if the user wants to use a proxy server for the eG manager agent communication 9 If the user chooses to use a proxy he she has to provide the name of the proxy server followed by the port 181 Installing and Configuring on Windows Environments number of the proxy server in Figure 3 104 The default port number of a proxy server is 80 However if the user chooses not to use a proxy server he she will be taken to step 12 of this setup eG Agent Setup eG Agent Setup Please enter the following details Proxy server IP Host Name 192 168 10 5 Proxy server Port Figure 3 104 Specifying the proxy server that the agent may need to use to communicate with the eG manager 10 Some proxy servers may be setup to validate incoming requests based on the user name and password specified before forwarding the requests to other web servers To support such cases the setup process enquires as to whether authentication is required by the proxy server see Figure 3 105 The default option is No Question 3 Do you need authentication For the Proxy server Figure 3 105 Setup seeking the confirmation regarding authentication of the proxy server
345. nally import the entity domain certificate into the keystore by issuing the following command keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 2 4 1 1 file the name of the domain certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 1 1 above A If the domain certificate import command throws an error for any reason it could be because all related certificates may not have been imported Check the web site of the CA for more Note details Importing a Certificate that is in the PEM Format PEM is a container format that may include just the public certificate such as with Apache installs and CA certificate files et ssl certs or may include an entire certificate chain including public key private key and root certificates or may only contain a certificate and a private key If the certificate you downloaded is in the PEM format and includes only a certificate file and a private key fil
346. nd Compose Signstues Reading Messages F Mark message read alter displaying tor g zj seconds JT Automaticaly expand grouped messages W Aulomaticaly download message when viewing in the Previews Pane I Read all messages in plain text Show ToolTips in the message Ist for clipped tems Highight watched messages IEEE Red z News Ef W Ge 300 headers ata tme S Mark al messages as read when exiting a newsgroup Forks Click here to change the fonts and default encoding used when reading messages E Figure 4 2 Clicking on the Fonts button In the Fonts dialog box select Unicode from the Font Settings list select any Universal font from the Proportional font list and choose the Unicode UTF 8 option from the Encoding list Finally click the ok button to save the changes Proportional font Arial z Fixed vadth fort CcurierNew y Font size Medium he eran fincode ure SSCS Figure 4 3 Defining font settings 4 To display double byte data eG Enterprise requires Universal fonts The preferred Universal fonts are e ArialUniCodeMS Sutiable for Chinese Korean Spanish german Japanese French Porthugese German spanish Russian e Code2000 Sutiable for French Porthugese German spanish Russian e evermono Suitable for Chinese Korean Spanish German Japanese French Portugese German Spanish 343 Configuring Double byte Support for eG Enterprise Russian e Cyberbit Sui
347. nd all intermediate certificates are trustworthy A certificate chain will therefore consist of multiple certificates Before importing each of these certificates you will have to understand the hierarchy of the certificates To know which is the root and which is the intermediate certificate refer to the web site of the certificate authority Then follow the steps below 1 First import the Root certificate For this execute the following commands one after another in the command prompt cd JAVA_HOME bin keytool import trustcacerts alias rootcert file lt Name_of_the_root_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypassmykey storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for the root certificate file the name of the root certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 1 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 3 4 1 1 above for details 2 Next import each of the intermediate certificates one after another using the following
348. ndingRetry 3 Preserve Order Flag PreserveOrdertrue LogEnabled false Log Path LogPath Wogs Log File LogF ile eGSMSMogr log Log File Size LogSize 2 RMI Server port in which the Serice Binds The default port of RMSererPot 13345 e RMI Service Name the eG SMS RMISewiceName GSMEngine manager The default service name of the eG SMS manager Fj Figure 7 8 The contents of the eGSMSMgr properties file 2 As indicated by Figure 7 8 note that the egSMSMgr properties file consists of the default RMIServerPort and the RMlServiceName values These values can be changed if required 3 Also note that a Command parameter exists in the eGSMSMgr properties file of Figure 7 8 In some environments GSM modems may support a command line interface through which SMS messages can be sent The eG SMS manager can be configured to use the command line interface using the Command specification in the eGSMSMgr properties file of Figure 7 8 By default the Command specification is disabled in the eGSMSMgr properties file A sample command specification has been provided in this file for your benefit In this example the command is echo MSG message mobile gt port When the SMS message is sent by the eG SMS manager it replaces message with the actual message to be sent mobile represents the mobile number to which the SMS should be sent and port is the port number that should be used for sending the SMS message 4 Now
349. ndow of the Microsoft SQL Server Management Studio 6 Then to create a new eG database user expand the Security node in the tree structure in the left pane right click on the Logins sub node and select the New Login option see Figure 3 54 126 Installing and Configuring on Windows Environments E Microsoft SQL Server Management Studio File Edt Wew Tools Window Community Help EL New Query Oy 2B ob US DIS OB te Summary x a a 2 YE Brrr J Logins EGURKHASAP SecurityjLogns 16 Item s d gabc 12 13 2020 Ay EGURKHASAP Administrator PR BUILTIN Administrators 12 13 2020 ER EEES A eqdatabase 12414 2020 EGURKHAS A er ver A egdbuser 12414 2020 gt aai A EGURKHASAP Administrator 12 13 2020 An PRJEGURKHASAPSQL Server2005MSFTEUserfEGURKHASAP MESQL 12 13 2020 By NT AUTHORITYINETWORK SERVICE SRJEGURKHASAPISOA Server200SMSSOLUserfEGURKHASAPSMSSQL 12 13 2020 NT AUTHORITYISYSTEM PRJEGURKHASAP SCE Server2005SQLAgentUserfEGURKHASAPSMS 12 13 2020 amp piya Aa eguser 12 14 2020 A ratheesh GQ NT AUTHORITYINETWORK SERVICE 12 13 2020 Aso A NT AUTHORITYISYSTEM 12 13 2020 Ak A priya 12 4 2020 E Server Roks A ratheesh 12 13 2020 AR bukadmin As 4 8 2003 chcreator Akk 12 14 2006 Gskadmin processadmin seourityadmin AR sevveradmin setupadmin D sysadmin Credertials D Server Objects CI Replication 3 Management O Notification Services L SQ Server Agent Agent XPs disab
350. ne a non SSL Coyote HTTP 1 1 Connector on port 8081 gt lt lt Connector className org apache coyote tomcat4 CoyoteConnector 50 Installing and Configuring on Unix 10 pont u CCIM nage r Poies milimlPicocessorms S24 maxProcessors 256 enableLookups true redirectPort 8443 acceptCount 10 debug 0 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 gt gt Save the file Next make sure that the eG manager URL configured against the MailHomeURL parameter in the MISC_ARGS section of the eg_services ini file in the opt egurkha manager config directory begins with https nstead of http Then save the file Finally start the eG manager 2 5 Configuring Tomcat to Listen on Multiple Ports By default Tomcat listens on port 8080 However if you want to configure Tomcat to listen on say port 8081 as well follow the steps below 1 2 4 5 Edit the server xml file in the lt CATALINA_HOME gt conf directory on the eG manager host Look for the following lines in the server xml file lt Connector port 8080 protocol HTTP 1 1 connection Timeout 20000 redirectPort 5443 gt Replace the above mentioned lines with the following lines lt Connector port 8080 maxThreads 150 minSpareThreads 25 maxSpareThreads 75 enableLookups false redirectPort 8443 acceptCount 100 debug 0 connectionTimeout 20000 disableUploadTimeout true gt lt
351. nevedsessuaeuvessenedvsesedeavensdecwsessacetes Selecting the Remove option from the Actions Menu cceccecceseeseeseesecseceseeseeseesecsecseesaceseeseesecsecseceaeeseesesseesecseceeeeaeeseesecaesneeeeeeaeenees Confirming removal of the eG software by selecting the OK button an Stat s changing to Completed ccs nio oreo taat E e VEE ETENE EE E EEEE EEEE EEE EEEE EE E The Welcome screen of the installation Wizard isco c0s0sssssesesuss vous sassnsesisssesesuesesetaveatsusssazesedussvestessasesrausevisnaesetodedesizeseateazecedbgssscsasaeseaels Accepting the license agreement for installing the eG manager Selecting a JDK version to use for manager installation c cecceseeseeseeseeeeceseeseesecsecsececeseeseesecsecseeeeeaeeaeesecsecaeseeeaeeaeeaeeaesaeeeeeeaseneeaes Setup enquiring the availability of JDK in the environment ecccescesseeceeeeeeesecsecececeseeseesecsecsecaeaeeaeeseesecseceeseaeeseeaeeaesaeeeeseeseaeenes Specifying the location of the Java home directory for installing the eG manager Selecting the IP address host name to use for the eG manager Hostname and port number of the system on which the eG manager will execute SS Enabling double byte support for the eG manager seeccececcesceseeseeseeeeeeeeeseeseesecsecseeeceseeseesecsecseceeeaeeseesecaececeaeeaeeaeeaeeaeeeeceeseeeeatens Specify the type of database server to be used to host the eG database cece ees eesscceececsesecseeeeseesesessceecs
352. nfigured to handle such environments There are various scenarios to be considered depending on whether the manager and agents reside in network address translated environments 6 1 Manager behind a NAT Consider the case where the eG manager and agents are in a private Intranet see Figure 4 1 All the agents can be configured to communicate with the manager using its private IP address In this case if external access from the Internet is required for the eG manager network address translation can be setup so the eG manager can be accessed using a public IP address from the Internet In the example in Figure 5 1 the manager is installed on a private address 10 5 20 12 The agents are installed on private addresses 10 5 20 4 10 5 20 11 10 5 20 19 The manager is accessible from the Internet via a public address 209 15 165 127 In this case users inside the Intranet eg User A can use the URL http 10 5 20 12 to connect to the manager while users on the Internet eg User B must use the URL http 209 15 165 127 to connect to the manager see Figure 6 1 349 Configuring eG Enterprise to Work in NATed Environments Private Intranet a G agenton Agent repatting F measures tothe 10 5 20 4 nears m nager T j http 1209 15 165 127 Ageri Cong c lam 7 measures to the gt SB manager 2 Agent reporting NAT a rad Extem lly visble messures l eGinanager on eG agent on BO9ASAG5 A2T 10 5 2
353. nfiguring on Windows Environments IIS Advanced Logging 1 0 Setup Microsoft Internet Information Services Setup Wizard Click the Finish button to exit the Setup Wizard Bm Es Completed the IIS Advanced Logging 1 0 Figure 3 144 Finishing the installation 6 Next proceed to configure the Advanced Logs For that first open the Internet Information Services IIS Manager console using the menu sequence Start gt Programs gt Administrative Tools gt Internet Information Services IIS Manager Figure 3 145 will then appear te Internet Information Services IIS Manager Go 3 gt WIN DXMEBFXBON3 gt File View Help e Eae eJ WIN DXME8FXBON3 Home Min ENA pa ai oer 50 MEJ Groupby Area gt Ej Restart ASP NET Sai z _ B stop V we H to w Ea view nop Pools NET NET ANET Trust Application Connection Machine Key Pages and Vow Stes Compilation Globalization Levels Settings Strings Controls Help R amp el Online Help Providers Session State SMTP E mail us B amp g g o Advanced Authentication CGI Compression Default Directory Logging Document Browsing i ai z a cq ae 2 8 amp WF FF Error Pages Failed Request Handler HTTP Redirect HTTP IPv4 Address ISAPI and CGI Tracing Rules Mappings Respo and Domai Restrictions n k gt 6 rt ARTA ISAPI Filters Logging MIME Types Modules Output Server Worker Caching Certificates
354. ng command to set the values ulimit n 8192 Check the UNIX reference pages on the ulimit command for the syntax of different shells Recommended value 8192 On Solaris setting the maximum number of open files property using ulimit has the biggest impact on your efforts to support the maximum number of RMI IIOP clients To increase the hard limit add the following command to etc system and reboot it once g lil set rlim_fd_max 8192 gt Solaris TCP_TIME_WAIT_INTERVAL Description Installing and Configuring on Unix Notifies TCP IP on how long to keep the connection control blocks closed After the applications complete the TCP IP connection the control blocks are kept for the specified time When high connection rates occur a large backlog of the TCP IP connections accumulate and can slow server performance The server can stall during certain peak periods If the server stalls the netstat command shows that many of the sockets that are opened to the HTTP server are in the CLOSE_WAIT or FIN_WAIT_2 state Visible delays can occur for up to four minutes during which time the server does not send any responses but CPU utilization stays high with all of the activities in system processes How to view or set Use the get command to determine the current interval and the set command to specify an interval For example ndd get dev tcp tcp time wait interval ndd set dev tcp tcp time wait interval 30000 Default
355. ng exported VV VV WV out Specify the name of the keystore file to which the certificate and private key are to be exported The keystore file can have any name of your choice Next you need to convert the keystore file which is currently in the pkcs12 format into the Java keystore i e JKS format For this issue the following command at the command prompt keytool importkeystore alias egitlab1 deststorepass mykey destkeypass mykey destkeystore keystore jks srckeystore keystore pk12 srcstoretype PKCS12 srcstorepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the aliasname of the certificate being requested make sure that you provide the same alias name that you specified in Section 2 4 2 1 of this document gt deststorepass this refers to the storepass of the destination keystore file i e the keystore file in the JKS format The storepass of the destination keystore should be the same as the storepass of the source keystore gt destkeypass this refers to the keypass of the destination keystore file i e the keystore file in the JKS format The storepass and keypass of the destination keystore file should be the same gt destkeystore the name of the destination keystore file i e the keystore file in the JKS format 49 Installing and Confi
356. ng on Windows Environments fa on sgure Cluster Quorum Wiz aed You we ready to corpse the quonum eating of the chiste 0 200 41 310 egi_attp Quorum Configuration Node and File Share Mapornty Your cluster quorum comfiguraton will be changed to the configuration shown above Figure 3 300 Reviewing the quorum settings 5 Click the Finish button in Figure 3 301 to end the quorum configuration process W Configure Cluster Quorum Wizard You have successhly configured the quonss settings for the chuter Configure Cluster Quorum Settings Share 0 200 41 510 egi_attp Quorum Configuration Node end File Share Maponty To view the report created by the waad ch View Repot To clone ther wanaed click Finish Figure 3 301 Completion of quorum configuration 3 27 4 Adding the eG Agent Service as a Cluster Resource The final step is to add the eGurkhaAgent service as a cluster resource For this follow the steps discussed hereunder 317 Installing and Configuring on Windows Environments Launch the Failover Cluster Manager In the tree view in the left panel of the manager expand the node representing the cluster and right click on the Services and Applications sub node within Then pick the Configure a Service or Application option from the shortcut menu that pops up of Cluster ATTP EGIRACNS Node and File Share Magonty 10 200 41 1 10 eg _ ate a Events Cow ma A Em Configure hgh svalatdey la a pecie serce a
357. nments ka Server Manager EGURKHAZOO8LIC a Get an overview of the status of this server perform top management tasks and add or remove server roles and features 5 SF Storage Server Summary Server Summary Help Computer Information amp Change System Properties Ful Computer Name egurkha2008lic CHN EGURKHA COM 2 View Network Connections Configure Remote Desktop Domain CHN EGURKHA COM Local Area Connection 1Py4 address assigned by DHCP IPv6 enabled Remote Desktop Enabled Product ID 5041 339 3906613 76477 TF Dont show me this console at logon Security Information I Go to Windows Firewall Windows Frewal Off E Configure Updates 4 Check for New Roles Windows Updates Install updates automatically using Microsoft Update E Run Securty Configuration Wizard Last checked for updates 11 2 2008 6 22 PM Ci Configure 1 ESC Last installed updates 10 30 2008 3 00 AM TE Enhanced Security Configuration On For Administrators ESC On For Users Roles Summary Roles Summary Help Roles 1 of 16 installed 2 Goto Roles 4 EJ S Last Refresh 11 3 2008 10 37 40AM Configure refresh Figure 3 134 The Server Manager console 4 In the Server Manager console click on the Roles node in the tree structure in the left panel of the console The information in the right panel will change to display a Roles Summary and related details To add a new role click on the Add Roles option in the right panel pf Fi
358. nor customizations such as default documents and HTTP errors monitor and log server activity and configure static content compression Additional Information Overview of Web Server IS Overview of Available Role Services in 11S 7 0 TES Checklists Overview of WSRM lt Previous Line gt inzal Cancel Figure 3 138 An introduction to the web server role 8 The next step will prompt you to choose the role services Select all the listed services and click the Next button to proceed Make sure that the IIS Management Scripts and Tools feature in particular is installed and enabled for the Web Server role 210 Installing and Configuring on Windows Environments Add Roles Wizard is Select Role Services Web Server E Common HTTP Features Static Content Default Document V Directory Browsing HTTP Errors HTTP Redirection E Application Development ASP NET V NET Extensibility ISAPI Filters Server Side Includes E Health and Diagnostics HTTP Logging Logging Tools Request Monitor Tracing Custom Logging E anor i Figure 3 139 Selecting the required role services 9 The screen that appears subsequently provides a summary of your specifications After reviewing your selections you can confirm installation of the chosen web server role by clicking on the Install button in Figure 3 140 211 Installing and Configuring on Windows Environments
359. nsure that they are separated by a Also ensure that a nick name does not contain any white spaces and that all nick names are in lower case 7 The next step involves configuration of any Coldfusion application servers for monitoring by the eG agent Do you want to configure any Coldfusion servers running on lt the host gt for monitoring by the eG Agent y n y The steps involved in this process are enumerated in Section 2 18 8 Next the setup will request your confirmation to configure any Sybase Adaptive servers for monitoring by the 65 Installing and Configuring on Unix 10 eG agent Do you want to configure any Sybase Adaptive servers running on lt the host gt for monitoring by the eG Agent y n y The steps involved in this process are enumerated in the Configuring and Monitoring Database Servers document If you are configuring an agent on a Solaris host then you would be prompted to configure the web server executing on the host Enter y to invoke the setup_webadapter script this script enables you to configure a web adapter on the Solaris host for monitoring the transactions to the web server on it If you do not want to monitor a web server then enter n here Do you want to configure any web servers running on sun08 for monitoring by the eG Agent y n n In case of Linux agents the configuration process terminates after the Coldfusion server and Sybase adaptive server configurations have been
360. nt Database thresholds Measurement results Monitored Configuration Information Information D User Interface Figure 1 1 The main components of eG Enterprise 1 1 1 Manager The eG manager is responsible for coordinating the functioning of the agents analyzing the reports from the agents to determine whether any problems exist and for handling user requests to eG Enterprise The main functions of the manager are discovery of the target infrastructure agent specification and control database storage threshold computation alarm correlation and user interactions Introduction 1 1 2 Agents The agents monitor the environment by running periodic tests The outputs of the tests are called measurements A measurement determines the state of a network system application service element of the target environment For example a Process test reports the following measurements 1 Number of processes of a specific type executing on a system 2 The CPU utilization for these processes 3 The memory utilization for these processes Agents use different approaches for testing the target environment The tests can be executed from locations external to the servers and network components that are responsible for the operation of the IT infrastructure Agents that make such tests are called external agents These agents take an external view of the IT infrastructure and indicate if the different services support
361. nt or not If the user chooses not to use the same account he she is made to repeat step 4 to create a new user account However if the user chooses to proceed by selecting the Yes option in the message box he she is directly taken to step 10 of this setup process To create a new user account for an Oracle database server a data tablespace and a temporary tablespace have to be associated with the new user account as shown in Figure 3 17 The default values for the data and temporary tablespace values are users and temp respectively 102 Installing and Configuring on Windows Environments eG Manager Setup Database Settings Please specify the following details for the database user priv Default tablespace Temporary tablespace temp Figure 3 17 The setup program requests for the default and temporary tablespaces in order to create a new user g I account We recommend that when you install the eG manager with an Oracle database backend the following tablespaces with the parameters indicated are specifically created for eG create tablespac gurkhadata01 datafile C Oracle ORADATA egurkha eGurkhaData01 dbf size 10240M autoextend off extent management local autoallocate create temporary tablespace egurkhatemp01 tempfile C Oracle ORADATA egurkha eGurkhaTemp01 dbf size 512M autoextend off extent management local uniform Create rollback tablespaces and rollback segments as needed The
362. o lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt e Copy the libeg so files from the opt egurkhallib lib64 directory to the opt egurkha lib directory 85 Installing and Configuring on Unix Stop and restart the Apache server 3 To enable the eG web adapter for Apache 2 2 following the steps given below First login to the Linux host as the Apache install user Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg22 so Copy the file mod_eg22 so from the opt egurkhallib lib64 directory to lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt Copy the libeg so files from the opt egurkha lib lib64 directory to the opt egurkha lib directory Restart the eG agent Stop and restart the Apache server 4 To enable the eG web adapter for Apache 2 4 following the steps given below First login to the Linux host as the Apache install user Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg24 so Copy the file mod_eg24 so from the opt egurkhallib lib64 directory to lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt Copy the libeg so files from the opt egurkhallib lib64 directory to the opt egurkha lib directory Stop and restart the Apache server Start the eG agent 2 18 Configuring the Coldfusion Server The eG agent on Unix is bundled with a setu
363. o Has at least 6 characters o Does not contain Administrator or Admin o Contains characters from three of the following categories o Uppercase letters A B C and so on o Lowercase letters a b c and so on o Numbers 0 1 2 and so on o Non alphanumeric characters amp and so on 123 Installing and Configuring on Windows Environments Hence before setting MS SQL Server 2005 as the eG backend verify the following gt Whether the MS SQL Server 2005 is operating on Windows 2003 gt Whether Mixed Mode Authentication is enabled for the MS SQL Server 2005 If so then while configuring the eG manager to use MS SQL Server 2005 as the eG backend ensure that the password you provide for the eG database user is a strong password If not the eG manager installation will fail If the eG manager installation fails before clicking on the OK button of the error message check the file lt EG_INSTALL_DIR gt manager logs error_log for any errors that may have been reported during the installation process If the password provided is not a strong password the corresponding error message is logged in the error_log file If you prefer you can manually create a new eG database and a corresponding user on the MS SQL Server 2005 using the SQL Server Management Studio Once you have succeeded in this process you can then proceed to install the eG manager using the eG database and user that you created manually To create an eG d
364. o not restart licenseAcceptance Whether to accept the terms and conditions of the eG license or not enter y to accept the terms or n to reject the same eGManager Specify the IP address of the eG manager to which the agent should report eGManagerPort Specify the port at which the eG manager listens useProxy Indicate whether the agent communicates with the manager via a proxy server if so set this flag to y if not set this flag to n 70 Installing and Configuring on Unix i proxyHost This parameter is applicable only if useProxy is set to y In this case specify the IP address of the proxy server against proxyHost If useProxy is set to n instead set this parameter to n as well j proxyPort This parameter too is applicable only if useProxy is set to y In this case specify the port number at which the proxy server listens against proxyPort If useProxy is set to n instead set this parameter to n as well k setAuthentication This flag is applicable only if useProxy is set to y In this case use this flag to indicate whether the proxy server requires authentication or not Set this flag to y if authentication is required If authentication is not required set this flag to n Similarly if useProxy is set to n set the setAuthentication flag also to n I proxyUsername This parameter is applicable only if setAuthentication is set to y In this case against proxyUsername provide the user name for authenticating com
365. o remove the eG agent software executing on the local host by selecting the Remove Local Host Software option To select this option use the down arrow key until the option is reached and then press the Enter key r Chpux01 1 Figure 2 24 Choosing to remove a software on the local host e From the screen that appears next select the eG Agent software to be removed To remove the selected eG agent software first mark it for removal by pressing the m key on the keyboard see Figure 2 25 Installing and Configuring on Unix Software Selection Chpux01 1 Figure 2 25 Marking the eG agent software for deletion e Then press the Tab key and choose Actions gt Remove as depicted by Figure 2 26 below Remove Software Selection Chpux01 1 Figure 2 26 Selecting the Remove option from the Actions menu e Then press the Enter key and wait until the Status of the remove analysis changes to Ready see Figure 2 27 Then using the Tab key choose the OK button to confirm deletion of the selected eG software 89 Installing and Configuring on Unix SD Remove Software Selection Chpux01 1 ird hel 1 a Figure 2 27 Confirming removal of the eG software by selecting the OK button e Once the software is removed status will become Completed see Figure 2 28 Now click the Done button specified by an arrow in the figure SD Remove Software Selection
366. o the cache and how often objects in the cache are updated Configure VPN Access Enable and configure a secure virtual private network VPN For remote client access to the Internal network Monitor your ISA Server Networks Use monitoring options to view current details about your system to verify connectivity define alerts and generate reports Done Figure 3 197 The administration console 3 The existing firewall policies will then be displayed as depicted by Figure 3 198 Also you will find that towards the right end of Figure 3 198 three tab pages exist namely Toolbox Tasks and Help Click on the Tasks tab 252 Installing and Configuring on Windows Environments 050 ernet Se and Acceleration Server 200 X aton vew e gt amle a a Firewall Policy Microsoft Internet Security and Accel internetsecort amp SE eartLasoz Acceleration Server2004 Firewall Policy Monitori Standard Edition FR Configuration Action Protocols From Listener To Block Egtesters Deny LI All Outbound Traffic Internal Extel Se Al nd 2p All Networks and Local Host e All Nd alow DlH all Net Ne C Networks Network Sets E gt computers UseRDNS E Address Ranges E Subnets E Computer Sets P O URL Sets E Domain Name Sets EE Web Listeners Figure 3 198 Clicking on the Tasks tab 4 To create an access rule click on t
367. o update the files in the web server s document root Please have the web server s administrator execute this script namely opt egurkha bin setup_cf to configure a Coldfusion server for monitoring by the eG agent HRA AK KAKA HK AAA AK KAA KR AAA AK AA ACK AK A AK CK KK 2 19 Uninstalling eG Enterprise The process of uninstalling eG Enterprise varies depending on the operating system used The steps to be executed to uninstall eG Enterprise are as follows 1 First stop the execution of the manager using the command optiegurkha bin stop_manager 2 Next stop the execution of the agent using the command loptiegurkha bin stop_agent 3 Next on Solaris use the pkgrm command to uninstall the eGmanager and eGagent packages 4 On Linux and AIX the opt egurkha directory has to be manually removed to uninstall the eG Enterprise system 5 On HP UX uninstall the eG agent following the steps given below e The eG agent can be uninstalled only by a super user Therefore login as the super user and run the command sam e Now press the Enter key on the keyboard A screen depicted by Figure 2 23 below appears next 87 Installing and Configuring on Unix Administration Manager Chpux 1 1 Figure 2 23 Selecting the Software Management option e Using the down arrow key on the key board select the SD UX Software Management option from Figure 2 23 and then press Enter e Using the next screen see Figure 2 24 choose t
368. odem has been installed 6 Next you will be required to specify the path to the directory in which the eG SMS manager is to be installed see Figure 7 6 Then click on the Next gt button to continue 359 Configuring the eG Manager to Send SMS Alerts eG SMS Manager Setup CS I ad MANAGER Enabling Service Excellence Figure 7 6 Specifying the installation directory of the eG SMS manager 7 Upon completion of the installation click on the Finish button in Figure 7 7 to quit the setup eG ie Figure 7 7 Completion of the installation 7 2 3 Configuring the eG Manager to work with the eG SMS manager Once the eG SMS manager is installed you need to configure the eG manager to interact smoothly with the eG SMS manager This configuration will ensure that the eG manager promptly forwards the alarms it generates to the eG SMS manager To configure the eG manager do the following 1 Open the eGSMSMgr properties file using Notepad from the install directory of the eG SMS manager see Figure 7 8 360 Configuring the eG Manager to Send SMS Alerts laj x Ble Edt Format Help COM Port a Pon COM1 Commanki echo 4SG message Smobile gt Sport lt q COmmand to be executed Port Speed PortSpeed 9600 Poll Interval in Sec Polllnterval 2 Read TimeOut in Sec ReadTimeOut 7 Command Send Interval in Sec CommandSendinterval 4 Sending Time Out SendTimeOut 10 Sending Retry MaxSe
369. ol HTTP response returned by the server the eG agent assesses the availability of the web server and the response time for the request 2 SNMP data collection To monitor the various network elements and any other application components that support SNMP eG agents support SNMP based monitoring 3 OS specific instrumentation Server operating systems already collect a host of statistics regarding the health of the server and processes executing on it For example CPU memory and disk space utilizations network traffic statistics process related measures can all be collected using operating system specific hooks eG agents use these hooks to collect and report a variety of statistics of interest 4 Application specific adapters For monitoring specific applications an eG agent uses custom adapters One example of a custom adapter is the web adapter The key motivation for the web adapter technology is that even today log files produced by web servers continue to be the predominant mode of monitoring web servers Logging has several drawbacks Since each and every request received by the web server is recorded in the logs each request produces a disk access that can be an expensive operation Moreover large web sites that get millions of hits a day can produce logs that are several terabytes in size Processing these log files is extremely expensive in terms of CPU and memory overheads on the server Consequently most web site administrators
370. ollowing 1 Open the command prompt and set the path to lt EG_INSTALL_DIR gt jre bin path using the command set path lt EG_INSTALL_DIR gt jre bin path Then using the keytool command import the manager certificate to the JRE of the eG agent A sample command has been given below keytool import file C tmp eGCert cer alias egcert keystore lt EG_INSTALL_DIR gt jre lib security cacerts The parameters expected by this command are alias an alias name for the certificate being imported make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document depending upon whether the certificate is a self signed certificate or a certificate obtained from a valid certificate authority For the default certificate bundled with the eG manager the alias should be egitlab1 file the full path to the cer file that was created in Section 3 13 1 keystore the keystore file that the JVM used by the agent checks for trusted certificates specify the same file name that you used to store the key see Section 3 4 1 1 or 3 4 2 1 of this document depending upon whether the certificate is a self signed certificate or a certificate obtained from a valid certificate authority For the default certificate bundled with the eG manager the keystore should be egmanager bin This command upon execution will request for the keystore password Provide the s
371. ommenting the block containing the HTTP Connector port definition 7 Next proceed to make the following changes to the HTTP connector block that was just uncommented o Change portto 7077 o Change minprocessors to 32 o Set maxprocessors to a value that is half the RAM size of the eG manager host i e for a RAM size of 512 maxprocessors will be 256 o Change enableLookups to false o Change acceptcount to 20 o Change connectionTimeout to 20000 Figure 3 94 depicts the aforesaid changes 175 Installing and Configuring on Windows Environments B server xml WordPad E Ee Edt vew Insert Format Hep olele aR al SPRL ee OS vawwe y ea a EA OAN DE EPA OPIA O performance so you can disable it by setting the enadleLookups attribute to false When DNS lookups are disabled request getRemoteHost will return the String version of the IP address of the remote client gt lt Define a non SSL Coyote HTTP 1 1 Connector on port 8061 gt lt Connector className org apache coyote tomeat4 CoyoteConnector port 7077 minProcessors 32 waxProcessors 256 enableLookups false redirectPort 8443 acceptCount 2b debug 0 connect ionTimeout 20000 lt Note To disable connection timeouts set connectionTiweout value to 1 gt lt Define a SSL Coyote HTTP 1 1 Connector on port 38443 gt Ct CB lt Connector classNamer org apache coyote tomeat4 CoyoteConnector port 8443 m
372. ompt and move to the directory to which you have downloaded the executable Next issue the following command at the prompt lt ExecutableName gt x This command attempts to extract the installation related files from the executable When prompted for the directory to which the files are to be extracted specify a directory on your local host and click the OK button therein to proceed with the extraction All the necessary files will then be extracted from the executable into the specified directory Then follow the steps given below 1 Click on the Yes button in Figure 3 63 to confirm MS SQL Server 2005 2008 2012 Express installation 134 Installing and Configuring on Windows Environments 2 3 4 In Figure 3 64 that appears provide the full path to the MS SQL Server 2005 2008 2012 Express installable that was extracted to a directory on your local host You can use the Browse button for this purpose After specifying the path click the Next button to move on eG Manager Setup Choose Destination Location Select folder where setup will install files Browse and select the path of the Microsoft SQL Server 2005 Express executable D msde2005 mssqI2005express Browse Figure 3 64 Providing the path to the MS SQL Server 2005 Express executable Next click the Yes button in Figure 3 65 to create a new database for the eG manager on SQL Server Express Edition Question J Would you like to create a ne
373. on Node 1 and Node 2 Then proceed to create the Windows cluster The Windows cluster creation procedure i e step 7 above has been detailed below On Node 1 open the Cluster Administrator tool using the menu sequence Start gt All Programs gt Administrative Tools gt Cluster Administrator Figure 3 241 will appear if you are launching the Cluster Administrator tool for the very first time From the Action list in Figure 3 241 pick the Create new cluster option Open Connection to Cluster 2 x Action Lx d a Figure 3 241 Choosing to create a new cluster Click on the Next button in the Welcome screen of the New Server Cluster Wizard 274 Installing and Configuring on Windows Environments New Server Cluster Wizard Welcome to the New Server Cluster Wizard This wizard helps you create a new server cluster Using this wizard you specify the computer that will be the first node in the cluster After pou finish the wizard you can add additional nodes by using Cluster Administrator This wizard requires that you provide the following information The cluster s domain cluster name that is unique in the domain The name of the first computer to be added to the cluster static IP address Logon information for a user account in the domain for the cluster service account To continue click Next Figure 3 242 The Welcome screen for the New Server Cluster Wizard 4 Figure 3 243 will then a
374. one 32 bt 64 bit URL 32 bit http www microsoft com downloads en details aspx FamilyID 4d110e78 95cb 4764 959c b8afc33df496 amp displaylang en 64 bit http www microsoft com downloads en details aspx FamilyID 793051A8 36A0 4342 BDFE 47A6B0E3488F 3 Once the download is complete go to the directory to which the executable was downloaded and double click on it 4 Figure 3 143 will then appear Accept the license by selecting the accept the terms in the License Agreement check box and click on the Install button to proceed with the installation ie IIS Advanced Logging 1 0 Setup oix Microsoft it t Please read the IIS Advanced Logging 1 0 I IS information License Agreement Services MICROSOFT SOFTWARE SUPPLEMENTAL LICENSE TERMS IIS ADVANCED LOGGING 1 0 FOR MICROSOFT WINDOWS OPERATING SYSTEMS Microsoft Corporation or based on where you live one of its affiliates licenses this supplement to you If you are licensed to use Microsoft Windows Operating Systems software for which this supplement is applicable the software you may use this supplement You maw not use it if you da not hawe a license for xl Pie Bad Cancel Figure 3 143 Accepting the license agreement 5 Once the installation ends Figure 3 144 will appear indicating the successful installation of the Advanced Logging feature Click the Finish button to exit the wizard 215 Installing and Co
375. onitoring a single application on the server at a 5 minute frequency the agent typically consumes 0 1 0 3 of CPU Network traffic generated by the agent is about 0 05 0 2 kbps The size of the agent on disk is about 100 MB While a 32 bit eG agent will consume a heap memory of 64 MB on an average the heap memory footprint of a 64 bit agent is 128 MB on an average For an agent that monitors multiple applications on a server or for an agent that monitors components in an agentless external manner the CPU memory and network bandwidth usage will be higher 2 16 Increasing the Memory of the eG Agent The eG agent runs as a Java process The maximum heap memory that can be allocated to a 32 bit eG agent process is limited to 1 5 GB The maximum heap memory allocation to a 64 bit eG agent process on the other hand is limited to 3 GB If an eG agent has been configured to monitor many components then you may have to allocate more heap memory to the eG agent In such a case follow the steps below for a Unix agent 1 Login to the eG agent host 2 Edit the start_agent script in the opt egurkha bin directory 3 Look for the entry Xmx in the file If you do not find it then insert an entry of the following format Xmx lt Memory_allocation_to_the __eG_agent gt M For instance if you want to allocate 256 MB of memory to the eG agent your Xmx specification should be as Installing and Configuring on Unix follows Xmx256M On the
376. onsole Clicking on the Tasks tab 253 Selecting the Create a new access rule OptlOmcassssscsscsscossusaunssseusicoscoascotavcszssveczasscssscszesvessesccesenanasvessaasceonsezacnesueaiavensozasnaanacsaversenens 253 Providing a name for the access rule 254 Selecting Allow or Deny eceeeseeeeeee 254 The name of the new client being displayed 255 Clicking on the Destination Sets Doderer raa E AEE EE T EAEE AKEE EE A EEAS O EE EE AEE TARAS 255 The selected protocols being listed 3 c 2cs sesczescosecescsscenceaayevescscunvetacacy un cecuatebidstves ccndevesvcuetee cesdevedncsabies cas devesncsdaves cauauvesncsdauss cocaiwvenesee 256 Defining the sources Selecting the Network object from the New Menu cccecesccesseseeseeseeeeeeeceseeseeseesecsecsseeaeeaecsecsecsecaeeaeeseesecaeceeeaeeaeeaesaecseeerseeeeaeeaes 257 Specifying the name of the network Object seesi risi io a eet NEE E AEE EOE EEA ETR a a i 257 The newly created destination set being displayed 258 Adding the IP addresses of the network 258 Specifying the IP address range of the sources The IP address range being listed The Welcome screen of the new protocol rule wizard cceeeceesesseeseesecseeeseeseeseesecsecseeseeeseeseesecseceeceaseaeesecsecseceeceaseaeeseeaesereeeseeeeaeeas 259 Selecting the Network in which the source IPs exist The chosen network being listed in the Address ranges list DOX cccceseeceeseeseese
377. opy the file ibm_mod_egurkha dll from the lt EG_AGENT_INSTALL_DIR gt lib directory to lt IBM_HTTPSERVER_HOME gt modules Stop and restart the IBM HTTP server To manually configure the eG web adapter on an IBM HTTP web server 2 x on Windows do the following 1 2 First login to the Windows server Edit the lt IBM_HTTPSERVER_HOME gt confihttpd conf file to append the following line LoadModule ibm_ egurkha_module modules ibm_mod_egurkha dll Copy the file ibm_mod_egurkha2_0 dll_ from the lt EG_AGENT_INSTALL_DIR gt lib directory to lt IBM_HTTPSERVER_HOME gt modules Rename the lt IBM_HTTPSERVER_HOME gt modules ibm_mod_egurkha2_0 dll to ibm_mod_egurkha dll Stop and restart the IBM HTTP server 3 19 Configuring the eG Agent to Monitor a ColdFusion Server For enabling the eG agent to monitor a ColdFusion server the agent configuration needs to be modified To achieve this do the following 1 4 Select Uninstall Agent from the options available under the eG Monitoring Suite gt eG Agent menu The screen depicted by Figure 3 131 will appear Here select the Modify option and click the Next gt button If the eG agent is operating on a Windows 2000 2003 host and detects any IIS web servers on that host then you will be prompted to confirm the monitoring of the IIS web server see Figure 3 132 Refer to Section 3 13 above to know how to enable monitoring of an IIS web server This prompt will not appear if the eG
378. or the Majority Node Set cluster which was created earlier To achieve this go to the command prompt and enter the following command cluster ExternalAgent res Majority Node Set priv MNSFileShare lt servername gt lt sharename gt Here lt servername gt lt sharename gt represents a valid windows file share located in the network To check if the file share witness has been created successfully or not use the following command see Figure 3 270 cluster res Majority Node Set priv cv C WINDOWS system32 cmd exe cluster res Majority Node Set priv sisting private properties for Majority Node Set Resource Value MyServer clustershare mareCheckInterval 2486 xf gt nare Delay 4 0x4 Figure 3 270 Specifying a file share witness 296 Installing and Configuring on Windows Environments 3 27 Configuring High Availability for the eG Agent Using Windows Cluster Setup on Windows 2008 You can configure two agents within a Windows cluster setup so that when one agent fails the other agent takes over from the first and performs all the monitoring tasks originally assigned to the first This way there will not be a single point of failure of the eG agent In order to configure a fail proof agent follow the broad steps listed below 1 2 a ON a as Prepare two machines with identical specifications Name them as Node 1 and Node 2 Install Windows 2008 R2 Enterprise Edition on both t
379. ore Actions and select the Configure Cluster Quota Settings option Patower Ote Manager Servce Cattigure a Service oF Apgication Valdate Thes Qute Networks Ouse Netw Server ATTPEGRADUOT Subate 1P ad OPE A Node Maty Warring Fakse of snode nd cane the chain te ial Check the daha of the rodes n add one o mene serven nodes a mpate sarace ard apphcsdors hom a cinte nurrng Wirin Server 2002 Windows Server X08 a wirden ER d O stor paa Can Corran Me trah arahat D etnia cates adso tests E Enti Chater Shared ystmes D anin Qam Shari oumes Aii E Atia sorn to ras chatu E Hane ennes art acct atone E Hanna a ctum rom Windies Serva 200 indore Sarem 2008 a windo Serre NM RI P Mmeraate to Storage to add dahs a I SSS Serves ad webct Suse F Oait E Eaim chaste operon he web E Eaire chae corm rds on ihe web E oana nepo pam on the Wed Figure 3 297 Selecting the Configure Cluster Quota Settings option 315 Installing and Configuring on Windows Environments 2 3 4 From the Select Quorum Configuration window that appears next select the Node and File Sharing Majority for clusters with special configuration option see Figure 3 298 Then click the Next button therein Bh Configure Guster Quorum Wizard aP Select Quorum Configuration Bakse You Begn Road the desciptors and then select a quonm conigaadon for you chaler The commendation we bared on providing the highest ara ab ity tor pour chutes
380. ort for the eG agent sessssssssssssssssrsssrsrsrsrererrsssseresesesesese 180 Figure 3 100 A message box requesting your confirmation to allow only trusted certificates 00 eee eees ese ceeeecseeeeseeecsetscsecseceeesseeeeseeeees 180 Figure 3 101 Specifying the IP hostname and SSL port of the eG manager eeeeseeeeeee 180 Figure 3 102 Hostname and port number of the eG manager to which the agent communicates 181 Figure 3 103 Setup enquiring if the user wants to use a proxy server for the eG manager agent communication 181 Figure 3 104 Specifying the proxy server that the agent may need to use to communicate with the eG manager e eseseseeierererersreresereseseseses 182 Figure 3 105 Setup seeking the confirmation regarding authentication of the proxy Servet 0 cece ese cess cseeeesecseeesseeecseesesecsesecsesaeeseseeees 182 Figure 3 106 Username and password to be used for communication via a proxy server Figure 3 107 Information specified by the user at the various stages of the setup process oo eee eee cess tects cseteesetseeetsseecsetsceesseteesesseesaeeees 184 Figure 3 108 Setup requesting the user s confirmation to assign a nick name for the eG agent eile eceeee cece esecseeeeseeeeseesceecseteeseseeesaeeeees 184 Figure 3 109 Assigning a nick name for the eG agent s host Figure 3 110 The completion of the eG agent Setup icc oriasi ii oraa E EE AEREE EN AREO TOERE Figure 3 111 Welcome scree
381. ort of the database server hosting the eG database 99 Installing and Configuring on Windows Environments eG Manager Setup Enter Text Please enter information in the field below Please enter the name of the Oracle database instance SID that the eG Manager should use lt Back Cancel Figure 3 13 Specifying the Oracle instance for eG database 4 The eG manager requires a special Oracle database user account to store its measures The user should next enter the following details as in Figure 3 14 gt the eG database user name default is egurkha gt the password for the database user eG Manager Setup Database Settings The eG Manager requires a special database user account to store its measures Please enter the eG Manager database user name egdbuser Please enter the password for the above database user Retype the password lt Back Next gt Cancel Figure 3 14 Specifying the user information that is to be used to create the eG database 100 Installing and Configuring on Windows Environments If you set an existing database user as the eG database user at step 4 then before I configuring the eG manager to use Oracle as its backend make sure that connect Note select_catalog and resource privileges are granted to the existing user 5 Next specify the destination directory for installing the eG manager see Figure 3 15 eG Manager Setup Choose
382. ost name of the manager eg http www manager com here Once all the required inputs are provided a keystore file will be generated in the lt JAVA_HOME_DIR gt bin directory with the lt Filename gt you had provided while issuing the command 2 4 1 2 Generating a Certificate Request Once a keystore file is generated proceed to request for a certificate from an internal certifying authority The procedure for this is as follows 1 Login to the eG manager and go to the Windows command prompt 2 Execute the following commands one after another cd JAVA_HOME bin keytool certreq alias egitlab1 keyalg RSA file lt Name_of_the_text_file gt keypass mykey keystore lt filename gt keystore storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name that you provided while generating the keystore file see Section 2 4 1 1 of this document gt keyalg specifies the algorithm that was used to generate the keys this can be RSA or DSA depending upon which algorithm was used for key generation in the procedure detailed in Section 2 4 1 1 file Provide a name for the text file to which the certificate request will be saved keypass the password used to protect the key that was
383. other hand if you find the entry in the start_agent file then simply alter the lt Memory_allocation_to_the _eG_agent gt to suit your specific needs 4 Finally save the file 2 17 The eG Web Adapter eG Enterprise s unique web adapter technology enables individual transactions performed by users of a web site to be tracked in real time In the sections that follow we will be discussing how to configure the eG web adapter for different web servers 2 17 1 Configuring the eG Web Adapter for an iPlanet SunONE Web Server before Version 6 0 The web adapter is part of the eG agent package for Solaris When the agent on Solaris is configured it is enabled to communicate with the web adapter to report statistics in real time to the eG manager For configuring the eG web adapter for an iPlanet SUnONE web server before version 6 0 you can use the setup_webadapter script in the opt egurkha bin directory The steps involved in configuring the iPlanet SUunONE web server to use the web adapter technology are a A user can install the eG web adapter capability only for the web servers that he she has the Note permission to administer 1 First run the command on the iPlanet SunONE web server host loptiegurkha bin setup_webadapter The setup_agent script on Solaris executes this command automatically Hence if you get here from step 9 of Section 2 10 above you do not have to explicitly run this command 2 Upon executing
384. ough the license agreement thoroughly and click the Yes button at the bottom of the screen to accept and proceed with the setup process 178 Installing and Configuring on Windows Environments eG Agent Setup License Agreement Please read the following license agreement carefully Press the PAGE DOWN key to see the rest of the agreement END USER LICENSE AGREEMENT FOR THE eG Products IMPORTANT PLEASE REVIEW CAREFULLY By choosing Yes when prompted to accept this license agreement or by installing the software you are consenting to be bound by and are becoming a party to this agreement If you do not agree to all of the terms of this agreement choose the No option and DO NOT INSTALL Do you accept all the terms of the preceding License Agreement If you select No the setup will close To install eG Agent you must accept this agreement Figure 3 97 License agreement for the eG agent 3 The next step depicted by Figure 3 98 prompts the user to select the destination location for the eG agent if he she chooses not to install the agent in the default folder If the eG manager resides on the host where the agent is being installed the Setup program will place the agent in the same location as the manager In this case the screen depicted by Figure 3 98 will not appear eG Agent Setup Choose Destination Location Select folder where setup will install files Setup will install eG Agent in the following folder
385. our confirmation to allow trusted certificates alone Do you want to allow trusted certificates only y n n Eal Ensure that the manager IP hostname provided when setting up the agent matches the IP hostname provided when generating the certificate on the manager Enter y if the agent is expected to communicate only with a manager that has a trusted SSL certificate If you enter n the agent accepts any certificate provided by the manager at the time when the SSL connection is established If you have chosen to allow trusted certificates alone then you need to indicate the trust relationship to the agent Towards this end follow the instructions detailed in Section 2 11 of this document once agent installation completes While configuring an eG agent on AIX setup will not prompt you to confirm whether Note you want the eG agent to allow trusted certificates alone 6 The setup will now request you to indicate whether you wish to assign nick name s for the eG agent s host Instead of remembering the IP address host name of a host users can assign one or more nick names to the host and manage all applications on the host using the same Please indicate if you want to assign a nick name s for this host y n n To assign nick names press y Setup will then request you to specify the nick name s to be assigned to the host Pleas nter the nick name s to be used for this host While providing multiple nick names e
386. ovide the same alias name you provided when generating the keystore see Section 3 4 1 1 file the name of the domain certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 1 1 above If the domain certificate import command throws an error for any reason it could be because all related certificates may not have been imported Check the web site of the CA for more Note details Importing a Certificate that is in the PEM Format PEM is a container format that may include just the public certificate such as with Apache installs and CA certificate files etc ss certs or may include an entire certificate chain including public key private key and root certificates or may only contain a certificate and a private key If the certificate you downloaded is in the PEM format and includes only a certificate file and a private key file then follow the steps below to import that certificate into a keystore file 1 Run the following command from the command prompt to export the certificate and private key file into the pkcsi2 format openssl pkcs12 export in certificate crt inkey private key certfile certificate crt name My certificate out keystore p12 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been describ
387. p Please enter the following details Proxy server IP HostN ame 192 168 10 9 Proxy server Port 80 Figure 3 119 Specifying the proxy server that the agent may need to use to communicate with the eG manager 10 Some proxy servers may be setup to validate incoming requests based on the user name and password specified before forwarding the requests to other web servers To support such cases the setup process enquires as to whether authentication is required by the proxy server see Figure 3 120 The default option is No Question 2 Do you need authentication for the Proxy server w L Figure 3 120 Setup seeking the confirmation regarding authentication of the proxy server A To get the eG agent to communicate via an ISA proxy server to the eG manager follow the Note steps discussed in Section 3 21 192 Installing and Configuring on Windows Environments 11 If authentication is required the eG agent setup allows the user to enter the user name and password that is used for all communications from the agent to the manager via a proxy server as in Figure 3 121 eG Agent Setup eG Agent Setup Please enter the following details Username to be used tor the Froxy server eguser Password eecceee Retype the password lt Back Next gt Cancel Figure 3 121 Username and password to be used for communication via a proxy server If the eG agent is configured
388. p script that enables monitoring of a Coldfusion server that may be running on that host This is why when configuring the eG agent on Unix you can also configure any Coldfusion server that may be running on the agent host for monitoring Alternatively you can configure the Coldfusion server after agent configuration The steps involved in the process are as follows 1 Execute the following command loptiegurkha bin setup_cf The setup_agent script executes this command automatically Hence if you get here from step 8 of Section 2 9 4 you do not have to explicitly run this command 2 Then decide if you want to configure an agent to monitor a Coldfusion server The default is y 86 Installing and Configuring on Unix 3 Next the user needs to enter the document root of the web server with which the Coldfusion server is associated 4 Next the configuration process prompts the user to determine if the user is the administrator of the web server that is to be used for monitoring by the eG agent If the user is not the web server administrator the configuration process prompts the user for the web server administrator s login name and password 5 The following message comes up upon the termination of the configuration process KKK KK AK OK KK K K K KK KK K KK KKK KKK K KK KK KKK KK KK OK KK KE KE OK 2K OK OK 2K OK I KK KK OK KOK 2K OK OK OK 2K KK If there were any errors in the above steps you may not have permissions t
389. p will close To install eG Manager you must accept this agreement Figure 3 2 Accepting the license agreement for installing the eG manager 3 Setup then automatically discovers all the versions of JDK available on the target host and lists them as depicted by Figure 3 3 The user will have to simply select the JDK version he she wants to use for their eG manager installation from the displayed list It is recommended that you use JDK 1 6 or its variants for installing the eG manager 93 Installing and Configuring on Windows Environments eG Manager Setup eG Manager Setup V6 Select the Java JDK version you wish to use for installing the eGM anager from the list below Selected Java JDK eG Built in JDK Available Java JDK Versions eG Built in JDK Other lt Back Cancel Figure 3 3 Selecting a JDK version to use for manager installation 4 Upon selecting a JDK version eG Enterprise automatically determines the location of the JDK related files on the target host and uses them to configure the eG user s Java execution environment to execute Java programs to proceed with the installation Clicking on the Next button in Figure 3 3 will then lead the user straight to step 8 of the setup process 5 On the other hand if the JDK version the user wishes to use is not listed in Figure 3 3 for some reason he she can pick the Other option from Figure 3 3 Figure 3 3 then appears where th
390. pass mykey keystore lt Filename gt keystore storepass mykey keysize 2048 validity 1095 The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below alias an alias name for the certificate being generated keypass a password used to protect the key that is generated ensure that you provide the same values for keypass and storepass keyalg specifies the algorithm that is used to generate the keys The options are as follows o DSA Digital Signature Algorithm o RSA An algorithm used for publick key cryptography keystore the keytoo command stores the generated key in a keystore file provide a name for this file as input to the keystore command keysize the size of the key that is generated the default key size is 1024 bits the key size must be in the range 512 bits 1024 bits validity indicates the number of days for which the key certicate will be valid 1095 days refer to 3 years The command upon execution will request the following inputs aor ep opr 5M Soa 5M S99 SO FS Ow iG W SG W U is your first and last name known lt Type the eG manager s IP address fully qualified host name here gt t is the name of your organizational unit known United States t is the name of your organization known eG Innovations Inc t is the name of your City or
391. perties of the IIS web server s host cscecescesseeseeseeseeseceseeseeseesecsecseceeceaeeseesecsecseeeeeaeeaecaeeseceseeeseeaeeaeeaeeneeeesenseaees Figure 3 325 The Properties dialog Box iana ei iata s ENERE EEE EAE RAE STEER EA EENE ER EEN EEA REEN E Figure 3 326 Viewing the ISAPI filters Figure 3 327 Opening the Windows r giStiy vsscsscsesessissssscascsssasasesevevavcosszsasassvavexesssasd secascscevbavansssascaateveuvecesesavancsva seas sesavansendseeatsveevencenbaneetaversazees Figure 3 328 Selecting the 6G Innovations Inc Entry esisiini ni o EEEE EEEE EREVENT ARNEE Figure 3 329 Confirming deletion of the selected key Figure 3 330 Selecting the Find option Figure 3 331 Finding the string eG Agent cece Figure 3 332 The registry key containing an eG Agent entry 0 ec eceeceecescesceseeseceeeseeseeseesecsecsecseeceeseesecsecsecaeeaeesecaecsecseceeseseeseeaeeaecaeeereeasenees Figure 3 333 Deleting theeGA sentMon key is ccc sccedasszvoceccavegedetvenes aE EEE esis enecasevevecauveusccnssveve causes canaswesccabevavedgesuecccahsvavesauvvecccgasaseesavevenceee Figure 3 334 Deleting the eGurkhaAgent key Figure 3 335 Deleting the eG Agent start menu OptiONnSs ceceseesseseeseeseceeeeseeseesecseesecsecsaeesecsecsecseeseeseesecsecsecsaseseeaeeseesececeeeeaeeseesecaeeneeeeseaeenees Figure 4 1 Configuring the Oracle database instance to support double byte cceeceeceeseeseeseeeeceseeseesee
392. ppear The current domain will be seleected by default from the Domain list In the Cluster name text box provide a name for the new cluster Note that the cluster name you specify should be unique in the chosen domain Then click the Next button in Figure 3 243 275 Installing and Configuring on Windows Environments New Server Cluster Wizard Cluster Name and Domain Specify the name of the new server cluster and the domain in which it will be created Select or type the name of the domain in which the cluster will be created Only computers in this domain can be members of the cluster Domain smallbusiness local v Type a cluster name that is unique in the domain This must be a valid computer name Cluster name ExternalAgent Figure 3 243 Specifying a cluster name 5 Key in the name of the first cluster node in the Computer name text box see Figure 3 244 and click the Next button to move on New Server Cluster Wizard Select Computer The computer must be a member of the domain you specified Enter the name of the computer that will be the first node in the new cluster Computer name Nodet Browse Advanced Figure 3 244 Specifying the computer name of the first cluster node 276 Installing and Configuring on Windows Environments 6 The wizard will analyze the configuration required for creating the cluster Ignore the warning messages related to the Quorum and additional
393. pt and run the script on the target host To grant execute permissions issue the following command from the directory that holds the silent_install_itanium script say tmp chmod x silent_install_itanium 8 Upon successful execution of the script the eG agent will be automatically installed and started on the host 2 13 Dealing with Operating System Variations The eG Enterprise Suite uses the Sun Microsystems Java 2 Enterprise Edition as the core platform on which it operates By default the Java Runtime Environment JRE version 1 6 for 32 bit operating systems is bundled as part of the eG agent installable for 32 bit Solaris and HPUX environments The eG agent for 32 bit Linux and AIX environments on the other hand is bundled with JRE 1 5 and JRE 1 6 for 32 bit operating systems This is done to ensure backward compatability with older versions of Linux AIX that may not support JRE 1 6 However here JRE 1 6 is the default Also the eG agent for 32 bit and 64 bit Windows 2003 XP environments is also bundled with JRE 1 6 The eG agent for Windows 2008 Windows 7 Windows 8 Windows 2012 32 bit and 64 bit environments on the other hand is bundled with JRE 1 7 0_17 The table below discusses this clearly eG Agent JRE 1 5 JRE 1 6 32 JRE 1 7 32 bit 64 bit bit 64 bit Linux 32 bit v v Linux 64 bit v Solaris v Sparc AMD AIX v HPUX PA RISC Itanium Windows y 2003 XP 32 bit 64 bit Window
394. questing you to confirm whether not a Microsoft SQL server is running in your environment 105 Specifying the location of the MS SQL server to be used for the eG database Specifying the name of the SQL server instance tO USC ceceeseeseeseeseesecseceseeseeseesecsecscesseeseesecseesecsececeeseesecsecaeeeseseeaeeaeeaesreeeeeeeeneeas A message box confirming the SSL status of the MS SQL Servet eccscesceeseesseseeseeseceeceseeseesecseceeaeeseesecsecsecseceeseseeseesecaeeneeereeaeeaees Specifying whether a new database has to be created for the eG database Indicating the name of the existing database to be used Indicating the name of the new database that is to be created Specifying the database administrator user name and password for an MS SQL server with Windows Authentication enabled 109 Specifying the user name and password of a database administrator on an MS SQL server with SQL Server authentication 109 Creatine a NEW USE as scucuzescceenilaasivece oa S EE E EE E T A e AE OE E OE AEA E AE tated tetenenenaeeareae teas Granting the requisite privileges to the new user Specifying the user name and password to be used to host the eG database on an MS SQL server with SQL server authentication jabledi arro OEA Era Ta OEE E AEA S IP ENa kara SE APANA NEER rer te rrer starrer tree nstecrer yee rerryree 111 Figure 3 33 Figure 3 34 Figure 3 35 Figure 3 36 Figure 3 37 Figure 3 38 Figure 3 39 Figure 3 4
395. r above or Oracle Linux v6 x or higher or Fedora Linux e JDK 1 6 0_10 and above e For the eG database use Oracle database server version 10G or higher Microsoft SQL Server version 2008 2012 2014 Microsoft Azure SQL database When using an Oracle database server Microsoft SQL server as the eG backend you can install the database on the same system as the eG manager or on a separate system E However for implementations with 100 monitors or more the database should ideally be Note hosted on a separate system Both the eG manager and the eG database can be hosted on virtual machines or physical machines e Aminimum of 2 GB RAM would be required for installing the eG manager on a 32 bit host for a 64 bit host on the other hand a minimum of 4 GB RAM would be required e Aminimum of 1 GB of disk space free e A valid eG license The following sections present the specific instructions for Solaris and Linux operating systems Installing and Configuring on Unix 2 1 2 Installing the Manager on Solaris Prior to installing an eG manager on Solaris ensure that the following recommended settings are in place gt Solaris file descriptors ulimit Description Specifies the maximum number of open files supported If the value of this parameter is too low a Too many files open error is displayed How to view or set Use the following command to display the current settings ulimit a Use the followi
396. r s group eGInstallDir opt eG install directory autoRestart y whether the agent should auto restart 69 Installing and Configuring on Unix licenseAcceptance y licenseAcceptance the licens eGManager 192 168 10 54 eG manager host use proxy setAu user proxy GManagerPort 7077 ecfranage ripone USER corny N RAOR proxyHost n proxy server Port n proxy port thentication n use auhentication for proxy proxyUsername none name for proxy access lt none Password none password for proxy access usessl use SSL for communication with the manager y n y Th trustedCertificates n use trusted certificates for SSL communication with the manager y n setNickName n set the nickname for the agent y n nickNameToUse hostname the nick name to set for this agent 5 The parameters that you may need to edit include the following a eGuser Here either provide the name of an existing user to the target host or that of a new user If you provide the name of the new user then make sure that you create this user account on the target host soon after you save all the changes to the silent_install script eGgroup Specify the group to which the eG user belongs eGinstallDir Specify the location on the target host in which the agent is to be installed autoRestart Whether the agent is to be auto restarted or not upon system reboot enter y to restart the agent or n t
397. r sets Figure 3 229 Viewing the new user set New Access Rule Wizard User Sets You can apply the rule to requests from all users Or you can limit access to specific user sets Figure 3 230 Removing the default set 33 Finally click the Finish button in Figure 3 231 to complete the access rule creation 268 Installing and Configuring on Windows Environments New Access Rule Wizard E Completing the New Access Rule Microsoft Wizard Intenet Saana You have successfully completed the New Access Rule Acceleration 2004 Wizard The new Access Rule will have the following configuration eGCommn aj Action Allow Traffic HTTP HTTPS Source eG Agents Destination eG Manager ial Accepted user sets eG Users Ei To close the wizard click Finish lt Back Cancel Figure 3 231 Ending the access rule configuration 34 You will then return to the Server Management console where the newly created access rule will be displayed along with the existing ones Click the Apply button therein to save the changes see Figure 3 232 oso ernet Se and Acceleratio er 200 x action view e gt eml a g Tree Firewall Policy Microsoft Internet Security and Accel Mee aE EGITLABo2 Pht hal 2004 Firewall Policy E monitoring Z Firewall Policy Virtual Private Networks VPN A Apply Discard To save changes and update the config
398. r should be configured to allow long running queries To ensure this do the following On the MS SQL Server host open the SQL Server Enterprise Manager From the tree structure on the left panel of the enterprise manager select the name of the SQL server to be used as the eG backend right click on it and choose Properties Figure 2 6 then appears Next click on the Connections page in the left panel of Figure 2 6 In the Connections section that is then displayed in the right panel make sure that the Use query governor to prevent long running queries option is disabled If not then uncheck the check box to disable it 25 Installing and Configuring on Unix i F Server Properties EGSQLDB Server EGSOLDB Connection sa 5 View connection properties Figure 2 6 Enabling long running queries to be executed on the MS SQL server e Finally click the OK button in Figure 2 6 e If the MS SQL Server 2008 is used as the eG backend then ensure that the VIA protocol is disabled on the server To achieve this do the following e Onthe MS SQL Server 2008 host open the SQL Server Configuration Manager e In the left panel of the configuration manager click on the Protocols for lt SQLSERVERNAME gt node as depicted by Figure 2 7 The list of protocols that the SQL server supports will then be displayed in the right panel see Figure 2 7 26 Installing and Configuring on Unix F sql Server Configuration Manager
399. r_default can be used to set agentless monitoring as the default option for the eG manager The output of this script is shown below Do you want to set the eG manager for agentless monitoring by default y n n y KEKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK Changes to the eG manager default setting have been successfully made KEKKKKKKKKK KK KK KKKKKK KK KK KK KK KK KK KK KK KK KK KK KK KK KK KK KKKK KK KK KKKKKKKKKKKKKKKKKKKKKKKK 3 1 3 Configuring the eG Manager to Use a Microsoft Azure SQL Database Microsoft Azure SQL Database is a relational database as a service that delivers predictable performance scalability business continuity data protection and near zero administration to cloud developers and solution architects If you have already created a SQL database on Azure then you can configure the eG manager to use this database as its backend The procedure for this is as follows 1 2 When setup prompts you to pick the database server that should be used to host the eG database pick the MsSql server option see Figure 3 83 eG Manager Setup Setup Type Select the setup type that best suits your needs Please select the type of database that you want to use to host the eG database Oracle MsSql server lt Back Cancel Figure 3 39 Specify the type of database server to be used to host the eG database Then setup requests you to ind
400. racted make sure that you provide the same alias name that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document If you are extracting the SSL certificate from the default keystore that is bundled with the eG manager then the alias should be egitlab1 keypass the password used to protect the key that was generated make sure that you provide the same password that you provided while generating the keystore file see Section 3 4 1 1 or 3 4 2 1 of this document Also note that storepass and keypass should be the same If you are extracting the SSL certificate from the default keystore that is bundled with the eG manager then the storepass and keypass should be eginnovations keystore Provide the name of the keystore file in which the key has been stored specify the same file name that you used to store the key see Section 3 4 1 1 or 3 4 2 1 of this document file Specify the full path to and the name of the certificate file cer to which the certificate has to be exported Once the keytool command successfully executes the certificate file will be created 2 11 1 2 Importing the SSL Certificate into the JRE of the eG Agent To achieve this do the following 1 Open the Shell prompt and set the path PATH opt egurkhaijre bin PATH Then using the keytool command import the manager certificate to the JRE of the eG agent A sample command has been given below keytoo
401. re 2 17 Completing the install analysis process Once the status becomes Completed press Done Now press Tab and choose File gt Exit to exit The install process will then prompt you to specify the name of the eG user Enter the name of th G user egurkha bob Next enter the path to the directory in which the eG agent is to be installed The default base directory for an eG agent is opt A subdirectory named egurkha will be created under this base directory in the previous step Enter the directory in which the eG agent should be installed opt Then enter the name of the group with which the eG user is associated If you specify an existing user name then this group prompt will not appear Enter the group to which the eG user is to be associated egurkha Would you like the eG agent to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the agent to start automatically every time the system hosting the agent reboots Now press y to install the auto restart feature or n to proceed without installing the same Upon successful installation of the agent the following message appears KREKEKKKKKKKKKKK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKK KK KK KK The eG agent has been successfully installed Please login as lt user name gt and run the script opt egurkha bin setup agent to configure the agent
402. refore make sure you specify the user name here without prefixing it with a domain name ill S 8 The configuration process next prompts the user to specify if the database user name specified has already been created Does the eguser account already exist y n n Type y here to confirm that the user exists 34 Installing and Configuring on Unix 10 User egurkha exists Continuing The configuration process proceeds to create the various database tables required by eG Enterprise The following error message appears next KKEKKKKKKKKKKKKKKKKKK KK KK KK KK KKK KKK KK KKK KKK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK Attempting to load the eG tables into the database If any error appears during the configuration there may be a problem with the MS SQL database parameters you supplied Please check and restart the manager configuration Press lt Enter gt to continue lt CTRL C gt to end Database table creation started Database table creation completed successfully KREKEKKKKKKKKKKEKKKKKKKKKKKKKKKKK KK KK KK KK KK KKK KKK KK KKK KKK KK KKK KKKKKKKKKKKKKKK Upon successful installation of the manager the following message will be displayed to the user KKKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKK KKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKK If there were no errors the eG Manager has been configured Please use th command opt egurkha bin start manager and opt egurkha bin stop manager to start and stop t
403. remove them from the Services list The eGAgentMon and eGurkhaAgent services will continue to appear in the Services list but control operations such as starting and stopping can no longer be performed on them To remove the start menu items corresponding to the eG agent right click on the eG Agent option in the Start gt Programs gt eG Monitoring Suite menu sequence and select the Delete option from the quick menu that appears see Figure 3 335 338 Installing and Configuring on Windows Environments aj New Office Document Open Office Document f Set Program Access and Defaults RD windows update A L Adobe Acrobats 0 Figure 3 335 Deleting the eG Agent start menu options 16 Finally remove the following directories from agent installation directory e lt EG_AGENT_INSTALL_DIR gt agent e lt EG_AGENT_INSTALL_DIR gt JRE If the manager is not installed on the same system as the agent then the entire lt EG_INSTALL_DIR gt can be removed Note 3 32 Manually Uninstalling the eG Manager To manually uninstall the eG manager do the following 1 Stop the eG manager if it is running 2 Delete the following registry keys to remove Win32 Services of the eG Manager gt VV VV WV HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services eGurkhaTomcat HKEY_LOCAL_MACHINE SYSTEM CurrentControlSet Services eGMon HKEY_LOCAL_MACHINE SYSTEM ControlSet002 Services eGurkhaTomcat HKEY_LOCAL_MACHINE SYSTEM Con
404. review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings IP Host Name 192 168 8 147 Port Number A 7077 Tomcat Port 7077 Double Byte Support Not Enabled Path for JDK Z C equrkha JAVA Database ServerName IP_ swo2fn3hhb database windows net Database Server Port k 1433 Database User Name eguser lt Back Cancel Figure 3 48 Information specified by the user at the various stages of the setup 11 Setup next tries to access the database server using the user account specified in step 8 above When doing so it figures out that the user name already exists and prompts you to confirm whether not to continue using the same name Click Yes here to proceed Question hl 7 The database user already exists do you want to use the same user Figure 3 49 Message box indicating the existence of a database user 12 If the configuration process succeeds the following screen will be displayed see Figure 3 38 The Setup requires the user to restart the system This can be done immediately or at a later point of time A valid license must be obtained for the eG manager to function This license should be placed in the bin directory of the egurkha folder for e g C Program Files egurkha bin Clicking on the Finish button will exit the Setup 122 Installing and Configuring on Windows Environments eG Manager Setup Setup
405. ripts which will be executed with super user permission during the process of installing this package Do you want to continue with the installation of lt eGagent gt y n y The following message will be displayed depicting the success of the agent installation IKK KK KK KKK KK KKK KK KK KK KK KK KKK KKK KKK KKK KK KK KK KK KKK KK KK KK KK KK KKK KK KK KKK The eG Agent has been successfully installed Please login as lt user name gt and run the script 55 Installing and Configuring on Unix opt egurkha bin setup_agent to configure the agent KKK III IAAI KAKAK KKKA KKKA KAKKA KKK KAKAK KKKA KKKA III IIIA III III III III Installation of lt eGagent gt was successful 2 9 3 Installing an Agent on Linux The standard eG agent software for 32 bit Linux hosts is provided as a tar file named eGagent_linux tar For installations on 64 bit Linux hosts the eGagent_linux_x64 tar file is provided An accompanying script drives the installation process for the eG agent On 32 bit Linux hosts this script is called iAgent_linux and for 64 bit Linux hosts this is called iAgent_linux_x64 The steps involved in installing an agent on these platforms are 1 To start the installation process execute the iAgent_linux or the iAgent_linux_x64 script as the case may be with the eGagent_linux tar file or the eGagent_linux_x64 tar file as the case may be located in the same directory as the corresponding script file i e iAgent_linux or iAgent
406. rocess is responsible for auto discovery of the environment and for determining the configurations of the agents To present a web based user interface the eG manager includes a Tomcat server for Unix environments For Windows environment the eG manager requires an Internet Information Server IIS to be co located with it on the same host The various factors that should be taken into account while determining the exact location of the eG manager in the target environment are a Performance impact of the eG manager For monitoring smaller environments in which five agents or less are to be used the eG manager can be co located on any of the staging servers of the infrastructure For larger environments it is advisable that users dedicate a host for supporting the eG manager b Network bandwidth usage As can be seen from Figure 1 4 several of the eG manager components communicate with the database server to store measurement results and to retrieve the results for display Co locating the database server with the eG manager minimizes the network bandwidth usage Moreover this configuration can also reduce response times seen by users accessing the eG manager The location of the eG manager relative to the agents also governs the network bandwidth usage For example the eG manager may be located at an ISP site external to the target environment In this case the results reported by the agents have to be communicated over an external network
407. rogram seeking the name and password of a database administrator If the configuration process succeeds the following screen will be displayed see Figure 3 38 The Setup requires the user to restart the system This can be done immediately or at a later point of time A valid license must be obtained for the eG manager to function This license should be placed in the bin directory of the egurkha folder for e g C Program Files egurkha bin Clicking on the Finish button will exit the Setup eG Manager Setup Setup has completed installing the eG Manager Before starting the eG Manager you will need to restart the computer Please choose one of the following options gt Yes want to restart my computer now valid license is required for the eG Manager to start functioning Please contact license eginnovations com to obtain the license Place this license file in the C egurkha bin directory Click Finish to exit eG Manager Setup Back Cancel Figure 3 38 Setup program indicating the completion of the eG manager installation Installing and Configuring on Windows Environments g lil By default the eG manager is configured for agent based monitoring i e when a server is auto discovered and then managed it is monitored in an agent based manner Administrators have an _ option to set agentless monitoring as the default for the eG manager On Windows systems the script lt EG_INSTALL_DIR gt lib set_manage
408. ror message that appears if the eG user does not have access to the database that is to be used eeeceeceeseeseeteeeeeneeeeeeneenees 129 Selecting the Properties option of the eG user Mapping the eG database to the eG user The eG user is executing a query on the eG database cececeeccesceseesecsecesceseeseeseesececeeceaeeseesecseceeeaeeseesesaecsecseceeceaeeseesecaeeeeeeseneeaees 131 Selecting the Properties option of the eG database 132 Granting permissions to the CG USEL cssscesseeeceeceseeseeseesececeeeeeeeaeeseeaeeseeneeeaeeaee 133 A message box requesting your confirmation for quitting setup or installing MSDE 134 Providing the path to the MS SQL Server 2005 Express executable ccccececsscescsecseesceeeeseesesesseescsessesscsecessessesesaseesseeeeeeaaeees 135 A message box requesting you to confirm whether not a new database is to be created oo cece eee eseeceecseeeeeeseseeaeeseseeeeeseaeeees 135 Specifying the name of the new database for the eG manager Creating a DBA With user Name Sa oss cscssiesssecascassescsesevsvavenssusavasssavsvevssasesocesauseevasvancegscaacevevenesesacanesvesssausooesanesndvesausvensozesndaneayavereazees Creating a special database user account sisccceccasecceassveosscasuneeassveons E EE causveseshaswecccdbevevedgesnececdhsvevesgusnecccdasuevesansneccede Specifying the eG manager install directory Summary of the installation settings 0 0 0 0 a Setup program indica
409. rts are saved as PDF documents However while using a double byte enabled eG manager if you have chosen to view data in a Language other than English then reports cannot be saved as PDF documents until the above mentioned steps are ii followed 385 Conclusions Conclusions eG Enterprise has been specially designed keeping in mind the unique requirements of IT infrastructures For more information on the eG family of products please visit our web site at www eginnovations com This document has described the installation and configuration of eG Enterprise For more details regarding the eG architecture how to use eG Enterprise and details of the metrics collected by the eG agents please refer to the following documents gt A Virtual Private Monitoring Solution for Multi Domain IT Infrastructures gt The eG User Manual gt The eG Measurements Manual gt The eG Quick Reference Guide We recognize that the success of any product depends on its ability to address real customer needs and are eager to hear from you regarding requests for enhancements to the products suggestions for modifications to the product and feedback regarding what works and what does not Please provide all your inputs as well as any bug reports via email to mailto support eginnovations com 387 Index C Configuring Applications for Monitoring by eG Agents Manually Configuring an Apache Server on Windows EnvironmentS s
410. run User name Administrator ee Domain smallbusiness local G This account will be given local administrative rights on all nodes of this cluster to allow for proper operation Figure 3 247 Providing the login information for the domain account under which the cluster service will be run 9 Figure 3 248 will then appear where you can review your cluster specifications To define your cluster quorum click the Quorum button in Figure 3 248 279 Installing and Configuring on Windows Environments New Server Cluster Wizard Proposed Cluster Configuration Verify that you want to create a cluster with the following configuration Cluster name Extemal4gent smalibusiness local Cluster IP address 192 168 2 174255 255 255 0 Cluster network Local Area Connection Private and Public Intel 21140 Based PCI Fast Ethernet Adapter Generic Primary Address 192 168 2 15 255 255 255 0 Cluster service account credentials Name Administrator P A awn MIME KK KX To create a cluster with this configuration click Next Figure 3 248 Reviewing cluster specifications 10 In the Cluster Configuration Quorum dialog box select Majority Node Set as the resource to be used for the quorum resource and click the OK button therein New Server Cluster Wizard E l Proposed Cluster Configuration Verify that you want to create a cluster with the following configuration Cluster name ExternalAgent smallbusiness local
411. rvers To configure a Sybase Adaptive server for monitoring please have the Sybase server s administrator execute the script opt egurkha bin setup_ sybase sh The eG Agent has been configured successfully Please use the commands opt egurkha bin start_agent and opt egurkha bin stop agent to start and stop the agent To provide feedback and report errors please contact support eginnovations com 2 11 Enabling the eG Agent to Allow Trusted Certificates f you have configured the eG agent during agent setup to allow trusted SSL certificates alone you need to follow the broad steps below to ensure the same e Extract the certificate from the keystore file and export it to a certificate file e Import the SSL certificate into the JRE of the eG agent The steps in this regard have been discussed elaborately below 2 11 1 1 Extracting the SSL Certificate to a Certificate File To achieve this do the following 1 2 Login to the eG manager and go to the command prompt Execute the following command cd JAVA_HOME bin keytool export alias egitlab1 keystore lt filename gt keystore storepass mykey keypass mykey file C tmp eGCert cer The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below 67 Installing and Configuring on Unix 3 gt alias the alias name of the certificate being ext
412. s 8 The installation process then prompts the user to select the destination location for the eG manager see Figure 3 34 eG Manager Setup Choose Destination Location Select folder where setup will install files Setup will install eG Manager in the following folder To install to this folder click Next To install to a different folder click Browse and select another folder Destination Folder Ch Browse lt Back I Next gt J Cancel Figure 3 34 Location of the eG manager 9 The next step summarizes all the details that have been provided so far by the user as in Figure 3 35 Installing and Configuring on Windows Environments eG Manager Setup Start Copying Files Review settings before copying files Setup has enough information to start copying the program files If you want to review or change any settings click Back If you are satisfied with the settings click Next to begin copying files Current Settings IP Host Name 192 168 8 147 Port Number A 7077 Tomcat Port 7077 Double Byte Support Not Enabled Path for JDK C egurkha JAVA Database ServerName ZIP 192 168 10 100 Database Server Port 1433 Database User Name egdbuser Figure 3 35 Information specified by the user at the various stages of the setup 10 Setup next tries to access the database server and create the user account specified in Step 5 If the user name already exists
413. s Environments Ele Action ew Help e mH a e a J Roles g Features a 2 Diagnostics gf Configuration amp 5 Storage is View the health of the roles installed on your server and add or remove roles and features Roles Summary H Roles Summary Help Roles 2 of 16 installed Add Roles Ea Remove Roles Fie Services Web Server IS File Services File Services Help Provides technologies that help you manage storage enable file replication manage shared folders ensure fast file searching and enable access for UNIX dient computers Role Status E Goto Fie Services Messages None System Services Al Runcing Events Nome in the last 24 hours A Role Services 1 instaled By Add Role Services zm Remove Role Services Cw File Server Instaled Distributed File System Net installed DFS Namespaces Not installed OFS Replication Not installed File Server Resource Manager Not installed Services for Network File System Not installed Windows Search Service Not installed Windows Server 2003 File Services Not installed zi S Last Refresh 11 5 2008 10 41 02 AM Configure refresh Figure 3 142 The Roles page in the right panel displaying the Web Server IIS role that was just installed 3 16 Cofiguring the eG Agent to Monitor the Web Site Transactions on an IIS Web Server on Windows 2008 2012 To perform web site transaction monitoring on an IIS web server executing on Windows 2
414. s above apply if the agent is communicating to the manager using a proxy server as well 6 4 Managing Agents in Multiple Private Networks In some cases especially in managed service provider MSP environments a single manager may be used to manage multiple private networks The same private IP address could be used by different servers in the different networks For example server Sa in the first network and server Sb in the second network could both have the same private IP address 192 168 10 7 Different applications could be running on these servers The eG architecture provides an elegant solution to allow these servers to be managed using a single manager This solution involves configuring the eG manager to identify agents using their nick names and not their IP addresses The steps in this regard are as follows 1 First add both the servers Sa and Sb via the eG admin interface with the same IP address but different nicknames e g Sa and Sb as in Figure 6 3 351 Configuring eG Enterprise to Work in NATed Environments Private Network i Private Network ES ee EN az Agent IP Agent IP 7 192 168 10 7 192 168 10 7 Agent Hick a Agent Nick Sa Sb Figure 6 3 Managing agents in multiple private networks 2 Next understand how the eG manager in your environment is presently determining the identity of the eG agents using the IP address of the eG agents or their nick name For this check the
415. s is as follows 1 When setup prompts you to pick a database server for use as the eG backend enter 2 to pick the Microsoft SQL Server option Database configuration for the eG Manager KKEKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKKK KK KK KK KK KKKK KK KK KKKKKKKKKKKKKKKKK The eG Manager requires a database server for storing its measurements KKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK Choose the type of database server which you want to use for the eG Manager 1 Oracle Database Server ZA Miecrosor re SOIRS Servern Select the database server type by number 2 2 The installation process instructs the user to appropriately size the database KKEKEKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KKK K KK KK KKKKKK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKK When setting up the eG database pleas nsure that you have sufficient space to host the eG database KKKKKKKKKKKKKKKKKKKK KKK KKK KKKKK KKK KK KK KK KK KKK KKK KK KK KKK KKK KKKKKKKKKKKKKKKKKKKKKKKK 33 Installing and Configuring on Unix 3 To configure the eG manager for database access next enter a the fully qualified SQL server name that Azure auto generates when creating a SQL database b the port number of the SQL server instance that Azure auto generates default is 1433 Prior to this provide your confirmation for proceeding with the setup by pressing y Do you want to continue the setup y n y y Enter the hostname or IP address of the MS SQL
416. s to verify the validity of a certificate s issuer Certificates are issued and signed by certificates that reside higher in the certificate hierarchy so the validity and trustworthiness of a given certificate is determined by the corresponding validity of the certificate that signed it The Chain of Trust of a Certificate Chain is an ordered list of certificates containing an end user subscriber certificate and intermediate certificates that represents the Intermediate CA that enables the receiver to verify that the sender and all intermediate certificates are trustworthy A certificate chain will therefore consist of multiple certificates Before importing each of these certificates you will have to understand the hierarchy of the certificates To know which is the root and which is the intermediate certificate refer to the web site of the certificate authority Then follow the steps below 1 First import the Root certificate For this execute the following commands one after another in the command prompt cd JAVA_HOME bin keytool import trustcacerts alias rootcert file lt Name_of_the_root_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypassmykey storepassmykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being reques
417. s v 2008 7 8 2012 32 bit 64 bit This section discusses how to handle the operating system and related JRE variations while installing an eG agent 75 Installing and Configuring on Unix 2 13 1 Deploying the eG Agent on Solaris Environments SPARC Solaris To deploy the eG agent on a Solaris host running a SPARC processor use the standard Solaris agent package The procedure for deployment has been discussed in Section 2 9 2 of this manual AMD 64 bit Solaris To monitor a 64 bit host running the AMD processor use the Solaris64 AMD agent package The steps for deploying this eG agent package are the same as that for the standard package and have been discussed elaborately in Section 2 9 2 of this manual 2 13 2 Deploying the eG Agent on Linux Environments 32 bit Agent The standard eG agent software for 32 bit Linux hosts is provided as a tar file named eGagent_linux tar An accompanying iAgent_linux script drives the installation process The procedure for deployment has been discussed in Section 2 9 2 of this manual 64 bit Agent To monitor a 64 bit Linux host use the eGagent_linux_x64 agent package An accompanying iAgent_linux_x64 script drives the installation process The procedure for deployment has been discussed in Section 2 9 2 of this manual Since the eG agent on Linux 32 bit is bundled with both JRE 1 5 and JRE 1 6 upon installing an agent on a 32 bit Linux host two JRE folders will be creat
418. s view Content view Configuration localhost applicationHast config 3 Figure 3 149 Re arranging the sequence of the logging fields Then apply the changes by clicking on the Apply button indicated by Figure 3 149 above Once the changes are saved click on the Return to Advanced Logging option indicated by Figure 3 149 above Figure 3 150 will then appear In the right panel of Figure 3 150 you will find that the newly added WebAdapterFile is appended to the list of log file definitions that pre exist 220 Installing and Configuring on Windows Environments s Internet Information Services IIS Manager lef x E gt WIN DXMESFxBONS gt ka alas File View Help iia Advanced Loggin HIlls F gging G The Advanced Logging feature E Start Page is disabled a s WIN DXMESFXBON3 WIN OXME Use this feature to create and manage log definitions which specify which server side and client side logging fields to log and to configure additional logging settings Actions Application Pools amp FTP Sites Group by No Grouping X Add Log Definition Eel Stes Name Enabled Edit Log Definition COMPUTERNAME Server Enabled XX Remove Log Definition WebAdapterFile Enabled Disable Log Definition Clone Log Definition Enable Advanced Logging Enable Client Logging Edit Logging Fields Edit Log Directory lt View Log Files Help On
419. sarsar eaa E E E E cheaanebessagesdeysaxaasepetaaededeasagvepeaxes aa 36 2A SSL enabling the eG Manager n UNK norssi gen Ae NE E AEN E E EATE AE 36 2 4 1 SSL Enabling the eG Manager Using a Self Signed SSL Certificate sssssseseeseseseseseeierssereerersrerererererrsrerererreet 37 2 4 2 SSL Enabling the eG Manager Using a Signed Certificate Obtained from a Valid Certifying Authority 44 2 5 Configuring Tomcat to Listen on Multiple Potts ecsccicscoscscticssctirs cxctes cove ieesstecvar sat sitet atea E E A N 51 2 6 Installing the eG Manager on Privileged Ports is2cciss cscisssesscssseiid cissleacess it irean sakreas nikae aai eaaa STe SRAKA EA ETAN SARTE ES eah 52 2 Starung the Manager ssion nnne EE E N NE RE E EE R OSEN 53 2 8 Increasing the Memory of the eG Manager Process sseseseesseeeetsrsseresestseststetsteresertnrsrsretetetsrststetnteserenrsretseseeeesrstste 53 2 9 Installing the eG Aget srianta aiaa a e EAr A CESO IDEASTA SEPA DEP OS aE Oa SKEAN ER EPSE SE iarsa 54 2 9 2 Installing an Agent on Solaris sisi cciceicescssceds opuvaceeissessveovestevsectatde coves ocssnncodeianntausohsdoiek a ari ire aianei ihai toisi 54 2 9 3 Instalime an Agent Om IMUR esses E EES a TE AE T N TA 56 2 9 4 Installing an Agent om ALX oicstoscsscccdsesdcassedescisdsescedsesasscdekscsiiivssdvssacSscvsdeesacoutendsasadvessenei ouceontesdeosevassasabves DERAS e 57 2 9 5 Installing an eG Agent on HP UX orrien iaee mr i rena AEE EEE EE E
420. se parameters you supplied Please check and restart the manager configuration Press lt Enter gt to continue lt CTRL C gt to end AE AE E AE AE ee AE AE E AE AE E AE E AE E AE AE AE E AE AE E AE AE AE E A AE AE E A AE E E AE E E AE AE E E AE AE E E AE AE E E AE A E A AE A E A E E E E E E E E E 21 Installing and Configuring on Unix Upon successful installation of the manager the following message will be displayed to the user AK KKK KKK KKK KKK KKK KKK KKK KK KK KKK KKK KKK KK KK KKK KKK KKK KK KK KKK KK KK KK KKK KK KK KK KK KKK KK If there were no errors the eG Manager has been configured Please use the commands opt egurkha bin start_manager and opt egurkha bin stop manager to start and stop the manager You will need a valid license to start the eG Manager Please contact mailto suppott eginnovations com to request for a license SRR A AK KK K K KKK K KK KK KK KK K K KKK KKK K KK K K K KK K KKK KK K KKK K KK KK KKK K KK KK K K K KKK KK KK KKK KK KKK 2 2 2 Using an MS SQL Server Database 2 2 2 1 Prerequisites for using an MS SQL Server Database Before even commencing the configuration process of the eG manager using an MS SQL Server database ensure that the following are in place The MS SQL Server should allow unlimited concurrent connections Given below are the steps to be followed to fulfill this requirement on an MS SQL Server 2000 e Select the Connections tab A dialog box depicted by Figure 2 1
421. secseceeeeceeseeaeesecaeeseeeceaeeseeaeeaeeneeeeeeaeenees Figure 4 2 Clicking on the Fonts button Figure 4 3 Defining font Settings nnen aaa EE ETENEE AEAN E A E EENE RE A REEE OEE ERR Figure 6 1 Manager behind a NAT onesie raoa aea RKAS EEEE ESEKIA ETETE KES PEKES EISEIN ESFE EEIEIE ENERO REVER EG TESEN OROS VEERE ESERE SENEESE TEA Figure 6 2 Agent behind a NAT Figure 6 3 Managing agents in multiple private networks Figure 7 1 How the eG manager NowSMS Lite integration works Figure 7 2 How th eG SMS Manager works cicccecesecsssvxcccesnstvsesso sh Ea EE EA AAEE EEE NEA KeA A REEE TA A AER EEES A ER AEAEE RETE RASAS Figure 7 3 The Welcome screen of the eG SMS manager Setup csseccescesesseeseeseceeceseeseeseesecsecsececeseeseesecsecsecaeeaeeaessecseeseceeeseeaeeaeeaeeneeerseaeeaees Figure 7 4 Accepting the license agreement Figure 7 5 Selecting the port on which the GSM modem has been installed 0 0 eceeceeseeseeeeseceeceseeseeseesecseceeceeeaeeaeeseesecseseeceaeeseeaeeeseeeeeeaeeaees Figure 7 6 Specifying the installation directory of the eG SMS managet ssssseeseeesessesesrseststseststesiststestststtstststeststsisestsststettsisesttsrstetseseesesest Figure 7 7 Completion of the installation sseeeeseeeeeeeeeeeeeerreereeeeee Figure 7 8 The contents of the eGSMSMgr properties file Figure 7 9 The contents of the eg_services ini file Figure 7 10 Starting the eG SMS Manager Fi
422. ser egurkha 3 Enter the directory in which the eG agent should be installed opt Next enter the path to the directory in which the eG agent will reside The default base directory for eG Enterprise is opt A subdirectory named egurkha will be created under the base directory If the base directory is not opt a symbolic link will be created from the egurkha subdirectory of the base directory to opt egurkha 4 Would you like the eG agent to auto restart on system boot up y n n The install process will now request the user to confirm installation of the auto restart feature This feature will enable the agent to start automatically every time the system hosting the agent reboots Now press y to install the auto restart feature or n to proceed without installing the same 5 The agent package contains components that need to be installed with the set uid permissions set These components must be installed for the agent to function properly Following this step the eG agent components are extracted and stored The following files are already installed on the system and are being used by another package Do you want to install these conflicting files y n q n 6 The following message will be displayed upon successful installation of the agent KKEKKKKKKKKKKKKKKKKKKKKKK KK KK KKKK KK KK KKKKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKK The eG agent has been successfully installed Please login as egurkha and run the script
423. ser name chn eatest Please enter the password Please reenter the password lt Back Next gt Cancel Figure 3 28 Specifying the database administrator user name and password for an MS SQL server with Windows Authentication enabled eG Manager Setup Database Settings New database creation requires administrator privileges e g sa or in the format domain dbaaccount if Windows authentication is enabled for the SQL database server Please enter the database administrator DBA user name a Please enter the password Please reenter the password trai Figure 3 29 Specifying the user name and password of a database administrator on an MS SQL server with SQL Server authentication By default manager setup displays the sa user name as depicted by Figure 3 29 If due to security concerns you decide not to use the sa user name and password then you can create a user with the Security Administrators and Database Creators roles and then provide that user s credentials in Figure 3 28 Figure 3 30 and Figure 3 31 depict how to create a new user with the aforesaid privileges using the SQL Server Enterprise Manager 109 Installing and Configuring on Windows Environments SQL Server Login Properties New Login xi General Server Roles Database Access E e fer ooo Authentication Windows Authentication Domain v Security access Grant access Deny access SO
424. server swo2fn9hhb database windows net Enter the port number of the MS SQL server 1433 1433 4 By default the SQL server instance that Azure creates is SSL enabled Therefore when requested to confirm whether the SQL server is SSL enabled or not type y Does the SQL database server support SSL y n n y 5 Since you have already created a SQL database on Azure enter y when setup prompts you to use an existing database for storing measures KKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKK Database access configuration for the eG Manager KEKEKKKKKKKKKKEKKKKKKK KK KK KK KK KK KK KKKKKKKKKK KK KK KK KK KK KKKKKKKKKKKK KK KK KK The eG Manager requires a database to store its measures Do you want to use an existing database y n y y 6 Enter the name of the Azure SQL database that pre exists Pleas nter the database name egdb 7 Next specify the details of the user account that will be used to host the eG database e the login name that you provided when creating the SQL database on Azure e the password that you provided for the login name at the time of creating the Azure SQL database The eG Manager requires a special database user account to store its measures Enter the eG database user name egurkha eguser Enter the password for egurkha Please re enter the password for egurkha By default the SQL database on Azure uses SQL authentication only The
425. server in the left pane of the console 378 Troubleshooting e The right pane will then change to display a variety of properties that can be defined for the IIS web server Browse the list to locate the ISAPI and CGI Restrictions property and click on it Figure 8 3 will then appear listing the ISAPI and CGI extensions that can run on the web server Look for egurkha in the list and when found check to see whether it is set to Allowed If not click on the Edit Feature Settings button indicated by Figure 8 3 Internet Information Services IIS Manager i 6 xi e3 S4 gt Ec234 gt ja 1 File View Help i FF ISAPI and CGI Restrictions Els le Add G5 Start Page a sj EG284 MAS sasikumar Use this feature to specify the ISAPI and CGI extensions that can run on the Web server Deny Edit 2 Application Pools Group by No Grouping i A amp FTP Sites X Remove Description Restriction Path ES Sites a 3 a Default Web Site No Description Allowed C Windows System32hcs hcsrvext dll Edit Feature Settings g egurkha No Description Allowed C Windows System32 hcap hcapext dil Help H karthikhere Active Server Pa Allowed C Windows system32jnetsrv asp dll Grine Hel e sasil ASP NET v1 1 4 Not Allowed C Windows Microsoft NET Framework v 1 1 4322 aspnet_isapi dll MERT ASP NET v2 0 5 Allowed Nindows Microsoft NET Framework v2 0 50727 a
426. server monitoring 3 Then restart the World Wide Web Publishing Service 204 Installing and Configuring on Windows Environments 3 15 Configuring the eG Agent to Monitor an IIS Web Server Operating on Windows 2008 Windows 2012 The eG agent can monitor an IIS web server operating on Windows 2008 2012 only if the Web Server role is configured on the target Windows 2008 2012 server Typically for an IIS web server to function on a Windows 2008 2012 server a Web Server Role should be configured on the server The Web Server role lets you share information with users on the Internet an intranet or an extranet If such a role does not exist on a Windows 2008 2012 server then you cannot monitor the transactions to the IIS web server on that host this is because the ISAPI filter required for transaction monitoring cannot be installed on a Windows 2008 server without the Web Server role To configure this Web Server role on a Windows 2008 2012 server follow the steps detailed below 1 Login to the Windows 2008 2012 server as a local domain administrator 2 Open the Server Manager console by following the menu sequence Start gt Programs gt Administrative Tools gt Server Manager see Figure 3 133 r gt r r gt gt Symantec Chent Security mim am Figure 3 133 Opening the Server Manager 3 The Server Manager console then appears see Figure 3 134 205 Installing and Configuring on Windows Enviro
427. sistant Step 5 of 7 Initialization Parameters lol x Memory Character Sets IDB Sizing File Locations Archive Database Character Set C Use the default The default character set for this database is based on the language setting of this operating system WESMSVIN1 252 Setting character set to Unicode AL32UTF8 enables you to store multiple language groups Choose from the list of character sets Weamawint 262 National Character Set al 46UTF16 X All Initialization Parameters File Location Variables Cancel Help Q Back Finish Figure 4 1 Configuring the Oracle database instance to support double byte Next ensure that you add multi language support to the browser host i e the host from which you will be connecting to the eG manager and the eG manager host Next the font and Unicode settings for your mail client should be configured so that eG alerts received by the client display double byte characters For instance to ensure that your Outlook Express client supports double byte characters do the following First open the Outlook Express client and follow the menu sequence Tools gt Options 342 Configuring Double byte Support for eG Enterprise Click on the Read tab page in the Option dialog box that opens and then click on the Fonts button in the Read tab aix Speling Secuky Connection Maintenance General Read Receipts Se
428. spnet_isapi dll Allowed C Progra 1 eGurkha manager tomcat bin native sapi_redirector dil RPC Proxy Serv Allowed C Windows System32 RpcProxy ypcproxy dil E E E Features view Content View Configuration localhost applicationHost config amp Figure 8 3 Checking whether the egurkha extension is Allowed to run on the web server e Clicking on the button indicated by Figure 8 3 will invoke Figure 8 4 To lift the ISAPI and CGI restrictions off the egurkha extension select the Allow unspecified CGI modules check box and the Allow unspecified ISAPI modules check box in Figure 8 4 and click the OK button You will then find that the egurkha listing in the ISAPI and CGI Restrictions window is set to Allowed 379 Troubleshooting 13 x1 66 Ss eam i ix De File Yiew Help id JJ ISAPI and CGI Restrictions 7 BIZ1e 7 AGS Start Page i CE EG284 MAS sasikumar Use this feature to specify the ISAPI and CGI extensions that can run on the Web server 2 Application Pools Group by No Grouping gt FTP Sites X Remove S i Sites Description Restriction Path a Default Web Site No Description Allowed C Windows System32 hes hesrvext dll Edit Feature Settings egurkha No Description Allowed C Windows System32 hcap hcapext dll Help H karthikhere Active Server Pa Allowed C Windows system32 inetsrv asp dll Online Help o sasil ASP NET v1 1 4 Not
429. ss NEEE EA EENE REEERE E T RE 330 3 31 Manually Uninstalling the eG Agents si ccicscisucsciecsscassstestsasscsabees tesidiescovsdncaseosdinhsensdvestussdi obsesaiyealaveciepsnoadestendiy ddvass 333 3 32 Manually Uninstalling the eG Manager oo eeeeseesecsseseeseeseeseeecsecseesecseeseesesacsecseesesseeseeseeaesessessesatesesaeeaseaseeeeees 339 CONFIGURING DOUBLE BYTE SUPPORT FOR EG ENTERPRISE ccscscsssssssscsssssssssessesssssssessscsssssssscessesseenessseees 341 BACKING UP AND RESTORING EG ENTERPRISE cccccsssscssssssssssscsesssscnscsssssssscesnssscenscsssnsesscesssssesnecessnsssssessaseesneres 346 5 1 Backing up and Restoring the eG Manager on Unix Environments Linux and Solaris ssseeeeseeerereeeeeererrrerererereeeee 346 5 2 Backing up and Restoring the eG Manager on Windows Environment c ceseesessseseseseeeseeseeeceeeeeeeesesaeeseeeeeeeaes 347 5 3 Backing up and Restoring the eG Database inuina eiiieaen sagi ai e EE a e EA 348 SA Mandatory Steps ranee en e A a e a a aea aa a e Se paaa a eaaa eia aieeaa 348 CONFIGURING EG ENTERPRISE TO WORK IN NATED ENVIRONMENT cccccssssssssssscssssscsnsssssssssesssesssenessssees 349 6 1 Maniager belinda NAW ssena e A E denashssersip A E E E E eaves dapeaaps 349 6 2 Agent ona PUBIC IP isis sescsssscsusssssacsvessseatesesbs ona sssiast onssoeuesestenrsioivexeusets T E SE cass REEERE easseaubioteianeensesossoauseos EAN KIE ests 350 63 Agent behind NAT erinan
430. ssecscesvistdvevsscntvesseesusahouesd Cossdasdesovedsiseaei avis E EIEEE NiE stu bolus dusind ssh IEE Ee 86 2 19 Uninstalling eG Enterpris essnee ereire ra ioar Ke OTN E EEEE T ERE ENEIT ROTE O ENTRETENERSE ENKET 87 INSTALLING AND CONFIGURING ON WINDOWS ENVIRONMENTS cccsccsssscssssssscssssssscssscesesssesssssssessesesecsseenesonee 91 3 1 Installing and Configuring the Manager iscsisvsisssosecescassusesousaorsioacexieserdeoneassesansvuvseiutossenmncsubeniciniwsosassabasaseos EEEO 91 3 1 1 Pre reg isites for Installation ssiri seroso tiiri aS En eNA ENANS E NEER ETS aae 91 3 1 2 Installing and Configuring the eG Manager on Windows 2008 Windows 7 Windows 8 Windows 2012 Platforms 92 3 1 3 Configuring the eG Manager to Use a Microsoft Azure SQL Database sesssesessesseeeessrstsresrsrsestersrsrsrrersrsrsest 116 3 1 4 Configuring the eG Manager to use an MS SQL Server 2005 on Windows 2003 cceesecseseseeseseteeeseeseeseeeeees 123 3 1 5 Installing and Using MS SQL Server 2005 2008 2012 Server Express as the eG Backend eee eeeeeeeeeeeeee 134 3 2 Silent Mode Installation of the eG Manager and Agents 0 cccececeeeesesseseseeeseeseesceeseesesaesaesaeeaceeesecsesaeeaeeaeeaseeseaeaees 139 3 2 1 Silent Mode Installation of the eG Manager 00 ee eeesssseeseeseeeeeeeeeesesseesesseeaceeeseesesatesesaseaeeessasseseesaesaseaeseseesaees 139 3 2 2 Silent Mode Installation of th eG Agent c 2 1 ccscosascediavesccves e S AA E A aR 1
431. sted one Enter yes to trust the certificate If the processing was successful then a message stating that the Certificate was added to keystore willl appear Figure 2 18 depicts the processing explained above 68 Installing and Configuring on Unix INNT System32 cmd exe C SAUE gt set path c progra 1i egurkha jre bin path C SAVE gt keytool import alias egcert file certnew cer keystore c progra 1l eg E h h urkha jre lib s pity cacerts Enter keystore password changeit nsure that the CN egtesti OU Testing Lab O eG Innovation L Chennai ST Tamil Nadu name IP of the iy CN support OU Testing Lab O eG Innovations L Chennai ST Tamil Nadu C IN Emailfddress support eginnovations com manager Serial number 14 appears against Valid from p A Sun Jun 5 15 61 41 IST 2005 23 94 te SHALL EE A Owner CN Trust this certificate no Certificate was added to keystore C SAUE gt Figure 2 18 The process of importing and trusting the manager certificate 5 Now start the agent 2 12 Silent Mode Installation of the eG Agent on Unix Silent mode installation is a standard way to ensure repeatability of the installation process Administrators use this process when installing uninstalling the same software in multiple locations servers For instance in large environments comprising of hundreds of components the eG agent software might have to be installed on each host to ensure that th
432. steps below If you already have a fully operational manager on the target host and you simply want to revert to the backed up version of the eG manager then simply replace the eGurkha directory on the target host with the backed up eGurkha directory and then restart the eG manager On the other hand if you want to completely scrap the existing manager installation and replace it with the backed up version then follow the steps below o Uninstall the existing eG manager o Next install the eG manager with the same specifications as the old manager for instance if the old manager was installed using Tomcat and not IIS make sure the new manager also uses Tomcat Similarly install the new manager in the same directory as the old manager However during installation make sure that you do not provide the name of the database used by the old manager Instead provide the name of a new dummy database for use as the eG backend o Replace the eGurkha directory of the new manager with the old eG manager o Finally start the eG manager 4 If you want to restore the eG manager to a different host i e a host with a different IP address hostname from that of the backed up manager then do the following O If you have a fully operational manager on the target host and you simply want to revert to the backed up version of the eG manager then to restore the backed up version simply replace the eGurkha directory on the t
433. stname and port number of the host on which the eG manager is being configured see Figure 3 7 By default setup auto discovers the host name and the IP address es of the eG manager host and makes it available for selection in Figure 3 7 You can pick the host name or any of the IP addresses listed therein to take the eG manager installation forward If the IP address host name that you want to use for your eG manager is not discovered for some reason then you can choose the Other option in Figure 3 8 This will invoke Figure 3 8 where you can manually specifiy the IP address host name of the eG manager If the domain name service is used in the target environment use the full hostname Otherwise specify the IP address However 7077 is the default port You can change this port if you so need 95 Installing and Configuring on Windows Environments eG Manager Setup eG Manager Setup Y6 Please select the host name or the IP address of this host eGLAP0030 PC 3 2053 4d6b aal Please enter the port number for the eG Manager 7077 lt Back Cancel Figure 3 6 Selecting the IP address host name to use for the eG manager eG Manager Setup eG Manager Setup Y6 Please enter the full host name or the IP address of this host 192 168 8 147 Please enter the port number for the eG Manager 7077 Figure 3 7 Hostname and port number of the system on which the eG manager will execute 96 Insta
434. sword to be used to host the eG database on an MS SQL server with SQL server authentication enabled Installing and Configuring on Windows Environments eG Manager Setup Database Settings The eG Manager requires a special database user account to store its measures Please enter the eG Manager database user name chniegtest Please enter the password for the above database user Retype the password lt Back Cancel Figure 3 33 Specifying the user name and password to host the eG database on an MS SQL server with Windows Only Authentication enabled If MS SQL Server 2008 is being used as the eG backend then ensure that the password provided in Figure 3 32 is a strong password Strong passwords are defined by the following parameters o Has at least 6 characters o Does not contain Administrator or Admin o Contains characters from three of the following categories O ou o Note 5 O O Uppercase letters A B C and so on Lowercase letters a b c and so on Numbers 0 1 2 and so on Non alphanumeric characters amp and so on Does not contain the corresponding username For instance if the name of the special database user is egdb then the password that you set for this user should be a strong password such as db123 Note that without a strong password the eG manager installation will fail Installing and Configuring on Windows Environment
435. t 1 ECOBSE31 F42B 4B4E B764 45FEA4005C0954 SdLicense 0 Result 1 ECOBSE31 F 425 46 4k B764 45FEA005C954 SdAskDestPath 0 2 Ee lt Indicates the eG agent install Resul x ECOB5E31 F42B 4B4E B764 45FEA005C954 AskYesNo 0 directory Result 1 ECOB5E31 F42B 4B4E B764 45FEA005C954 AskYesNo 1 bOO5C954 SdShowDlgEdit2 0 lt lt Indicates the IP address and port number of the eG manager ECOBSE31 F42B 464E B764 45FEA005C954 AskYesNo 2 s 0 a a Jo a Result 1 FEAOO5C954 SdShowDlgEdit2 1 ca lt Indicates the IP addfess and port number pesut of the Proxy servef via which the agent e ciiaetaiaaiiaiaeiin communicates With the manager nls z bOO5C954 SdshowDlgEdit3 0 szEditl eguser is szEdit2 egurkha Indicates the user name and szEdit3 egurkha password for authentifating ECOBSE31 F42B 4B4E B764 45FEa005 954 saseQmampunication via the Proxy Result 1 server Application Name eG Agent Version 4 Company eG Innovations Inc Lang 0009 ECOBSE31 F42B 4B4E B764 45FE4005C954 AskYesNo 4 Result 1 i EC0OBS5E31 F42B 4B4E B764 45FEA005C954 3d3howDlgEditl 0 sate indicates the nick namd of the eG agent Result ECOBSE31 F42B 4B4E B764 45FE4005C954 SdFinish 0 Result 1 bOptl 0 bOpt2 0 Figure 3 72 Contents of the script file 141 Installing and Configuring on Windows Environments 3 2 2 2 Using the Silent Mode Script to Perform Subsequent Agent Installations
436. t can change according to the requirements of your environment These inputs have been described below gt alias the aliasname of the certificate being requested make sure that you provide the same alias name that you specified in Section 2 4 1 1 of this document gt deststorepass this refers to the storepass of the destination keystore file i e the keystore file in the JKS format The storepass of the destination keystore should be the same as the storepass of the source keystore gt destkeypass this refers to the keypass of the destination keystore file i e the keystore file in the JKS format The storepass and keypass of the destination keystore file should be the same destkeystore the name of the destination keystore file i e the keystore file in the JKS format srckeystore the name of the destination keystore file i e the keystore file in the PKCS12 format srcstorepass The storepass of the source keystore file i e the keystore file in the PKCS12 firmat make sure that you provide the same storepass you specified in Section 2 4 1 1 of this document 2 4 1 5 Configuring Tomcat for Using the Keystore File The eG manager on Unix uses Tomcat 6 0 as the web server Therefore to SSL enable the eG manager you need to configure the server xml file of Tomcat with the name and full path to the keystore file which was created earlier For this purpose do the following 1 2 3 Stop th
437. tVersion Perflib To monitor Windows 2000 and Windows XP the user name must have access granted by the following group policies o Profile single process o Profile system performance Both group policies are security settings that you can set from the Local Policies gt User Rights option in the Administrative Tools of the Control Panel To monitor Windows XP if the systemroot is on an NTFS partition the user name must have at least READ access to the following two files o SystemRoot System32 Perfc009 dat o SystemRoot System32 Perfh009 dat 197 Installing and Configuring on Windows Environments 3 13 Enabling the eG Agent to Allow Trusted Certificates If you have configured the eG agent during agent setup to allow trusted SSL certificates alone you need to follow the broad steps below to ensure the same e Extract the certificate from the keystore file and export it to a certificate file e Import the SSL certificate into the JRE of the eG agent The steps in this regard have been discussed elaborately below 3 13 1 Extracting the SSL Certificate to a Certificate File To achieve this do the following 1 Login to the eG manager and go to the command prompt 2 Execute the following command cd JAVA_HOME bin keytool export alias egitlab1 keystore lt filename gt keystore storepass mykey keypass mykey file C tmp eGCert cer The text in Bold in the above command line indicates those inputs that can
438. table for Chinese Korean Spanish German Japanese Spanish Russian Ensure that one more of these Universa fonts are downloaded to the eG manager host and copied to the following locations therein e lt EG_INSTALL_DIR gt manager fonts e lt JDK_INSTALL_DIR gt jre lib fonts Note While copying the font files to the above mentioned directories ensure that the font file extensions are in upper case in other words copy the font files as TTF and not ttf 5 Next configure the eG manager to use any of the downloaded Universal fonts for displaying data in the eG user interface The choice of font naturally depends upon the language preference of the user For instance to display data given below in the eG user interface in Chinese you need to configure the eG manager following the steps Edit the eg_ui ini file in the lt EG_INSTALL_DIR gt manager config directory using Notepad In the DOUBLE_BYTE_SETTINGS section of the file set the FONT_NAME parameter to Cyberbit as indicated below DOUBLE BYTE SETTINGS FONT NAME Cyberbit Save the eg_ui ini file 6 Also to ensure that multi byte support is extended to the eG reports that are saved as PDF documents do the following Download the font file Code2000 TTF from the web In fact there are many web sites that provide downloads of this file The site that we recommend is http www code2000 net code2000_page htm Copy the downloaded font f
439. tartmanager_out txt 6c IDK13 1 1_O bin java exe c Di PROGRAWI SS test equrkha ib eg manager jar D PROGRA 1 ss1test egurkha ib classes12 21p D PROGRA 1 ss1test egurkha s inal WEB NF cl sse5 D PROGRA 1 ss Itest egurkha ib GsmMEngine jar D PROGRA 1 ss Itest egurkha 1i lt https 1 D PROGRA L s5 Test equ z mn ert jar D PROGRA 1 s51test egurkha lib jnet jar EqgstartmManager 168 10 43 7077 Final servlet uploa r 92 Figure 3 76 SSL enabling the start_manager script SSL enabling the start manager script by making the indicated change 7 Next make sure that the eG manager URL configured against the MailHomeURL parameter in the MISC_ARGS section of the eg_services ini file in the lt EG_INSTALL_DIR gt manager config directory begins with https instead of http Then save the file 8 Finally start the eG manager 3 4 2 SSL Enabling the eG Manager Using a Signed Certificate Obtained from a Valid Certifying Authority Self signed certificates are useful in environments where security is not a priority In highly secure environments especially where the eG manager is to be frequently accessed via the public internet using a self signed certificate may not be preferred In such a case you can obtain a valid certificate from a certificate authority and use that certificate to SSL enable the eG manager The broad steps to be followed to achieve this are as follows
440. te a new rule click on the Create site and content rule option in Figure 3 185 This will invoke a wizard using which the rule can be configured In the Welcome screen of the wizard see Figure 3 186 click on the Next gt button New Site and Content Rule Wizard Welcome to the New Site and Content Rule Wizard This wizard helps you create a new site and content rule for this array Site and content rules determine whether and when specified users can access content on specific destinations Site and content rule name eG_site To continue click Next lt Back Cancel Figure 3 186 The Welcome screen of the New Site and Content Rule Wizard 24 Next select the Allow option from Figure 3 187 to indicate that the rule intends to a low access to a site Then click on the Next gt button 246 Installing and Configuring on Windows Environments New Site and Content Rule Wizard Rule Action Select the type of action this rule performs Figure 3 187 Allowing access to a site 25 To apply the rule to the newly created destination set first select the Specified destination set option from the Apply this rule to list of Figure 3 188 Then choose the Name of the destination set and click on the Next gt button New Site and Content Rule Wizard Destination Sets Select the destinations to which this rule applies Specified destination set E Figure 3 188 Selec
441. te an apache_root txt file at lt EG_ROOT gt agent config directory and type the following server lt APACHE_ROOT gt For example if the root directory of the Apache server is C Program Files Apache group Apache then server C Program Files Apache group Apache 4 Restart the Apache server 3 28 Stopping the eG Agent To stop the agent on a Windows 2003 XP host click the Start button on the task bar From thereon select Programs gt eG Monitoring Suite gt eG Agent gt Stop Agent New Office Document Open Office Document ral Set Program Access and Defaults amp Windows Update Figure 3 316 Stopping the eG agent In case of Windows Vista however only a user with administrator privileges can stop the agent Therefore before attempting to start the agent click on Start Search on the task bar of the agent host right click on Command Prompt and then select the Run as administrator option as depicted by Figure 3 319 This implies that the command that is issued at the command prompt soon after will be run with administrator privileges 326 Installing and Configuring on Windows Environments Internet Internet Explorer E mail Windows Live Mail Documents Pictures ow Remote Deskt EditPlus a Notepad s I Send to Fax Recipient Gal i Ec Microsoft Offi Scan for Viruses 9 WinZip 4 Paint E mail with Yahoo we Unpin from Start Menu Microsoft Offi Add to Quick Launch
442. te is a software gateway that allows sending of SMS messages using a GSM GRPS EDGE 3G modem The eG manager can integrate with the NowSMS Lite software so that eG alarms can be forwarded as SMS alerts to configured mobile phones This way operators only see alerts relating to networks servers applications and services under their purview Employing a patented automatic triage technology the eG manager prioritizes alerts so the root cause of problems are differentiated from the effects and forwards them instantly to the NowSMS server for delivery to users mobile phones e By integrating the eG manager with the eG SMS Manager component The eG SMS manager is a key component of eG Enterprise which when integrated with the eG manager generates personalized alerts to the mobile phones of IT operations staff e By integrating the eG manager with Air2Web Air2Web offers a Content Gateway platform using which SMS MMS WebPush messages can be sent to any mobile phone anywhere in the world In environments where this gateway is configured in house and in environments that subscribe to the Air2Web s gateway services the eG manager can be integrated with the gateway service so that SMS alerts can be instantly sent to mobile phones without modems SMS subscriptions or components like the eG SMS manager e By integrating the eG manager with PageGate PageGate software allows for network paging or network wide alphanumeric paging and text mess
443. ted make sure that you provide a unique alias name for the root certificate file the name of the root certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 1 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 2 4 1 1 above for details 2 Next import each of the intermediate certificates one after another using the following command keytool import trustcacerts alias intercert1 file lt Name_of_the_intermediate_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypass mykey storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for every intermediate certificate file the name of the intermediate certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 2 4 1 1 above 41 Installing and Configuring on Unix gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 2 4 1 1 above for details Fi
444. tents of the original file are copied The details of the subsequent alerts will then be logged to the original file This way a maximum of 10 HTTPSMSl log files can be created by default The same default settings apply to the egsmsaudit log file as well These default log settings can however be overridden using the above mentioned parameters To increase the maximum size in MB upto which a log file HTTPSMS log and or the egsmsaudit log can grow before a new log file is created increase the value of the Log_file_size parameter Likewise to increase the maximum number of log files that can be created change the value of the Max_log_files parameter Then save the file to register the changes 375 Troubleshooting Troubleshooting This chapter in deals with the queries that may arise while installing and configuring eG 8 1 Installing the eG Manager The eG manager installation does not even start What could be wrong Please check for the following o Did you accept the license agreement o Check if you possess the administrative privileges on Windows o Do you have the pre requisites for JDK with the appropriate version An operating system version that eG supports The right service pack and option pack for Windows environments The eG manager installation failed What could be wrong 1 Make sure that the database instance you specified is valid Connect from the sqlplus prompt using the database administrator
445. teps below 1 Open the start_manager bat file see Figure 3 86 residing in the lt EG_INSTALL_DIR gt lib directory Change the URL http lt eGmanagerlp gt lt eGmanagerdefaultTCPPort gt final serviet upload present in the last line of the batch 168 Installing and Configuring on Windows Environments file to https lt eGmanagerlp gt lt eGmanagerPort gt final servlet upload see Figure 3 86 j start_manager bat Notepad File Edit Format Help dad path path C IDK13 1 1_O bin D WINNT System32 set eg_classpath D PROGRA 1 ss Itest egurkha ib classes12 zip D PROGRA 1 ss Itest egurkha 1ib eg_manager jar D PROGRA 1 s5 Ttest egurkha manager tomcat webapps final weEB INF classes D PROGRA 1L ss Itest egurkha lib classesl2 zip D PROGRA 1L ss1t Final Wee INF cTasses equrha 0 PROGRA L ss Test equrkha b GsHengine Jarib PROGRA a ssItest egurkha 1ib ldapjdk jar D PROGRA 1 ss Itest egurkha manager tomcat server 116 D PROGRA 1L ss Itest e urkha manag er tomcat common lib serv let jar D PROGRA 1 ssltest egurkha manager tomcaticommon Tib ant jar D PROGRA L ss Itest egurk a lib eg_troubleticket jar D PROGRACA ssI test egurkha ib eg subscrtbermanagement jar D PROGRA 1 ssItest egurkha manage r tomcat bin bootstrap jar D PROGRA 1 ss5 Itest egurkha manager tomcat common ib activation jar D PROGRA 1 Ss Itest egurk ha lib Acme jar D PROGRA 1 ss Itest egurkha lib
446. ter resource Then choose Generic Service as the resource type and click Next to proceed to the next step 289 Installing and Configuring on Windows Environments New Resource eG Agent _ eG Agee Description eG Agent service Resource type Generic Service x Group Cluster Group 7 T Run this resource in a separate Resource Monitor To continue click Next lt Back Cancel Figure 3 262 Providing the details of the new cluster resource 25 When Figure 3 263 appears select NODE1 and NODE2 from the Available Nodes list click on the Add button and transfer the selection to the Possible Owners list Then click Next to proceed Possible Owners Possible owners are nodes in the cluster on which this resource can be brought online Specify the possible owners for this resource Available nodes Figure 3 263 Adding nodes to the Possible owners list 290 Installing and Configuring on Windows Environments 26 When Figure 3 302 appears select all Available resources click on the Add button and add the selection to Resource dependencies Then click the Next button Dependencies NB Figure 3 264 Adding available resources to resource dependencies 27 The eGurkhaAgent service will then be automatically displayed against Service name in Figure 3 265 Click the Next button in Figure 3 265 to move on 291 Installing and Configuring on Windows Environments Generic Service Parameters
447. ter the following message is displayed the install uninstall process will be terminated Current user john does not have permission to execute this script Only super user can execute this script 4 On the other hand if the current user is the super user then the script will begin installing uninstalling the auto restart feature Upon successful installation of the auto restart feature for an agent you will see the following message Successfully installed the auto restart feature for the eG agent Upon successful installation of the auto restart feature for a manager you will see the following message Successfully installed the auto restart feature for the eG manager Similarly upon successfully uninstalling the auto restart feature for an agent you will see the following message Successfully uninstalled the auto restart feature for the eG agent In the same manner once the installation of the auto restart feature for a manager becomes successful the following message will appear 63 Installing and Configuring on Unix Successfully uninstalled the auto restart feature for the eG manager 2 10 Configuring the eG Agent After the installation an agent needs to be configured on the server on which it is installed To do this it is essential to login as the eG user The licensing terms for eG Enterprise are mentioned in the file loptiegurkha license_agreement It is mandatory that you read this before proceeding any
448. ternet Security amp Acceleration e EGITLABOZ Standard Edition Getting Started Getting Started with ISA Server 2004 _ Follow these steps to set up your ISA Server networks and protect the computers in these networks while allowing traffic to flow between them Tasks Define Administrative Roles Before you begin read about securing your ISA Server computer X Disconnect Selected Server from Management Console Backup this 15A Server Configuration Define Your ISA Server Network Configuration Select a predefined network template to create your ISA Server network layout and apply default policy rules Use network rules to specify NAT or route relationships between your ISA Server networks A Restore this 154 Server Configuration View and Create Firewall Policy Rules A Related Tasks Export 154 Server Configuration to a File Import from an Exported ISA Server Configuration File Create rules defining how ISA Server allows secure access to Internet sites corporate e mail network servers services and websites inside and outside your corporate network Use the system policy editor to define how ISA Server enables the infrastructure necessary to manage network security and connectivity Read about system policy Define How ISA Server Caches Web Content Define a cache drive and then accelerate Web performance by specifying how Web content is downloaded t
449. tetramer NTFS fides wehin a com The DNS Cieri service drncache caches Do The eG Agert Sed Recovery Process Prowdes the cove file encrpphon technology ure The Extermbte Authentication Protocol EAP se zj Figure 3 305 Selecting the eGurhaAgent service 5 In the Client Access Point page that appears next provide input for the network name and IP addresses that clients will be using when accessing the eGurkhaAgent service Then click the Next button in Figure 3 306 SA High Availabilty Wizard t Client Access Point Before You Begn Select Service a Apphcahon Type tre name that chords val use when sccessng the service of appicaton Name ATIP EGIRGend wc One of more Pvt s bese could not be configured sulomatcaly For each netmask to be used make nse Select Service the netvecth is selected ord then type an Select Ses age Puephc te Regn Netware Abs 10200 40071 Seng Cortemator Cortapae High fave wach Sumay Figure 3 306 Entering the network name and IP address using which clients will be accessing the clustered resource 6 When Figure 3 307 click on the Next button to move on 320 Installing and Configuring on Windows Environments CEAT TTIE f Select Storage Before You Begn Setect ordy the storage volumes that pou wari to asagn to the servor of app caton You can sign oddmonal storage to ther serene or apploston after pou compiete ha wead Select Service a Select Service No
450. th super user permission during the process of installing this package Do you want to continue with the installation of lt eGmanager gt y n y 13 Installing and Configuring on Unix Upon successful completion of the installation process the following message will be displayed KKKEKKKKK KK KK KK KK KK KK KKKK KK KK KKKK KK KK KK KK KK KK KKKK KK KK KKKKKKKKKKKK KK KK KK The eG Manager has been successfully installed Please login as lt user name gt and run the script opt egurkha bin setup manager to configure the manager The licensing terms for eG products are mentioned in the file opt egurkha license agreement PLEASE READ THIS FILE BEFORE PROCEEDING Please note that the eG Manager requires JDK 1 6 KEKEKKKKKKKKKKEKKKKKKK KK KK KKK K KK KK KKKKKKKKKK KK KK KKKKKKKKKKKKKKKKKKKKKKKKEK Installation of lt eGmanager gt was successful 2 1 3 Installing the Manager on Linux CentOS For installation on Linux CentOS systems the eG manager is provided as a tar file named eGmanager_linux tar The same tar file can be used for installing the eG manager on 32 bit Linux CentOS host and on a 64 bit Linux CentOS host During installation setup automatically detects whether the target host is a 32 bit or a 64 bit host and copies the relevant files to the directory chosen for installation The installation process is driven by a shell script named iManager_linux The eG manager software has to
451. the command etc rc d init d httpd start The eG agent installation script expects the apache start up file to be called apachectl Moreover this script expects the apachectl file to be in the apacheServerRooti bin directory To configure the default httpd to work with eG follow the following steps O O O Create the directory in etc httpd bin cd etc httpd bin In s etc re d init d httpd apachectl In s usr sbin httpd httpd Run opt egurkha bin setup_webadapter Provide etc httpd as the web server s root directory admin of the web server is root mv etc rc d init d httpd etc rc d init d httpd save In s etc httpd bin apachectl etc rc d init d httpd Start the Apache server using the command etc httpd bin apachectl start e How do I change the eG manager s port Stop the eG manager Look for the script start_manager bat in the lt EG_HOME_DIR gt lib directory and modify the port there but do not run the script Next proceed to change the egurkha web site s port To do so first go into the Windows Internet Service Manager Start gt Programs gt Administrative Tools gt Internet Information Services IIS Manager In the Internet Information Services window that appears right click on the manager host and select Properties from the shortcut menu From the Master Properties list box therein select the egurkha web site and then click the Edit button alongside it to edit its properties Upon c
452. the eG agent on a Windows 2008 Windows Vista Windows 7 host Likewise you will have to use the program called eGAgent_win2012 exe to install the eG agent on a Windows 8 Windows 2012 host By default the eG agent is a 32 bit application For agent deployments on 64 bit Windows 2008 Windows Vista Windows 7 hosts therefore use the eGAgent_win2008_x64 exe To install the eG agent on a 64 bit Windows 8 Windows 2012 host on the other hand use the eGAgent_win2012_x64 exe Before installing an eG agent on a Windows 2008 host make sure that the VC 2008 or above runtime engine exists on that host If not then download and install the same For use on a 32 bit Windows 2008 host you need to download the 32 bit VC 2008 or above runtime engine from the URL http www microsoft com download en details aspx id 29 Prior to installing the eG agent on a 64 bit Windows 2008 host download and install the 64 bit VC 2008 or above runtime engine from the URL http Awww microsoft com download en details aspx displaylang en amp id 15336 Il 186 Installing and Configuring on Windows Environments 1 To start the installation process run the corresponding exe The Welcome screen see Figure 3 111 of the eG agent Setup program appears Clicking on the Next gt button at the bottom of this screen takes the user to the next step of the setup eG Agent Setup Welcome Welcome to the eG Agent Setup program This program will install the
453. the eG manager connects to the URL and sends the SMS alert 7 4 Integrating the eG Manager with PageGate PageGate software allows for network paging or network wide alphanumeric paging and text messaging from any combination of the following modules web email commandline ascii serial TAP in and GUI windows workstations Alphanumeric or text messages can be sent to alphanumeric pagers numeric pagers cell phones PIMs billboards or pcmcia pager cards PageGate is a flexible powerful way to take control of corporate communications The eG manager can be integrated with PageGate so that the alarms generated by the eG manager are sent as SMS to pagers via PageGate To submit messages to PageGate the eG manager uses a Commandline ASCII interface Given below are the pre requisites for this integration e PageGate with the required number of pagers licenses e Commandline ASCII Interface e The eG Manager with a valid license for SMS Alerting capability e A Dial up modem 7 4 1 Configuring the PageGate Software to Transmit Alarms Sent by the eG Manager To achieve this follow the steps given below 1 Please make sure that a dial up modem is connected to the eG manager host 2 Install the PageGate software on the eG manager host and start the PageGate server as shown below 367 Configuring the eG Manager to Send SMS Alerts SIR gi G S t i Windows Server 2003 Standard Edition 4k 0R g ayp C T gt 3
454. the managed list of the eG manager Please check the agent error log to confirm if this is the case o A third reason for the agent manager communication to fail could be if the manager is configured to authenticate all agents reporting to it and the agent is communicating via a Network Address Translator or firewall In this case the manager will not be able to authenticate the agent To enable manager agent communication turn the authentication option off for manager agent communication o Some antivirus software may stop the eG agent from executing any Visual Basic scripts on Windows This can cause the agent to stop running Please check the antivirus software s documentation to determine how it can be configured to allow the Visual Basic scripts in the eG directory to execute The eG agent on a server used to work Suddenly it has stopped working What could be wrong This problem can also occur if you have uninstalled the Java environment that you had specified when installing the eG agent Even an upgrade of the java environment or changing the java installation directories can cause problems You will need to edit the lt EG_HOME_DIR gt bin start_agent script on Unix to restart the manager On Windows reinstall Java in the same location Are there log files that I should look at to figure out what problems are happening with my eG installation Yes to detect problems with the eG manager please look at the error_log file in the
455. the procedure detailed in Section 3 4 1 If you pick option b use the procedure detailed in Section 3 4 2 3 4 1 SSL Enabling the eG Manager Using a Self Signed Certificate If you do not want to use the default SSL certificate bundled with the eG manager then you can generate a self signed certificate using an internal certificate authority and use that certificate for SSL enabling the eG manager For this follow the steps given below e Generate the Keystore file e Generate a certificate request e Submit the certificate request to the internal certificate Authority CA and obtain a certificate e Import the certificate into a keystore e Configure Tomcat for using the keystore file Each of these steps has been discussed in the sections that follow 145 Installing and Configuring on Windows Environments 3 4 1 1 Generating the Keystore File The keystore file stores the details of the certificates necessary to make the protocol secure Certificates contain the information pertaining to the source of the application data and helps validate the source To generate the keystore use the keytool command For this purpose login to the Windows manager and go to the command prompt Then execute the following commands one after another cd JAVA_HOME bin keytool genkey alias egitlab1 keyalg RSA keypass mykey keystore lt Filename gt keystore storepass mykey keysize 2048 validity 1095 The text in Bold in the above comman
456. tificate Services to request for a self signed certificate then you need to connect to http lt YourWebServerName gt certsrv and then pick the option to submit the certificate Figure 3 74 will then appear 147 Installing and Configuring on Windows Environments Sie Favortes sip sucpested Stes Web Ske Galery Microsoft Active Owectory Certficate Services Submit a Certificate Request or Renewal Request To submit a saved request to the CA paste a base 64 encoded CMC or PKCS 10 certificate request or PKCS 7 renewal request generated by an extemal source such as a Web server in the Saved Request box Saved Request a3 Sxhb6sYopgep9iLwoviduskaRsFuviastgxz0a BaseB4 encoded Jah66Xwc1yyrzk2 6s3 cN1Do1KOBpUr YXApdyCQaz certificate request NxatJwIDAQABOAAUDOTIKoZIhvcNAQEF BOADGYEA CMC or OUSuxMS3 SZtORCSKdHiGO AVZDe1Uv4Hw0q7Kkm PKCS 10 or eB Bujutik9p7T1hO ya6iPINhzEFPK IuxStr8u PKCSW 1 END NEW CERTIFICATE REQUEST Certificate Template Web Server zi Additional Attributes Attributes fE Internet Protected Made On Fa kios ig Figure 3 74 Requesting for a certificate Open the text file containing the certificate request which was created using the procedure detailed in Section 3 4 1 2 above copy the contents of the file and then paste it to the text area of the Base 64 encoded certificate request text box of Figure 3 74 Then click the
457. time the Client Sets list will display the name of the chosen client set see Figure 3 193 249 Installing and Configuring on Windows Environments New Site and Content Rule Wizard Client Set Specify the client sets to which this rule applies Applies to requests coming from Client Sets Internal client Add Remove Figure 3 193 The name of chosen client set displayed in the Client Set dialog box 31 Then click on the Next gt button in Figure 3 193 to proceed After viewing the summary of your specifications click on the Finish button in Figure 3 194 to end the rule configuration New Site and Content Rule Wizard Completing the New Site and V Content Rule Wizard You have successfully completed the New Site and Content Rule Wizard You created a rule with the following configuration x Name eG_site Action Allow Destination set Specified destination set eG Manager Schedule Always To close this wizard click Finish Figure 3 194 Finishing site and content rule configuration 32 Once the wizard exits Figure 3 185 will appear once again The details of the newly configured rule will be displayed therein see Figure 3 195 250 Installing and Configuring on Windows Environments net Securty and Acceleration Server 2000 Configure Site and Content Rules EGISASERVER Array E i Eaten hen Sie ad enin T content on the Erel a computers can be accessed by
458. ting the completion of the eG manager installation Contents of the script file ici scasi c sdssacsesesesescszeancnssacasasavazaneveazsasassvavetscbavansotavcasceveavanecsascaacsvenvenesesecancsvesseavsosevanasndvssansvsnvonesnbaneasavereates 141 Changing thenick name of ameGaserit iseccescvecccsssveeescoxsensensaseoss sess ence asuveonsesisescaphovece causvercsuasaecccahevevedgessece A E i 143 Requesting for a certificate Downloading the certificate SSL enabling the start_manager script SSL enabling the start_manager script The error message that appears when connecting to an eG manager using a self signed SSL certificate l A lock symbol in the address bar indicating that the SSL certificate used by the eG manager is a public certificate 163 Viewing th connection d tails eiior r ta ieoi ETE aS ELE A E E Sawa EE NAA EATR EERE 164 Viewing the Certificateinformation s osier oerein rE a A AEA A AAEE AEAEE EE ER OR 165 The Certificates window Converting the certificate into PEM format Message indicating that the manager has been started successfully ecescescesseseeeseeeceseeseeseeseceeesceseeaecsecseeseceeeeaeeseeseeeeneseeeeneeaees Message indicating that the manager has not been started successfully SSL enabling the startmanager Script savsscvssccssescsscevevasvssscsesssavevasevesssesieiscsnsacavccasscnascescsacvavssaesusacaycovavasvtevoacasacedvasataveevasesesasanteversa sees As SOCUTILY MOSSAGE sie vcse sar cscses E
459. ting the destination set to which the rule applies 26 Then click on the Next gt button in Figure 3 189 247 Installing and Configuring on Windows Environments New Site and Content Rule Wizard Schedule Select a schedule for applying this rule Figure 3 189 Selecting the schedule 27 Next choose the client set to which the rule applies For that select the Specific computers option from Figure 3 190 and then click on the Next gt button New Site and Content Rule Wizard Client Type You can specify client type by user name group name or IP address Figure 3 190 Selecting the Specific Computers option 28 Click on the Add button in Figure 3 191 to add the client sets to which the rule applies 248 Installing and Configuring on Windows Environments New Site and Content Rule Wizard xi Client Set Specify the client sets to which this rule applies Applies to requests coming from e Next gt Cancel Figure 3 191 Clicking on the Add button 29 From the Available list of Figure 3 192 select the newly created client set and click on the Add gt button therein to ensure that the rule is applied to the chosen client set Then click on the OK button in Figure 3 192 CI 2x Available in Internal client in Internal client lt Remove OK Cancel Figure 3 192 Selecting the client set to be added 30 Figure 3 191 will re appear but this
460. to configure the server xml file of Tomcat with the name and full path to the keystore file which was created earlier 1 2 Edit the server xml file in the lt CATALINA_HOME gt conf directory In the file search for the XML block where the SSL Coyote HTTP connector on port 8443 is defined If this block is commented it indicates that the eG manager is not SSL enabled and is hence listening on an HTTP port only To SSL enable the eG manager first uncomment this block as indicated below lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector protocol HTTP 1 1 port 8443 minSpareThreads 32 maxThreads 512 enableLookups false acceptCount 10 connectionTimeout 20000 useURIValidationHack false URIEncoding UTF 8 compression on compressionMinSize 2048 noCompressionUserAgents gozilla traviata compressableMimeType text html text xml text plain application x java applet application octet stream application xml text javascript text css image png image jpeg image gif app lication pdf application x javascript application javascript SSLEnabled true scheme https secure true clientAuth false sslProtocol TLS keystoreFile webapps eGmanager bin keystorePass eginnovations gt Then proceed to make the changes indicated in Bold below in the SSL XML block lt Define a SSL Coyote HTTP 1 1 Connector on port 8443 gt lt Connector protocol HTTP 1 1 port
461. too command stores the generated key in a keystore file provide a name for this file as input to the keystore command gt keysize the size of the key that is generated the default key size is 1024 bits the key size must be in the range 512 bits 1024 bits 37 Installing and Configuring on Unix gt validity indicates the number of days for which the key certicate will be valid 1095 days refer to 3 years The command upon execution will request the following inputs What is your first and last name Unknown lt Type the eG manager s IP address Fully qualified host name here gt What is the name of your organizational unit Unknown United States What is the name of your organization Unknown eG Innovations Inc What is the name of your City or Locality Unknown Bridge Water What is the name of your State or Province Unknown New Jersey What is the two letter country code for this unit Unknown US Is CN eG Innovations Inc OU United States O eG Innovations Inc L Bridge Water ST New Jersey C US correct no yes When requested for the first and last name indicate how you will be accessing the eG manager For instance if you will be accessing the eG manager for which the certificate is being generated via the intranet then specify the IP address of the eG manager here On the other hand if the eG manager is to be accessed via the public Internet then specify the fully qualified h
462. tor account in Figure 3 256 and click Next Add Nodes Wizard Cluster Service Account Enter login information for the domain account under which the cluster service will be run User name Administrator Passwort eeeeecensne Domain smallbusiness local G This account will be given local administrative rights on all nodes of this cluster to allow for proper operation Figure 3 256 Entering the domaina administrator password 285 Installing and Configuring on Windows Environments 19 A summary of your node specifications will appear in igure 3 257 Verify your specifications and click the Next button to move on Add Nodes Wizard Proposed Cluster Configuration Verify that you want to add nodes to a cluster with the following configuration igure 3 257 Verifying the configurations of the cluster 20 Track the progress of the new node creation in Figure 3 258 that then appears Once the process ends click the Next button to confirm completion 286 Installing and Configuring on Windows Environments Add Nodes Wizard Adding Nodes to the Cluster Please wait while the cluster is configured Reanalyzing cluster Configure cluster services Configure resource types Configure resources View Log Details Bety Figure 3 258 Tracking the progress of the new node addition 21 Click the Finish button in Figure 3 259 to quit the wizard fadd Nodes wizard Completing the
463. tore file you generated when you followed the procedure detailed in Section 2 4 2 1 above Importing a Signed Certificate and the Certificate Chain into the Keystore File Digital certificates are verified using a chain of trust The trust anchor for the digital certificate is the Root Certificate Authority CA The Certificate Hierarchy is a structure of certificates that allows individuals to verify the validity of a certificate s issuer Certificates are issued and signed by certificates that reside higher in the certificate hierarchy so the validity and trustworthiness of a given certificate is determined by the corresponding validity of the certificate that signed it The Chain of Trust of a Certificate Chain is an ordered list of certificates containing an end user subscriber certificate and intermediate certificates that represents the Intermediate CA that enables the receiver to verify that the sender and all intermediate certificates are trustworthy A certificate chain will therefore consist of multiple certificates Before importing each of these certificates you will have to understand the hierarchy of the certificates To know which is the root and which is the intermediate certificate refer to the web site of the certificate authority For instance if Comodo is the Certificate Authority that has issued the SSL certificate then connect to the following URL https support comodo com index php Default Knowledgebase Article View
464. tors to refer to the monitored servers devices the eG manager and agents can identify these devices using nick names A nick name is a logical easy to understand name assigned to a server device Nick names can be assigned to a server when installing the agent The nick name assigned to a server when installing an agent must also be specified in the eG admin interface when adding an application on that server Figure 3 123 provides the user the option of specifying a nick name Nick Name s support The eG system allows you to assign a nick name for an eG Agent You N can manage all applications running on this host using the nick name rather than having to remember the host s IP address or its domain host name An eG Agent can be assigned one or more nick names Would you like to assign a nick name s for this eG Agent ee a Figure 3 123 Setup requesting the user s confirmation to assign a nick name for the eG agent 13 Clicking on the Yes button will then require the user to specify the nick name see Figure 3 124 194 Installing and Configuring on Windows Environments eG Agent Setup Please enter the nick name s to be assigned to this host Please use to seperate multiple nick names Nick oraagent Back Cancel Figure 3 124 Assigning a nick name for the eG agent s host a Once a nick name is specified for a host the user has the option of managing appli
465. trolSet002 Services eGMon HKEY_LOCAL_MACHINE SYSTEM ControlSet001 Services eGurkhaTomcat HKEY_LOCAL_MACHINE SYSTEM ControlSet001 Services eGMon 339 Installing and Configuring on Windows Environments 3 Delete the following registry keys to remove eG Manager software from Add Remove Programs gt HKEY_LOCAL_MACHINE SOFTWARE Microsoft Windows CurrentVersion Uninstall 12ECDC9D 2DEE 4550 BEF0 C5FAAA070D7A Ensure that the DisplayName for the above mentioned key is eG Manager Note gt HKEY_LOCAL_MACHINE SOFTWARE eG Innovations Inc eG Manager 4 Delete the following shortcut Start gt Programs gt eG Monitoring Suite gt eG Manager K A E If the eG agent is not installed on the manager box you can directly delete the Start Note gt Programs gt eG Monitoring Suite shorcut 5 Delete the lt EG_INSTALL_DIR gt manager directory A If the agent is not installed on the manager box then you can remove the entire Note lt EG_INSTALL_DIR gt 340 Configuring Double byte Support for eG Enterprise 4 Configuring Double byte Support for eG Enterprise eG Enterprise embeds the ability to store and display data in any language that the user wants Each user connecting to an eG manager can thus view data in a language that he she prefers While eG Enterprise can support all European languages with minimal configuration some additional configurations need to be carried out to make sure that the
466. ts i e the system accounts For this purpose follow the steps discussed below on a Windows 2008 7 Vista system that supports the Italian language 1 Go to the Pennello di controllo the Control Panel in English window and double click on the Paese e lingua Region and Language in English option therein as indicated by Figure 3 161 EF Tutti gli elementi del Pannello di controllo _ oy x 2 8 Pannello di controllo Tutti gli elementi del Pannello di controllo 23 Cerca nel Pannello di controllo LD Modifica le impostazioni del computer Visualizza per Icone grandi R Account utente 3 Audio H autoplay 0 o Barta dele applcaxion Ernani Caratteri Centro accessibilit Start amp amp Centro connessioni di rete e Ye Z Connessione RemoteApp e condivis Centri nperalne i desktop Data e ora aghj Dispositivi e stampanti ou Gestione colori a Gestione credenziali 4 Gestione dispositivi Icone area di notifica r ooo eG Iniziatore iSCSI KA Java 32 bit P Mouse 1 Opzioni cartella 2 Opzioni Internet Y Opzioni risparmio energia f g Paese e lingua fa Programmi e funzionalit e Programmi predefiniti u Risoluzione dei problemi E Schermo Sintesi vocale Figure 3 161 The Control Panel 2 Figure 3 162 will then appear Click on the Opzioni di amminsrazione tab page Administrative tab page in English and click the Copia impostazioni Copy Settings in English button therein 231 Installin
467. ts of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for the root certificate file the name of the root certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 2 1 above gt keypass and storepass Provide the same keypass and storepass that you specified when generating the keystore refer to Section 3 4 2 1 above for details 2 Next import each of the intermediate certificates one after another using the following command keytool import trustcacerts alias intercert1 file lt Name_of_the_intermediate_certificate gt keystore lt Name_of_the_keystore_file gt keystore keypass mykey storepass mykey The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide a unique alias name for every intermediate certificate gt file the name of the intermediate certificate that you want to import gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 2 1 above gt keypass and storepass Provide the same keypass and storepass that
468. tton to proceed 303 Installing and Configuring on Windows Environments 14 Shared tobder Wizard 5 Shared Foder Location en eee On a voima wilh apgsopeate charactenttics Shared Fokje Location a ueste a new one an appropmate vokme does Prowenn Storage and create one NIFS Permessons Share Protocols Renew Setting ard Cooate Share Corfamation 79M8 13468 Figure 3 282 Selecting the folder to share 3 In the NTFS Permissions dialog box that appears next see Figure 3 283 choose to change the NTFS permissions of the specified folder by picking the Yes change NTFS permissions option Then click the Edit Permissions button 304 Installing and Configuring on Windows Environments Figure 3 283 Choosing to change the NTFS permissions of the specified folder 4 Doing so invokes Figure 3 284 Click the Add button in Figure 3 284 305 Installing and Configuring on Windows Environments Eee eg attp At SYSTEM R Adrmreitisiort E GIF SNIGT Vadnai ators x Users EGIFSNJOT Wass Ful Corio Modty Read b Emote Lint Fokfer Corverds Figure 3 284 Adding a user group 5 Figure 3 285 will then appear Click the Object Types button in Figure 3 285 select the Computers check box in the window that pops up and click the OK button in that window to return to Figure 3 285 Select Users Computers Service Accounts or Groups Figure 3 285 Clicking the Object Types button 6 Now in the Enter th
469. tually started or not by selecting the Status sub node under the GetAscii node in the tree structure see Figure 7 22 The Status field in the right panel will then indicade whether the GetAscii interface is currently running or not PG Admin o PageGate Database s Scheduler B Interfaces Global El GetAscii o H E Settings GP GetSerial H S GetTap H S Getweb m f Connectors Carriers 95918603 eg B SingTel H Recipients s Groups Logging E Reports Figure 7 23 Confirming the status of the GetAscii service 13 Next proceed to configure the recipients to whom the SMS messages have to be paged For that righ click on 372 Configuring the eG Manager to Send SMS Alerts the Recipients sub node under the PageGate node and pick the Add option from the menu that pops out PG Admin E E PageGate H Program H E Database a Scheduler eG Interfaces et Connectors Figure 7 24 Adding a new recipient 14 Inthe right panel provide the details of the new recipient as depicted by Figure 7 23 below PG Admin E E PageGate H E Program 81257767 i Daba E Scheduler H 4 Interfaces co Connectors ety el Getseral E A Carriers TG ta i Groups H E Logging E Reports S Registration Figure 7 25 Providing the recipeint s details 15 While furnishing recipient information make sure that you provide the same val
470. ue in the Recipient and in the ID PIN text boxes In other words provide the ID or PIN of the new recipient in the Recipient text box as well 373 Configuring the eG Manager to Send SMS Alerts Also make sure that the GetAscii check box is selected in the Enabled Services section choose the appropriate carrier and also select the Alpha checkbox necessary for sending alphanumeric pages 16 Finally click on the Apply button to create the recipient 17 Next either copy the sendpage32 exe from the PageGate install directory to the lt EG_INSTALL_DIR gt lib folder or include the PageGate install directory in the eG manager s PATH variable The second approach will need a manager restart for the changes to take affect 7 5 Integrating the eG Manager with a Web based Interface Some environments may support a web based interface that receives alarm information from a third party source via HTTP HTTPS converts this information into SMS and transmits the SMS alerts to configured recipients To enable the eG manager to integrate with such an interface so that eG alerts are converted into SMS for transmission to configured mobile numbers do the following 1 Edit the eg_services ini file in the lt EG_INSTALL_DIR gt manager config directory 2 Set the SendSMSAlertsOverHTTP flag in the HTTP_SMS_ALERTS section of the file to true 3 Next configure the URL to which the eG alerts need to be sent against the HTTPSMSURL parameter 4 Sav
471. ule sources to the destinations specified in this page This rule applies to traffic sent to these destinations Edit Z Remove cear Figure 3 215 Clicking on the Add button to define the destinations 20 To ensure that the proxy server protects the data flowing from the eG agent to the eG manager we need to provide the eG manager IP as the destination for our access rule Therefore first select the Computer option from the New menu of Figure 3 216 Add Network Entities J i xj Network entities New Edit Delete Network Network Set Address Range Subnet Computer Set URL Set Domain Name Set Add Close Figure 3 216 Selecting the Computer option 21 Figure 3 217 will then appear where the Name of the destination and its Computer IP address will have to be provided As stated earlier the IP of the eG manager needs to be mentioned here To save the changes click the OK button in Figure 3 217 261 Installing and Configuring on Windows Environments New Computer Rule Element E 2 xi 4 eG Manager Computer IP Address 10 ec 10 a Oa 18 Browse Description optional pme cm Figure 3 217 Clicking on the Add button 22 This will lead you back to Figure 3 216 which will now list the newly added computer see Figure 3 218 Select the new addition and click the Add button therein Add Network Entities Exi Network entities New Edit
472. up_cluster script from the opt egurkha bin directory to configure the redundant manager capability of eG Enterprise eG Enterprise offers a redundant manager option wherein a secondary management console can act as an active or passive standby for the primary console This capability together with the ability to deploy redundant external agents in multiple locations ensures that there is no single point of failure for the monitoring solutions For more details about manager redundancy refer to the eG User Manual When setup_cluster executes it first requests your confirmation to enable manager redundancy Would you like to enable eG manager redundancy y n n y If nis specified the setup_cluster script will automatically terminate and the setup_manager script will continue executing To configure manager redundancy at any later point in time execute the setup_cluster script separately from the opt egurkha bin directory The procedure for this has been provided in Section 2 2 3 If y is specified at step 11 you will be required to indicate whether SSL has been enabled for the manager being configured Please indicate if your eG Manager uses SSL y n n n Press y to confirm SSL enabling and n to deny it Next indicate whether Network Address Translation NAT is used Please specify if you use Network Address Translation NAT y n n y NAT facilitates multiple managers spanning geographies to communicate with one another In such a
473. uration click Apply JA Configuration Standard Edition Firewall Policy Order Action Protocols From Listener 1 Block Egtesters Deny a All Outbound Traffic te Internal Extel e all ne B F 2 Alopen alow DHP All Networks and Local Host e All Ne Tasks FERN To Name Firewall Policy Tasks T Publish a Web Server 5 Publish a Secure Web Server S 733 shiva Allow yall Networks and Local Host Extel BJ all Outbound Traffic T Publish a Mail Server A Create New Server Publishing Rule System Policy Tasks SF Edit System Policy Show System Policy Rules Export system Policy 9 Import System Policy Related Tasks Define IP Preferences Export Firewall Policy Import Firewall Policy Figure 3 232 The name of newly added access rule displayed 35 To ensure that the new rule is the first rule to be applied by the ISA proxy server push the rule up to the first place in the list To do so select the new rule right click on it and choose the Move Up option from the shortcut menu see Figure 3 233 This will move the new rule up by one row only Therefore keep repeating this procedure until the rule reaches the first position Then save the changes by clicking on the Apply button 269 Installing and Configuring on Windows in Figure 3 234 rosoft Internet Security and Acceleration Server 2004
474. val ndd set dev tcp tcp _keepalive interval 300000 Default value 72000 milliseconds Recommended value 15000 milliseconds gt Solaris TCP_KEEPALIVE_PROBES Description Specifies the kernel how many TCP keepalive probes to send out before it decides if a specific connection is broken How to view or set Use the ndd command to determine the current value or to set the value For example ndd set dev tcp tcp _keepalive probes 5000 Default value 9000 milliseconds 10 Installing and Configuring on Unix Recommended value 5000 milliseconds gt Solaris kernel semsys seminfo_semume Description Limits the maximum semaphore undo entries per process Because this setting specifies a maximum value the parameter does not cause the use of additional memory unless it is needed How to view or set This value is displayed as the semume parameter if the usr sbin sysdef command is run There can be an entry in the etc system file for this tuning parameter Set this parameter through the etc system entry set sensys seninto senma 200 Default value 10 Recommended value 200 gt Solaris kernel semsys seminfo_semopm Description Displays as the semume parameter if the usr sbin sysdef command is run An entry in the etc system file can exist for this tuning parameter This number is the maximum value of System V semaphore operations per semop call The default value for this option is too low for hig
475. values relevant to your agent installation save the file Eal Make sure that the eGuser account exists on the target system before you run the silent_install script 7 Provide execute permissions for the silent_install script and run the script on the target host To grant execute permissions issue the following command from the directory that holds the silent_install script say tmp chmod x silent_install 8 Upon successful execution of the script the eG agent will be automatically installed and started on the host 71 Installing and Configuring on Unix Follow the same procedure discussed above to install the eG agent on Tru64 FreeBSD CentOS and openSUSE hosts in the silent mode 2 12 2 Installing an eG Agent on Solaris in the Silent Mode To install an eG agent on Solaris in the silent mode do the following 1 First manually install an eG agent on a target Solaris host using the installation instructions provided in Section 2 7 2 of the eG Installation Guide Typically this is achieved by executing the pkgadd d command on the target host from a super user account After manual installation of the agent you will find that a directory named egurkha is automatically created in the install location specified during installation Now tar the egurkha folder as eGagent_solaris tar to a temporary folder say tmp on the agent host For this purpose issue the following command at the shell prompt tar
476. ving all the configurations inputs provided and reapplying these during subsequent installation without human intervention The key advantages of a silent install are repeatability and the prevention of human errors that may occur during manual installation 3 2 1 Silent Mode Installation of the eG Manager The first step towards installing the eG manager in the silent mode is to create the silent mode script for a manager installation The script file will carry the extension iss and will contain the inputs provided by the administrator while installing the eG manager in the normal mode Before attempting script creation ensure that the eGManager_ lt OS gt exe is available on the local host Then to create the script do the following 1 From the command prompt switch to the directory in which the eGManager_ lt OS gt exe resides 2 Next issue the following command eGManager_ lt OS gt exe a r f1 lt Full path to the script file gt For example to create a script file named eGManager iss in the c script directory the command should be eGManager_ lt OS gt exe a r f1 c scriptleGManager iss 3 The Normal mode manager installation will then begin The inputs supplied during the normal mode will automatically be saved in the iss file that was created in step 2 Refer to the eG Installation Guide for the detailed procedure for installing an eG manager on Windows in the normal mode The next time you wish to install the
477. vironment ccceceesssessesesseeseeseeeceeseesesseeaeeaesaceesseesesaesaeeaeeaceeseesseeatens 76 2 13 2 Deploying the eG Agent on Linux Environment 0 cccececesesecssesesseeseeseeecseeseesessecseeseeseeessecsessessesseeaeeaseaseesaeens 76 2 13 3 Deploying the eG Agent on HPUX Environment ececeseeesseesesseeseeseeeceeseecsesaecaeseeeaceesseesesaeeaesaesaeeeseaeesatens 71 2 13 4 Deploying the eG Agent on AIX Environment essssesssssssssesssesrstsrsiststetsststeteterenerenrernrststteststststnteterenrnrerstseret 77 2 14 Starine Mhe SGA Se NG x an E A TENN E E N OTEA TT 2 15 Performance Impact of the eG Ageri s 00 cs icasscectessocecededeceussieagectebedeeadessssecdanstonstebedsesdey odpeateperdendeboaoneuepetpaciabeusnoes 80 2 16 Increasing the Memory Of the G Agent eiiaoe iie aia E EEN a E E a AE od gacthpedeesds 80 2 17 The eG Web Adapter cs sscsccsceaces sszcnisnccsssnreoveed aAA TESA EAA EEEE EE OESE 81 2 17 1 Configuring the eG Web Adapter for an iPlanet SunONE Web Server before Version 6 0 cceeeseseeeeeeeeens 81 2 17 2 Configuring the eG Web Adapter for a SunONE Web Server Version 6 x on Solaris ccesecseseseseeseeeeeeeeeeeens 83 2 17 3 Configuring the eG Web Adapter for an Apache IBM HTTP Web Server on a 32 bit Unix Operating System 83 2 17 4 Configuring the eG Web Adapter for an Apache Web Server on a 64 bit Linux Operating System 0 85 2 18 Configuring the Coldfusion S rver sis scsssts
478. w database for the eG Manager Figure 3 65 A message box requesting you to confirm whether not a new database is to be created Figure 3 66 then appears Here specify the name of the new database and click the Next button to continue 135 Installing and Configuring on Windows Environments eG Manager Setup Enter Text Please enter information in the field below Enter the name of the database that you want to create for the eG Manager egdemo Figure 3 66 Specifying the name of the new database for the eG manager 5 Since database creation requires administrator privileges create a database administrator user with user name sa by specifying a password in Figure 3 67 Then click the Next button therein eG Manager Setup Database Settings New database creation requires administrator privileges e g sa or in the format domain dbaaccount if Windows authentication is enabled for the SOL database server Please enter the database administrator DBA user name sa Please enter the password tt Please reenter the password ten Cea Figure 3 67 Creating a DBA with user name sa 6 Further the eG manager needs a special database user account to store its measures Therefore provide the name and password of this special user in Figure 3 68 that appears next and then click the Next button 136 Installing and Configuring on Windows Environments eG Manager Setup Database Settings
479. will terminate the eG manager configuration process On the other hand if Yes is clicked then setup will install the MS SQL Server 2005 2008 2012 Express Edition and create the eG database on it Microsoft SQL Server 2005 2008 2012 Express Edition is a free easy to use redistributable version of SQL Server designed for building simple data driven applications MS SQL Server 2005 2008 2012 Express Edition can only serve as a temporary substitute for the MS SQL server as it provides only limited storage and scalability capabilities Owing to such constraints it is strongly recommended that you restrict the usage of the Express edition to short term monitoring of a relatively small number of components to be precise a maximum of 25 components We also recommend that you acquire a licensed version of the MS SQL server as soon as possible install the server and migrate the eG database to it Ill Before proceeding to install MS SQL Server 2005 2008 2012 Express Edition ensure that the hardware and software pre requisites for installation are in place Once the software and hardware pre requisites are fulfilled download the free MS SQL Server 2005 2008 2012 Express Edition installable from the Microsoft web site For instance to download the MS SQL Server 2012 Express Edition use the URL http www microsoft com en in download details aspx id 29062 Download the installable to any location on your local disk Then open the command pr
480. work usually contains servers that are published to the Internet It will usually be less trusted than internal networks C YPN Site To Site Network VPN site to site network represents a network in a remote site connected through a VPN link C External Network An external network represents an untrusted network such as the Internet ISA Server has a default external network ae Figure 3 208 The newly created destination set being displayed 13 To specify the IP addresses that form part of the network being defined click on the Add button in Figure 3 209 that appears New Network Wizard x Network Addresses Define the IP addresses for this network You can add IP address ranges IP address ranges associated with a network adapter and private IP ranges Address ranges Start Address End Address Edit Remove Add Adapter Add Private lt Back Next gt Cancel Figure 3 209 Adding the IP addresses of the network 14 Provide the IP address range to which the rule applies in the Starting address and Ending address text boxes of Figure 3 210 and then click the OK button therein In our case the range of IPs representing the eG agent hosts will have to be provided here 258 Installing and Configuring on Windows Environments IP Address Range Properties il x Specify the range of IP addresses Starting address Ending address 105 7 OF 00 161 10 0
481. ws o DSA Digital Signature Algorithm o RSA An algorithm used for publick key cryptography gt keystore the keytoo command stores the generated key in a keystore file provide a name for this file as input to the keystore command gt keysize the size of the key that is generated the default key size is 1024 bits the key size must be in the range 512 bits 1024 bits gt validity indicates the number of days for which the key certicate will be valid 1095 days refer to 3 years The command upon execution will request the following inputs What is your first and last name Unknown lt Type the eG manager s IP address fully qualified host name here gt What is the name of your organizational unit Unknown United States What is the name of your organization Unknown eG Innovations Inc What is the name of your City or Locality Unknown Bridgewater What is the name of your State or Province Unknown New Jersey What is the two letter country code for this unit Unknown US Is CN eG Innovations Inc OU United States O eG Innovations Inc L Bridge Water ST New Jersey C US correct no yes 155 Installing and Configuring on Windows Environments When requested for the first and last name indicate how you will be accessing the eG manager For instance if you will be accessing the eG manager for which the certificate is being generated via the intranet then specify the IP
482. xec in the lt APACHE_INSTALL_USER gt directory 4 Stop and restart the Apache server The same procedure applies while configuring the web adapter on an IBM HTTP Server 1 x on Unix 83 Installing and Configuring on Unix S To configure the web adapter on Apache 1 x on HPUX AIX servers the procedure is almost the same as what has been discussed above however the only difference is that you will have to append the following lines to the end of the lt APACHE_HOME gt conf httpd conf file lill LoadModule mod_egurkha libexec mod_egurkha so Then copy mod_egurkha so to the lt APACHE_HOME gt libexec directory To manually configure the eG web adapter on an Apache web server 2 0 on Unix do the following 1 2 4 First login to the Unix server as the Apache install user Edit the lt APACHE_HOME gt conf httpd conf file to append the following line LoadModule eg2_module modules mod_eg2 so Copy the file mod_eg2 so from the opt egurkha lib directory to lt APACHE_HOME gt modules under lt APACHE_INSTALL_USER gt Stop and restart the Apache server The same procedure applies for configuring an IBM HTTP Server 2 0 on Unix Note that you cannot configure the web adapter on Apache web server 2 0 IBM HTTP Server 2 0 for HPUX To manually configure the eG web adapter on an Apache web server 2 2 on Unix do the following 1 2 First login to the Unix server as the Apache install user Ed
483. xt 15 minutes then select the Upgrade now option from the AGENTS UPGRADE page pick the agents for which nicks are to be auto assigned from the AUTO UPGRADEABLE AGENTS list and click the Enable button therein 6 Once this is done set the Verify if agent is reporting from configured IP parameter in the MANAGER SETTINGS page Configure gt Settings menu sequence in the eG administrative interface to No Since the eG manager and agents have now been configured to use the nick name as the key to identify an agent server servers with the same IP address can be easily distinguished and managed by an eG manager 353 Configuring the eG Manager to Send SMS Alerts Configuring the eG Manager to Send SMS Alerts IT infrastructures that support mission critical services need to be up and running 24x7 Timely precise alerting by a monitoring solution can provide adequate notice for an IT manager to react immediately and to avert potential crisis situations The eG Enterprise Suite is capable of alerting users to issues anytime anywhere Besides providing users to the eG monitoring console with a list of open problems in the CURRENT ALARMS window the eG Enterprise system can also send out email alerts of issues to configured mailboxes and SMS alerts to configured mobile phones pagers To send SMS alerts the eG manager can be configured to use any of the following mechanisms e By integrating the eG manager with NowSMS Lite The NowSMS Li
484. y start the eG manager 2 4 2 SSL Enabling the eG Manager Using a Signed Certificate Obtained from a Valid Certifying Authority Self signed certificates are useful in environments where security is not a priority In highly secure environments especially where the eG manager is to be frequently accessed via the public internet using a self signed certificate may not be preferred In such a case you can you can obtain a valid certificate from a certificate authority and use that certificate to SSL enable the eG manager The broad steps to be followed to achieve this are as follows GY Pee e Generating the keystore file Generating a certificate request Submitting the certificate request to the Certificate Authority CA and obtaining a certificate Importing the certificate into a keystore Configuring Tomcat for using the keystore file The sub sections below elaborate on each of these steps 44 Installing and Configuring on Unix 2 4 2 1 Generating a Keystore File The keystore file stores the details of the certificates necessary to make the protocol secure Certificates contain the information pertaining to the source of the application data and helps validate the source To generate the keystore use the keytool command For this purpose login to the Windows manager and go to the command prompt Then execute the following commands one after another cd JAVA_HOME bin keytool genkey alias egitlab1 keyalg RSA key
485. y added IP 11 Clicking on the OK button in Figure 3 173 will lead you back to Figure 3 170 As is evident from Figure 3 174 the name of the newly created destination set will be displayed here Ey Microsoft Internet Security and Acceleration Server 2000 Administration Action view le gt elm 2 Tree Configure Destination Sets EGISASERVER Array Destination sets include one or more computers or directories on specific computers For access policy rules destination sets include computers that are not on your internal network For Web publishing rules and server publishing rules destination sets include computers that are in your internal network Internet Security and Acceleration Server 2000 GS Arrays B EGISASERVER Array 44 Monitoring 8 Server El 3 Access Policy G44 Publishing E Bandwidth Rules iG Policy Elements Schedules Bandwidth Priorities Destination Sets E Client Address Sets E Protocol Definitions E Content Groups Ej Cache Configuration Current destination sets servers eG Manager E Monitoring Configuration B J Extensions EEA Network Configuration 1 Client Configuration 8 fap H323 Gatekeepers Create destination set Delete destination sets Modify destination sets Figure 3 174 The newly created destination set being displayed 12 The next step in the ISA proxy configuration is to define the protocol rules
486. y to opt egurkha 5 Would you like the eG agent to auto restart on system boot up y n n 56 Installing and Configuring on Unix The install process will now request the user to confirm installation of the auto restart feature This feature will enable the agent to start automatically every time the system hosting the agent reboots Now press y to install the auto restart feature or n to proceed without installing the same 6 Ifthe agent is installed on the same system as the manager some common files need not be reinstalled The following files are already installed on the system and are being used by another package Do you want to install these conflicting files y n q n 7 As in the case of the eG manager the agent package contains components that need to be installed with the set uid permissions set These components must be installed for the agent to function properly Following this step the eG agent components are extracted and stored 8 Finally the following message will be displayed depicting the success of the installation KKKKKKKKKKKKKKK KKK KKK KKK KKK KK KKK KKK KKK KKK KKK KK KKK KKK KKK KKK KK KK KKK The eG agent has been successfully installed Please login as lt eG user name gt and run the script opt egurkha bin setup agent to configure the agent HKAKKKKAAKKKKKKIKKAIKIIIIEKIIIKIK IIIA IKI III III IEEE IEEE I e To install the eG agent on Tru64 FreeBSD CentOS openSUSE operating systems also you wil
487. yed on the eG server as well as on web servers DNS servers LDAP servers application servers database servers payment gateways etc While the agent that executes on the eG server is an external agent the agents executing on the other servers are internal agents The installation and configuration of the external and internal agents is similar The main difference between these agents is in the nature of tests that these agents execute Internal agents are not required for network devices such as routers load balancers etc which are monitored using the Simple Network Management Protocol SNMP The eG external agent is capable of monitoring routers load balancers and other network devices 2 9 1 1 System Requirements For the eG agent to function effectively the system on which the agent is being installed should support e Solaris 7 or higher Red Hat Enterprise Linux v3 or higher AIX 4 3 3 or higher HP UX 10 or higher FreeBSD 5 4 Tru64 5 1 openSUSE v11 or above CentOS v5 2 or above Fedora Linux Oracle Linux v6 x or higher e 512 MB RAM and at least 1 GB of disk space for installing the agent k The eG agent software has to be installed from a super user account Note As in the case of the manager the procedure for installing an agent varies depending on the operating system environment used Instructions for installing the agent on Solaris Linux AIX and HPUX operating systems are provided in t
488. you in proceeding with the installation process if you choose MS SQL Server as the database server for eG manager 1 The installation process instructs the user to appropriately size the database KKEKEKKKKKKKKKKKKKKKKK KK KK KK KKKKKK KK KK KKKK KK KK KKK K KK KK KKKK KK KK KKKKKKKKKKKKKKKKKKKKKK When setting up the eG database pleas nsure that you have sufficient space to host the eG database KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK KK KK KK KK KK KK KK KK KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK To configure the eG manager for database access next enter a the hostname or IP address of the server that hosts the MS SQL database use the hostname if DNS is supported b the port number of the MS SQL server default is 1433 Prior to this provide your confirmation for proceeding with the setup by pressing y Do you want to continue the setup y n y Enter the hostname or IP address of the MS SQL server Enter the port number of the MS SQL server 1433 If the MS SQL server being configured uses named instances then specify none instead of the port number Next indicate whether the MS SQL server to be used as the eG backend is SSL enabled or not Does the SQL database server support SSL y n n Then specify whether not the SQL server is NTLM v2 enabled Does the SQL database server with NTLMv2 y n The installation process next asks the user as to whether an existing database instance can be used or whether a new instan
489. you specified when generating the keystore refer to Section 3 4 2 1 above for details 3 Finally import the entity domain certificate into the keystore by issuing the following command keytool import trustcacerts alias egitlab1 file lt Name_of_the_domain_certificate gt keystore lt Name_of_the_keystore_file gt keystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 3 4 2 1 file the name of the domain certificate that you want to import keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 2 1 above 158 Installing and Configuring on Windows Environments A If the domain certificate import command throws an error for any reason it could be because all related certificates may not have been imported Check the web site of the CA for more Note details Importing a Certificate that is in the PEM Format PEM is a container format that may include just the public certificate such as with Apache installs and CA certificate files etc ss certs or may include an entire certificate chain including public key private key and root certificates or may only
490. your environment cee 117 Specifying the location of the MS SQL server to be used for the eG database 118 Confirm whether not the SQL database on Azure is SSL enabled Specifying whether a new database has to be created for the eG database 119 Indicating the name of the SQL database you created on Azure ceeceeeceesceseeseeseeeeeeseeseeseeseesecsececeseesecsecsececeeeeaeeaeeaeeaeeneeeeeeneenees 119 Specifying the user name and password to be used to store measures in a SQL database on AZUIEC eee cece eee cse eects tects eeeeeees 120 Location of the eG manager 121 Information specified by the user at the various stages Of the setup ecesesssseseceeceeceseeseesecseceeceeeeseeaecsecsecsececeaeeseeaeeaeeneeeeeeneenees 122 Message box indicating the existence of a database US L eccescescesecseeseeeseeseeseesecsecseceaeeseesecsecseeaceseesecsecsecseceeceaeeseesesaeeneeeeeeneenees 122 Setup program indicating the completion of the eG manager installation 123 Opening the SQL Server Management Studio 124 Selecting the New Database option 125 Creating the eG database ayo anosa esio EERIE KA EEEO E EDETEN EEA EEEE EDENE REET AEE ATERN EEE 126 Selecting the New Losin opt oireita EEEO EREEREER ROTTE EE 127 Creating the eG database user The error message that appears if a strong password is not provided when the password policies are being enforced 0 0000100 128 The er
491. ystore The text in Bold in the above command line indicates those inputs that can change according to the requirements of your environment These inputs have been described below gt alias the alias name of the certificate being requested make sure that you provide the same alias name you provided when generating the keystore see Section 3 4 1 1 149 Installing and Configuring on Windows Environments gt file the name of the domain certificate that you want to import gt keystore Provide the name of the keystore file you generated when you followed the procedure detailed in Section 3 4 1 1 above Importing a Signed Certificate and the Certificate Chain into the Keystore File Digital certificates are verified using a chain of trust The trust anchor for the digital certificate is the Root Certificate Authority CA The Certificate Hierarchy is a structure of certificates that allows individuals to verify the validity of a certificate s issuer Certificates are issued and signed by certificates that reside higher in the certificate hierarchy so the validity and trustworthiness of a given certificate is determined by the corresponding validity of the certificate that signed it The Chain of Trust of a Certificate Chain is an ordered list of certificates containing an end user subscriber certificate and intermediate certificates that represents the Intermediate CA that enables the receiver to verify that the sender a
Download Pdf Manuals
Related Search
Related Contents
gITs User Manual M12JS User Manual MSW-2808A NTSC 取扱説明書 das PDF downloaden 取扱説明書 (PDF/350KB) Product Information Guide 2015年9月号 Roberts Gorden CGTH-40 Gas Heater User Manual Copyright © All rights reserved.
Failed to retrieve file