Escolar Documentos
Profissional Documentos
Cultura Documentos
aspx)
What is System Center 2012 R2 Operations Manager ?
---Operations Manager enables you to monitor services, devices, and operations for many
computers in a single console
.
---System Center Operations Manager(SCOM) is a cross-platform data center management
system for operating systems and hypervisors. It uses a single interface that shows state, health
and performance information of computer systems.
---It also provides alerts generated according to some availability, performance, configuration or
security situation being identified.
Whar it Monitors?
---show state, health, and performance information, as well as alerts generated for availability,
performance, configuration and security situations.
What Operations Manager Does?
--Businesses, small and large, are typically dependent on the services and applications provided by
their computing environment.
--IT departments are responsible for ensuring the performance and availability of those critical
services and applications. That means that IT departments need to know when there is a problem,
identify where the problem is, and figure out what is causing the problem, ideally before the users of
the applications encounter the problems. The more computers and devices in the business, the
more challenging this task becomes.
--Using Operations Manager in the environment makes it easier to monitor multiple computers,
devices, services, and applications.
--The Operations console, enables you to check the health, performance, and availability for all
monitored objects in the environment and helps you identify and resolve problems.
--Operations Manager will tell you which monitored objects are not healthy, send alerts when
problems are identified, and provide information to help you identify the cause of a problem
and possible solutions.
-- As the administrator, you configure what will be monitored by selecting computers and
devices to be monitored and importing management packs that provide monitoring for specific
features and applications.
--To decide which objects to monitor and what to monitor for, you need to understand the
features that comprise the Operations Manager infrastructure and how Operations Manager
works.
--Installing Operations Manager creates a management group. The management group is the
basic unit of functionality.
--At a minimum, a management group consists of a management server, the operational
database, and the reporting data warehouse database.
The management server is the focal point for administering the management group
and communicating with the database.
When you open the Operations console and connect to a management group, you
connect to a management server for that management group.
The operational database is a SQL Server database that contains all configuration
data for the management group and stores all monitoring data that is collected and
processed for the management group.
The data warehouse database is a SQL Server database that stores monitoring and
alerting data for historical purposes.
Data that is written to the Operations Manager database is also written to the data
warehouse database, so reports always contain current data.
--These core components of a management group can exist on a single server, or they can be
distributed across multiple servers, as shown in the following image.
--The role of the management server is to administer the management group configuration,
administer and communicate with agents, and communicate with the databases in the
management group.
--The management group can contain multiple management servers to provide additional
capacity and continuous availability.
--When two or more management servers are added to a management group, the management
servers become part of a resource pool and work is spread across the members of the pool.
--When a member of the resource pool fails, other members in the resource pool will pick up
that members workload.
-- When a new management server is added, the new management server automatically picks
up some of the work from existing members in the resource pool.
-- All members in the resource pool will manage a distinct set of remote objects; at any given
time, two members in the same pool will not manage the same object at the same time.
--A specialized type of management server is the gateway server. A gateway server enables
the monitoring of computers in untrusted domains.
--The agent collects data, compares sampled data to predefined values, creates alerts, and
runs responses.
--Every agent reports to a management server in the management group. This management
server is referred to as the agent's primary management server.
--Agents watch data sources on the monitored computer and collect information according to
the configuration that is sent to it from its management server.
--The agent also calculates the health state of the monitored computer and objects on the
monitored computer and reports back to the management server.
-- When the health state of a monitored object changes or other criteria are met, an alert can
be generated from the agent.
--This lets operators know that something requires attention. By providing health data about
the monitored object to the management server, the agent provides an up-to-date picture of
the health of the device and all the applications that it hosts.
-- A proxy agent is an agent that can forward data to a management server on behalf of a
computer or network device other than its host computer.
--For example, an agent that is installed on the physical node of an SQL cluster can be enabled
to act as proxy to monitor the cluster resource.
--Proxy agents enable monitoring of computers and devices on which an agent cannot be
installed. Those agents called Agentless Monitoring.
--On a monitored computer, the Operations Manager agent is listed as the System Center
Management Health service.
--The System Center Management Health service collects performance data, executes tasks,
and so on. Even when the service is unable to communicate with the management server it
reports to, the service continues to run and queues the collected data and events on the disk of
the monitored computer.
--When the connection is restored, the System Center Management Health service sends
collected data and events to the management server.
Note:- The System Center Management Health service is sometimes referred to as the health
service.
--The System Center Management Health service also runs on management servers.
-- On a management server, the System Center Management Health service runs monitoring
workflows and manages credentials.
--To run workflows, the System Center Management Health service initiates MonitoringHost.exe
processes using specified credentials.
--These processes monitor and collect event log data, performance counter data, Windows
Management Instrumentation (WMI) data, and run actions such as scripts
--Management servers also run the System Center Data Access service and the System Center
Management Configuration service.
--The System Center Data Access service provides access for the Operations console to the
operational database and writes data to the database.
--The System Center Management Configuration service manages the relationships and
topology of the management group. It also distributes management packs to monitored
objects.
management
--Management packs define the information that the agent collects and returns to the
management server for a specific application or technology.
--For example, the BizTalk Server Management Pack contains rules and monitors that collect
and evaluate events and operations that are important to ensuring the health and efficiency of
the BizTalk Server application.
--The management pack defines the types of objects, such as applications and features, that
will be monitored on computers that have been discovered by Operations Manager.
--Agents send data to the management server that identifies the instances of objects
discovered on the computer.
--The management server then sends the agents the elements of management packs that
apply to the discovered objects for each computer, such as rules and monitors.
--A rule defines the events and performance data to collect from computers and what to do
with the information after it is collected. A simple way to think about rules is as an If/Then
statement.
--For example, a management pack for an application might contain rules such as the
following:
If a message indicating that the application is shutting down appears in the event log,
create an alert.
If upload of a source file fails, collect the event that indicates this failure.
--As these examples show, rules can create alerts and collect events or performance data,
which the agent sends to the management server. Rules can also run scripts, such as allowing
a rule to attempt to restart a failed application.
--Discovered objects have a health state, which is reflected in the Operations console as green
(successful or healthy), yellow (warning), or red (critical or unhealthy).
--Monitors define the health states for particular aspects of the monitored object. For
example, a monitor for disk drive capacity might define green as less than 85 percent full,
yellow as over 85 percent full, and red as over 90 percent full.
--A monitor can be configured to generate an alert when a state change occurs.
2. Computers that meet the specified criteria and are not already managed are identified.
3. An Operations Manager agent is installed on the discovered computer.
4. The agent requests configuration data, and then the management server sends the
agent configuration data from installed management packs that includes classes to be
discovered. For example, if the Windows Server operating system management packs
are installed, the management server will send the agent the operating system classes.
5. The agent compares the configuration data to the computer, identifies any objects that
it discovers, and returns the information to the management server. For example, the
agent will return to the management server that an instance of Windows
Server 2008 R2 operating system is on the computer.
6. The management server sends the agent all monitoring logic from installed
management packs that applies to the discovered objects. For example, the agent will
receive all monitoring logic that applies to Windows Server 2008 R2.
7. The agent applies the monitoring logic, such as rules and monitors, runs workflows, and
returns data to the management server.
8. As changes occur to discovered objects, such as applications being added or
uninstalled, the agent sends the updated information to the management server, which
then sends updated monitoring logic.
Note:- Operations Manager can also discover and monitor network devices, computers running
UNIX and Linux operating systems, and provide agentless monitoring.
--The agent also sends events, performance, and state data to the primary management server
for that agent, which writes the data to the operational and data warehouse databases
simultaneously.
--The agent sends data according to the schedule parameters for each rule and monitor.
--For optimized collection rules, data is only transmitted if a sample of a counter differs from
the previous sample by a specified tolerance, such as 10%. This helps reduce network traffic
and the volume of data stored in the operational database.
--Additionally, all agents send a packet of data, called a heartbeat, to the management server
on a regular schedule, by default every 60 seconds.
--The purpose of the heartbeat is to validate the availability of the agent and communication
between the agent and the management server. For more information on heartbeats,
--For each agent, Operations Manager runs a health service watcher, which monitors the state
of the remote Health Service from the perspective of the management server.
--When you see both alerts, you know the computer cannot be contacted by the management
server.
--When you see only the heartbeat failure alert, you know the computer can be contacted but
there is a problem with the agent. Both alerts are closed automatically when heartbeats
resume.
Note:- By default, alerts for missed heartbeats and response to ping are disabled for client
operating systems. To receive alerts for client operating systems, override the Health Service
Heartbeat Failure and Computer Not Reachable monitors for the class Windows Client
Operating System to set the Generates Alert parameter to True.
--The health state for the agent-managed computer will change to critical (red) when
the Health Service Heartbeat Failure alert is generated.
--To view details for the health state, right-click the computer in Active Alerts, point to Open,
and click Health Explorer.
--The Availability node will be expanded to display the critical item. Click Health Service
Heartbeat Failure, and then click the State Change Events tab.
--You will see a list of state changes with the date and time of occurrence.
--Select any occurrence to display information in the Details pane. The health state will change
to healthy (green) when heartbeats resume.
--You can change the heartbeat interval for all agents and number of missed heartbeats for all
management servers in Settings in the Administration workspace, as shown in the following
illustration.
--You can also override the global heartbeat interval for individual agents and the number of
missed heartbeats for individual management servers by opening the properties for the
computer in Agent Managed or Management Servers in the Administration workspace.
--For example, you might increase the heartbeat interval for a computer that has a slow
connection to the network.
--A management server will not collect descriptions for events or publishers that are
present on an agentless managed computer but are not present on the proxy agent.
--The agent collects data, compares sampled data to predefined values, creates alerts, and
runs responses. A management server receives and distributes configurations to agents on
monitored computers.
--There are several methods you can use to install an Operations Manager agent on a
computer.
You can use the Discovery Wizard in the Operations console, sometimes called a push
installation. (All other methods are considered manual installations.) This method
works for computers running Windows, UNIX, and Linux operating systems.
You can run the Setup Wizard from the Operations Manager installation media and
install the agent directly on a computer running Windows.
You can install an agent directly on a computer running Windows, UNIX, and Linux
operating systems by using a command line.
--To install the agent by using the Discovery Wizard, firewall ports must be open on the agentmanaged computers. Also, you must have an account that is a local administrator on the
computer on which you want to install the agent.
--Agents that are installed by using the Discovery Wizard can be managed from the Operations
console, such as updating agent versions, applying patches, and configuring the management
server that the agent reports to.
--When you install the agent using a manual method, updates to the agent must also be
performed manually.
--You will be able to use Active Directory integration to assign agents to management groups
--The process of searching your environment is called discovery. One of the advantages of
using discovery is that it listsall manageable objects, including any that you might not be aware
of.
--The Discovery Wizard does not show computers that the management group is already
monitoring.
--If you are doing a phased rollout of your management group, you can run the wizard to add
new computers to the group. Also, after your initial deployment, you can use the Discovery
Wizard to add newly installed computers to be managed.
--When agents are pushed out to computers, System Center 2012 Operations Manager sends
credentials that have local administrator rights for that computer; this is required to install the
agent.
--If the Discovery Wizard is not right for your needs (for example, if you have a set list of
computers to which you want to deploy agents), you have the option of manually installing
agents on systems to be managed.
-- Agents can also be embedded in the host image of the monitored computer.
--Use the following procedure to discover computers running Windows and to deploy the
Operations Manager agent to the discovered computers from the Operations console.
*To install an agent on a computer running Windows by using the Discovery Wizard
1. Log on to the Operations console with an account that is a member of the Operations
Manager Administrators role.
2. Click Administration.
Note:- The Discovery Wizard links in the Operations console open the Computer and
Device Management Wizard.
b. In the Find Computers dialog box, type the criteria that you want to use for
discovering computers, and then click OK.
c. In the Domain list, click the domain of the computers that you want to discover.
If you want to browse Active Directory Domain Services or type the computer names, do
the following:
a. Select Browse for, or type-in computer names, click Browse, specify the
names of the computers that you want to manage, and then click OK.
b. In the Browse for, or type-in computer names box, type the computer
names, separated by a semi-colon, comma, or a new line. You can use NetBIOS
computer names or fully qualified domain names (FQDN).
o
Click Next, and on the Administrator Account page, do one of the following:
Click Discover to display the Discovery Progress page. The time it takes
discovery to finish depends on many factors, such as the criteria specified and
the configuration of the IT environment. If a large number (100 or more) of
computers are being discovered or agents are being installed, the Operations
console will not be usable during discovery and agent installation.
Note:- Computers that are already managed by the management group will not be
returned by the wizard.
o
Note:- If the task fails for a computer, click the targeted computer. The reason for the
failure is displayed in the Task Output text box.
d. Click Close.
--When you set up agentless monitoring of a computer, you select a proxy for each agentlessmanaged computer.
--Being configured as a proxy agent allows an agent to submit data on behalf of another
source.
--A management group can serve as a proxy, but this takes up system resources.
--You might also configure a computer to act as a proxy to support specific features of a
management pack.
--For example, the Active Directory Management Pack requires enabling domain controllers to
act as proxy agents.
Note:- If a proxy agent is removed from management, its agentless systems are no longer
managed.
-- Both the agentless-managed system and its proxy need to have access to the managing
server through any firewalls.
1. In the Administration workspace, click Agent Managed, right-click the computer, and
then click Properties.
3. On the Security tab, select Allow this agent to act as a proxy and discover
managed objects on other computers, and then click OK.
2. In the Management Server Properties dialog box, click the Security tab.
3. On the Security tab, select Allow this server to act as a proxy and discover
managed objects on other computers, and then click OK.
1. Log on to the computer with an account that is a member of the Operations Manager
Administrators role for the management group
.
2. In the Operations console, click Administration.
4. In the Agentless Managed pane, select the agentless-managed computers for which
you want to change the proxy agent, right-click them, and then select Change Proxy
Agent.
5. In the Change Proxy Agent dialog box, select the computer you want to be the new
proxy agent, and then click OK.