Adding Servers

To add Servers:

  1. Select Operations > Configuration > Servers > Server List. The SERVER LIST page is displayed.
  2. On the SERVER LIST page, click ADD NEW on the ACTIONS panel. The ADD SERVER page is displayed.
  3. Fill in the required details. Click Advanced to fill in the optional details, if required. For more information about fields on the ADD SERVER page, see Field Description.

    Note:

    The details of mandatory fields that are displayed on clicking Advanced are fetched from configured details in the DEFAULT CONFIGURATION page.

  4. Click SUBMIT. The new Server is added.

    Note:

    To add a Server, the Server Default Configuration must be available. If the default configuration is not available, specify the details corresponding to the Server to be added in the same page, or configure default details of Server in the DEFAULT CONFIGURATION page (See Default Configuration).

    ADD SERVER page (Advanced button)
    Figure:  ADD SERVER page (Advanced button)


    ADD SERVER page (Advanced button clicked)
    Figure:  ADD SERVER page (Advanced button clicked)


Field Description

The following table describes the fields on the ADD SERVER page:

Field

Description

Primary IP Address

Type in the primary IP address of the Server.

Host Name

Type in the host name of the Server.

Monitoring By

Lists the configured monitoring network protocols. Select any one monitoring protocol from the list. Based on the option you select, some additional fields are displayed. Type in the details as required.

  • SNMP: The Simple Network Management Protocol (SNMP) is an internet-standard protocol for managing devices on IP networks.  It is used for collecting information from, and configuring, network devices, such as Servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network.
  • WMI: The Windows Management Instrumentation (WMI) protocol consists of a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification. It is used to mainly monitor the events status that are configured in the Server.
  • SSH: SSH, is an encrypted network protocol for initiating text-based shell sessions on remote machines in a secure way. This allows a user to run commands on a machine's command prompt without them being physically present near the machine. It also allows a user to establish a secure channel over an insecure network in a client-Server architecture, connecting an SSH client application with an SSH Server.
  • Telnet: Telnet offers users the capability of running programs remotely and facilitates remote administration. Telnet is available for all operating systems and eases integration in varied networking environments.
  • Agent: Agent monitors and sends the data in regular intervals and sends the data to the configured Server.
  • None: If selected, indicates none of the monitoring protocol is selected for monitoring purpose.

If Monitoring by is selected as Agent

If Monitoring by is selected as Agent, the following fields are displayed.

  • WMI user: Lists the configured WMI user names. Select a WMI user name from the list.
  • WMI Timeout: By default, 10 seconds is displayed. You can edit the time out as required.

If a Server is monitored using the WMI ping protocol and if the Server does not respond in the given time out period, it is considered that the Server is not functioning.

If Monitoring by is selected as SSH

If Monitoring by is selected as SSH, the following fields are displayed.

  • SSH User:Type in the SSH User name.
  • SSH Port:Type in the SSH port number using which, the Server monitors the specified services.

If Monitoring by is selected as Telnet

If Monitoring by is selected as Telnet, the following fields are displayed.

  • Telnet User: Type in the Telnet user name.
  • Telnet Port: Type in the telnet port number using which the Server monitors the specified Servers or services.

If Monitoring by is selected as WMI

If Monitoring by is selected as WMI, the following fields are displayed.

  • WMI Timeout:By default, 10 seconds is displayed. You can modify the default time out as required.
  • WMI User: Type in the WMI user name.

The following fields are displayed on clicking Advanced.

Divisional

Lists the configured Divisionals. Select a Divisional from the list.

Service Entitlement

Lists the configured Service Entitlements. Select the Service Entitlement from the list. The specified Service Entitlement defines the monitoring services for the parameters, such as CPU and Memory, HDD, and so on for the selected Server. For more information about configuring Service Entitlements, see Configuring Service Entitlements. Based on the selected Service Entitlement, the Event Monitoring [WMI required] section with the Event Logs and Event Types fields are displayed to configure on the ADD SERVER page.

Server Status

After submitting the details of the Server, the status of the Server is displayed in this field. The status of the Server is indicated using the color codes:

  • Up: Indicates the Server is up. The status is indicated in green color.
  • Down: Indicates the Server is down. The status is indicated in red color.

(Blank) indicates that the Server is not monitored and the status is displayed as a blank field.

Serial No.

Type in the serial number of the Server.

Configuration Item ID

Displays a unique Configuration ID for the Server after you submit the Server details. Click the CI ID link to open the corresponding CI in the CMDB module.

NAT IP Address

The NAT IP Address refers to the public IP address that is given by an external client for the external Server to enable Server monitoring from this application.

Use NAT IP

If this check box is selected, the monitoring is done using the specified NAT IP address.

Other IP's

Type in the other IP addresses of the Server using comma as a separator.

Server Type

Lists the configured Server types. Select the Server type from the list.

Vendor

Lists the configured vendors. Select the vendor from the list.

Operating System

Lists the configured operating system types. Select the operating system from the list.

Location

Lists the configured locations. Select the location from the list.

Customer

Lists the configured customers. Select the customer from the list.

Criticality

Lists the configured Criticality value for a Server. Select the Criticality from the list as High, Medium, or Low.

Server Category

Lists the configured Categories of the Servers. Select a Category from the list.

Ping Protocol

Lists the configured protocols.

  • ICMP: The Internet Control Message Protocol (ICMP) is one of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached..
  • TCP: The Transmission Control Protocol (TCP) is one of the main protocols in TCP/IP networks. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
  • UDP: The User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol (TCP) used primarily for establishing low-latency and loss tolerating connections between applications on the Internet.

Select a protocol from the list using which the Server should communicate with other Servers.

Ping Timeout

Type in the ping time out for the Server. Within the specified time, the Server communicates the destination IP address for the Server to reach and record results.

Ping Retry

Type in the number of times the ping operation need to be repeated with another Server.

Note: If the system fails to communicate with the Server even after the specified number of times, an alert e-mail is sent to the configured members.

Monitoring Source

Lists the configured monitoring source types as:

  • Summit Server: It refers to the machine, where SUMMIT Server is installed. Select this option to perform the monitoring operation from this Server.
  • Proxy Agent: It refers to the machine configured at a client location for sending monitored data of the client machines to the SUMMIT Server. Select this option to perform the monitoring operation from this agent.

Monitor By Proxy

Lists the configured Proxy Servers. Select the Proxy Server from the list.

Ping By Proxy

Allows to check the status of the Server by proxy ping, if the check box is selected.

SNMP Community String

Displays the SNMP string for the Server.

SSH User

Specify SSH user type from the drop-down list.

SSH Port

Specify the SSH Port.

SSH Timeout

Specify the SSH Command timeout in seconds.

Reference ID

Specify the reference identification number for the device.

Note: If the reference ID is not configured, the unique identification number of the device is displayed in device details.

SOP Template

Lists the configured SOP templates. Select a SOP template to map the SOP to the Server.

To E-mail ID

Type in the e-mail address of the people to whom the alert and notification

e-mails about the Server status need to be sent in “To” list.

  • Alert Mail: The Alert e-mail is sent whenever a Server has crossed the threshold.
  • Notification Mail: The Notification e-mail is sent whenever a Server status changes to Up from Down and also when a Server utilization has crossed the specified threshold.

CC E-Mail ID

Type in the e-mail address of the people to whom the Alert/Notification e-mails about the Server status need to be sent in “CC” list.

Description

Type in a brief description about the Server.

Active

Indicates that the Server is active/ inactive.

  • If selected, the Server is active and is displayed in the Servers list.
  • If not selected, the Server is a inactive.

The following fields are displayed based on the configuration of the selected Service Entitlement.

Monitor Ports

Allows the Server to monitor the specified port number through the specified port type. This will help the administrator to monitor the port status. The following configuration settings are displayed. Specify the required details to monitor the status of the port.

  • Sl. No: Displays the serial number.
  • Service Name: Type in a Service name.
  • Type: Lists the configured protocols. Select a protocol name for the Server from the list. The Server monitors the port number using the specified protocol name.
  • Port: Type in a port number.
  • Active: Indicates if the Service is active or inactive. If selected, the Service is active for the Server to monitor the port status. If not selected, the Service is inactive and the Server does not monitor the port status.

Ms Exchange

Version

Lists the Microsoft Exchange Servers.

  • Exchange 2003: If selected, the Server monitors the Microsoft Exchange 2003 roles using the specified WMI user credentials.
  • Exchange 2007: If selected, the Server monitors the Microsoft Exchange 2007 roles. The Exchange roles can be in one Server or different Servers, where the IP addresses of these different Servers are connected to the specified Primary IP address.
  • Exchange 2010: If selected, the Server monitors the Microsoft Exchange 2010 roles.

Exchange Server Roles

Displays the Exchange Server roles. Specify the required details for the Server to monitor the application on the Exchange Server.

  • IP Address: Type in the IP address of the Exchange Server or enter the primary IP address of the Server.
  • PowerShell Path: Type in the PowerShell path for the Server to communicate with the Exchange Server.
  • Bin folder path: Type in the bin folder path for the Server to communicate with the Exchange Server.
  • User Name: Type in the user name of the Exchange Server.
  • Password: Type in the password of the Exchange Server.
  • Max Wait Time (sec): Type in the maximum wait time for the Server.
  • Active: Indicates if the Server can monitor the Exchange Server. If selected, the Server is available to monitor the Exchange Server. If not selected, the Server is not available to monitor the Exchange Server.

Ms SQL

Displays the configuration settings for Microsoft SQL application. Specify the required details for the Server to monitor the Microsoft SQL Server.

  • Instance Name: Type in the SQL Instance name, using which the Server will be monitoring the Microsoft SQL application. Using WMI User credentials the Server monitors only the SQL general information and the database details.
  • User Name: Type in the SQL user name to access the Microsoft SQL application.
  • Password: Type in the SQL user password to access the Microsoft SQL application.
  • Capture DB Details: Select the check box to capture DB details.
  • Capture Table Details: Select the check box to capture table details.

Application Log

Displays the configuration settings for Application Log. Specify the required details for the Server to monitor the application log details.

  • Sl. No: Displays the serial number.
  • Application Type: Displays the Application Type.
  • Application Name: Type in the Application name.
  • Application Path: Type in the Application path.
  • Active: Indicates if the Application Log is active or inactive. If selected, the Application Log is active for the Server to monitor the Application Log details.

WebSphere

Displays the configuration for Websphere application. Specify the required details for the Server to monitor the application.

  • Server User Name: Type in the Server user name to access the Server.
  • Server Password: Type in the password to access the Server.
  • WS bin folder path: Type in the WS bin folder path for the user to access the Websphere application.
  • Java bin folder path: Type in the Java bin folder path for the user to access the Websphere application.
  • WS User name: Type in the WS user name to access the Websphere application.
  • WS Password: Type in the WS user password to access the Websphere application.
  • SOAP Port: Type in the SOAP port number where the Websphere application is accessed using the specified port number.

JBoss

Displays the configuration for JBoss application. Specify the required details for the Server to monitor the JBoss application.

  • Server User Name: Type in the Server user name to access the Server.
  • Server Password: Type in the password to access the Server.
  • JBoss bin folder path: Type in the JBoss bin folder path for the user to access the JBoss application.
  • Java bin folder path: Type in the Java bin folder path for the user to access the JBoss application.
  • WS User name: Type in the JBoss user name to access the JBoss application.
  • WS Password: Type in the JBoss user password to access the JBoss application.
  • SOAP Port: Type in the SOAP port number, where the JBoss application is accessed using the specified port number.

Apache Tomcat

Displays the configuration for Apache Tomcat application. Specify the required details for the Server to monitor the application.

  • Tomcat Port: Type in the Tomcat port number, where the Apache Tomcat application is accessed using the specified port number.
  • SSL Enabled (check box): If selected, the application runs with the web protocol “HTTPS”, which is secured to exchange the data with the Server. If cleared, the application runs with the web protocol “HTTP”, which is not secure, so someone can eavesdrop on the conversation between your computer and the Server.
  • Tomcat User Name: Type in the Tomcat user name to access the Apache Tomcat application.
  • Tomcat User Password: Type in the Tomcat user password to access the Apache Tomcat application.

Active Directory

Displays the configuration for Active Directory. Specify the required details for the Server to monitor the parameter.

  • Root Domain: Type in the root domain for the active directory.
  • Discovery: Select the Discovery option from the list: Domain Level or Forest Level.

Based on the Discovery option the fields under the Connectivity test are displayed.

  • Domain Name: Type in the domain name.
  • Computer Name: Type in the computer name.
  • User Name: Type in the user name.

Oracle

Displays the configuration for Active Directory. Specify the required details for the Server to monitor the parameter.

  • Service/Database Name: Type in the database name for the Server.
  • Active: If the check box is selected, the configuration is active.
  • User Name: Type in the user name.
  • Password: Type in the password.
  • Service Port: Specify the port number for communicating with the database.
  • Use Host Name: Select the check box to use host name for communicating with the Oracle Server instead of IP address.

Event Monitoring

Lists the configured Event Templates for the selected Tenant. Select an Event Template from the list. For more information about the Event Action Templates, see Configuring Event Action Templates.

Note: WMI protocol is required for monitoring this parameter.

Applog Template

Lists the configured Application Log Templates for the selected Tenant. Select an Application Log Template from the list. For more information about Application Log Templates, see Configuring Application Log Templates.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of the ADD SERVER page.

SHOW LIST

Click SHOW LIST to view the SERVER LIST page showing all the configured Servers for the selected Tenant.

SERVER LIST page
Figure:  SERVER LIST page

  • To modify a server, click the configured Host Name. The SERVER-<HOST NAME> page is displayed. Make appropriate changes and click SUBMIT.
  • To view the inactive Servers, select the Include Inactive checkbox.


Filters

Click Filters to specify the filter criteria to view a particular set of Servers.

FILTERS pop-up page
Figure:  FILTERS pop-up page

The following table describes the fields on the FILTERS pop-up page:

Field

Description

Tenant

Lists the configured Tenants. Select a Tenant from the list to display the Servers.

Mapped CIs

Select this check box to view the Servers that are mapped to CIs.

Search

You can search for the Servers by specifying the host name,serial number,primary ip, address, Nat IP address, reference ids and so on.

Vendor

Lists the configured Vendors. Select the vendor from the list to view the Servers for the selected vendor.

Location

Lists the configured Locations. Select the Location from the list to view the Servers for the selected Location.

Customer

Lists the configured Customers. Select the Customer from the list to display the Servers for the selected Customer.

Criticality

Lists the configured criticalities. Select the criticality from the list to view the Servers for the selected criticality.

Ping Protocol

Lists the configured ping protocols. Select the ping protocol from the list to view the Severs for the selected ping protocol.

Monitoring Source

Lists the monitoring sources. Select the monitoring source from the list to view the Servers configured for the selected monitoring source.

SNMP Version

Lists the SNMP versions for discovery. Select the SNMP version from the list to view the Servers discovered with the selected SNMP version

Service Entitlement

Lists the configured Service Entitlements. Select the Service Entitlement from the list to view the Servers for the selected service entitlement.

Monitoring By

Lists the configured monitoring by options. Select a monitoring by from the list to view the Servers for the selected monitoring by option.

Server Type

Lists the configured Server types. Select the Server type from the list to view the Servers for the selected Server type.

OS Type

Lists the configured OS types. Select a OS type from the list to view the Servers for the selected OS type.

Server Category

Lists the configured Server Categories. Select the Server Category from the list to view the Servers for the selected Server Category.

Group

Lists the configured Server Groups. Select the Group from the list to view the Servers for the selected Server Group.

Server Group Type

Lists the configured Server Group type. Select the Server Group Type from the list to view the Servers for the selected Server Group Type.

Note:

When the SERVER LIST page is displayed, the ADD NEW icon is displayed on the ACTIONS panel.


SERVICES

Click SERVICES to add services to monitor the server.

CI RELATIONSHIP

Click CI RELATIONSHIP to view the CI relationships for the server.

CHANGE HISTORY

Click SHOW LIST to view all the changes that occurred on the server such as Last 20 E-mails, Monitoring Error.