A configuration that includes a high-availability
(HA) hub is resilient and efficient. It is resilient because the HA
hub can be relocated to any LPAR in the sysplex with minimal disruption
to the other components. The configuration is efficient because the
remote monitoring server on the same LPAR as the hub handles all communications
with the monitoring agents and thus reduces the load on the hub. If
your environment supports the requirements for a HA hub, you should
configure one.
About this task
You can configure a high-availability hub monitoring server in any sysplex environment
with dynamic virtual IP addressing (DVIPA) and shared DASD. A high-availability hub is configured in
its own runtime environment, without any monitoring agents, and can be configured on the same LPAR
with a remote monitoring server. It is recommended that system variables are not enabled on an
high-availability hub. This configuration allows the hub monitoring server to be relocated to any
suitable LPAR in the sysplex with no changes, and with minimal disruption to the components
connecting to the hub.
Figure 1 depicts an HA hub monitoring server connected to a remote monitoring on
the same LPAR, to remote monitoring servers on other LPARs, to remote monitoring servers on
distributed systems, and to the Tivoli Enterprise Portal server.
Figure 1. High-availability hub monitoring server and its connections
Reminder: An HA hub is the only type of hub that can be on the same
LPAR with a remote monitoring server that reports to it. You can configure monitoring agents to
report to the remote hub. You should not configure monitoring agents to report directly to the HA
hub.
Tips:
The parameters shown in this section are not the only parameters you might need to set in the
configuration profile for the runtime environment. After you set the parameters shown here, be sure
to go through the entire configuration profile to make sure the parameter values are correct for the
configuration you want.
The parameters with names beginning KDS_HUB are not parameters for
the hub monitoring server; they are parameters for remote monitoring servers.
For information on the XF (“EXCLUDE FIND") macro, seeXF edit macro.
The following instructions assume that the KDS_TEMS_TYPE parameter was
set to HUB and the KDS_TEMS_HA_TYPE parameter was set to HA during the set up
of the environment. If this is not the case, set those parameters in the RTE configuration profile
before completing the following procedure.
Procedure
Do an EXCLUDE FIND of all _TCP_HOST strings,
then customize all occurrences of the LPAR name to the reserved DVIPA
name.
In this example, this is hostname OMEGHAHUB.
ISREDDE2 TSTEST.&userid.HAHUB.WCONFIG(HAHUB)
Command ===> C &hostname OMEGHAHUB ALL Scroll ===> CSR
****** ***************************** Top of Data ******************************
- - - - - - - - - - - - - - - - - - 307 Line(s) not Displayed
000308 ** 000029 RTE_TCP_HOST "OMEGHAHUB"
- - - - - - - - - - - - - - - - - - 197 Line(s) not Displayed
000506 RTE_TCP_HOST "OMEGHAHUB"
- - - - - - - - - - - - - - - - - - 186 Line(s) not Displayed
000693 ** Note: If this is a High-Availability Hub TEMS, KDS_TEMS_TCP_HOST
- - - - - - - - - - - - - - - - - - - 1 Line(s) not Displayed
000695 KDS_TEMS_TCP_HOST "OMEGHAHUB"
- - - - - - - - - - - - - - - - - - - 90 Line(s) not Displayed
000786 ** Note: If this is a High-Availability Hub TEMS, KDS_PH01_TEMS_TCP_HOST
- - - - - - - - - - - - - - - - - - - 9 Line(s) not Displayed
000796 KDS_PH01_TEMS_TCP_HOST "OMEGHAHUB"
- - - - - - - - - - - - - - - - - - - 32 Line(s) not Displayed
****** **************************** Bottom of Data ****************************
Do an EXCLUDE FIND of all _PORT parameters,
then customize _PORT according to your site's
conventions.
Customize the monitoring server protocols to support only
IP: At least one of the values must be IPPIPE, IP6PIPE, IPSPIPE,
or IP6SPIPE. Nullify the KDS_TEMS_COMM_PROTOCOL3 parameter
by setting it to "" (instead of the SNA value
set initially).
ISREDDE2 TSTEST.&userid.HAHUB.WCONFIG(HAHUB)
Command ===> Scroll ===> CSR
000658 ** TEMS communication protocols:
000659 ** Specify the communication protocols to be used by the local TEMS.
000660 ** Valid values are IPPIPE, IP, SNA, IP6PIPE, IP6, IPSPIPE, and
000661 ** IP6SPIPE. When communication with another ITM component (TEPS, Hub
000662 ** TEMS or Remote TEMS, Agents) is initiated, the TEMS tries Protocol 1
000663 ** first and goes to Protocol 2 and so on, in case of failure.
000664 ** Note: Update the corresponding KDS_TEMS_TCP_*_PORT_NUM port number
000665 ** parameter for each KDS_TEMS_COMM_PROTOCOLx parameter enabled.
000666 ** For example, if KDS_TEMS_COMM_PROTOCOL1="IPPIPE", set the
000667 ** corresponding KDS_TEMS_TCP_PIPE_PORT_NUM parameter.
000668 ** If KDS_TEMS_COMM_PROTOCOL2="IP" (for IP.UDP), set the
000669 ** corresponding KDS_TEMS_TCP_UDP_PORT_NUM parameter.
000670 ** If this is a Remote TEMS, update the KDS_HUB_* parameters
000671 ** by uncommenting out the corresponding KDS_HUB_TCP_*_PORT_NUM
000672 ** parameters and specify the Remote's Hub TEMS port numbers.
000673 KDS_TEMS_COMM_PROTOCOL1 IPPIPE
000674 KDS_TEMS_COMM_PROTOCOL2 IP
000675 KDS_TEMS_COMM_PROTOCOL3 ""
Uncomment the KDS_TEMS_TCP_KDEB_INTERFACELIST parameter,
then change its value from the default (!*)
to !dvipa_hostname, where dvipa_hostname is the private
DVIPA name set for the KDS_TEMS_TCP_HOST parameter
(in this example, !OMEGAHUB). This setting ensures that the high-availability
hub is restricted to its private DVIPA address and cannot interfere
with the remote monitoring server configured on the same LPAR.
ISREDDE2 TSTEST.&userid.HAHUB.WCONFIG(HAHUB)
Command ===> Scroll ===> CSR
000698 ** If the TEMS requires network interface list support:
000699 ** Note: If this is a High-Availability Hub TEMS, uncomment the
000700 ** KDS_TEMS_TCP_KDEB_INTERFACELIST and set its value to
000701 ** "!<dvipa_address>"
000702 KDS_TEMS_TCP_KDEB_INTERFACELIST "!OMEGHAHUB"
What to do next
These are not the only parameters you might want to set.
For example, you might want to configure the monitoring server to
enable event forwarding, support for self-describing agents, auditing,
or the SOAP server.