This section lists and briefly describes the Operations Management settings that the software administrator needs to configure after installation.
| To access |
Select Admin > Platform > Setup and Maintenance > Infrastructure Settings Select Applications and use the list to set the administration context to Operations Management |
| Relevant tasks | |
| See also |
Note: To change existing or default settings, click the button.
The Auditing Settings contains the available configurations used to customize how audit information is recorded. The Audit Logs can be viewed from:
Admin > Platform > Setup and Maintenance Audit Log > Locations/Operations Manager
The following elements are included in the Audit Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Audit Category |
Configure which audit categories are logged. The default value is Configuration, which only writes configuration changes to the Audit Log. When you set the audit category to All, event and configuration changes are written to the Audit Log. |
| Enable Auditing |
If enabled, Operations Management actions are written to the Audit Log. |
The Automatic Node Generation for Dynamic Environments Settings contains the available configurations used to customize dynamic node generation.
The following elements are included in the Automatic Node Generation for Dynamic Environments Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| DDM Domain Name |
Name of the DDM routing domain. Keep empty if you want to use the default domain. |
| Dynamic Node Generation |
Enable if you have a highly dynamic environement. CIs for new systems are automatically generated in the RTSM. |
| IP Ranges |
Sets of IP address ranges that specify the IP addresses that relate to the dynamic environment. Format: |
| Node Name Patterns |
Node name patterns using regular expressions that specify the nodes that relate to the dynamic environment. Format: |
The CI Resolver Settings contains the configurations used to control how the CI Resolver manages incoming CI-related information and uses it to identify the best matching CI for a particular event. All attributes of the compared CIs are taken to calculate a similarity using a scoring function. The output of the scoring function indicates how similar two CIs are to each other. The CI with the highest score is selected as the best matching CI.
The following elements are included in the CI Resolver Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Cache Modification Configuration |
Sets, using XML format, the attributes and CI types that should be used and those that should be ignored during CI resolution. Some CI attributes do not provide useful information. For example, an attribute value may apply to many CIs but does not help to identify matching CI. These types are specified in the Any CI types and attributes included in the ignore lists are always ignore by CI resolution. Some types of information are essential for successful CI resolution. These types are specified in the Entries in the ignore lists override entries in the whitelist. Entries in the whitelist are handled in their order of appearance. |
| Cache Refresh Rate |
Specifies the frequency with which the CI cache is refreshed (minutes). |
| Cache Type |
Sets the Cache Type for CI Resolution. In Memory — It is recommended to select the In Memory cache type when CI resolution performance is more important than minimizing the memory footprint on the Data Processing Server. In smaller managed environments, where the total number of CIs in the monitored environment is smaller than the default value in the CI Limit setting, using the In Memory cache type is preferable. CI Resolution maintains all CIs in RAM. Use this setting for larger environment only when there is sufficient RAM available. Database — It is recommended to select the Database cache type when your monitored environment is very large (when the number of CIs being monitored is larger than in the CI Limit setting). CI Resolution maintains only the most often-used CIs in RAM. This is typically 20% of the CI Limit setting. All other required CIs are maintained in a cache file. This option results in a lower memory footprint but may have an impact on CI resolution performance. |
| CI Limit |
Sets the maximum number of CIs that are loaded into cache by the CI Resolver. |
| CI Limit Event Fully Qualified Domain Name |
Sets the event source attribute of the event sent to the Event Browser when the CI Limit is reached. |
| CI Resolver Attribute Splitting Rules |
Semicolon separated list of attribute/pattern pairs:
|
| CiInfo Host Separation Character |
Character used to divide the host name from the CiInfo text string, for example: Note: If you need to provide keywords containing the separator character, enclose the keyword within quotation marks ( |
| CiInfo Key Separation Character |
Character used to divide the CiInfo text string into keywords used to find CIs in the RTSM, for example, a colon ( |
| Database Cache File Path |
Sets the file path to the specified folder for the Persistent cache type, which maintains cache entries in a file in the file system. You can use either an absolute path or a relative path to the BSM home directory. |
| Fast Result Cache |
Number of previous results that are cached for fastest resolution. This cache notes the most frequent resolution results which are then reused for subsequent resolutions. |
| Query Chunk Size |
Maximum number of CIs that are transferred within a chunk from RTSM. |
| Resolution Retry Time |
Time in minutes after which the CI Resolver does a retry for previously failed resolution attempts. |
| TQL Queries |
Defines the TQL queries to run for resolving a CI. Note: You can replace the automatically generated TQL query with a TQL query customized for your environment. |
| Use Topology Sync Shortcut |
CI Resolver can use service ID information from Topology Sync to map service IDs directly to CIs. |
The Certificate Server is a component used to issue the certificates required for secure communication. It runs on each of the Data Processing Servers. This setting can be used to route all incoming certificate requests from the multiple Gateway Servers to a single Data Processing Server. On this Data Processing Server incoming certificate request can be granted with the ovcm command-line tool.
The following elements are included in the Certificate Server Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Certificate Server IP Address |
Specifies the IP Address of Data Processing Server to which certificate requests are forwarded. |
A new event can be used to automatically change the lifecycle state of one or more existing, related events. When a new event is received, a search for existing, related events is made. If any related events are found, these are closed or set to resolved and replaced by the new event.
There are two ways in which events can be related:
closeKeyPattern attribute
If an event comes in and its closeKeyPattern matches the key attribute of an existing event, the older event is closed.
ETIs Contributing to Health
Events can be related when they all contain an ETI contributing to health. The value of the ETI of the new event must be different from the value of the existing, active events, but must be associated with the same CI.
If Enable Changing State of Related Events is set to true, on receiving a new event, a search is made for related events and any found related event is closed or set to resolved.
The following elements are included in the Change State of Related Events Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Change State |
Change state of all related events to the specified value, either When an event is closed, it is no longer possible to execute any further actions on the event upon resolution of the failure. When closing an event automatically, the When you select the value Tip: The Incoming Event Acknowledge setting should be set to the same value as the Change State setting. |
| Detected Related Events by ETI |
Existing events must have same CI and ETI as new event, but a different ETI value. Only if ETI contributes to health. Default value is true. |
| Detected Related Events by Key Matching Pattern |
Key of existing events must match closeKeyPattern of new event. Default value is true. |
| Enable Changing State of Related Events |
For each newly received event, the existing events are inspected to find events related to the new event. Any events that are related to the new event are closed or set to resolved. Default value is true. |
The Closed Events Browser Settings contains the available configurations used to customize how closed events are displayed in the Closed Events Browser.
The following elements are included in the Closed Events Browser Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Maximum Closed Events |
Sets the maximum number of closed events to be displayed in the Closed Events Browser. Default is 1000. |
The Content Manager Settings contains the available configurations used to manage how content packs are created.
The following elements are included in the Content Manager Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Enable Content Pack Development |
Enables the development of predefined Content Packs. Caution: It is not recommended to change any predefined Content Packs that you are not responsible for - as this may result in upgrade errors. |
The Custom Attribute Settings contains the available configurations used to customize how custom attributes are used.
The following elements are included in the Custom Attributes Setting pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Available Custom Attributes |
List of custom attributes separated by semicolons (;) that you can add to the Event Browser as columns, for example: " |
Note: Each custom attribute can then be selected as a column in the Event Browser.
The Downtime Settings contains the following attributes that are used for controlling the handling of events that were received while CIs were not available due to scheduled downtimes.
The following elements are included in the Downtime Setting pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Downtime History Range |
Time period in minutes within which past downtime configurations are considered. All downtime periods are ignored which have an end time that is before the beginning of the configured history time period. |
| Future Downtime Range |
Ignore all maintenance windows which starts after current time plus the future downtime range in minutes. |
| Refresh Time Interval |
Maximum time in minutes after changes in the maintenance windows configuration are taking effect. |
A new event can be a duplicate of an existing event. For each new event that is received by Operations Management, a check is made to establish whether it is a duplicate of an existing (original) event. If the original event is found, the new event is excluded from any further processing and not added to the Event Browser. The original event is updated with information from the new event. The updates include the following information:
Duplicate count is increased by 1
Received time is changed to that of the new event
Note: Original received time remains available in event history lines.
Optionally, the following updates can also be made:
Change title to that of new event
Change severity to one of the following states:
Value contained in the new event
Most critical value from the new and original severity
Duplicate matching operates as follows:
If the new event has the No Duplicate Suppression flag set, no search for an original event is made.
If the new event includes a key, a search is made for an existing, active event that has the same key as the new event, and that are separated by less than the time period specified in the Maximum Age of Duplicate Events setting.
If the new event does not include a key, a search is made for an existing, active event where a set of configurable attributes have the same values as the new event, and that are separated by less than the time period specified in the Maximum Age of Duplicate Events setting.
If no original event is found yet, and the new event has an ETI value for a health-contributing ETI, a search is made for an existing, active event that has the same ETI value and the same CI, and that are separated by less than the time period specified in the Maximum Age of Duplicate Events setting.
The number of duplicates received for an event is available in the Event Browser. The Time Received value reflects the time that the latest duplicate arrived. The first received time is maintained in the Event History.
The following elements are included in the Duplicate Events Suppression Setting pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Detect Duplicate Events by ETI |
Use ETIs to find original event. Duplicate events must have same CI, ETI, and ETI value, and the ETI must contribute to health. Default value is true. |
| Detect Duplicate Events by Identical Attributes |
Use selected attributes (for example |
| Detect Duplicate Events by Key |
Use key attribute to find original event. Duplicate events must have identical key. Default value is true. |
| Enable Duplicate Events Suppression |
If enabled, duplicate events are dropped and the related original event is updated instead. Default value is true. |
| Maximum Age of Duplicate Events |
Maximum number of seconds difference between received times of original and new event (0 = infinite). Default value is 0. |
| Select Application |
Duplicate events must have identical application. Default value is true. |
| Select Category |
Duplicate events must have identical category. Default value is true. |
| Select CI |
Duplicate events must have identical CI. Default value is true. |
| Select CI Hint |
Duplicate events must have identical CI hint. Default value is true. |
| Select ETI Hint |
Duplicate events must have identical ETI hint. Default value is true. |
| Select ETI Value |
Duplicate events must have identical ETI and ETI value. Default value is true. |
| Select HPOM Service ID |
Duplicate events must have identical HPOM service ID. Default value is true. |
| Select Node |
Duplicate events must have identical node. Default value is true. |
| Select Node Hints |
Duplicate events must have identical node hints. Default value is true. |
| Select Object |
Duplicate events must have identical object. Default value is true. |
| Select Policy Condition ID |
Duplicate events must have identical policy condition ID. Default value is true. |
| Select Severity |
Duplicate events must have identical severity. Default value is true. |
| Select Subcategory |
Duplicate events must have identical subcategory. Default value is true. |
| Select SubComponent ID |
Duplicate events must have the same SubComponentID value. |
| Select Title |
Duplicate events must have identical title. Default value is true. |
| Select Type |
Duplicate events must have identical type. Default value is true. |
| Update Severity of Original Event |
Update severity of original event based on selected mode. The mode values are:
Default value is No. |
| Update Title of Original Event |
Update title of original event with title of last duplicate event. Default value is false. |
Note: Wrong keys can suppress events that are not duplicates of existing events. To avoid suppressing non-duplicate events,
Include enough information within the key to make the key specific enough to achieve a reliable match.
Include all necessary attributes in the identity check.
Dropping duplicates also results in the inability to update health because the following differences between the original event and duplicate event may exist:
Original event had no ETIs.
Original event and the new event had different ETIs.
The ECA Event Cache Settings contains the available configurations used to customize how duplicate events suppression and close related event information is cached.
The following elements are included in the ECA Event Cache Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Cache Clean-Up Interval |
Time interval in seconds after which the cache is cleaned up. Default: 60 Seconds (Minimum: 10 seconds). |
| Maximum Event Age |
Maximum age of cached events in minutes. Older events are removed from the cache during clean-up. |
| Maximum Event Count |
Maximum number of events held in the cache. If the current cache size is greater than this number, the oldest events are removed from the cache during clean-up. |
The Event Processing Interface Server Settings contains the available configurations for the Event Pipeline Server.
The Event Processing Interface (EPI) is used to enrich events with additional information from sources accessible using Groovy scripts (version 1.7.3). For example, it is possible to add data to an event from a Microsoft Excel file or an SQL database. If Groovy scripts are specified in the Event Pipeline Script and Step Settings, the event is forwarded to the EPI Server.
The following elements are included in the Event Cache Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| EPI Server Timeout |
Configures the maximum time period (in msec) for event processing in the EPI Server. The value zero (0) disables the timeout which means that a problem during processing in the EPI server may block further event processing indefinitely. Note: If the EPI Server Timeout setting is shorter than the timeout specified for a script, the execution of the script is stopped after the global timeout period is reached. The dedicated timeout cannot be reached. It is recommended to select a shorter dedicated timeout value for individual scripts and set a longer global timeout. |
The Event Auto Archiving Settings contains the available configurations used to customize how closed events are automatically removed from the database and archived to an XML file or a compressed (.zip) file.
The following elements are included in the Event Auto Archiving Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Archive Name | Prefix of the event archive file name. The complete file name includes the date, time and file type (.xml or .zip). |
| Base Path |
Base directory path used by all event archives. If no value is specified, the default base path is used. Default base path: To find the value of the default base path for achiving, execute the following command on the Data Processing Server system:
Linux default: Windows default: You can enter an alternative base path. Both absolute and relative paths are accepted, for example: Absolute: Relative: The specified relative path is appended to the default base path. For example,
|
| Compress Archive | Enables the compressing of the event archive during automatic archiving (true). |
| Confirmation Event | Send a event to confirm a successful events archive execution as log only event. |
| Event Age | Closed events which are older than the specified value (in hours) are automatically archived. All closed events are archived if this value is zero. |
| Enable Automatic Archiving | Enables automatic archiving of events (true). |
| Execution Interval |
Time period (hours) between the completion of the last automatic archiving of events and the start of the next execution. Note: The execution start time will be delayed by the time taken to archive the available closed events. |
| HP Cloud Object Storage Access Key ID |
Access Key ID used for HP Cloud Object Storage. Tip: for information about HP Cloud, visit |
| HP Cloud Object Storage Container | Name of the HP Cloud Object Storage container. If it does not exist, it is created automatically. |
| HP Cloud Object Storage Secret Key | Secret key for use with the specified HP Cloud Object Storage Access Key ID. |
| HP Cloud Object Storage Tenant ID | Tenant name of the HP Cloud Object Storage account, for example, [email protected]. |
| Minimum Disk Space | Automatic archiving is executed if at least the configured amount of disk space (MB) is available on the disk/partition. |
| Proxy Host | Hostname of the https proxy. Leave empty if no proxy is required. |
| Proxy Port | Port number used by the specified proxy. |
| Storage Type | Store archive in HP Cloud Object Storage or locally on the file system |
The Event History Settings contains the available configurations used to customize how event history information is handled.
The following elements are included in the Event History Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Maximum Property Length |
History of properties of type string or text which are longer than the configured value are ignored. Values with a fixed length like UUID cannot be limited. The default value is 0 which retains all information regardless of length. If an attribute modification where the new or old value exceeds the maximum length, the following text appears in place of the value in the event history: Value exceeds the maximum permitted length of `configured length' characters. |
The Event Lifecycle State and Assignment Propagation settings contains the available configurations used to customize how correlated events are handled when closing cause events.
The following elements are included in the Event Lifecycle State and Assignment Propagation settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Propagation of Assignment Operation to Symptom Events |
Enables the propagation of user and group assignments to symptom events. When enabled (True), changing the user or group assignment of a cause event also applies the change to all symptom events. Note: If Enabled (True), assignments cannot be changed for symptom events. |
| Propagation of Lifecycle State Operations to Symptom Events |
Enables the propagation of lifecycle state changes to symptom events.
Note: If Enabled (True), lifecycle states cannot be changed for symptom events. |
The Event Forwarding Settings contains the available configurations used to specify whether events are forwarded to connected servers, the forwarding mode, and the expiration time of forward requests.
The following elements are included in the Event Forwarding Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Event Forwarding Batch Count |
Maximum number of events or updates send simultaneously for each synchronization request to HPOM and BSM Connector servers. The default value is 100. Minimum value is 1. Maximum value is 500. Note: If less than the configured maximum number of events or updates are available in the queue, all are sent in one request. Only if more than the configured number are waiting in the queue, are multiple requests created. For example, if 120 events are in the queue and the default is set to 100, the first 100 events are sent, followed by the remaining 20 events. If only 1 event is in the queue at that moment, that one event is sent. |
| Event Forwarding Expiration |
Number of hours an event forward request or event update synchronization request is held in the queue. If the request cannot be delivered to the target server before this expiration time, it is automatically deleted from the queue. Default value is 12 hours. Minimum value is 1 hour. Maximum value is 720 hours (30 days). Note: If the request to forward an event to a particular connected server fails, the request is deleted from the forwarding queue and the event makes an internal note that the delivery to the target server has failed. The event maintains information about the failed request to the specified connected server. Any further forwarding rule matches on this event for this connected server is ignored. If the forwarding type was set to Synchronize and Transfer Control, a standard event annotation is also added to the event, otherwise no event annotation is made. Failure to deliver can occur for retry timeouts, or a catastrophic delivery error. A catastrophic delivery error is a situation where it does not make sense to retry the request, for example, a mis-configuration (authentication fails), or a programming error is encountered in an External Process groovy adapter (NullPointerException). These cases require manual intervention before retrying. To manually retry failed requests to a particular connected server, from the Event Browser, manually transfer control of an event that has previously failed delivery to a particular server. |
| Forward Event Properties as CMAs |
If disabled (false), event attributes that are unknown in HPOM for Windows or HPOM for UNIX are not forwarded as Custom Message Attributes. This affects the following Event properties: Priority, Description, State, Subcategory, Cause Event Id, Solution, Related CI, Related CI Hint, Node Hint, Source CI, Source CI Hint, ETI, ETI Hint, Skip Duplicate Suppression, Controlled Transferred. |
| Forward Events |
Specifies whether automatic forwarding of events to connected servers is enabled. If set to true, event forwarding using event forwarding rules is active. |
| Incoming Event Acknowledge |
Specifies lifecycle state in Operations Management to which the Tip: The Change StateIncoming Event Acknowledge setting should be set to the same value as the Incoming Event Acknowledge setting. |
| One-line Event Forwarding |
Every forwarded event includes a list of servers that have a copy of this event. By default, when the event is modified on one server, it notifies all servers in the list of the change. When enabled (true), for each event change (for example, close, annotation, or add), the server only informs the server from which the event was received and to which the event was forwarded. This can be useful in simplifying connections in firewall environments. |
| Retry Notify Interval |
Event Forwarding automatically retries delivery of event forward requests once a minute. Whenever a target server is unavailable, an internal event is generated indicating the failure to deliver. This setting defines the minimum number of minutes to elapse before generating another event for the failing request. Default: 60 minutes. Range: Minimum of 1 minute and a maximum of 1440 minutes (1 day). Note: This setting does not affect the retry interval of one minute. |
The Event Type Indicator Settings contain the configuration setting that you enables you to let ETI mapping rules override indicators specified in custom attributes.
The following elements are included in the Event Type Indicator Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Allow Rule Overwrite |
Permits ETI Mapping Rules to overwrite indicators specified in custom attributes (CAs). Default: False If set to false, and CMA-matched event type indicators are recognized, mapping rules are ignored. If set to true, the CMAs are still evaluated but mapping rules are used to process events. For example, migrating from customized, non-Operations Management-ready SPIs to Operations Management-ready SPIs can result in errors in event processing as new content packs no longer work as expected with the existing handling. Permitting mapping rules to override the CMA-driven event assignment leaves the Operations Management administrator in control. |
The Health Indicators for Unresolved and Unassigned Events Settings contains the available configurations used to specify the custom Event Count based HIs.
The following elements are included in the Health Indicators for Unresolved and Unassigned Events pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Event Count Rule |
Specifies how the number of unassigned/unresolved events are calculated for display. The following options are available:
The default setting is The value displayed for the number of highest severity events for CI:
The To avoid this situation, select one of the other options: |
| Event Subcategories |
List of event subcategories, separated by semicolons. For each subcategory, additional health indicators are calculated based on the number of unassigned and unresolved events with that subcategory. |
The HPOM Topology Synchronization Connection Settings pane contains the Operations Management settings that can be used to specify connection information used to communicate with one HP Operations Manager for UNIX or HP Operations Manager for Windows management server. These connection settings are used for synchronization of events and basic topology synchronization between Operations Management and the specified HP Operations Manager management server.
Note: The recommended method of synchronizing topology information is by using Dynamic Topology Synchronization. For details, see Dynamic Topology Synchronization
The following elements are included in the HPOM Connection Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Forward All Events |
Enables (true) forwarding of all events to this HPOM system. Use for testing only. For production systems, set up servers using the Connected Servers manager and create appropriate Event Forwarding Rules. |
| HPOM Host |
Name of the system hosting the HPOM management server that is forwarding events. This setting is used for the bi-directional synchronization of events between Operations Management and one HPOM management server. It is recommended to specify connections to external servers, including HPOM management servers, using the Connected Servers manager. For details, see How to Create a Connection to an HPOM Server. |
| HPOM Password |
Password for the user that Operations Management uses to connect to the configured HPOM management server. |
| HPOM Port |
Port number to use when establishing a connection to the HPOM management server. |
| HPOM Type |
Specify the platform of the HPOM installation. For HP Operations Manager for Windows, the user must have at least PowerUser rights and must be a member of HP-OVE-Admins group and the local administrators group. |
| HPOM User |
User name that Operations Management uses to connect to the configured HPOM management server. |
| HTTPS HPOM Web Service Connection |
Set to true to use HTTPS to connect to the HPOM web service. |
The HPOM Topology Synchronization contains the settings used by Operations Management to synchronize its topology with HPOM.
These settings are used for basic and dynamic synchronization of the object topology in the environments monitored by Operations Management and HPOM. The recommended method of synchronizing topology information is by using Dynamic Topology Synchronization. For details, see Dynamic Topology Synchronization.
Note: For more information about the opr-startTopologySync.bat command, see Basic Topology Synchronization Command-Line Interface.
For the basic synchronization of Operations Management and HPOM topologies, make sure that the following settings are correctly configured:
HPOM Connection Settings
The topology synchronization process reads the topology data from the HPOM Web Service (WS) during synchronization. For more information, see HPOM Topology Synchronization Connection Settings.
The following elements are included in the HPOM Topology Synchronization pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Dump Data |
Saves all data from the topology synchronization to the hard disk. This setting is not recommended for production systems because it can have a significant negative effect on performance. The default setting is |
| Groovy Scripts |
Enables Groovy scripts used to manipulate the synchronization data during the synchronization process. |
| Packages for Topology Sync |
Lists the packages used for the topology synchronizations. |
| Resolve IPs During Synchronization |
Enable IP resolution for nodes without IP address information in HPOM. Enable IP resolution ( |
| Skip CI Deletion |
Disables the automatic deletion of CIs when performing topology synchronization. The responsibility for CI deletion is transferred to RTSM. |
The License Reporting Settings contains the available configurations used to specify the License Reporting Server.
The following elements are included in the License Reporting pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Server Name |
Specifies the fully qualified domain name of the License Reporting Server. If no server is specified, no reports are generated. |
The Outdated Event Check Settings contains the available configurations used to drop old events.
The following elements are included in the Outdated Event Check Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Maximum Event Age |
Maximum allowed age (in hours) of an event to be processed. If the creation time of an incoming event is older than that allowed by the Maximum Event Age period, the event is dropped. To disable, set to 0. |
The Reconciliation Settings contains the available configurations used to poll the RTSM for reconciling changes.
The following elements are included in the Reconciliation Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Polling Interval |
Specifies the interval used to poll RTSM for reconciliation changes (in seconds). Use 0 to disable polling. |
The Relative Filter Re-evaluation Settings contains the available configurations used to specify the time after which relative date filters are re-evaluated.
The following elements are included in the Relative Filter Re-evaluation Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Re-evaluation Interval |
Specifies the time after which relative date filters are re-evaluated (in seconds). Valid range is 30 seconds to 86400 seconds (24 hours). |
The Topaz Authorization Service Settings contains the configurations that Operations Management uses in conjunction with user management.
Note: The list of event categories defined here is also available in the user configuration dialog box, where you can grant users or user groups access to work with events and event categories.
The following elements are included in the Topaz Authorization Service Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Categories |
List indicating event categories recognized by Operations Management separated by semicolons ( Event categories are logical groups of events (for example: |
| Refresh Interval |
Refresh interval in minutes for reloading user permissions from the database. Operations Management reloads user permissions every 10 minutes by default. However, events already loaded into the browser remain unaffected. Changes to a user account are only fully available after a new logon to Operations Management. |
The Topology View Settings contain the configuration setting that you can use to change how information is displayed in the Health Top View pane either in the Health Perspectives tab or the Dashboard.
The following elements are included in the Topology View Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| CI Centering Mode |
Enables updating of the view selector in the Top View when a CI is selected in the view. |
The Event Correlation Settings contain the configuration settings that correlation rules are managed.
The following elements are included in the Topology-Based Event Correlation Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Auto-Extend Time Window Mode |
Enables the automatic extension of the correlation time period whenever an additional symptom is correlated to the same cause. Each time that an event is correlated with a problem, the time period set in the correlation time window is restarted to help enable the correlation of a greater proportion of symptoms associated with the original event. The correlation time window is only automatically extended when an a new symptom is added to a cause AND the cause is not yet closed. If the cause is already closed, the time window is not extend anymore so that after the last time window elapses, future repetitions of symptoms are no longer correlated to the closed cause. This avoids ignoring new similar symptoms. Just because a cause is closed, it is not necessarily true that the problem is solved. If the same symptoms continue to occur, they were most likely not caused by the closed cause event and should become visible in the Event Browser. |
| Correlate Closed Cause Events |
Controls whether symptoms are correlated to closed causes or not. Default is Correlation takes place regardless of the lifecycle state of cause event, as long as events occur within the correlation time window. Correlating a symptom to a closed cause closes the symptom as it is not possible to have open symptoms with a closed cause. |
| Correlation Time Window |
Sets the period of time in seconds that correlation rules wait for all required events to occur before reporting the cause event and emptying the correlation rule cache. Cause and symptom events must arrive within that time frame in the correlation engine to be considered for correlation. A time window starts when a first cause or symptom event arrives that cannot be correlated with any other event. Default value is 960 seconds (16 minutes). |
| Max Query Result Cache Time |
Sets the maximum time in seconds that a query result for a cause-symptom relationship between CIs for a given correlation rule is cached. After this time period elapses, the RTSM is queried again. Valid range is 0 seconds to 86400 seconds (24 hours). Default value is 300 seconds (5 minutes). For very high numbers of possible cause-symptom relationships, event correlation can take a long time. The result of the correlation query for possible symptom CIs is stored in a cache and this cache is used for further checks. When the configured Max Query Result Cache Time period has elapsed, the query is rerun. This minimizes the number of times that queries are run for multiple open causes/symptoms relationships. |
| Max Waiting Queue Size |
Maximum number of events waiting to be processed by the correlation engine. If this limit is exceeded, the oldest event is removed from the queue and no longer considered for correlation. Default value: 5000 Valid range of Values: 100-20000 Changes are enabled immediately. |
The User Interface Settings contains the time interval used to update the Operations Management user interface with new event-related data.
The following elements are included in the User Interface Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Event Types for Global Event Count |
Controls which events contribute to an event count, for example in Event Dashboard widgets. Possible values are:
|
| Maximum Event Count |
Maximum number of active events (excluding events with parents) that is shown in a UI. If the actual event count exceeds this number, the system switches to Purge Mode and only displays the latest events. When in Purge Mode, a confirmation of being in Purge Mode (maximum number of active events than can be displayed in the Event Browser has been reached) is displayed in the information bar. In addition, it states which events are still displayed based on their time received (all events older than the stated time are purged out). The value is automatically set during deployment and is dependent on the selected deployment option: Small - 1000 Med. - 5000 Large - 10000 Extra large - 20000 Note: The more events that are stored in cache, the greater the memory demands from MercuryAS. If you significantly increase the Maximum Event Count setting, check for out-of-memory errors in the log files or increase the memory settings for MercuryAS in:
If you change the deployment in ServerDeployer, you will have to change the memory settings again. If the configured maximum is reached the oldest 10% of the top level events are removed from the cache. When the number of active, top-level events is less than 80% of the maximum value, the purged events are reloaded. For example, if the default Event Cache Max Level of 20000 is reached, the 2000 oldest events are removed from the cache. As the number of events in the Event Browser drops to 16000, the purged events are reloaded. The settings are per deployment. The same setting is applied to all gateway servers within the same deployment. |
| Sound Notification for New Events |
Enables sound notification for new events. When loading an event browser, this setting is used unless the user has defined alternative behavior in the browser options. |
| User Interface Update Interval |
The interval of user interface updates (in milliseconds). The default value is 5000 ms (5 seconds). |
The Web Service Settings contains the time interval used to update the Operations Management user interface with new event-related data.
The following elements are included in the User Interface Settings pane.
|
UI Element (A-Z) |
Description |
|---|---|
| Error Response Verbosity |
Controls the verbosity of responses from the Operations Management Web Service. The option |
| Secure Modify |
Operations Management Web service modify operations are secured by setting the X-Secure-Modify-Token HTTP header on Web service modify requests (PUT, POST and DELETE). For details on how to set this header, see the Operations Manager i Extensibility Guide. This header provides enhanced security protection against malicious exploits of web applications. Secure Modify is enabled by default. Note: Secure Modify is not backwards compatible with Operations Management 9.0 Web services and may cause some Web service clients designed to communicate with these Web services to fail when this feature is enabled. For backwards compatibility, this feature may be disabled. See the Operations Manager i Extensibility Guide for additional measures that may be taken to reduce the impact of disabling Secure Modify. |
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to [email protected].