Configuring Hardware Sentry

Hardware Sentry monitors the hardware of almost any server and external storage device available in datacenters. The configuration procedure will differ whether the server is locally and remotely monitored.

Creating a Hardware Policy

Policies enable administrators to deploy configurations on PATROL Agents and monitoring solutions, such as Hardware Sentry in an automated way. Policies are designed to define and configure monitoring criteria and apply them to selected PATROL Agents. The configuration criteria are automatically pushed to the PATROL Agents on which the policy is applied.

By default, Solution Administrators have full access to all policies in all realms (tenants). Tenant Administrators have full access to all policies in their realm (tenant). Certain policy management operations can only be performed by the owner of the policy. For more information about the different types of policies, see the Policy management section of the BMC documentation.

To view the Infrastructure Policies page, in the navigation pane of the TrueSight console, expand Configuration and select Infrastructure Policies.

To create a monitoring policy:

  1. Log on to the TrueSight console.
  2. In the navigation pane, expand Configuration and select Infrastructure Policies.
  3. In the Infrastructure Policies page, ensure that the Monitoring tab is selected and click Create Policy.
  4. In the Create Monitoring Policy page, specify the monitoring policy properties:

Creating a Hardware Monitoring Policy

Step 1 - Define the General Properties

Property Description
Name Name for the policy. The policy names must be unique. In an environment with tenants, the policy names must be unique for a single tenant. It is a mandatory field.
Description (Optional) A brief description about the policy.
Associated User Group Name of the user group that is associated with the PATROL Agents as defined in the Authorization Profile or in the PATROL Agent ACLs. The policy is applicable to these PATROL Agents.
Share with User Group Specify whether this policy is to be shared with the users across the associated user group or not. This property can be viewed in READ-ONLY mode by other users of the associated user group. Only the owner of the policy can modify this property.
Precedence Priority of the policy. Based on the precedence number that you configure, the configuration is applied to the PATROL Agents and the Infrastructure Management servers. Refer to BMC TrueSight documentation for more information about precedence.
Enable Policy Indicates whether the policy is enabled or disabled. By default, the policy is enabled. If you disable a policy when you create it, the policy configurations are not applied to the PATROL Agents and the Infrastructure Management Servers. If you disable any existing policy, the policy configurations are removed from the PATROL Agents and the Infrastructure Management servers, where the policy was applied.

Step 2 - Select the PATROL Agents

Define conditions to select the PATROL Agents on which you want to apply the policy:

  1. Select a property.
  2. Select an operator to create the condition. The available operators depend on the property that you select.
  3. Specify a value for the selected property.
  4. (Optional) To add more than one condition, click the inline button, and perform the earlier steps.
  5. (Optional) To group the conditions, use the parentheses and Boolean operators from their corresponding lists.

    Selecting a PATROL Agent

  6. Click Save to validate the creation of the policy.

To edit a monitoring policy

  1. Log on to the TrueSight console.
  2. In the navigation pane, expand Configuration and select Infrastructure Policies.
  3. In the Infrastructure Policies page, locate the monitoring policy you wish to modify, click its action button inline and click Edit.
  4. In the Edit Monitoring Policy page, locate the monitoring configuration you wish to modify and click its action button inline to access the monitoring options panel.
  5. Customize the configuration.
  6. Click Save to apply your changes to the selected PATROL Agent(s).

Configuring the Hardware Monitor Type Properties

Once the Hardware policy is created and configured, Hardware Sentry is loaded by the Agent. Then, the Hardware Monitor Type must be properly configured to start collecting data and reporting on hardware health and performance.

To configure the Hardware Monitor Type:

  1. Create a policy or edit an existing policy.
  2. Click the Monitoring tab.
  3. Click Add Monitoring Configuration to configure the Monitor Type properties:

    Adding a Monitoring Configuration

  4. From the Monitoring Solution menu, select Hardware.

  5. From the Version menu, select the required version. The Monitor Profile and Monitor Type information are automatically selected.
  6. Configure the properties for local host or remote host monitoring - To provide required information for identifying the device you wish to monitor, select the appropriate connector and define the device variable information.
  7. Configure the discovery and polling intervals (Optional) — To modify the default properties that set the frequency at which discovery and polling processes must be performed.
  8. Configure Global Alert Settings (Optional) — To provide all required information to set the alert actions you want the solution to perform when a problem occurs.
  9. Manage reporting options (Optional) — To schedule automatic reports on energy usage, Ethernet/fiber port activity and/or hardware inventory.
  10. Click Save to apply the new Hardware Monitor Type properties to the selected PATROL Agent(s).

Only the owner of a policy (user who creates the policy) can modify the associated user group and sharing status of a policy. A policy can be modified by only one user at a time and it will be locked for other users. A Solution Administrator can forcibly unlock a policy to modify it. Tenant Administrators can unlock policies within their specific tenants. Users of the associated user group can view, enable, disable, delete, and modify the policy. They cannot modify the associated user group and sharing status of the policy. For detailed information about policy management, refer to the BMC TrueSight documentation.

Configuring Hosts monitoring

Configuring Local Hosts Monitoring

Hardware Sentry is designed to automatically detect the components of the server it is running on along with the PATROL Agent. However, specific properties need to be configured to ensure the product collects and reports data and performance as needed.

  1. Create a policy or edit an existing policy.
  2. Click Add Monitoring Configuration to open the device configuration panel and select the options corresponding to the device you wish to monitor.
  3. In the Hardware Configuration section, locate List of Devices and click Add to add a new device to your monitoring environment or click the inline button next to the device you wish to configure.

    Accessing a device properties

  4. Configure the device properties:

    Configuring a device properties

    • Indicate the name of the device on which the PATROL Agent is installed and on which the policy will apply or leave the default setting (localhost) to let Hardware Sentry identify your local device automatically.
    • Enter the IP address of the device. If no IP address is provided, the specified device name will be used. The IP address will then be resolved by your DNS/hosts file.
    • Select the Device Type.
  5. Scroll down to the Protocol/Connection Information section to configure the options specific to the protocol you wish to use for monitoring the device:

  6. (Optional) Scroll down to the Device Advanced Settings section to select the specific connector(s) that will be used to monitor your device and to define additional configuration variables. Click here to open the Hardware Connector Library documentation and get an exhaustive list of available connectors.

    Connectors Selection

    • Select an option from the Connector Selection list:
      • Automatic (default and recommended mode): to let the solution automatically run tests at each discovery and select the connector files that most closely match the requirements of the managed system.
      • Exclude Specified Connectors: to prevent connector file(s) to be used by the solution. Connector file names must be comma-separated (Example: MS_HW_CpMgServNT.hdf, MS_HW_CiscoUCSCIMC.hdf). Refer to the Hardware Connector Library documentation to get an exhaustive list of available connectors.
      • Use Specified Connectors (for advanced users): to manually enter the connector file names the solution will use to monitor the managed system. Please note that Connector file names must be comma-separated (Example: MS_HW_CpMgServNT.hdf, MS_HW_CiscoUCSCIMC.hdf).Refer to the Hardware Connector Library documentation to get an exhaustive list of available connectors.

    An error in the connector file selection will prevent Hardware Sentry from properly monitoring the managed system. Note that connectors’ names are case sensitive.

    • In the Additional Variables section, click Add to configure the device additional configuration variables which will be applied to a single supervised host or device:

    Adding Configuration Variables

  7. Click OK to validate.

  8. In the Add Monitoring Configuration panel, locate the Global Advanced Settings section and the Local Commands settings options:

    Configuring Local Host Monitoring

  9. Select the Enable Local Commands to enable the utilization of local commands.

  10. In the Execute localhost OS command as section, specify the user account for executing external commands on the localhost:

    • Executing commands with the default PATROL user account: leave blank to use the default PATROL account credentials
    • Executing commands with a specific user account: enter the username and password of the account you wish to use to execute the commands (typically root credentials).
    • (UNIX/Linux only) Localhost Sudo Options: Allows you to use the Sudo utility to execute root privileged command. If the PATROL Agent default account does not have sufficient privileges to execute commands and cannot be granted super-user rights, use the “sudo” utility to authorize users to execute specific commands as another user account (typically root). To configure Hardware Sentry to use Sudo:
      • Select the Use When root Privileges are Needed option. Make sure the sudo utility is installed on the system and the /etc/sudoers file is configured to allow the PATROL Agent to execute the commands as root.
      • Configure “sudo” to allow the PATROL Agent default account to execute the needed commands as root (modify the /etc/sudoers file). Configuring “sudo” requires root privileges.
      • Make sure the sudo utility is installed on the system and the /etc/sudoers file is configured to allow the PATROL Agent to execute the commands as root.
      • Verify that the PATROL Agent default account is properly authorized to execute the needed commands through the “sudo” utility.
    • In Sudo Command Line, enter the command line you wish Hardware Sentry to execute.
  11. Click OK to save your settings. After a few minutes, your device will be displayed in the TrueSight console.

To edit the local host settings

  1. From the Infrastructure Policies panel, click the Monitoring tab and then click the inline button next to the Hardware Monitoring Solution for which you want to modify the connection settings and select Edit. The Add Monitoring Configuration opens.
  2. In the List of Devices section, click the inline button next to the localhost and select Edit.
  3. In the configuration panel, modify the connection information.
  4. Click OK twice.
  5. The new settings will be automatically applied to the localhost.

Configuring Remote Hosts Monitoring

Hardware Sentry allows you to configure remote monitoring for any accessible device to get a real-time insight of the health of your monitored environment, perform proactive maintenance operations, and maintain the highest level of performance you need.

Hardware Sentry offers the possibility to add remote hosts to your monitoring environment individually or in a batch when the hosts share the same configuration settings (OS, protocol, credentials, etc.). When creating a group of hosts you are proposed to define the group name (Internal ID) as well as the set of hosts included into a group being created. The name (Internal ID) makes it easier for you to identify the hosts that are part of a group in the TrueSight console. Additionally, you can associate your system to Fully Qualified Domain Names (FDQNs) of specific devices in TrueSight when you define the connection settings of your host(s). The FDQN designates the specific location of a device within the Domain Name System (DNS) hierarchy; it communicates the host’s position relative to the root of the DNS namespace. An FQDN enables each connected device to be uniquely identified and located within the monitored environment and therefore ensures that a device is properly identified.

Adding a remote host or an external device to your monitored environment consists in identifying the host/device you wish to monitor and configure the connection settings according to the protocol you need to use. This section provides step-by-step instructions for adding a single host/device or for adding multiple hosts/devices at a time, that will be easily identified as part of a group in the TrueSight console.

To add the monitoring of remote hosts

  1. Create a policy or edit an existing policy.
  2. Click Add Monitoring Configuration to open the device configuration panel and select the options corresponding to the device you wish to monitor.
  3. In the Hardware Configuration section, locate List of Devices and click Add to add a new device to your monitoring environment or click the inline button next to the device you wish to configure.

    Accessing a device properties

  4. Configure the device properties:

    Configuring a device properties

    • Internal ID: Enter an ID that will identify the remote host or that will be used as a group name if you wish to configure several hosts that share the same connection settings (OS, protocol, credentials, etc.).
    • Hostname(s) or IP address(es): Enter the Hostnames or IP addresses of the hosts you wish to monitor. A group can contain multiple hostnames/IP addresses that must be separated by commas.
    • From the drop-down list, select the System or Device type.
    • (Optional) Enter the FQDN to associate the system to another device in TrueSight. The FQDN uniquely distinguishes a device from any other system and ensures that a device monitored via their management cards or through controllers, for example, is properly identified.
  5. Scroll down to the Protocol/Connection Information section to configure the options specific to the protocol you wish to use for monitoring the device:

  6. (Optional) Scroll down to the Device Advanced Settings section to select the specific connector(s) that will be used to monitor your device and to define additional configuration variables. Refer to the Hardware Connector Library documentation to get an exhaustive list of available connectors.

    Selecting Connectors

    • Select an option from the Connector Selection list:
    • Automatic (default and recommended mode): to let the solution automatically run tests at each discovery and select the connector files that most closely match the requirements of the managed system.
    • Exclude Specified Connectors: to prevent connector file(s) to be used by the solution. Connector file names must be comma-separated (Example: MS_HW_CpMgServNT.hdf, MS_HW_CiscoUCSCIMC.hdf). Refer to the Hardware Connector Library documentation to get an exhaustive list of available connectors.
    • Use Specified Connectors (for advanced users): to manually enter the connector file names the solution will use to monitor the managed system. Connector file names must be comma-separated (Example: MS_HW_CpMgServNT.hdf, MS_HW_CiscoUCSCIMC.hdf). Refer to the Hardware Connector Library documentation to get an exhaustive list of available connectors.

    An error in the connector file selection will prevent Hardware Sentry from properly monitoring the managed system. Note that connectors’ names are case sensitive.

    • In the Additional Variables section, click Add to configure the device additional configuration variables which will be applied to a single supervised host or device:

    Adding Configuration Variables

  7. Click OK to save your settings. After a few minutes, your device will be displayed in the TrueSight console.

To edit the remote host settings

If you change the monitoring settings for hosts that are part of a group, make sure that these settings apply to all the hosts in the group. Once saved, the new configuration (policy) will automatically be applied to all the hosts in the group.

  1. From the Infrastructure Policies panel, click the Monitoring tab and then click the inline button next to the Hardware Monitoring Solution for which you want to modify the connection settings and select Edit. The Add Monitoring Configuration opens.
  2. In the List of Devices section, click the inline button next to the device for which you want to modify the connection settings and select Edit.
  3. In the device configuration panel, modify the connection information.
  4. Click OK twice.
  5. The new settings will be automatically applied to the specified host(s)/device(s).

Configuring Monitoring Protocols Settings

Before configuring the monitoring protocols, refer to the Supported Platforms section of the Hardware Connector Library documentation to know what protocols are supported by your device platform.

Using the HTTP Protocol

You can use the HTTP protocol to establish a connection with the HTTP/REST interface and monitor systems or devices.

To monitor a system using the HTTP protocol:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the HTTP options.
  3. Select the Enable HTTP option to enable the utilization of the HTTP protocol.

    Defining HTTP Options

  4. Configure the HTTP connection settings:

    • the protocol you wish to use: HTTP or HTTPS. By default, Hardware Sentry proposes to use HTTPS.
    • The port number to be used. By default, Hardware Sentry proposes to use port 443.
    • the HTTP credentials (username and password).
  5. Click OK to validate.

Using the SNMP Protocol

Hardware Sentry can leverage the SNMP protocol to collect hardware information. In that case, an SNMP agent must be installed on the monitored host and the SNMP connection configured. The information required by Hardware Sentry depends on to the SNMP version you wish to use.

To monitor a server using the SNMP protocol:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section.
  3. Select the Enable SNMP option to enable the utilization of the SNMP protocol.
  4. Define the SNMP Information:

    • Select the version of the SNMP protocol that Hardware Sentry must use to retrieve information from the SNMP agent. Possible values are 1, 2c, or 3.
    • Indicate the SNMP port number you wish to use to perform SNMP queries. By default the SNMP queries are performed through port 161.
    • Define the connection settings according to the SNMP protocol you wish to use:
      • If you wish to use SNMP version 1, provide a valid SNMP Community string to use to perform SNMP v1 queries (Default: Public). Please note that timeout is set through the PATROL Agent Configuration variable /snmp/default_timeout.
      • If you wish to use SNMP version 2c:
        • provide a valid SNMP Community string to use to perform SNMP v2c queries (Default: Public).
        • indicate the number of seconds Hardware Sentry will wait for an SNMP response. By default, the timeout is set to 120 seconds to cover all the sub-queries that compose the ‘parent’ queries.
      • If you wish to use SNMP version 3:
        • enter the Username to be used to perform the SNMP v3 queries.
        • select the Authentication Protocol to be used to authenticate the SNMP v3 messages. Possible values are: None, MD5, SHA.
        • provide the Authentication Password to be used to authenticate the SNMP v3 messages.
        • select the Privacy Protocol to be used to authenticate SNMP v3 messages. Possible values are: None, AES, DES.
        • enter the Privacy Password associated with the privacy protocol.
        • enter the Context Name accessible to the SNMP entity.
        • indicate the number of seconds (Timeout) Hardware Sentry will wait for an SNMP response. By default, the timeout is set to 120 seconds to cover all the sub-queries that compose the ‘parent’ queries.

Using the SSH Protocol

SSH (Secure Shell) can be used to monitor Linux/UNIX servers or to communicate remotely with systems and devices that have an SSH interface on their management card. Once the SSH options are configured, Hardware Sentry will run commands to determine the status, performance or capacity of these systems.

To monitor a server using the SSH protocol

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the SSH options.
  3. Select the Enable SSH option to enable the utilization of the SSH protocol.
  4. Provide the required SSH configuration information:

    Provide the Required SSH Configuration Information

    • Provide the Username, Password/Passphrase (if required), and the OpenSSH Private Key File.

    The key file must be accessible to the PATROL Agent that will make the connection to the host through the SSH protocol.

    • (UNIX/Linux only) In the Sudo Options section:
      • Check the Use When root Privileges are Needed option to use the “sudo” utility in order to execute external commands as “root” on UNIX/Linux platforms.
      • Enter the Sudo Command Line to execute.
  5. Click OK to validate.

Using the WBEM Protocol

You can use the WBEM (Web-Based Enterprise Management) protocol to communicate directly with a SMI-S Provider and collect information.

To monitor a server using the WBEM protocol:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the WBEM options.
  3. Select the Enable WBEM option to enable the utilization of the WBEM protocol.
  4. Provide the required WBEM configuration information:

    Provide the Required WBEM Configuration Information

    • Enter the Username and Password to use to establish the connection with the device using the WBEM protocol. If no credentials are provided, Hardware Sentry will use the PATROL Agent default account on localhost.
    • Specify the Port Number. By default port 5989 is used for encrypted connections and 5988 for non-encrypted connections.
    • For encrypted connections, check the Encryption option.
    • In the Advanced Options section:
      • Enter the IP address/device name of the Multi-Tier Authentication Server. This option is mostly used for VMware servers. If left blank, the solution will automatically use the WBEM credentials.
      • Enter the WBEM Namespace. Leave blank to let the solution detect the proper namespace (recommended).
  5. Click OK to validate.

Using the WMI Protocol

You can use the WMI (Windows Management Instrumentation) protocol to communicate directly with a SMI-S Provider/storage system and collect information from systems or devices.

To monitor a server using the WMI protocol:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the WMI options.
  3. Select the Enable WMI option to enable the utilization of the WMI protocol.

    Defining WMI Options

  4. Enter the Username and Password to use to establish the connection with the device through the WMI protocol. If no credentials are provided, Hardware Sentry will use the PATROL Agent default account on localhost.

  5. Click OK to validate.

Using the Cisco UCS Manager

To collect information about Cisco UCS Blade Chassis and Cisco Fabric Interconnect Switch, you need to provide the required credentials for Cisco UCS (Unified Computing System) Manager.

To monitor a server using the Cisco UCS Manager:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the Cisco UCS Manager options.
  3. Select the Enable Cisco UCS option to enable the utilization of the Cisco UCS protocol.

    Defining Cisco UCS Manager Options

  4. Enter the Username and Password to use to establish the connection with the Cisco UCS.

  5. Uncheck the Encryption option to disable the SSL Encryption for UCS login (HTTPS). By default, the encryption is enabled.
  6. Click OK to validate.

Using the IPMI-Over-LAN Protocol

IPMI-Over-LAN is the out-of-band interface used by Hardware Sentry to bypass the usual hardware agents and communicate directly with the motherboard’s BMC chip.

To monitor a server using the IPMI-Over-LAN protocol:

  1. Create a policy or edit an existing policy.
  2. In the List of Devices panel, scroll down to the Protocol/Connection Information section to define the IPMI-Over-LAN options.
  3. Select the Enable IPMI-Over-Lan option to enable the utilization of the IPMI-Over-LAN protocol.

    Defining IPMI-over-LAN Options

  4. Enter the Username and Password to use to establish the connection with the IPMI chip out-of-band (IPMI-over-LAN).

  5. Click OK to validate.

Configuring Discovery and Polling Intervals

Hardware Sentry periodically performs discoveries to detect new components in your monitored environment. By default, the solution runs a discovery every hour, but you can customize this interval to match your specific needs.

Hardware Sentry also polls the managed systems to collect hardware health data. By default, the polling interval for this “data-collect” is set to every 2 minutes.

To configure the discovery and polling intervals:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration panel, scroll down to the Intervals section.

    Configuring the Discovery and Polling Intervals

  3. Enter the frequency (in minutes) of the discovery process. By default, the discovery interval is set to 60 minutes

  4. Enter the interval at which the solution must poll the managed systems to collect hardware health data. By default, the polling interval is set to 2 minutes
  5. Click OK to save your settings.

Configuring Thresholds

By default no global thresholds are set in TrueSight. To take full advantage of Hardware Sentry, Sentry Software recommends setting thresholds as specified in the Reference Guide.

Three type of thresholds exist in TrueSight:

  • Global thresholds: Infrastructure Management Server-side thresholds (Absolute, Signature and Abnormality) managed from the TrueSight console, applicable to all monitors in a realm.
  • Agent thresholds: “Classic” range-based thresholds defined on the BMC PATROL Agents. They can be set at the monitor type or monitor instance level.
  • Server thresholds: Same as global thresholds, but defined in a monitoring policy and therefore applicable to a subset of agents. Such thresholds can be set at the monitor type or monitor instance level.

PATROL events generated by the Sentry Software’s KMs provide more information about the failure. Sentry Software therefore recommends setting agent thresholds over global or server thresholds.

Setting Global Thresholds

Hardware Sentry includes predefined thresholds that can be imported into TrueSight Operations Management.

IMPORTANT: Although Sentry Software recommends using these predefined thresholds, it is often a good practice to review the threshold template before importing it in TrueSight to ensure that predefined thresholds meet your requirements.

To import predefined thresholds:

  1. Download the MS_HW_thresholdtemplate.csv file.
  2. Review the content of the MS_HW_thresholdtemplate.csv and possibly update it.
  3. Copy the content of the MS_HW_thresholdtemplate.csv file to the thresholdtemplate.csv file located in _<TrueSight Presentation Server installation directory>_\TrueSightPServer\truesightpserver\modules\cma on your TrueSight server.
  4. If required, in the resulting thresholdtemplate.csv file, replace bmcrealm with the name of the tenant (from version 11 of TrueSight Operations Management, you can use * to apply these thresholds to all tenants).
  5. From a command-line interface, go to _<TrueSight Presentation Server installation directory>_\TrueSightPServer\truesightpserver\bin and execute the command below:
tssh.bat thresholdtemplate import



+-------------------------------------------------------------------------------------------+

|   BMC TrueSight Presentation Server - Command Line Interface 2017 version 11.0            |

|   Copyright 2014-2017. BMC Software, Inc. as an unpublished work.  All rights reserved.   |

+-------------------------------------------------------------------------------------------+





Importing thresholds template....



Importing thresholds from file "C:/Program Files/BMC Software/TrueSightPServer/truesightpserver\modules\cma\thresholdtemplate.csv"

Successfully imported thresholds template

You can further customize these global thresholds to apply specific settings to each attribute of every Monitor Types.

To customize global thresholds

  1. Log on to the TrueSight console.
  2. In the navigation pane, expand Configuration and select Global Thresholds.
  3. Expand Hardware and select the required version. All the monitors and attributes are displayed on the right pane.
  4. Select the attribute for which you wish to set global thresholds.

    Setting Global Thresholds for the Selected Attribute

  5. In the bottom pane, specify under which conditions events will be triggered. In our example, the threshold for the Charge Monitor Type is set to trigger an event of severity “Minor” when Charge attribute is lower than 50% and an event of severity “Major” when it is lower than 30%.

    Setting Global Thresholds

Setting Agent Thresholds

Agent thresholds are range-based thresholds defined on the BMC PATROL Agents. You can define range-based thresholds for the attributes of a Monitor Type (all monitor instances) or a single monitor instance on the PATROL Agents.

To set Agent thresholds:

  1. Log on to the TrueSight console.
  2. Edit your Hardware monitoring policy:

    Editing the Hardware Monitoring Policy

  3. Select the Agent Thresholds tab and click Add Agent Threshold.

  4. Select Hardware as the Monitoring Solution, the Version, the Monitor Type, the Scope and the Monitor Attribute.

    Setting Agent Threshold for the Hardware Monitor

  5. The Instance SID is required when setting thresholds at the instance level. You will find that information in the TrueSight Infrastructure Management console by placing the cursor on the required instance.

  6. Specify under which conditions events will be triggered.
  7. Click OK.
  8. Click Save.

Setting Server Thresholds

Server thresholds configured for a specific policy override the global thresholds set in the TrueSight console.

  1. Log on to the TrueSight console.
  2. Edit your Hardware monitoring policy:

    Editing the Hardware Monitoring Policy

  3. Select the Server Threshold tab and click Add Server Threshold.

  4. Select the Monitoring Solution (Hardware), the Version and the Monitor Type.
  5. Enter the Monitor Instance Name and select the Monitor Attribute.

    Setting Server Thresholds

  6. Select the Type of Threshold: Absolute, Signature, or Abnormality.

  7. Specify under which conditions events will be triggered. For example, define an event of severity “Major” when the Charge attribute of the specified battery reaches 50% for more than 5 minutes.
  8. Click OK.
  9. Click Save.

Configuring Global Alert Settings

Configuring Global Alert Settings consists in indicating:

Configuring Alert Actions

Alert Actions enable the administrator to choose specific actions to be executed when a hardware failure is detected. With Alert Actions, it is possible to customize the way a hardware problem notification is performed.

Hardware Sentry can be configured to run one, several, or all types of Alert Actions when an alert is triggered regarding the monitored hardware.

To set the alert actions you want the solution to perform when a problem occurs:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration, scroll down to the Global Alert Settings section.
  3. Define the alert action you wish Hardware Sentry to perform Upon a Hardware Problem and Upon a Connector Failure:

    • A Specific PATROL Event (Default)
    • A STD 41 PATROL Event
    • No Event

    Configuring Alert Actions

    A Hardware Health Report is automatically generated when a PATROL Event occurs to provide detailed information about the system impacted by the hardware failure or the threshold breach (ex: device type and label, serial number, etc.).

  4. The Enable Annotations option makes the solution annotate the parameter’s graph with a comprehensive report of the problem. Annotations are enabled by default. Uncheck the option if you do not want graphs to be annotated.

  5. Click OK to save your settings.

Configuring Alert Delay

Configuring the alert delay consists in indicating the number of consecutive times an attribute has to stay above (or below) the parameter threshold for an alert to be triggered. Setting alert delays can prevent false alerts to be triggered.

To configure the alert delay:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration panel, scroll down to the Alert Delay section.

    Configuring Alert Delays

  3. For each parameter type, indicate the number of consecutive times parameters have to stay above or below the defined threshold before an alert is triggered:

    • Numeric parameters (e.g.: Error Count parameters)
    • Discrete parameters (e.g.: Predicted Failure, Need Cleaning, Status, etc.)
    • Connector status parameters
    • Present parameters
  4. Click OK to save your settings

Automatically Resetting Error Count Parameters

Error Count parameters keep increasing as new errors are encountered. To reset these parameters, you can configure Hardware Sentry to automatically acknowledge an alert on the Error Count parameters and reset it to zero after a specified period of time.

To automatically reset Error Count parameters:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration panel, scroll down to the Auto Reset section.

    Configuring the Error Count Parameters Auto Reset

  3. From the Error Count Parameters list, select the period of time after which you want the solution to automatically reset the Error Count parameters.

  4. Click OK to save your settings.

Hardware Sentry will automatically apply the specified settings to the Error Count parameter of the following Monitor Types:

Enabling/Disabling the Missing Device Detection

Enabled by default, the missing device detection mechanism alerts operators when a device that was previously detected in the system is no longer found. If a device is no longer discovered, its Present attribute goes into alarm.

This mechanism is very useful when, for example, a non-redundant physical disk does not restart upon a system reboot and is therefore no longer seen by the operating system and the monitoring software.

The missing device detection feature does not apply to logical disks, voltage and temperature sensors, LEDs, and LUNs.

To disable the missing device detection:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration panel, scroll down to the Missing Device Detection section.

    Configuring the Missing Device Detection

  3. Disable Missing Device Detection: Check this box if you no longer want to be alerted when a device goes missing. Deactivating this feature when some missing devices have already been detected will trigger a removal of these devices from the monitoring environment.

  4. Delete missing devices: if the “Disable Missing Device Detection” box is unchecked, specify when the missing devices should be deleted:

    • After the number of hours specified below: devices will be removed when the specified time is reached. Enter the desired time in the text field (default: 72).
    • Never: devices will continue to appear in the console even when they are detected as missing.
    • Immediately: devices will be removed from the console as soon as they are detected as missing. An alert will however be triggered before deletion.

    The history of devices that have been removed will be lost.

  5. Clean-up Missing Devices on Startup: Select this option if Hardware Sentry triggers false “Missing Device” alerts after a start up (reboot) operation. Occasionally, servers reassign IDs to some devices during start up (reboot). When this situation occurs, Hardware Sentry cannot match these devices with their new IDs and irrelevant alerts are triggered. This option configures the solution to automatically clean-up the list of previously discovered devices when the Agent starts.

    Devices that went missing during the start up (reboot) operation will not be reported as missing.

  6. Click OK to save your settings.

Configuring the Unknown Status

On rare occasions, Hardware Sentry collects an unexpected value for a monitored device and returns the poll with “Unknown Status”. If this situation occurs, you can configure Hardware Sentry to perform specific actions.

To configure the Unknown Status:

  1. Create a policy or edit an existing policy.
  2. In the Add Monitoring Configuration panel, scroll down to the Unknown Status section.

    Configuring the Unknown Status

  3. From the Translate Unknown Status Value to list, select the status you wish to apply:

    • Nothing to keep the Status attribute value as Unknown
    • 0 (OK) to set the Status attribute to OK (default)
    • 1 (Warning) to trigger a WARNING on the Status attribute
    • 2 (Alarm) to trigger an ALARM on the Status attribute.
  4. Trigger an Internal KM Issue Notification: By default, Hardware Sentry triggers an Internal KM Issue Notification when an unknown status is collected. Un-select this option to disable the notification.

  5. Click OK to save your settings.