Best practices task list
The Best Practices Task List is an aid that outlines the high-level steps necessary to implement IBM® Sterling Control Center Monitor. It describes planning that needs to be done for each task and the documentation references you can access for more information.
Some of these steps may have already been completed by someone in your organization. For example, someone may have already analyzed the environment and installed the hardware and software. You may be tasked with configuring IBM Sterling Control Center Monitor, so you would start with planning steps that identify your organization's IBM Sterling Control Center Monitor objectives. The task list will help you identify the high-level tasks that need to be performed to implement IBM Sterling Control Center Monitor.
# | Task | Planning Information and Best Practice Notes | Documentation Resources |
---|---|---|---|
1 | Planning Your Implementation | ||
1a | Identify your business objectives | Identify your IBM Sterling Control Center
Monitor business objectives. Part of this process involves analyzing your environment to determine what you have, what you need, and what you want to do with those resources. This process is vital to an effective IBM Sterling Control Center Monitor implementation. Locate network diagrams, documents that state IBM Sterling Control Center Monitor objectives (which may have been identified when your organization purchased IBM Sterling Control Center Monitor), and other documents, that might help you identify your IBM Sterling Control Center Monitor business objectives. |
|
1b | Analyze your environment | Important: If you are running at 80 percent or more CPU capacity
with IBM Control Center
Monitor V6.0, then in V6.1
you need to add more CPU. Adding more CPUs is necessary to properly scale an IBM Control Center
Monitor environment with multiple
EPs.
Determine your hardware and software needs and system requirements for engine(s),
consoles (GUIs), databases, reports.
|
|
1c | Identify if you want a high availability or non-high availability environment for IBM Sterling Control Center Monitor | ||
1d | Gather information for the building blocks that will define IBM Sterling Control Center Monitor system-level objects: servers, users, email lists, calendars, etc. | You will use this information later when you are creating these building blocks. | |
Gather server information |
Because you must have a valid user ID and password to access each server, you may want to setup a generic user ID and password to access servers more easily. You do not need a user ID and password for dynamically discovered servers or servers that send data to IBM Sterling Control Center Monitor through SNMP traps. For Sterling Connect:Direct® servers, you can add one server and then use the IBM Sterling Control Center Monitor Guided Node Discovery feature to get a list of the nodes that server communicates with based on netmap entries and statistics logs. See Performing guided node discovery. |
||
Decide if you will rename system server groups | You must rename system server groups before you start IBM Sterling Control Center
Monitor for the first time. Do not name any server groups All server type Servers to avoid naming conflicts with system-defined server groups. |
||
Decide how you will group servers | Decide how you will group servers in a way that makes sense for your
environment, for example, geographic location or service line. Tip: If you want to
restrict a user to all the activities from one or more servers, you can use the server group
restriction. With the server group option, you create a server group with one or more servers and
associate that group to a user role.
|
||
Decide if you will use data visibility groups (DVGs) | Decide if you will use data visibility groups to limit the data users can
monitor. If so, determine a way to segment access to data that makes sense for your environment, for
example, by functional department such as accounting or payroll. Tip: If you want to
restrict a user to all the activities from one or more servers, you can use the server group
restriction. With the server group option, you create a server group with one or more servers and
associate that group to a user role.
|
||
Decide how you will implement user roles and permissions | Develop a role hierarchy to capture the user roles and permissions needed in your environment using the superuser and user roles as a basis. | ||
Determine if you need to implement a password policy for your organization | If your organization enforces a password policy, get a copy of it. To implement your password policy, edit the passwordPolicy.xml file when you configure user access to IBM Sterling Control Center Monitor in a later task. To open the passwordPolicy.xml file, in the web console, click . Assign a unique user ID to each user and reset the default password for the administrator. | ||
Decide which users need permission to create rules, SLCs, and their supporting objects for future monitoring of transactions using the Monitor This option | |||
Decide whether you will use external authentication to validate user credentials | To use external authentication, you must configure IBM Sterling Control Center Monitor and Sterling External Authentication Server. | ||
Decide what type(s) of notifications you will use to handle alerts | Gather information you will use to define SMTP email settings and SNMP settings
for host computers where SNMP traps are sent. The specific elements a trap contains are dictated by the contents of the IBM Sterling Control Center Monitor configuration file named SnmpAdaptorWrapper.xml. The Management Information Block (MIB) that defines the Object Identifiers (OIDs) contained in the trap is shipped with IBM Sterling Control Center Monitor. It is named SterlingMIB.mib and is located in the \esm installation directory folder. |
||
1e | Identify the building blocks needed to meet your monitoring objectives | For the objectives you identified, plan how you will use the building blocks to
define the work IBM Sterling Control Center
Monitor will perform.
As you are going through this process, be sure to plan for reuse of building blocks where possible such as an action used in more than one rule or a calendar used in multiple SLCs. This will simplify the ongoing maintenance of these objects. |
|
Decide which rules you need to meet your business objectives for monitoring servers | Your rules need to be based on the business objectives you identified earlier in the planning process. The rules you define will provide IBM Sterling Control Center Monitor with instructions that specify the event to listen for. View the built-in rules to decide if you need to enable or disable any of them. If you need to modify a built-in rule, make a copy of the rule, modify it, and then disable the built-in rule. | ||
Identify the service level criteria that will enable you to determine whether service level agreements have or have not been met | |||
2 | Preparing the Environment | ||
2a | Identify required patches, service packs, and releases for managed servers | Download any product updates from IBM Sterling Customer Support. | |
2b | Verify that the system hardware is in place and ready for the installation | You can use a load balancer in a high availability environment to evenly distribute IBM Sterling Control Center Monitor web console sessions and events of a dynamically discovered server that are posted to the IBM Sterling Control Center Monitor event repository. | |
2c | Install the database software | Record the following information from the database administrator for use later
during the IBM Sterling Control Center
Monitor installation:
Make sure you have the correct objects for the database you chose (for example, DB2 page size). For more information, consult the product documentation for the database you chose. |
|
2d | Create the production and reports databases for your database type | If your database supports partitioning, you should take advantage of it. | |
2e | Configure secure connections for use between IBM Sterling Control Center Monitor and a Sterling Connect:Direct or Sterling B2B Integrator server | Before you configure the connections, obtain and import certificates into the IBM Sterling Control Center Monitor truststore. | Configuring secure connections |
2f | Configure IBM Global High Availability Mailbox to publish events to IBM Sterling Control Center Monitor | The default connection is non-secure. You can configure Global Mailbox to create a secure connection with IBM Sterling Control Center Monitor. | |
2g | If consoles will access the IBM Sterling Control Center Monitor engine using a secure connection, configure the HTTPS connection | Determine HTTPS information for the engine and console connection | |
3 | Installing IBM Sterling Control Center Monitor | ||
3a | Install IBM Sterling Control Center Monitor |
Important: If you do not enable the globalization parameter for the Microsoft SQL server
during an IBM Sterling Control Center
Monitor installation, then
you cannot use multi-byte characters. When you use a multi-byte character without enabling this
parameter, then IBM Sterling Control Center
Monitor cannot run
and you must manually remove the character from your database. If you choose to enable the
globalization parameter later, you must reinstall IBM Sterling Control Center
Monitor.
|
|
3b | If you are installing IBM Sterling Control Center Monitor for a high availability environment, install your second event processor | Installing IBM Control Center in a high availability environment | |
3c | After you install the engine, the IBM Sterling Control Center Monitor console is available locally on the computer where IBM Sterling Control Center Monitor is installed. For remote computers, the console is available from the engine "launch" page | The Console can be started by accessing the engine launch page from a browser after the engine is started. | Setting up a console |
3d | If the console will access the engine using a secure connection, configure a secure connection between the engine and the console for either a high availability or non-high availability environment | Configuring secure connections | |
3e | If you want to secure event posting to the event repository through a user name and password authentication, enable the authentication in configCC | Enabling authentication for posting events to the IBM Control Center event repository | |
3f | Install the FTP agents (if you will manage FTP servers using IBM Sterling Control Center Monitor) | One agent per FTP server must be installed (except for the z/OS FTP server). If you have a high availability environment, you must configure your WS_FTP and FTP for z/OS server to send traps the assigned event processor. | Setting up IBM Control Center to monitor Sterling Connect:Direct File Agent |
3g | Set the self-defined user key if you want to encrypt passwords with your own key. | You need to have the administrator authority of IBM Sterling Control Center Monitor to set the user key. | Securing the IBM Control Center root passphrase with a user key |
4 | Starting and Accessing IBM Sterling Control Center Monitor | ||
4a | Start IBM Sterling Control Center Monitor |
Important: In a high availability environment, the first event processor (EP) running is
the controller EP. Ensure that any Sterling Connect:Direct File Agent is configured to send
traps to all EPs.
|
Starting and stopping IBM Control Center |
4b | Directly invoke the console to gain access to IBM Sterling Control Center Monitor | After you log into the console, be sure to change the admin password. If you are unable to log into the console, you should check the engine log file for problems that may have caused the engine to not start. |
|
4c | Redirect to IBM Sterling Classic Console from IBM Sterling Control Center Monitor | After you log into the IBM Sterling Control Center Monitor, you can launch the IBM Sterling Classic Console from the Menu Settings. | |
5 | Changing settings and tuning IBM Sterling Control Center Monitor | To ensure optimal operation, you can change system settings to tune IBM Sterling Control Center
Monitor. For example, if the engine time
is different from the server time, adjustments need to be made in the time Preferences Settings.
Important: To change SMTP email settings, run the configCC
utility.
|
|
5a | Configure IBM Sterling Control Center Monitor to send traps | Configure SNMP settings for host computers where SNMP traps are sent. | About SNMP settings |
5b | Configure JMS message retention time | Because IBM Sterling Control Center Monitor is a durable subscriber for messages, it receives all messages published on a topic, including those published while it is not running. Configure the message provider to retain messages longer than the longest amount of time IBM Sterling Control Center Monitor may be taken down. | WebSphere MQ IBM Documentation |
5c | Change the default system server group names | If you want to change the default names for the system server groups, do it
before you start defining servers, server groups, or any other IBM Sterling Control Center
Monitor objects. The engine must be
restarted to put the changes into effect. CAUTION: After you define objects, such as
rules and SLCs, that reference system server groups, do not change system server group names.
|
|
5d | Configure load balancer in a high availability environment | In a high availability environment, you can configure a load balancer to evenly distribute IBM Sterling Control Center Monitor web console sessions, or the events of a dynamically discovered server that are posted to the IBM Sterling Control Center Monitor event repository. | Load balancer configuration for IBM Control Center |
6 | Defining Servers | ||
6a | Add servers |
For Sterling Connect:Direct servers, you can add one server and then use the Guided Node Discovery feature to get a list of the nodes the server communicates with based on netmap entries and statistics logs. After adding a server of a specific type, you may use that definition as a template for other servers to be added if you use the duplicate capability from the Server List view. |
|
6b | Create server groups | ||
6c | Set event processor assignment, failover, and monitoring policies for your high availability environment | Setting a server assignment, failover, and monitoring policy for an event processor | |
7 | Defining User Access | ||
7a | Define data visibility groups (DVGs) | ||
7b | Define user roles | ||
7c | Define a user password policy | ||
7d | Add users | ||
8 | Setting Up Calendars and Schedules | When defining calendars and schedules, use a descriptive naming convention that allows users to know what they are by name. This will save users the time of looking at the object properties to determine their use and facilitate object reuse. | |
8a | Set up calendars | ||
8b | Set up schedules | ||
9 | Creating actions that will be invoked by a rule when an event occurs | Will the default actions that are included in IBM Sterling Control Center
Monitor work for you? If not, create
actions that will meet your needs. These actions will be used when you are creating rules. You can create actions while you are creating rules; however, a planned, methodical approach of creating them up front will help you create only the actions you absolutely need. You can then select these actions when creating rules. (One action might be used in many different rules.) This process will result in fewer actions to maintain. Be sure to give any actions you create a descriptive naming convention that allows users to know what they are by name. This will save users the time of looking at the object properties to determine their use and facilitate object reuse. |
|
10 | Creating rules that specify an event that IBM Sterling Control Center Monitor will listen for | Your rules need to be based on the business objectives you identified earlier in
the planning process. As you are creating rules and SLCs, you should approach this process in a slow-roll, phased approach where you define a rule or an SLC for a server. If you get the results you want, then add another rule or an SLC and test, and add another and test, and so on. This will allow you to troubleshoot rules and SLCs as you go before adding more complexity. |
|
11 | Creating the Service Level Criteria that will enable you to determine whether service level agreements have or have not been met | As you are creating rules and SLCs, you should approach this process in a
slow-roll, phased approach where you define a rule or an SLC for a server. If you get the results
you want, then add another rule or an SLC and test, and add another and test, and so on. This will
allow you to troubleshoot rules and SLCs as you go before adding more complexity. Tip: It is best to set up a rule for IBM Sterling Control Center
Monitor instances that have multiple EPs
and use SLCs to watch for the event with message ID CSLC248E. You are alerted when IBM Sterling Control Center
Monitor stops monitoring an in-progress
SLC because the SLC monitoring window is expired before the controller event processor (EP)
transition completes.
|
|
12 | Ongoing Administration of IBM Sterling Control Center Monitor | ||
Exporting and importing IBM Sterling Control Center Monitor configuration data | You can either export your entire configuration data or individual configuration objects from one IBM Sterling Control Center Monitor instance and import the data into another IBM Sterling Control Center Monitor instance. Rules are the only configuration objects that you can export and import into another IBM Sterling Control Center Monitor instance individually. | ||
Changing IBM Sterling Control Center Monitor Settings | In the ongoing administration of IBM Sterling Control Center
Monitor, you might need to change system
settings, such as the following:
Important: To change SMTP email settings, run the configCC
utility.
Important: If emails are sent in any rule actions, the email system
setting must be configured first. Likewise, the SNMP host settings must be configured appropriately
for traps generated due to rule actions to be sent to the correct locations. The system-wide
administrator email address is configured in configCC. Any emails sent from the
IBM Sterling Control Center
Monitor system are sent from the
address. In addition, Monitor This request emails are sent to this email
address.
|
Configuring system settings | |
Improving Performance | You can perform general tuning to improve the performance of the IBM Sterling Control Center Monitor engine. | Tuning IBM Control Center | |
s | Managing Configuration Objects | If you want to create, update, or delete multiple configuration objects such as
actions, rules, schedules, email addresses, and SLCs without manually entering each one or using the
duplicate function in the console, you can use the Batch Creation Utility), sample script, and
sample templates provided with IBM Sterling Control Center
Monitor. You can also copy configuration objects between IBM Sterling Control Center Monitor configurations to prepare for disaster recovery or to copy a production instance to a test instance. |
|
Troubleshooting IBM Sterling Control Center Monitor |