Você está na página 1de 92

User Guide

Page 1 of 92

Copyright 2009 DMX Technologies

Disclaimer
Information in this document is subject to change without prior notice. Companies, names and data used in examples herein are fictitious and for illustration purposes only, unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express permission of DMX Technologies. DMX Technologies may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. The furnishing of this document does not give external parties any license to these patents, trademarks, copyrights, or other intellectual property rights except as expressly provided in any written license agreement from DMX Technologies. DMX Technologies and Everest are trademarks of DMX Technologies Pte Ltd. All other brand and product names are trademarks or registered trademarks of their respective holders. Microsoft is a registered trademark of Microsoft Corporation. All other trademarks are the property of their respective owners. Document Code: Everest_Userguide

Page 2 of 92

Copyright 2009 DMX Technologies

Company Information
URL: http://www.dmxtechnologies.com/ Technical Inquiries: support.everest@dmxtechnologies.com Contact DMX 1401 Stanhope House, 738, Kings Road, Quarry Bay, Hong Kong Tel: +852 2520 2660 Fax: +852 2802 2062

Page 3 of 92

Copyright 2009 DMX Technologies

Table of Contents
1 2 2.1 2.2 2.3 2.4 3 3.1 4 4.1 4.2 5 5.1 About the Everest User Guide..........................................................................7 Introduction to Everest ...................................................................................8 Whats New in Everest? .......................................................................... 9 What are the Enhancements in Everest?.................................................. 11 Key Features of Everest........................................................................ 11 System Requirements .......................................................................... 13 Accessing Everest..........................................................................................14 Bringing up the Everest UI .................................................................... 14 Everest UI Framework...................................................................................15 User Interface Components................................................................... 15 Everest Menu Options .......................................................................... 18 Viewing Network Maps ..................................................................................22 Overview ........................................................................................... 22 5.1.1 Alarm Summary ........................................................................... 22 5.1.2 Performance Summary .................................................................. 23 5.1.3 Network Summary ........................................................................ 24 5.1.4 System Summary ......................................................................... 27 5.1.5 Historical Events Summary............................................................. 28 5.1.6 SQL Server Summary.................................................................... 30 5.1.7 Apache Server Summary ............................................................... 30 5.1.8 Domino Server Summary............................................................... 31 5.1.9 IIS Server Summary ..................................................................... 32 5.1.10 Exchange Server Summary ............................................................ 33 5.1.11 SLA Summary .............................................................................. 33 5.1.12 Cisco SAA Summary...................................................................... 35 5.1.13 Services Summary ........................................................................ 36 5.1.14 Syslog Summary .......................................................................... 36 5.1.15 Node Status Summary................................................................... 38 5.1.16 Oracle DB (Performance Summary)................................................. 39 5.1.17 Oracle DB (Physical Activity)........................................................... 41 5.1.18 Oracle DB Summary...................................................................... 41 5.1.19 WebLogic Summary ...................................................................... 42 5.1.20 Bookmark .................................................................................... 42 5.1.21 WebSphere Summary.................................................................... 43 5.1.22 Dotnet Summary .......................................................................... 44 5.1.23 Active Directory Summary.............................................................. 44 5.1.24 Tomcat Summary ......................................................................... 45 5.1.25 Jboss Summary ............................................................................ 46 5.1.26 Down Time Report Summary.......................................................... 46 5.1.27 Down Time Performance Summary.................................................. 47 Alarms View ....................................................................................... 48 Events View ....................................................................................... 53 Traps View ......................................................................................... 54 Syslog View........................................................................................ 57 Map View ........................................................................................... 60 5.6.1 Folder/Resource Connection ........................................................... 61 Copyright 2009 DMX Technologies

5.2 5.3 5.4 5.5 5.6

Page 4 of 92

5.6.2 5.6.3
5.6.3.1

Save ........................................................................................... 63 Other UI Operations ...................................................................... 64


Locate Area 64

5.6.4
5.6.4.1.1 5.6.4.1.2 5.6.4.1.3

UI View Options............................................................................ 64
Resource View........................................................................................ 64 Location View......................................................................................... 65 Domain View.......................................................................................... 66

6 7 7.1 7.2 8 8.1 8.2 8.3

Monitoring Performance Statistics ................................................................68 Working with Threshold Settings ..................................................................70 How Threshold helps to manage ............................................................ 70 Multiple Threshold Configurations........................................................... 70 Configuring Notifiers .....................................................................................71 What is Notification? ............................................................................ 71 Beeper .............................................................................................. 71 Escalation Mechanism .......................................................................... 72 8.3.1 Notifiers....................................................................................... 73 8.3.2 Monitor Messages ......................................................................... 73 8.3.3 Beeper ........................................................................................ 74 Pop-Up Notification.............................................................................. 74 Reports and Auto Reports .............................................................................76 9.1 Report Profiles .................................................................................... 79 9.1.1 Add Reports ................................................................................. 80 9.1.2 Edit Reports ................................................................................. 83 9.1.3 Delete Reports.............................................................................. 83 Auto Reports ...................................................................................... 84 9.2.1 Email Server Configuration ............................................................. 85 9.2.2 Send Immediately......................................................................... 87 9.2.3 Copy Reports ............................................................................... 87 PDF 87 Configure Reports ............................................................................... 88 Everest Graphs/Reports........................................................................ 90

8.4 9

9.2

9.3 9.4 9.5

Page 5 of 92

Copyright 2009 DMX Technologies

List of Figures
Figure 4.1-1: Everest User Interface Components ................................................................................ 15 Figure 5.1-1: Alarm Summary View....................................................................................................... 23 Figure 5.1-2: Performance Summary View ........................................................................................... 24 Figure 5.1-3: Network Summary View................................................................................................... 25 Figure 5.1-4: System Summary View.................................................................................................... 27 Figure 5.1-5: Historical Events View...................................................................................................... 29 Figure 5.1-6: SLA Summary................................................................................................................. 34 Figure 5.1-7: Cisco SAA Summary View............................................................................................... 35 Figure 5.1-8: Services Summary View .................................................................................................. 36 Figure 5.1-9: Syslog Summary View ..................................................................................................... 37 Figure 5.1-10: Node Status Summary................................................................................................... 38 Figure 5.1-11: Oracle DB Performance Summary ................................................................................ 40 Figure 5.1-12: Oracle DB Summary ...................................................................................................... 41 Figure 5.1-13: Bookmark....................................................................................................................... 43 Figure 5.1-14: Websphere Summary .................................................................................................... 43 Figure 5.1-15: Dotnet Summary ............................................................................................................ 44 Figure 5.1-16: Tomcat Summary........................................................................................................... 45 Figure 5.1-10: Down Time Report Summary......................................................................................... 47 Figure 5.1-11: Down Time Performance Summary............................................................................... 47 Figure -5.2-1: Alarms View .................................................................................................................... 49 Figure 5.3-1: Events View ..................................................................................................................... 54 Figure 5.4-1: Traps View ....................................................................................................................... 55 Figure 5.6-1: Map View ......................................................................................................................... 60 Figure 5.6.7-5.6-2: Resource Mapview ................................................................................................. 65 Figure Figure 5.6-3: Location Mapview ................................................................................................. 66 Figure 5.6-4: Domain Mapview.............................................................................................................. 67 Figure 5.6-1: Performance..................................................................................................................... 68 Figure 8.2-1: Beep Notifier..................................................................................................................... 71 Figure 8.3-1: Notifiers Alerts .................................................................................................................. 72 Figure 8.3-2: Monitor Messages............................................................................................................ 73 Figure 8.4-1: Pop-Up Notifier................................................................................................................. 74 Figure 8.4-1: Report .............................................................................................................................. 77 Figure 9.1-1: Report Profiles.................................................................................................................. 80 Figure 9.1-2: Add Statistical Reports ..................................................................................................... 81 Figure 9.2-1: Auto Report Profiles ......................................................................................................... 84 Figure 9.2-2: Email Server Configuration .............................................................................................. 86

Page 6 of 92

Copyright 2009 DMX Technologies

1 About the Everest User Guide


This guide is written for administrators and end-users of Everest to help them manage their network. The document provides an overview of the product and explains the different deployment methods that can be adapted. It also provides the basic steps involved in working with Everest. The document is intended to aid the users in understanding the core features of Everest and using them to achieve optimum efficiency in managing their network.

Page 7 of 92

Copyright 2009 DMX Technologies

2 Introduction to Everest
Everest is a powerful, and scalable solution helping users to manage their IT networks effeciently and cost effectively. It is an industry-leading carrier-class, fully scalable webbased solution for monitoring and controlling heterogeneous devices within a network. Networking equipment vendors and Service providers can rely on Everest for network management such as EMS and NMS. It manages networks taking into account the complex interdependencies between networks, resources and applications. By proactively managing critical IT Infrastructure, Everest ensures business agility for its users by anticipating problems, isolating performance issues, and allowing its users to manage change in real time, reducing operational costs, increases network resilience, and ultimately improves ROI. Everest's enhanced features can easily scale to meet the needs of the large enterprise networks. Using Everest helps deliver superior management solutions in a cost-effective, low-risk, and high-productivity model. Everest can also interoperate with existing Operational Support Systems (OSS) and Network Management Systems (NMS) by providing northbound and southbound interface such as CORBA and XML.

Page 8 of 92

Copyright 2009 DMX Technologies

2.1

Whats New in Everest?


a.

1. WMI: Enhancements include the following: Everest can monitor the different windows operating systems such as Windows 2000 Professional, Windows 2000 Advanced Server, Windows XP Professional edition, Windows 2003 Server Standard and Enterprise Editions and latest Windows Vista OS using WMI. Everest can monitor the various processes, applications (like J2EE applications, SAP applications), and services running in Windows systems. Everest can monitor Microsoft applications namely MS SQL Server 2005 Enterprise and Express Editions, Microsoft Exchange Server 2003, Microsoft Exchange Server 2007, and Vista Operating systems. Everest can discover the single IP or group of IP addresses, which are in same domain i.e. accessible by same username and password. WMI Polling architecture has been enhanced to support large number of nodes. User Interface for discovering single IP and group of IP addresses with options to include Performance and/or inventory information to be discovered and monitored at the same time

b. c.

d. e. f.

2. Cisco SAA: The Cisco SAA module in Everest allows the user to configure Cisco routers and monitor the SAA data available through them. The SAA features can be used to measure delay, jitter, and packet loss from deployed Cisco routers as agents to simulate customer end stations. These routers are referred to as delay and Jitter probes. Additionally, the Everest delay and jitter probes can be configured with remote monitoring (RMON) alarm and event triggers, once baseline values have been determined. This allows the delay and jitter probes to monitor the network for predetermined delay and jitter service levels and alert network management system stations when a threshold is exceeded. In Everest, the CISCO SAA module supports probes such as: Jitter, HTTP, VoIP Jitter, DNS, DHCP, Echo, APM, TCP Connect, and UDPEcho. 3. Application and Services Monitoring:
a.

MySQL Monitoring: Everest can monitor MySQL Servers, as well the Databases & Tables in them. Some of the parameters monitored for MySQL Servers are Threads Details, Query Cache Details, Temporary File Details, Key Efficiency Details, Table Locks Details, Traffic Information, Connection Details, Database Details, Table Details and so forth. U2 / DB2 Monitoring: Everest has been designed to learn and monitor the different performance parameters of IBM databases running on u2 servers (for Linux platforms) and db2 server (for Windows platforms). Services Monitoring: This module in Everest provides availability and performance monitoring of different services running on TCP/UDP ports such as HTTP, HTTPS, SMTP, SNMP, SNMP Traps, Apache etc. in the network. The services monitoring module can be extended to generate notifications and alerts, if the mail server or any specified attribute within the system has problems.

b.

c.

Page 9 of 92

Copyright 2009 DMX Technologies

4. Scheduled Discovery: Everest can be scheduled to automatically discover the network resources based on several configurable parameters such as Time, IP address and protocol filters specified by the user. Finally, Everest compares the results of such scheduled discoveries with the data from previous discoveries already available in its database. As a result, Everest groups the resources as New Resources (reachable but Not Monitored by Everest), Existing Resources (already monitored by Everest), and Non-existing Resources (Everest is polling but resource is not in the Network (non-reachable)). 5. Reporting:
a.

Nodeview: Enhancements include the following: Node view Options: All nodes can be classified into categories based on their functionality and the software running on them. Node view Configurations: Allows the user to customize or reset the Node View parameters. Extending Overview to build Node view Upgrading to Everest

b.

Reports: The Reporting system enhancements include: Reports configuration page - In-group type, graph size option is added in the form of a combo box having two options small and large. The user can select the size as per the requirement. There is a button provided at the top of each graph using which the user can maximize and minimize each report group. Once the user minimizes a particular report group, the next report group comes up automatically. By default, the Everest Reports module provides around 20 sample reports, which the user can copy, modify, and use. This will save considerable time and effort for the user. The user can configure the individual group reports using the configure button provided at the top of each graph. This opens the same graph in a pop-up window. The user can change the configuration and save it in the system under the same profile or can save the configuration as a New Report Profile using the Save as new report button. The Reporting module allows the user to convert the reports and the preconfigured auto-reports into PDF, so that the user can send these reports to any users or customers.

c.

IP View: The IP View shows the status of the network based on nodes discovered within the network. The screen displays the list of Nodes created by user based on the IP address along with the details such as Status, IP Address, Host Name, Node type, Alias, Description, Contact, Location and the Device Name.. The user can drilldown the IP address to view the individual node view page. Overview Enhancements: Includes the following User can copy the existing overview to new overview. User can be able to configure default (Resource/Location/Domain) path for the overview

d.

Page 10 of 92

Copyright 2009 DMX Technologies

2.2

What are the Enhancements in Everest?

The enhancements in Everest include the following: 1. RMON Probe Data Collection: Allows the user to monitor RMON traffic, and collect relevant statistics data from network segments and network devices based on Protocol distribution. 2. Syslog: Enhancements include the following:
e. f. g. h. i.

Notification for Syslog Messages - Provides the functionality for sending the notification for the Syslog messages. Syslog Page enhanced with graphs - Displays graphs for The Top 10 Most Faulty Sites and total Syslog received for the particular path level. Syslog Reports - Provides the report functionality for the Syslog resources. Syslog Notification Logs - Provide the details about the notified Syslog messages details. Syslog Summary (Overview) - Enhanced Syslog functionality in the overview page. This implementation is dependant on the performance.

3. Usability Changes (UI Enhancements): Everest supports the various changes in the user Interface that includes the Menu changes, Admin page layout, Admin left panel view, Views Configuration page, Flow diagrams, Reports Enhancements, Help and User Preferences Menu changes. 4. Technical Support Utility: This module helps the user to send any query to the Technical Support team. The user can also send the log files to be more specific about the query or the difficulty faced. The user can send a query to the Technical Support team both when Everest is running and not running. When Everest is running, the user can send the query by clicking Help > Contact Technical Support. Incase Everest is not running, and then the user can send the TSUtilConf.py file to the Tech Support team. 5. Map View: This module is designed as a graphical representation and control module of the monitored infrastructure, its imaging features have been significantly enhanced for a better view of the network resources, easy control of the topology elements, and flawless access to Everest screens. In Everest, there are 8 types of Folder Profiles, namely: Default, Bus, Ring, Router, Segment, Star, Subnet, Switch, and Workstation. 6. Trap View: The Trap view screen displays the history of all traps between the devices or resources in a network and the Everest system for each severity level, as indicated by color codes.

2.3

Key Features of Everest


Provides comprehensive, cost effective network management from a centralized location. Provides Integration Interfaces on par with Industry Standards to allow smooth integration of existing OSS system running in the Service Providers Environment Helps reduce operations costs using dependable, and scalable technology Versatile, Scalable and Extendable Fault Foresee-Find-Fix Mechanism
Copyright 2009 DMX Technologies

Page 11 of 92

Service Level Agreement (SLA) Management Facility Visually plan, manage network and achieve operational efficiency Supports Application Discovery, Fault Management, Threshold Definition, Configuration Management, Performance Management and Runtime Administration Helps reduce Operations complexity through remote and centralized network element administration Reporting Improves customer satisfaction and retention Offers secure and reliable network management Supports probes such as: Jitter, HTTP, VoIP Jitter, DNS, DHCP, Echo, APM, TCP Connect, and UDPEcho.

Page 12 of 92

Copyright 2009 DMX Technologies

2.4

System Requirements

Distributed Servers: Deployment 1: Presentation + Database Server in single system - Dual Xeon / P4 3.0 with 4GB RAM, 240GB HDD Database Collector - P4 with 1GB RAM, 40GB HDD Deployment 2: Everything will be in different system, with the requirements as specified below. Operating System & Database Server Data Collector Redhat Linux Enterprise 4 / 5 Windows 2003 Server Redhat Linux Enterprise 4 / 5 Windows 2003 Server MySQL 5.0.22 Database Server / Microsoft SQL Server 2005 Enteprise Edition SP2 Internet Explorer 6.0 SP2 and above Processor Memory Hard Disk Space 40 GB

Xeon / P-IV 3.0 GHz Xeon / P-IV 3.0 GHz Dual Xeon / P-IV 3.0 GHz

2 GB

Presentation Server Database Server

2 GB

40 GB

4 GB

240 GB

Client

Single Server: Deployment 1: Database Server - Dual Xeon / P4 with 4 GB RAM, 240 GB HDD Everest - Xeon / P4 with 2GB RAM, 80GB HDD Deployment 2: Everest + Database Server in single system - Dual Xeon / P4 3.0 with 4GB Contact support.everest@dmxtechnologies.com or local reseller for deployment requirements, license or technical support related queries. Note: For all users using Windows XP and Windows 2003, the user needs to disable the use of Pop-up Blocker by following the steps given below in order to display the pop-up windows available in Everest: 1. Open Internet Explorer. 2. Select Internet Options from the Tools Menu. 3. Select the Security Settings tab. 4. Click on the Custom Level button. 5. Select the Disable radio-button under the option Use Pop-up Blocker.

Page 13 of 92

Copyright 2009 DMX Technologies

3 Accessing Everest
3.1 Bringing up the Everest UI

The Everest User Interface gets displayed using the Internet Explorer 6.0 or higher version browser. When the user starts Everest, the user will be first prompted with the Sign In page as shown below. The user will have to enter the default user name and password to log into Everest System.

Figure Sign In (Login) Screen

Sign in using the User Name and Password provided to the user. By default, administrator and admin will be used as the username and password for the initial logins.

Note: It is suggested that the administrator password be changed for security reasons after the initial login session

Page 14 of 92

Copyright 2009 DMX Technologies

4 Everest UI Framework
4.1 User Interface Components

Everest provides a standard web based graphical user interface so that multiple users can log in and access the information simultaneously. It is supported with an intuitive and self-explaining toolbar and menu options that allow the user to navigate easily and access relevant information.

Figure 4.1-1: Everest User Interface Components

The screen is divided basically into Four sections, namely:

Page 15 of 92

Copyright 2009 DMX Technologies

Toolbar: The toolbar facilitates in switching between different sections with a single click on the tab. Menu Bar: The user can access the different menus and traverse through different available configuration in Everest through this Menu bar. Time Scale Options: These options allow the user to filter critical data and view overview, alarm, events, syslog, performance, and reports page based on different options available Main Panel: The Main Panel displays data based upon the filters applied in View Config Panel. Following are the tabs available under the tool bar: 1. Overview This is a configurable page, which can be used to access the status of monitored infrastructure. 2. Alarms / Events Everest generates alarms based on breach of preconfigured or customized thresholds and logs the records of all such instances in events. It provides the facility to incorporate additional information (comments) to events entries, facilitating the event escalation process. Everest can alert the designated personnel at once, even trigger self-remedy applications that automatically solve problems,thus helping the userr IT infrastructure to become reliable, efficient and unfailingly resilient. 3. MapView MapView shows the topological representation of the mapped network, in the form of logical views (Resource, Domain and Location) 4. Performance Measures the performance and availability of various network devices from different vendors based on different networking technologies. It shows the details such as Utilization / Throughput / Availability of the devices which are monitored. 5. SLA Everest provides SLA reports that can be customized based on different personnel at different levels and of varying areas of expertise for example, from the CIO down to network engineers, ensuring the SLA levels are high, in turn maintaining customer satisifaction. 6. Report Everest Reports module is a very powerful tool that provides information for capability planning or monitoring performance issues in the environment. Plotting data such as latency measurement from the emulated user, the CPU, memory, disk I/O of the servers, the network utilization and throughput information of the WAN connections in
Page 16 of 92 Copyright 2009 DMX Technologies

the same graph, for example, would be very useful in managing an e-business environment. With all relevant information plotted into a single graph, the user can easily associate different statistics information and isolate any potential bottlenecks in the infrastructure setup in the event of any performance situation. Time scale Options: The Time Scale options available in the left panel of the system is as shown below:

The Time Scale Options consists of the following parameters: Duration Calendar Custom

The user can click on these parameters to view the corresponding Time Scale options as described below: To set the Duration parameter: Click the Duration parameter in the Time Scale option section. The duration option list is as shown above. Clicking on the required option from the list displays the corresponding data in the right panel. To set the Calendar parameters: Click the Calendar parameter in the Time Scale option section. The Calendar window gets displayed in the left panel. Select the date or week or month for which the data is to be displayed. Then, the corresponding data gets displayed in the right panel. To set the Custom parameters: Click the Custom parameter in the Time Scale option section. The Start Time and End Time window gets displayed in the left panel. Click on the Calendar buttons to manually select the start and end date. Click on the Submit button. The corresponding data gets displayed in the right panel.

Page 17 of 92

Copyright 2009 DMX Technologies

4.2

Everest Menu Options

Everest has the following menu options:


Main Menu File Sub Menu Level 1 New Level 2 Current Window Overview Alarms Events Traps Syslog Map Performance SLA Reports Resource Servicedesk Netflow Config Mgmt Inventory

Convert to PDF Close Views Overview Inventory Home View Alarms Events Syslog Traps Map Performance SLA Reports Resource Service Desk Netflow Config Mgmt Inventory Patch Management Summary IP View Audit Trail

Page 18 of 92

Copyright 2009 DMX Technologies

Scheduled Discovery Tools Ping Trace Route SNMP Walk Telnet Remote Configurator Learn Discovery

Result Report

Common Resource Learn Automatic Discovery Topology Discovery Learn WMI Learn PDC Scheduled Discovery

RMON Syslog

Network Segment Network Device Add Resources Edit Resources Delete Resources ActiveDirectory Monitoring MySQL Monitoring DB2 Discovery Universe Server Discovery Universal Database Discovery Oracle 10g Database WebSphere Monitoring JBoss Monitoring Tomcat Monitoring Apache Monitoring

Application Discovery

CISCO SAA Netflow Configuration Download Configure User Account Accounts Preferences Groups Change Password Bookmark Overview Node View SLA Reports Location Domain

View Configuration

Page 19 of 92

Copyright 2009 DMX Technologies

Notifier

Alerts Methods Beeper Pop Up Monitor Messages Email Server Configuration GSM Modem Configuration Incidents Problems Customer Information Products and Services Reports Search Email Server Configuration GSM Modem Configuration Upload CSV Auto Report Profiles Mail Server Configuration AMC Vendors Software Type Software Category Reports Patch Management Summary Patch Management System Group Patch Group Patch Storage Path WSUS Config Software Deployment Agent Management Agent Schedule Discovery Agent Profile

Service Desk

Auto Reports Inventory

Patch Management

Agent

Syslog Netflow Services Config Business Hours CFG Upload UI Upload Manage Process Config Change Name Port Configuration Host Configuration Debug Settings LogQuery Poller Control

Page 20 of 92

Copyright 2009 DMX Technologies

Remote Process

Debug Settings LogQuery Restart Upgrade

System Upgrade License Upgrade Everest Parameters Database Backup Restore Configuration

RESTART Application Memory Dump Everest Details License Details Resource Details Process Details Thread Status Remote Process Status Database Status

Help

Online Help Contact Technical Support About Everest

Page 21 of 92

Copyright 2009 DMX Technologies

5 Viewing Network Maps


5.1 Overview

The Overview screen provides a birds eye perspective of the monitored network infrastructure. This screen provides links for the following 14 types of views in the left panel: 1. Alarm Summary 2. Performance Summary 3. Network Summary 4. System Summary 5. Historical Events Summary 6. SQL Server Summary 7. Apache Server Summary 8. Domino Server Summary 9. ISS Server Summary 10. Exchange Server Summary 11. SLA Summary 12. Cisco SAA Summary 13. Services Summary 14. Oracle DB (Performance Summary) 15. Oracle DB (Physical Activity) 16. Oracle Db Summary 17. WebLogic Summary 18. Node Status Summary 19. Bookmark 20. WebSphere Summary 21. Dotnet Summary 22. Active Directory Summary 23. Tomcat Summary 24. JBoss Summary 25. Syslog Summary 26. Down Time Report Summary 27. Down Time Performance Summary

By default, the Overview tab displays the Alarm Summary screen. The user can choose to view the particular summary view by clicking the corresponding link under Views.

5.1.1 Alarm Summary


To view the Alarm Summary screen, click the Alarm Summary link in the Views panel. The Alarm Summary screen gets displayed as shown below:
Page 22 of 92 Copyright 2009 DMX Technologies

Figure 5.1-1: Alarm Summary View

The Alarms Summary displays the following details: Map View: Displays the topological representation of the managed or monitored devices within the network infrastructure. Most Faulty Nodes: Displays the list of the most faulty nodes with the number of alarms for each severity type. Latest Alarms: Displays the latest list of the top 10 alarms raised within the complete network / specific folder / node. Most Faulty Sites: Lists the most faulty sites with the number of alarms for each severity type. In the root level or folder level, the window displays the most faulty folders.

Note: The user can view the Node View page of a particular Resource or Node by clicking on the resource or the Node name in the windows.

5.1.2 Performance Summary


To view the Performance Summary, click the Performance Summary link in the Views panel. The Performance Summary screen gets displayed as shown below:
Page 23 of 92 Copyright 2009 DMX Technologies

Figure 5.1-2: Performance Summary View

Network Performance: Displays the Average value of the statistics, such as Throughput, Utilization, Utilization In, and Utilization Out of the network available under the selected folder path. System Performance: Displays the Average value of the system statistics, such as CPU Utilization, Memory Utilization, Disk Utilization, and Free Disk Space of the network available under the selected folder path. Availability: Displays the Average value of statistics, such as Network Availability, Resource Availability, Application Availability, and Database Availability of the network available under the selected folder path. Network Performance Distribution, System Performance Distribution and Availability Distribution screens provide the graphical representation of the performance values.

Note: This screen also indicates the severity status of the devices corresponding to the statistics.

5.1.3 Network Summary


To view this screen, click the Network Summary link in the Views panel. The Network Summary screen gets displayed as shown below:

Page 24 of 92

Copyright 2009 DMX Technologies

Figure 5.1-3: Network Summary View

Top Traffic Sites: Lists the top 10 sites with regard to their traffic statistics, such as Utilization, Throughput, Network Availbility, Utilization In, Utilization Out, Error Rate, and Overflow Rate. Top Nodes by Traffic: Lists the top 10 Nodes with regard to their traffic. It also provides the % value of the statistics, such as Utilization and Throughput of the nodes.

Page 25 of 92

Copyright 2009 DMX Technologies

Top Interfaces by Traffic: Lists the top 10 Interface Resources with regard to their traffic. It also provides details, such as Utilization and Throughput of the nodes. Worst Available Interfaces: Lists the top 10 Nodes and their corresponding Resources with regard to their availability. It also provides details on the Network Availability of the nodes. Worst available Nodes with Interfaces: Lists the top 10 Nodes with regard to their availability. It also provides details on the Network Availability of the nodes. Top Nodes by Error: Lists the top 10 Nodes with regard to their Error Overflow Rate. It also provides details, such as Error Rate and Overflow Rate of the nodes. Top Interfaces by Error: Lists the top 10 Nodes and their corresponding Resources with regard to their Error Overflow Rate. It also provides details, such as Error Rate and Overflow Rate of the nodes. In the above screen the user can click on the Table Title or the table values to drill-down the corresponding report. When the user clicks the table value, the following sample screen gets displayed:

In the screen, the user has clicked the Network Availability statistics of the Taiwan folder. This a Adhoc report. The report displays the list of Top N resources available within the selected folder along with the Average, Minimum and Maximum values of the selected statistics. The report also displays the Filters, Statistics Type, Graph Type, Top N values, Resolution, Scale, and Size of the report. All these parameters are displayed as dropdown options. The report also displays the Red and Yellow threshold values.

Page 26 of 92

Copyright 2009 DMX Technologies

The user can change any of the above mentioned report parameters and can save it as a new report profile using the Save as New Report button.

Note: The Table title and Table Value drill-down option is made available in most of the Summary screens. If the user clicks the individual statistics, then the Threshold values are applicable. If the user clicks the group statistics (i.e, the statistics name from the table) then the thresholds are not applicable.

5.1.4 System Summary


To view this screen, click the System Summary link in the Views panel. The System Summary screen gets displayed as shown below:

Figure 5.1-4: System Summary View

System Sites Summary: Lists the top 10 sites with regard to system statistics, such as CPU Utilization, Memory Utilization, Disk Utilization, and Free Disk Space. Top CPU Nodes: Lists the top 10 nodes with regard to CPU Utilization. It also provides details on the CPU Utilization of the nodes. Top Memory Nodes: Lists the top 10 nodes with regard to Memory Utilization. It also provides details on the Memory Utilization of the nodes.
Page 27 of 92 Copyright 2009 DMX Technologies

Top Disk Utilization Nodes: Lists the top 10 nodes with regard to Disk Utilization. It also provides details on the Disk Utilization of the nodes. Worst Disk Space Nodes: Lists the worst 10 nodes with regard to Disk Space. It also provides details on the availability of free disk space in the nodes in GBytes.

5.1.5 Historical Events Summary


To view this screen, click the Historical Events Summary link in the Views panel. The Historical Events Summary screen gets displayed as shown below:

Page 28 of 92

Copyright 2009 DMX Technologies

Figure 5.1-5: Historical Events View

Most Faulty Sites: Displays the list of the most faulty sites with the number of alarms for each severity type. Most Faulty Nodes: Displays the list of the most faulty nodes with the number of alarms for each severity type.

Page 29 of 92

Copyright 2009 DMX Technologies

Most Faulty Resources: Displays the list of the most faulty resources with the number of alarms for each severity type. Site Distribution: Graphically represents the events details.

5.1.6 SQL Server Summary


This screen presents vital details of SQL Server running on the monitored device. To view the SQL Server Summary screen, click the SQL Server Summary link under the Views panel. The SQL Server Summary screen gets displayed as show below:

Figure 5.1-6: SQL Server Summary View

The SQL Server Summary screen displays the following details: SQL Server System Summary: Shows the details, such as Database Availability, CPU Utilization, Memory Utilization, Disk Utilization, Free Disk Space, and Throughput, of the machine where the SQL Server is running. SQL Server Cache: Shows the cache summary of the system where SQL Server is running. SQL Server Disk Usage: Shows the disk usage details of the SQL Server, such as Data File(s) Size, Log File(s) Size, and Percent Log Used. SQL Server Memory: Shows the memory usage details of the SQL Server, such as Connection Memory, Maximum Workspace Memory, and Lock Memory. SQL Server Connections: Shows details about the users who connected to the SQL Server, such as User Connections, Logins, and Logouts.

5.1.7 Apache Server Summary

Page 30 of 92

Copyright 2009 DMX Technologies

This screen displays details about Apache Server, the system on which Apache is running, Apache server client, and performance of the system. To view the Apache Server Summary screen, click the Apache Server Summary link in the View panel. The Apache Server Summary screen gets displayed as shown below:

Figure 5.1-7: Apache Server Summary View The Apache Server Summary screen displays the following details: Apache Server System Summary: Shows the details such as Apache Application Availability, Apache Health, Apache Outage, Throughput, and Response Rates. Apache Server Information: Shows details about Apache Server, such as Apache Application Availability, Apache Health, Apache Outage, and Response Rates. Apache Server Client Information: Shows details such as Client Connected and Client Request. Apache Server System Performance: Graphically presents information, such as Apache Outage and Apache Application Availability.

5.1.8 Domino Server Summary


This screen displays details about the system where Domino Server is running, its performance, and mail and memory information. To view the Domino Server Summary screen, click the Domino Server Summary link in the View panel. The Domino Server Summary screen gets displayed as shown below:

Figure 5.1-8: Domino Server Summary View


Page 31 of 92 Copyright 2009 DMX Technologies

The Domino Server Summary screen displays the following details: Domino Server System Summary: Shows the details, such as Domino Application Availability, CPU Utilization, Domino Disk Utilization, Resource Availability, Device Availability, and Free Disk Space, of the system where Domino Server is running. Domino Server System Performance: Shows the performance details, such as Domino Disk Utilization, CPU Utilization, and Resource Availability, of the system where Domino Server is running. Domino Server Mail and Memory Information: Shows the details, such as Dead Mail, Routing Failure, Waiting Mail, Free Memory, and Swap Memory File Size.

5.1.9 IIS Server Summary


This screen displays details about the IIS Server. To view this screen, click the IIS Sever Summary link in the View panel. The IIS Sever Summary screen gets displayed as shown below:

Figure 5.1-9: ISS Server Summary View The IIS Server Summary screen displays the following details: IIS Server Summary: Shows vital details about the IIS Server, such as IIS Application Availability, IIS Health, IIS Outage, File Cache Hits, and File Cache Misses. IIS Server System Summary: Shows the system information such as IIS Health and IIS Outage.
Page 32 of 92 Copyright 2009 DMX Technologies

IIS Server Cache Summary: Shows cache details of the IIS Server, such as File Cache Hits and File Cache Misses. IIS Server Distribution: Graphically presents the IIS Server details, such as IIS Application Availability and IIS Outage.

5.1.10 Exchange Server Summary


This screen displays the information about the Exchange Server and the system where it is running. To view this screen, click the Exchange Server Summary link in the Views panel. The Exchange Sever Summary screen gets displayed as shown below:

Figure 5.1-10: Exchange Server Summary View The Exchange Server Summary screen displays the following details: Exchange Server System Summary: Shows the system details such as Exchange Application Availability, Exchange Health, Exchange Outage, and Average Delivery Time. Exchange Server Delivery Time Summary: Shows the delivery time details of the Exchange server, such as Average Delivery Time and Average Local Delivery Time. Exchange User/ Client Summary: Shows the list of users and clients connected to the Exchange Server. It shows details such as Active Client Logons and User Count. Exchange System Distribution: Graphically presents details such as Exchange Application Availability, Exchange Health, and Exchange Outage.

5.1.11 SLA Summary


To view the SLA screen, click the SLA link in the Views panel. The SLA overview screen gets displayed as shown below:

Page 33 of 92

Copyright 2009 DMX Technologies

Figure 5.1-6: SLA Summary

The SLA Summary screen has four sections: SLA Summary: The SLA Summary shows the percentage of SLA statistics (both breached and not breached). There are four levels of threshold value: Breached, Alert, Warning, and Information. The threshold values of these 4 levels are in increasing order respectively. Breached SLA: Breached SLA displays only breached SLA statistic in tabular format. It displays the Resource and SLA Summary. SLA Statistics: As the name suggests, this report displays current statistics according to four pre-defined parameters, i.e.,1. Conformance, 2. Non-Conformance, 3. unknown, and 4. and outage. The Number of Conformance Points and Number of NonConformance Points are reset based on the SLA Monitoring Interval. Template: The template SLA report shows the summary of each of the SLA templates.

Note: The color of the Pie chart represents different levels of threshold severity. Clicking on SLA Configuration tab, the user can configure the new parameter and define the required parameters.

Page 34 of 92

Copyright 2009 DMX Technologies

5.1.12 Cisco SAA Summary


To view the Cisco SAA Summary screen, click the Cisco SAA Summary link in the Views panel. The Cisco SAA Summary overview screen gets displayed as shown below:

Figure 5.1-7: Cisco SAA Summary View

The Cisco SAA Summary screen displays the following details: Jitter Performance: Displays the Average value of the Jitter statistics, such as Jitter Availability, Forward Packet Loss (%), Backward Packet Loss (%),Forward Jitter, Backward Jitter, and Jitter Response. DHCP Performance: Displays the Average value of the DHCP statistics, such as DHCP Availability, and DHCP Response. DNS Performance: Displays the Average value of the DNS statistics, such as DNS Availability, and DNS Response. Echo Performance: Displays the Average value of the Echo statistics, such as Echo Availability, and Echo Response. TCP Performance: Displays the Average value of the TCP statistics, such as TCP Availability, and TCP Response.

Page 35 of 92

Copyright 2009 DMX Technologies

5.1.13 Services Summary


To view the Services Summary screen, click the Services Summary link in the Views panel. The Services Summary overview screen gets displayed as shown below:

Figure 5.1-8: Services Summary View

The Services Summary screen displays the following details: HTTP, FTP, SMTP, SSH, Telnet, SNMP, MYSQL and NTP services monitored. Each table displays the statistics such as Availability (%) and Establishment Time (msec) for each of the services monitored. These statistics values are displayed as Average, Minimum and Maximum values.

5.1.14 Syslog Summary


To view the Syslog Summary screen, click the Syslog Summary link in the Views panel. The Syslog Summary screen gets displayed as shown below:

Page 36 of 92

Copyright 2009 DMX Technologies

Figure 5.1-9: Syslog Summary View

The Syslog Summary displays the following details: Most Faulty Sites: Lists the most faulty sites with the number of alarms for each severity type. In the root level or folder level, the window displays the most faulty folders. Most Faulty Syslog Nodes: Displays the list of the most faulty syslog nodes with the number of alarms for each severity type. Latest Syslog Messages: Displays the latest list of the top 10 syslog messages raised within the complete network or within the specific folder or node. Syslog Summary Chart: The Syslog Summary chart is represented in the form of a PieChart, which shows the percentage of Syslog statistics. There are four levels of threshold value: Information, Warning, Minor and Major. The threshold values of these 4 levels are in increasing order respectively. Syslog Severity Graph: The Syslog Severity graph is represented in the form of a Stack Bar graph, which shows the percentage of Syslog statistics stacked one upon the other. There are four levels of threshold value: Information, Warning, Minor and Major. The threshold values of these 4 levels are in increasing order respectively.

Page 37 of 92

Copyright 2009 DMX Technologies

Note: The user can view the Syslog reports page of a particular Resource or Node by clicking on the resource or the Node name in the windows.

5.1.15 Node Status Summary


Click the Node Status Summary link in the Views panel. The Node Status Summary screen gets displayed as shown below:

Figure 5.1-10: Node Status Summary

The Node Status Summary displays the alarm status of each node in a pictorial form that Everest is monitoring. Additionally Everest provides filter capabilities that help in finding a problem node. An exhaustive mouse over option describes the node in detail. Furthur drill down option allows user to visit the Node View of the corresponding node. Following features are avaialble in the Node Status Summary Page: Classification of Node based on their group: Nodes are classified and grouped into various classes by Everest based on their properties. Classes include Router, Switch, Device, Server, NT, Cisco and Linux. By Default all nodes are displayed. Selecting a class from the list and clicking Go displays only the nodes belonging to that specific class. Classification based on the alarm status: User can filter Nodes based on their Alarm status using these filter criteria. Select Show Alarm Nodes and click Go to display only nodes with any alarm. Blink: User can set the option to make the node blink to represent a recent alarm condition in it. User can set the blink duration to as less as 5 min, 15 min, 30 min and even 1 hour.

Page 38 of 92

Copyright 2009 DMX Technologies

Alarm Type: User can provide the alarm description in this filter to get the desired result. For example, Device Down or Packet Loss High, the exact match of the Alarm description is to be given to filter accordingly. Filter By: User can select IP Addr, Host Name or Alias from the list and specify the corresponding value in the box provided next to it and click Go to apply the filter.

5.1.16 Oracle DB (Performance Summary)


To view the Oracle DB Performance Summary, click the Oracle DB Performance Summary link in the Views panel. The summary screen gets displayed as shown below:

Page 39 of 92

Copyright 2009 DMX Technologies

Figure 5.1-11: Oracle DB Performance Summary

Page 40 of 92

Copyright 2009 DMX Technologies

The Oracle DB Performance Summary displays the detailed Database Information, OS Statistics, Instance activity for a session, user and CPU classified into different tables and finally Instance Efficiency percentage.

5.1.17 Oracle DB (Physical Activity)


To view the Oracle DB Physical Activity, click the Oracle DB (Physical Activity) link in the Views panel. The summary screen gets displayed as shown below: Screenshot It displays the Oracle DB physical activities such as Instance Activity Physical Read, Load Profile, and Time Model Statistics.

5.1.18 Oracle DB Summary


To view the Oracle DB Summary, click the Oracle DB Summary link in the Views panel. The summary screen gets displayed as shown below:

Figure 5.1-12: Oracle DB Summary

Page 41 of 92

Copyright 2009 DMX Technologies

It collects various parameters of the Oracle DB and displays in a single page. The parameters include Library/Dictionary Cache, Services, Shared Pool Statistics, SGA Memory Summary, Cache Sizes, Table Space, Instance Activity Rollback, and other miscellaneous information.

5.1.19 WebLogic Summary


To view the WebLogic Summary, click the WebLogic Summary link in the Views panel. The summary screen gets displayed as shown below:

The screen displays wide range of information about WebLogic in a single view, including WebLogic Server Availability information, WebLogic Server Information, Server Queue Status, JDBC Summary, EJB Summary, JVM Summary, JMS Summary and Servlet Summary.

5.1.20 Bookmark
It helps in specifying a bookmark. Bookmark Configurations act as shortcuts for the user to access any URL using Everest. These Bookmarks can be configured using Configure Book Mark option provided in Overview. The administrator can assign any URL to any Users in Everest. Multiple Configurations can be added to the same Category. Once the
Page 42 of 92 Copyright 2009 DMX Technologies

configurations are added, they get displayed in the Overview in Tabular form. The Name of the Configuration is a link that takes the user to the URL assigned.

Figure 5.1-13: Bookmark

According to the screenshot, Goggle and Yahoo are links that can be used to directly access the URLs. The User displays the Everest Users to whom these URLs are assigned.

5.1.21 WebSphere Summary


To view the WebSphere Summary, click the WebSphere Summary link in the Views panel. The summary screen gets displayed as shown below:

Figure 5.1-14: Websphere Summary

Page 43 of 92

Copyright 2009 DMX Technologies

The screen displays WebSphere statistics including, its availability, Bean Summary, System Summary, JDBC Pool Summary, JVM Summary, Servlet Summary, Thread Pool Summary and Transaction Summary.

5.1.22 Dotnet Summary


To view the Dotnet Summary, click the Dotnet Summary link in the Views panel. The summary screen gets displayed as shown below:

Figure 5.1-15: Dotnet Summary

The screen displays Dotnet statistics including its Thread Summary, Memory Summary, Locks Summary, Exception Summary, Jit Summary, Security Summary and Application Summary.

5.1.23 Active Directory Summary


To view the Active Directory Summary, click the Active Directory Summary link in the Views panel. The summary screen gets displayed as shown below:

Page 44 of 92

Copyright 2009 DMX Technologies

The screen displays the AD Statistics including, its availability, Performance Counter, LDAP Information and DRA Information.

5.1.24 Tomcat Summary


To view the Tomcat Summary, click the Tomcat Summary link in the Views panel. The summary screen gets displayed as shown below:

Figure 5.1-16: Tomcat Summary

The screen displays the Tomcat Statistics including, its application availability, Cache Information, Data Source Information, Garbage Collector information, Request Processor information, Thread Pool Information, Session information, VM Memory Pool information, VM Threading Information.

Page 45 of 92

Copyright 2009 DMX Technologies

5.1.25 JBoss Summary


To view the JBoss Summary, click the Jboss Summary link in the Views panel. The summary screen gets displayed as shown below:

The screen displays the Jboss statistics including, its availability, EJB Summary, Cache Summary, JVM Summary, its Servlet and Sessions Summary, Thread Pool and Transaction Summary, Request Processor Summary and JCA Pool Summary.

5.1.26 Down Time Report Summary


To view the Down Time Report Summary screen, click the Down Time Report Summary link in the Views panel. The Down Time Report Summary screen gets displayed as shown below:

Page 46 of 92

Copyright 2009 DMX Technologies

Figure 5.1-17: Down Time Report Summary

The Down Time Report Summary displays the following details: Down Time Report: Displays the list of devices that are currently down in the selected time scale.

Note: The user can filter the list of devices displayed based on the Node, Node Type and Alarms Types using the filter options provided.

5.1.27 Down Time Performance Summary


To view the Down Time Performance Summary screen, click the Down Time Performance Summary link in the Views panel. The Down Time Performance Summary screen gets displayed as shown below:

Figure 5.1-18: Down Time Performance Summary

The Down Time Performance Summary displays the following details:

Page 47 of 92

Copyright 2009 DMX Technologies

Down Time Performance: Displays the list of devices that are down in the selected time scale.

Note: The user can filter the number of devices displayed based on the Top value using the filter option provided.

5.2

Alarms View

The Alarms screen displays all the alarms raised by Everest when a breach in the configured thresholds level occcurs. Alarms are displayed along with their corresponding severity level. The user can view the alarms for all the resources by clicking the Alarms tab. The Alarms screen gets displayed as shown below:

Page 48 of 92

Copyright 2009 DMX Technologies

Figure -5.2-1: Alarms View

The Alarms page displays the alarms based on color-coded severity levels:
Severity Level 1 2 3 4 Description Informational Warning Error Serious Error Inactive (Not currently polled) Status Indicator Green Yellow Orange Red Gray

Page 49 of 92

Copyright 2009 DMX Technologies

Navigation: To view the alarms raised for a particular resource, select the resource in the navigation panel. The complete path of the alarm list gets displayed at the top left corner of the Alarm screen. The user can select the path under which the user want to view the alarms by clicking on the directory structure in the Navigation panel. Time Scale Option: Refer to Time Scale Options defined in the UI Components section for more details. View: The enhanced Alarms screen in Everest allows the user to select from four predefined Alarms Views: Resource View (shows all alarms/events based on resources learnt), Location View (shows alarms/events based on location selected), Domain View (shows alarms/events based on domain selected), and Node View ( shows alarms/events based on all resources within the node). By default, the page displays the resources under All Nodes. The user can also view the resources under a particular node by selecting the Node from the drop-down box. The page also displays the number of alarms for each severity type. The number for each severity is provided as a link in the right-hand top corner. The user can click on these links to view list of alarms sorted based on the severity type. In the view panel, the page displays the list of list alarms for the selected time scale with details such as the Status, Type (i.e, Dependant alarms or Individual alarms), Time Stamp, Node, Resource, Description, Current Value, Reset Value, and Options.

Note: Reset Value displays the point where the Threshold will comeback to normal.

The user can click on the icon under the Type column to view the Dependants Alarms page as shown below:

Page 50 of 92

Copyright 2009 DMX Technologies

The option icons include the Add Comment, Diagnose, Delete and Add Incident. The user can use the Add Comment option to comment about a particular alarm. The user can add comment to a particular alarm using the Add comment option. But, a comment once added cannot be deleted. When the user clicks the Diagnose option, the Choose Diagnostic Method window gets displayed as shown below:

Page 51 of 92

Copyright 2009 DMX Technologies

The user can select the required diagnose option and then click the submit button. The SNMP option comes only for the SNMP enabled resources. For more details regarding the Diagnostic Methods refer the Everest Troubleshooting Guide. Similarly, the user can use the Delete option to delete alarm(s). For more details regarding the Add Incident option, refer the Service Desk module. In the alarms the page, the user can click the resource path link to view the statistical page of the respective resource. Filter Criteria: The user can filter the alarms based on two options: Node Type, Resource Type and IP Range. The user can also filter the alarms based on the option radio buttons: Root Alarms and All Alarms.

To add or edit the Resource Type or IP Range filter criteria Click the Edit button corresponding to the Resource Type or IP Range. The Add/Edit window pops up. In the Add/Edit drop-down box, select the resource name. In the Filter Name field, enter a filter name. In the Filter Value field, enter the range of IP addresses to be used for the filter criteria.
Page 52 of 92 Copyright 2009 DMX Technologies

Click Add/Edit to save the criteria or Cancel to discard the criteria.

Note: The user can select the radio button to either display the Root Alarms or All Alarms.

5.3

Events View

The Events view screen displays the history of all the alarms raised and cleared i.e. resource being down and then back up by Everest for each severity level, as indicated by color codes, whereas the Alarms view shows only the current Alarms raised by Everest. To view the events raised for all the resources Click the Alarm tab on the main toolbar. The Alarms screen gets displayed. In the Alarms screen, select Events from the Event Type drop-down menu. The Events view screen gets displayed as shown below:

Page 53 of 92

Copyright 2009 DMX Technologies

Figure 5.3-1: Events View

Note: The user can also view the Events page using the Navigation panel as explained in the Alarms View.

Customization of the events view page is similar to the procedures explained in the Alarms view.

5.4

Traps View

The Traps view screen displays the history of all the traps between the devices or resources in a network and the Everest system for each severity level, as indicated by color codes.

Page 54 of 92

Copyright 2009 DMX Technologies

To view the Traps raised for all the resources In the Views menu, click Traps. Else, click the Alarms tab on the main toolbar. The Alarms screen gets displayed. In the Alarms screen, select Traps from the Event Type drop-down menu. The Traps view screen gets displayed as shown below:

Figure 5.4-1: Traps View

Note: The user can also view the Traps page using the Navigation panel as explained in the Alarms View.

In addition, the user can view Traps for the selected resource based on the following:

Page 55 of 92

Copyright 2009 DMX Technologies

Time Scale Option: Refer to Time Scale Options defined in the UI Components section for more details. Filters: The user can apply the following filters for the Trap: View Type: From the drop-down menu, select a view type, i.e., Resource View, Location View, or Domain View. Node Type: Specify the Node for which the user want to view the Trap. IP Range: Specify the IP Range for which the user want to view the Trap. The user can Edit the IP Range by clicking the Edit button. The user can enter multiple IP Addresses separated by semicolon (for example, 192.168.1.1;192.168.2) or a range of IP Addresses separated by hyphen (192.168.1.1-100). Trap Type: Select the type of Trap from the drop-down box that includes options such as Generic Type, Cold Start, Warm Start, Link Down, Link Up, Authentic Failure, egpNeighbour Loss, and Specific Type.: Traps: The user can specify the Traps either Configured Traps or Non Configured Traps to be displayed. (Configured Traps are those fetched based on the Resources configured for Traps. Non Configured Traps are those fetched by Everest irrespective of the configurations.) To apply the filter criterias: Resource Type and IP Range: Click the Edit button corresponding to the Resource Type or IP Range. The Add/Edit window pops up. In the Add/Edit drop-down box, select the resource name. In the Filter Name field, enter a filter name. In the Filter Value field, enter the range of IP addresses to be used for the filter criteria. Click Add/Edit to save the criteria or Cancel to discard the criteria. Trap Type: Select the type of Trap from the drop-down box and click the Submit button. The Trap corresponding to the type selected gets displayed in the right panel. The Trap View page displays the details such as Status, Time Stamp, IP Address, Host Name, Resource, Generic Type, Specific Type, Message and Options.

Note: The above-mentioned details are displayed only for resources discovered using Everest. For all other undiscovered resources, these informations are not displayed and only Time-stamp, IP address, Generic Type, Specific Type, and Message is available.

Page 56 of 92

Copyright 2009 DMX Technologies

5.5

Syslog View

Syslog is a protocol that allows a device to send event notification messages to event message collectors (also known as syslog servers) across IP networks. As processes, applications and operating systems were written independently, the content of syslog messages varies significantly. Because of syslog's simplicity, no stringent coordination is required between the transmitters and the receivers. Transmission may be started on a device without a receiver being configured or even actually physically present. Conversely, many devices are likely able to receive messages without prior configuration or definitions. All these have greatly aided the acceptance and deployment of syslog. Everests Syslog module provides complete support for the collection of syslog messages sent from any device within the monitored infrastructure. It provides support for both RFC3164 and non-RFC syslog messages. Everest also has Windows Event Log Collector, which collects and manages event log messages from Windows systems. To view the Syslog screen From the Views menu, click Syslog. The Syslog screen gets displayed as shown below:

Page 57 of 92

Copyright 2009 DMX Technologies

Figure 5.5: Syslog

Note: The user can also view the Syslog page using the Navigation panel as explained in the Alarms View.

In addition, the user can view Syslogs for the selected resource based on the following: Time Scale Option: Refer to Time Scale Options defined in the UI Components section for more details. View Type: From the drop-down menu, select a view type, i.e., Resource View, Location View, or Domain View. Filters: Select the appropriate filters for the Syslog. The user can apply the following filters for the Syslog: Node Type: Specify the Node for which the user want to view the Syslogs.
Page 58 of 92 Copyright 2009 DMX Technologies

IP Range: Specify the IP Range for which the user want to view the Syslogs. The user can Edit the IP Range by clicking the Edit button. The user can enter multiple IP Addresses separated by semicolon (for example, 192.168.1.1;192.168.2) or a range of IP Addresses separated by hyphen (192.168.1.1-100). Current Hour: Select the period for which the user want to view the Syslogs. The user can edit this field by clicking the Edit button. Event ID: Specify the event ID. To edit this field, click the Edit button. Event Type: Select the Event Type from the drop-down menu. To edit this field, click the Edit button. Message: Enter any word by which the user want to filter the Syslog message. This field supports wild characters. The user can edit this field by clicking the Edit button. Source: Specify the application whose Syslog messages the user want to view. The user can edit this field by clicking the Edit button. Category: Specify the category of the application the user selected in the Source filter option. This is applicable only for Windows. The user can edit this field by clicking the Edit button. User: Specify the current user of the system. This is applicable only for Windows. The user can edit this field by clicking the Edit button.

To add or edit the Filters Click the Edit button corresponding to the Filter option. The Edit window gets displayed In the Filter Name text box, add a name for the filter. In the Filter Value text box, add the corresponding value for the filter. For example, for the IP Range filter option, the user can enter multiple IP Addresses or a range of IP Addresses as the Filter Value. Click Add/Edit button to add or edit the filter or Cancel to discard the changes. Clicking Delete will remove the filter. For sorting of alarms / events/ traps / syslogs based on severity, click on the corresponding color tab, ex. Clicking the red tab with a numerical on it at the Alarms page displays only Serious Error Alarms i.e alarms with the red marker to be listed in the page. This is applicable at Alarms, Events, Traps and Syslog pages. After sorting a operation, to return to the screen where all severity alarms/ events/ traps/ syslog are to be displayed as per the page chosen, click the TOTAL link next to the colored severity tabs. This will display all Alarms currently present at the Alarms / all events present at the events page. This is also applicable for traps and syslogs. Clicking any of the tabs Alarms, Events, Traps and Syslog just above the colored tabs opens the corresponding page i.e. if the Syslog tab is clicked while the user is at the

Page 59 of 92

Copyright 2009 DMX Technologies

Alarms page, the Syslog page with all syslogs as per the relevant time scale filter and severity are displayed immediately.

5.6

Map View

In Everest, Map View is designed as a graphical representation and control module of the monitored infrastructure, its imaging features have been significantly enhanced for a better view of the network resources, easy control of the topology elements, and flawless access to Everest screens. Map view helps the user to navigate through the different levels of the mapped infrastructure. Map View basically consists of the following kinds of graphical representations, namely: Linear Topology, Ring Topology and Star Topology. The user can see the Mapview screen by clicking the Map tab in the Toolbar. By default, the Map View screen displays all the devices connected to each other in the Linear pattern as shown below:

Figure 5.6-1: Map View

The Map view screen displays the Mapped Infrastructure, Alarms generated, and the user option buttons. The user can perform various actions, such as Add Image & Icon, Delete Image & Icon, Folder Connection, Resource Connection, Refresh, and Save.

Page 60 of 92

Copyright 2009 DMX Technologies

Map View being a graphical representation of the infrastructure being monitored and managed, it allows the user to fully take advantage of its sophisticated visual customization tools. Foremost of such tools is the utility to choose map backgrounds, network icons and backdrops, and the ability to drag and position elements anywhere around the map area as the user see fit to best simulate the actual infrastructure being represented. In Everest, there are 10 types of Folder Profiles, namely: 1. Default 2. Bus 3. Circle 4. Ring 5. Router 6. Segment 7. Star 8. Subnet 9. Switch 10. Workstation
Note: If the user selects the profile type as Default, then the user has the option of selecting the type of view, i.e. Linear or Circular in the filter options. For all other profiles selected, this option is disabled in the filter options. If the user is opening the Map for the first time, then Everest checks the profile type. If it is default, then it checks for the connections between the folders. If there are connections, then the Map view gets displayed in the Circular pattern. Else, if there are no connections, then the Map view gets displayed in the linear pattern.

The user can select the profiles by right clicking the folder and then selecting the edit properities option. Based on the Folder profile selected, the Map View displays the following graphical representations: If the user select a star folder profile, then all the Resources of a Node are displayed in the Star Topology. If the user select a Router or Switch folder profile, then the Map View displays the Router/Switch with the connected IPs (all are in the same folder) in the star Topology with the Router/Switch as centric. If the user select a subnet folder profile, then the Map View displays the Linear Topology with the Router/Switch as centric.

5.6.1 Folder/Resource Connection


In any real time network, resources will be interconnected and related. The Folder Connection in Everest allows the user to graphically represent these interconnections and relations between folders and resources. The Folder Connection feature helps the user draw connections between folders and between the resources in those folders.
Page 61 of 92 Copyright 2009 DMX Technologies

To draw a connection between folders and resources In the Map screen, select the folders the user want to connect. The user can connect only two folders at a time. Keep the mouse pointer over Connections icon and choose Add from the drop-down menu. A pop-up message gets displayed asking whether the user want to add or change any resource level connection. Click OK. The Add Resource to Resource Connection window opens, displaying all resources in the selected folders.

Note: Clicking Cancel just draws a line between the folders, not between the resources in the folders.

In the Add Resource-to-Resource Connection window, select a resource each from the two folders and click the Add button. To add connections between many resources, repeat this step. From the Folder Statistics radio buttons, select Avg, Max, or Sum. Note: Selecting Avg shows the average utilization value of the resources level connections within the folders; Max shows the maximum utilization value of the resources level connections within the folders; and Sum shows the total utilization value of the resources level connections within the folders, on mouse over. In the above screen, the user can choose the following options by selecting or unselecting the checkboxes for the following parameters: Resource Status When both the resources are selected When only one resource is selected When both the resources are not selected The status of the connection is based on the resource with higher severity The status is based on the status of the resource selected The status of the connection will appear GREEN in the Map view screen, if the polling of the resources is enabled. The status of the connection will appear GREY in the Map view screen, if the polling of any resource is disabled. Resource Statistics The Statistics of the connection is based on the higher Utilization value of the two resources. The Statistics of the connection is based on the Utilization value of the selected resource. Then the Utilization appears as Not Available (N/A) in the Map view screen

Any resource is selected or not

Then the Utilization appears as Not Available (N/A) in the Map view screen

Note: If the Utilization value is not available for one of the resources in the connection, then also the Utilization appears as Not Available (N/A) in the Mapview screen.

Page 62 of 92

Copyright 2009 DMX Technologies

Similarly, the other options available in the Everest system w.r.t Folder Status and Folder Statistics are as described below: Folder Status When all the checkboxes are selected If any check box for Folder Status is unchecked If any check box of Folder Statistics is unchecked It is based on the Resource Status. Then the status of that connection will not be included to represent at folder level. It will be calculated for checked connections only. For example, out of 4 resource level connections if only 3 Folder Statistics are checked then the Avg utilization of Folder level connection will be the sum of utilization of 3 resource level connections divided by 3 (not 4). The same principle applies to Max, and Sum. The color of folder level connection will be GREY. Folder Statistics It is based on the Resource Statistics.

If Folder Status check boxes of all the resource level connections are unchecked If Folder Statistics check boxes of all resource level connections are unchecked When the color of all resource level connections are GREY

Utilization of folder level connection will be N/A.

Then the color of folder level connection will be also GREY.

Utilization will be N/A.

Click the Save button to save the folder connections. Note: The severity color code of the line drawn between the folders/resources are based on the higher severity of the resource-resource connection.

5.6.2 Save
To save any changes that has been done to the Mapview screen, click the Save button. The user can change the position of the icons from the default view. This change can be

Page 63 of 92

Copyright 2009 DMX Technologies

saved by clicking the Save button in the Mapview screen. This enables the user to view the same configuration when the user revisit the page.

5.6.3 Other UI Operations


5.6.3.1 Locate Area

The Locate Area is a feature similar to the search function. The Map options has a dropdown menu that lists all the resources and folders in the current map. The user can select any node/resource in the drop-down menu and the corresponding resource will be searched in the current map and will be highlighted within a black box.

5.6.4 UI View Options


The Mapview screen in Everest allows the user to select from three predefined Alarms View and Events View options, namely: Resource View Location View Domain View (shows alarms/events based on all sub folders within the domain)

5.6.4.1.1

Resource View

The user can view the topological mapping of all the resources by selecting Resource View from drop-down list. The Resource view gets displayed as a graphical representation of topology mapping between all the resources that are monitored. The Resource Mapview page looks as shown below:

Page 64 of 92

Copyright 2009 DMX Technologies

Figure 5.6.7-5.6-2: Resource Mapview

In the above screen, each object represents the resources that are learned by Everest. The Resource View has the following characteristics: Each Symbol represents the state of a particular resource. The user can mouse over the symbol to view the details of the resources. Each resource has an appropriate color depending on the maximum severity of the resources under it.

The Zoom option is available for the Resource view as a horizontal bar with increasing / decreasing magnification.
5.6.4.1.2 Location View

The user can view the number of resources for all the nodes by selecting the Location View from the drop-down list. The Location Mapview page looks as shown below:

Page 65 of 92

Copyright 2009 DMX Technologies

Figure Figure 5.6-3: Location Mapview

In the above screen, the sub-lines are the configured location views. The Location View has the following characteristics: Each Symbol represents the state of a particular node. The user can mouse over the symbol to view the details of the nodes. Each sub-line has an appropriate line color depending on the maximum severity of the nodes under it. The sub-lines are alternating in structure i.e. if one sub-line is drawn to the right, the next line is drawn to the left of the main line.

5.6.4.1.3

Domain View

The user can view the number of nodes for all the resources by selecting the Domain View from the drop-down list. The Domain Mapview screen gets displayed. The Domain Mapview screen looks as shown below:

Page 66 of 92

Copyright 2009 DMX Technologies

Figure 5.6-4: Domain Mapview

The features of the Domain mapview page is very similar to the Location Mapview.

Note: Mouse-over options in the left panel are available only for Resource view in the filter. Also the filter options for RESOURCE VIEW are not applicable for LOCATION & DOMAIN VIEW options in the Map view page

Page 67 of 92

Copyright 2009 DMX Technologies

6 Monitoring Performance Statistics


The Performance screen provides vital information about the behavior of the monitored network devices. It displays information, such as availability, error rate, throughput, utilization and response time of communication links, servers and applications, and other statistics. In addition, the user can view performance details of resources based on Time, View Type, and Filters. To view the Performance screen, in the Views menu click the Performance link.

Figure 5.6-1: Performance

Navigation Panel: Navigation panel helps the user traverse through different nodes / subnets and view the details in the main page. Time Scale Option: Refer to Time Scale Options defined in the UI Components section for more details. View Type: It helps the user to switch between different views - Resource / Domain / Location views . For example, when the Location view is selected, the alarms path and the tree structure visible in the navigation panel are all changed to Location view. Filter Options: Using the Filter options, the user can filter performance details to be displayed in the main page. The user can filter based on tyope of view (Resource View, Location View, Domain View), Node types (Linux, Windows, Cisco routers , HP switches, etc), the type of resource (CPU , DISK , Memory), performance of the nodes existing in

Page 68 of 92

Copyright 2009 DMX Technologies

the specific IP Address or IP address range, Performance parameters (Health, Network Trafic, Server, Application, SQL Server) and Statistics value options (as discussed below). Once an option is selected, the filter is applied and the user can see the specific performance-related statistics. The user can edit the filter options by clicking the Edit button. Statistics related to the Performance Parameters are: Health: Availability Network Traffic: Throughput In, Throughput Out, Utilization and Network Availability. Server: Utilization and Free Space Application: Application Availability and Application Utilization. SQL Server: Data File Size, Percentage Log Used, and Cache Hit Ratio. Statistical Value options: The user can select to view Average, Worst, or Threshold statistics, which need to be displayed in the Performance screen. Average: Takes the average of all the statistics that satisfy the view and filter criteria. Worst: Takes the maximum of all the statistics that satisfy the view and filter criteria. For Availability and Disk space, this is taken as the minimum. Threshold: Takes the percentile of the number of resources whose average is more than a configured threshold (configured in the system configuration).

Note : The thresholds discussed in the performance applies only to performance view page. This setup is not applicable across Everest.

Page 69 of 92

Copyright 2009 DMX Technologies

7 Working with Threshold Settings


7.1 How Threshold helps to manage

By configuring the threshold, the user can enable performance degradation notifications that aid in network planning and preventive maintenance. The user can configure a threshold setting for a system through the appropriate menu item in the GUI at runtime. When the system performance crosses the threshold setting, a notification is generated to alert the user of the degraded performance.

7.2

Multiple Threshold Configurations

The user can proactively manage resources using events and performance tracking based on thresholds settings. The user can configure the threshold settings for any resource individually or as a group, provided the resources are of the same profile (CFG file).

Page 70 of 92

Copyright 2009 DMX Technologies

8 Configuring Notifiers
8.1 What is Notification?

Everest allows the user to subscribe to the types of events for which they want to be notified. When the defined type of event occurs, Everest will notify the user through a notification method that the user would have configured, such as Email, DOS Batch file, SMS, Beep, SNMP trap, BatchNotifierAPI, or an XML notification. Everest notification system is very flexible. The email/SMS formats and DOS batch files are definable on a subscription-by-subscription basis. Beside using email or running user-defined batch files, it is possible to receive notifications via a mobile phone (SMS) or a pager (depending on the services offered by the user mobile phone and pager operators), set off beep chimes on a workstation, receive POP notifications through the Pop-Up Notification Client and set an SNMP trap.

8.2

Beeper

To view the beeper notifier client In the Configure menu, choose Notifier > Beeper. The Beep Notifier screen gets displayed as shown below:

Figure 8.2-1: Beep Notifier

Notification by beep is executed as an alarm chime, which will sound off on the workstation of the associate user (the Everest user whose user ID is associated with the beep notification) after a defined event condition occurs.

Page 71 of 92

Copyright 2009 DMX Technologies

Note: Ensure that the Everest Beep Notifier Client is activated and kept active to enable the execution of beep alarms. To enable this, select Configure Menu -> Notifier -> Pop Up. As soon as it is activated, DO NOT minimize or close the client window. Otherwise the user may not hear all the beep alarms. The color (GREEN /YELLOW /ORANGE /RED) in the animation corresponds to the severity status (NORMAL or INFORMATION / WARNING/ ERROR/ SERIOUS ERROR) of the beep notification, respectively.

8.3

Escalation Mechanism

The Everest system allows the user to Add/Edit/Delete notification methods. To view all the predefined Notification alerts In the Configure menu, choose Notifier > Alerts. The Notifier Alerts page gets displayed as shown below:

Figure 8.3-1: Notifiers Alerts

The Notifier screen depicts the Notifier Alerts details such as Name, Type, Severity, Severity Type, Path Name, Notifier Type, Delivery Option and Method Name. The user can also perform several actions such as Add Notifier (types such as Event, Syslog and Trap), Edit Notifier, Delete Notifier, view Notifier Methods corresponding to the Notification, can Monitor Messages, Enable/Disable Notifier Alerts and view the Beeper. The configuration actions such as Add Notifier, Edit Notifier, Delete Notifier are explained in detail in the Everest Admin Guide. These user actions such as view Notifier Methods Monitor Messages and Beeper are described in detail below:

Page 72 of 92

Copyright 2009 DMX Technologies

8.3.1 Notifiers
The user can view the list of notifier alerts by clicking on the Notifiers button in the Notifiers Methods page.

8.3.2 Monitor Messages


To view or monitor the list of notificationmessages sent from Everest Click the Monitor Messages button in the Notifier Alerts screen or in the Configure menu, choose Notifier > Monitor Messages. The Messages screen will be displayed as shown below:

Figure 8.3-2: Monitor Messages

The Messages screen displays the Msg ID, Time Stamp, different Notifiers, their status, and the Notifier Description. The user can select a particular message and click the Acknowledge button to send an acknowledgement for that notification or message. Also, the user can filter out messages by entering a part of the description in the Description field and clicking the Go button to view the required messages. user can type in keywords such as: Latest in the Description field, which then displays only the latest messages in the page.

Page 73 of 92

Copyright 2009 DMX Technologies

8.3.3 Beeper
Refer to section 8.2 for more details.

8.4

Pop-Up Notification

To view the pop-up notifier client

Note: The user can use the pop-up notifier client, only after configuring the Pop-up Notifier Method. For more details regarding the configuration of the Pop-up Notifier Method, refer the Everest Admin Guide.

In the Configure menu, choose Notifier > Pop-Up. The Pop-Up Notifier screen gets displayed as shown below:

Figure 8.4-1: Pop-Up Notifier

To view the Pop-Up Notification after a defined event condition occurs, the user should open the Pop-up Notification window as explained above and keep the window minimized. On the occurance of a defined event condition, the pop-up window flashes displaying the details of the newly occurred event. The user can choose to view the individual notifications or the clubed notifications in the pop-up window during the Popup Notificationh Method configuration.

Page 74 of 92

Copyright 2009 DMX Technologies

Note: Ensure that the Everest Pop-up Notifier Client is activated and kept active to enable the execution of pop-up alarms.

Page 75 of 92

Copyright 2009 DMX Technologies

9 Reports and Auto Reports


Reporting is an important function in any infrastructure management system. Everest has enhanced this capability, allowing the user to define the frequently viewed resource statistics to be saved in report profiles. The Reports module allows the user to specify the kind of information the user need and it presents complete details about the monitored resource in a user-friendly graph. With all relevant information plotted into a single graph, the user can easily associate different statistics information and isolate any potential bottlenecks in the infrastructure setup in the event of any performance situation. Reports in Everest allow users to graphically or even numerically understand the state of the various monitored resources within the network thus helping to avoid sudden and untoward events within the monitored network. Users are provided options to view available data through a wide range of graphical formats, filtering options relevant to time scale and resolution. Everest provides users the ability to quickly create new reports or customize the set of pre defined reports through an easy to use interface. To view the Reports Click the Reports tab in the main toolbar. The Report Profiles screen gets displayed as shown below:

Page 76 of 92

Copyright 2009 DMX Technologies

Figure 8.4-1: Report

The screen is basically divided into two parts i.e. the Left Panel and the Right panel. In the left panel, the user can view the following: Time Scale Option: User can avail these options to quickly filter out data as per requirements as shown below:

Page 77 of 92

Copyright 2009 DMX Technologies

The Time Scale Options consists of the following parameters: Duration Calendar Custom

The user can click on these parameters to view the corresponding Time Scale options as described below: To set the Duration parameter: Click the Duration parameter in the Time Scale option section. The duration option list is as shown above. Clicking on the required option from the list displays the corresponding data in the right panel. To set the Calendar parameters: Click the Calendar parameter in the Time Scale option section. The Calendar window gets displayed in the left panel. Select the date or week or month for which the data is to be displayed. Then, click the Submit Button to display the corresponding data in the right panel. To set the Custom parameters: Click the Custom parameter in the Time Scale option section. The Start Time and End Time window gets displayed in the left panel. Click on the Calendar buttons to manually select the start and end date. Click on the Submit button. The corresponding data gets displayed in the right panel.

Filter Options:

Page 78 of 92

Copyright 2009 DMX Technologies

Report Type: Everest provides 20 different graph types to aid the user in viewing the reports as per their choice of graphical format. For more information on Graph Types, see Everest Graphs/Reports. Top N : Everest allows the user to view All, Top 1, Top 4, Top 10, or Top 20 reports using this option. Select Resolution: Everest allows the user to select the Minute, Hour, Day or Month resolution in addition to the time scale options to retrieve required data using this option. In the right panel, the user can view the configured individual Reports under the Cisco Switch Reports and buttons such as Report, Edit Report and PDF. In each individual Report, the user can see the three buttons, namely: Open in new window and Minimize. Modify,

The user can use the above-mentioned filter options to modify any report. If the user wants to modify only a particular section of the report, click the Modify button of the report section, apply the filters, and click the Submit button.

Note: The above-described Report Filter Options are common for all report profiles.

To configure the individual reports refer section 9.4 for more details. Similarly, the user can maximize or minimize the report view using the corresponding button.

9.1

Report Profiles

In the Default Report Profile screen, click the Report button in the Configure menu, choose View Configuration > Reports. The Report Profiles screen gets displayed as shown below:

Page 79 of 92

Copyright 2009 DMX Technologies

Figure 9.1-1: Report Profiles

This screen lists all the available reports. From the Report Profiles screen, the user can view individual Reports as well as add, edit, delete or even copy existing report and customize it. In addition, the user can create Auto Reports and schedule these reports to be sent via email or store them in specified path to be viewed later. To view a Report Profile, click the report profile name.

9.1.1 Add Reports


To add reports In the Report Profiles screen, click the Add Report button. The Add Reports screen gets displayed as shown below:

Page 80 of 92

Copyright 2009 DMX Technologies

Figure 9.1-2: Add Statistical Reports

Enter the appropriate parameters in the Add Statistical Reports screen. See the table given below for more details regarding the parameters. Parameter Report Type Report Profile Name User Description Select the type of report from the drop-down list. Assign a unique name to represent this report profile. Select either Public or Private from the drop-down menu. If the user selects Public, the report will be visible for all users of Everest. If the user selects Private, only select users will be able to view the report. The user can select the users by clicking the Browse button, which would list all available user accounts of Everest. Click the Browse button to select the Portal User. The Portal Users will see the reports assigned to them. Select any one of 3 views from the drop-down list. This will display report data based on the view selected. Resource View is selected by default. Select either Alias or Path to be displayed with the Report.

Portal User View

Path Format

Page 81 of 92

Copyright 2009 DMX Technologies

Resources /Folders

Enter the complete path name of the resource(s) or folder(s) whose data is to be viewed in this report else, click the Browse button to display the directory tree from which to select the resources/folders. Click the Close button after selection of resource or folder or click Clear button to remove the selection. Select the time scale for which the report is to be displayed. By default the value is set to Last 60 min. Assign the filter and/or combination of filters to be used displaying the report. Or click on Browse button to display and select the required filter options and operators. Click on the Close button to collapse the directory tree or click on the Clear button to remove the selection. Assign a unique name for the group of statistic that the particular resources support. Set the default report to any of the following listed options: Area Time Bar Time Current Vs Future Current Vs History Data Table Distribution Donut Events Events Summary Horizontal Bar Patterns Percentile Area Time Pie Stack Bar Time Stack Distribution Stack Bar Distribution Summary Table Trending Time Vertical Bar

Time Scale Filters

Group Statistics Name Default Report

Statistics

Provide statistics whose data is to be included in the report else, click the Browse button to display the directory free from which to select the statistics. Click the Close button to collapse the directory tree or click the Clear button to remove the selection. Click the drop-down list to select any of the following Group Type:

Group Type

Page 82 of 92

Copyright 2009 DMX Technologies

Statistical Spilt show graphs with plots as per statistics Resource Split show graph with plots according to selected resource Single Graph = show each graph individually Multiple Graph show multiple graphs as a single report Chart Size Click the drop-down menu and select any of the following: Small Large Thresholds Enter the threshold parameters for Red Threshold and Yellow Threshold. Note: Based on the Red and the Yellow Threshold values, the Polarity is decided. If the Red Threshold is greater than the Yellow Threshold, then the Polarity is positive. Else, the Polarity is negative. Click Add to add the report. Repeat the procedure to add more reports.

Note: To delete the added report, select the added report from the list and click the Delete button. The user can edit the report by selecting it and clicking the Edit button.

Click OK to save the report or Cancel to discard the report.

9.1.2 Edit Reports


To edit an existing Report In the Report Profiles screen, select the Report Profile that needs to be edited. Click the Edit Report button. The Edit Report Profile screen gets displayed. All the fields in this screen are editable. For more information about the fields in this screen, see Add Statistical Reports Parameters. Edit the Report Profile as per changes required and click OK to save the changes or Cancel to discard the changes.

9.1.3 Delete Reports


To delete an existing Report

Page 83 of 92

Copyright 2009 DMX Technologies

In the Report Profiles screen, select the Report Profile that needs to be deleted and click the Delete Report button. The Confirm Delete Reports Profiles screen gets displayed. Click Yes to confirm the deletion or No to discard the deletion. Once the user clicks Yes, the Report Profile will be deleted from the Report profile list.

9.2

Auto Reports

The Reports feature in Everest allows the user to generate and send Report Profiles automatically to anyone through email, or to a folder. To view the Auto Reports screen Click the Auto Reports button in the Report Profiles screen or in the Configure menu, choose Auto Reports > Auto Report Profiles. The Auto Report Profiles screen gets displayed as shown below:

Figure 9.2-1: Auto Report Profiles

If the user has added any Auto Report Profiles, those profiles will be listed in this screen. From this screen, the user can add, edit, or delete Auto Reports. In addition, the user can configure the Email Server through which autoreports will be sent as well as use the send immediately option as the name implies to send configured autoreports immediately.

How to Add AutoReports In the Report Profiles screen, click the Auto Reports button or in the Configure menu, choose Auto Reports > Auto Report Profiles. The Auto Report Profiles screen is displayed. In the Auto Report Profiles screen, click the Add Auto Report button. The Add Auto Reports screen is displayed as shown below:

Page 84 of 92

Copyright 2009 DMX Technologies

Enter a name for this report and select the target typet as Email or folder (provide the email address to which the Auto Report has to be sent if the target type was chosen as Email, else provide the complete folder path in which autoreport is to be stored if target type was chosen as Folder).

Note: Multiple email addresses are supported in the target field, however ensure that they are separated by . i.e. a comma separator.

Select one or more Report and Overview Profiles using the Browse button. Schedule the time and frequency in at which the auto report is to be generated and sent. Click OK to add the Auto Report Profile or Cancel to discard it.

9.2.1 Email Server Configuration


The user can configure the email server settings to automatically send the Auto Reports through email. To configure Email Server In the Auto Report Profiles screen, click the Email Server Configuration button or in the Configure menu, choose Auto Reports > Mail Server Configuration. The Email Server Configuration screen gets displayed as shown below:

Page 85 of 92

Copyright 2009 DMX Technologies

Figure 9.2-2: Email Server Configuration

Enter the appropriate parameters in the Email Server Configuration screen. See the table given below for more details regarding the parameters. Parameter Primary Email Server SMTP Server Email From Login Name Enter the IP address or the domain name of the SMTP server that Everest can use to send the email. Enter the email address of the sender that is acceptable to the SMTP server. Enter the login name for supporting the SMTP server. This field is optional, if the SMTP server does not require any authentication. Enter the password for supporting the SMTP server. This field is optional, if the SMTP server does not require any authentication. Description

Password

Alternate Email Server SMTP Server Enter the IP address or the domain name of the alternative SMTP server that Everest can use to send the email. This will be used only when the primary server fails. Enter the email address of the sender that is acceptable to the alternative SMTP server. Enter the login name for supporting the alternative SMTP server. This field is optional, if the SMTP server does not require any authentication. Enter the password for supporting the alternative SMTP server. This field is optional, if the SMTP server does not

Email From Login Name

Password

Page 86 of 92

Copyright 2009 DMX Technologies

require any authentication. Click Ok to save the Email Server settings or Cancel to discard the settings.

9.2.2 Send Immediately


With properly configured email server settings, user can select an Autoreport Profile to be sent to specified email address or have the profiles generated in a specified folder in PDF format immediately To use the Send Immediately feature, select one or more profiles from the Autoreport Profile page. Click on Send immediately button to have the selected autoreports. A message Successfully generated Autoreport would be displayed on successful completion of the send immediately operation

9.2.3 Copy Reports


Everest provides a large number of pre defined reports, which can be copied and modified, thus aiding different users to view reports as per their requirements.
To use Report Templates

In the Report Profiles screen, select a sample report. Click the Copy Reports button. A copy of the selected sample report opens. All the fields in this screen can be edited as per user requirements. In the Report Profile Name field, enter a unique name for the report. To add more such reports, click the Add button and repeat the above-listed procedure. For more information on other fields, See Add Statistical Reports Parameters. Click OK to save the report settings or Cancel to discard the settings.

9.3

PDF

Everest allows the user to convert the reports and the pre-configured auto-reports into PDF format, since PDF files are smaller in size making it easy to view the reports or even email them to managers, customers or other everest users.
To publish a report as PDF

In the Report Profiles screen, click the report the user wants to convert into PDF. The report screen opens.
Page 87 of 92 Copyright 2009 DMX Technologies

Click the Export to pdf button available on the top-right corner. The report opens as a PDF file, which the user can save.

9.4

Configure Reports

To configure the individual reports In the Report screen, click the the individual reports. (Open in New Window) button, which is seen above

The Report Configuration screen gets displayed in a new pop-up window as shown below:

Enter the appropriate parameters in the Report Configuration screen. See the table given below for more details regarding the parameters. Parameter Resource / Folders Statistics Description Select the resources / folders from the navigation path displayed that will get added to the upper text field. Here, the user will get only the list of statistics, which are related to the selected resources. Select the statistics from the list to be added to the upper text field. The name of the individual report selected for configuration gets displayed.

Report Name

Page 88 of 92

Copyright 2009 DMX Technologies

Report Category Filters

Enter the report category name. Select the Change Filters link to select the new filters to be added to the report. Select the Clear button to remove the filters. Click the drop-down menu and select any of the following Group Type: Statistical Spilt Resource Split Single Graph Multiple Graph

Type

Top 4

Click the drop-down menu and select any of the following: Show All Top 1 Top 4 Top 10 Top 20

Scale

Click the drop-down menu and select any of the following: All Hour Business Hours Non-Business Hours

Graph

Select the type of graph from the following: Area Time Bar Time Current Vs Future Current Vs History Data Table Distribution Donut Events Events Summary Horizontal Bar Patterns Percentile Area Time Pie Stack Bar Time Stack Distribution Stack Bar Distribution Summary Table Trending Time Vertical Bar

Page 89 of 92

Copyright 2009 DMX Technologies

Resolution

Click the drop-down menu and select any of the following: Minute Hour Day Month

Size

Click the drop-down menu and select any of the following: Small Large

Thresholds

Enter the threshold parameters for Red Threshold and Yellow Threshold. Note: Based on the Red and the Yellow Threshold values, the Polarity is decided. If the Red Threshold is greater than the Yellow Threshold, then the Polarity is positive. Else, the Polarity is negative.

Click on the Submit button to save the changes.

To save as new Report Enter the above-discussed parameters in the configuration page and click on the Submit button to save the changes. The new Graph with the saved changes gets displayed below the configuration options. Click the Save as new report button to save the graph as a new report profile, following which the new Report profile name gets displayed in the left panel.

9.5

Everest Graphs/Reports

Everest supports the following types of graphs/reports: Area Time: The Area Graphs are an extension of the trending graphs. Instead of plotting single statistics information, area graphs plot a group of statistics information, which are related to one another. A typical usage of Area Graph is in the Protocol Distribution, where the Area Graphs will provide the total amount of data passing through together with the ratio information. Bar Time: A Bar Graph is a chart with blocks whose lengths are proportional to the quantities (variables) they represent. Although bar graphs are also applicable to single statistics, they are best used for multiple statistics, where several blocks (in contrast to a single piece for single statistics) represent each specific statistic, providing a visual comparison of the individual values.

Page 90 of 92

Copyright 2009 DMX Technologies

Current Vs Future: The Current Vs Future Graph provides visual reports that compare present and expected future performances by extrapolation. Future extrapolation provides an informed performance forecast, thus laying the basis for predicting and preventing any infrastructure problem. Current Vs History: The Current Vs History Graph provides visual reports that compare graphs present and past performances by extrapolation. Comparing historical and current behaviors helps the user to determine any previous service degradation. Data Table: The Data Table Report tabulates the statistics data based as per 3-minute average. Distribution: A Distribution Graph is a histogram, or a specialized graph used to plot statistics with the independent variable plotted along the horizontal axis, and the dependent variable (any statistic) plotted along the vertical axis. The independent variable can attain only a finite number of discrete values (in the sample graph, the values are 0-10%, 10-20%, 20-30%, up to 90-100% ranges) rather than a continuous range of values. The dependent variable can span a continuous range. This presents a general picture of the network load. Donut: A Donut Graph is a specialized chart used to plot statistics, with the independent variable plotted around a circle in a counterclockwise direction, and the dependent variable (values in percentage) rendered as an arc whose measure is proportional to the magnitude of the quantity. Donut graphs show the percentage of the related statistics within a group. A typical use for the Donut graph is to visually illustrate protocol distribution. Events: The Events Report provides data that help in keeping track of Everest events (e.g., breach in threshold settings). Events Summary: The Events Summary Report also provides data that help in keeping track of Everest events (e.g., breach in threshold settings). Horizontal Bar: A Horizontal Bar Graph is a chart with blocks whose lengths are proportional to the quantities (variables) they represent. It provides summarized information of the performance counters. Although bar graphs are also applicable to single statistics, they are best used for multiple statistics, where several blocks (in contrast to a single piece for single statistics) represent each specific statistic, providing a visual comparison of the individual values. Pattern: The Pattern Graphs are graphs that plot the values of statistics over some repetitive time patterns. They provide the pattern analysis of the performance statistics over a specific time range, such as hour of day, day of week, month of year, etc. As the name implies, these graphs are most useful to show usage patterns. Percentile Area Time: The Area Graphs are an extension of the trending graphs. Although percentile area and total area graphs are applicable to single statistics, they are best used for multiple statistics, where several areas/sections (in contrast to a single area for single statistics) represent each specific statistic, providing a visual comparison of the individual values. Instead of plotting single statistical information, area graphs plot a group of statistics information that is related to one another. A typical usage of Area Graph is in the
Page 91 of 92 Copyright 2009 DMX Technologies

Protocol Distribution, where the Area Graphs will provide the total amount of data passing through together with the ratio information. Pie: A Pie Graph is similar to a Donut graph and is also a specialized chart used to plot statistics, with the independent variable plotted around a circle in a counterclockwise direction, and the dependent variable (values in percentage) rendered as an arc whose measure is proportional to the magnitude of the quantity. Constructing radial lines from its ends to the center of the circle, creating a wedge-shaped slice, depicts each arc. The independent variable can attain a finite number of discrete values, and the dependent variable can attain any value from 0 to 100 percent. Pie graphs show the percentage of the related statistics within a group. A typical use for the pie graph is to visually illustrate protocol distribution. Stack Bar: A stack bar graph is similar to the Area time graph. In a Stack Bar graph the individual data series are depicted as part of Bar and different parts of the Bar are given different shading. Stack Bar Distribution: A distribution graph is a histogram, or a specialized graph used to plot statistics with the independent variable plotted along the horizontal axis, and the dependent variable (any statistic) plotted along the vertical axis. The independent variable can attain only a finite number of discrete values rather than a continuous range of values. The dependent variable can span a continuous range. The user may also convert the chart into an image file by activating the appropriate link on the bottom right area of the graph. In Stack Bar Distribution Graph each bar showing one performance counter, which is split into multiple colors to indicate exactly where the counter normally lies. Stack Bar Time: A Stack Bar Time Graph is a chart with blocks whose lengths are proportional to the quantities (variables) they represent. It indicates the exact time when the infrastructure has attained maximum load. Although bar graphs are also applicable to single statistics, they are best used for multiple statistics, where several blocks (in contrast to a single piece for single statistics) represent each specific statistic, providing a visual comparison of the individual values. Stack Bar Time Distribution: A Stack Bar Time Distribution graph is a combination of Stack Bar Time and Stack Bar Distribution graphs. The graph displays blocks whose lengths are proportional to the quantities (variables) they represent along the vertical axis and the statistics with the independent variable plotted along the horizontal axis. Summary Table: The Summary Table Reports provides a summarized view (overall average, maximum and minimum) of the statistics over a given time range. Trending Time: The Trending graphs are charts that plot the values of statistics vis--vis time, and show the history of the statistics in graphical form. Time scales for plotting the trending graphs, as well as links to related reports and options to set average and peak data, can be selected in the options bar above the graph. Vertical Bar Graph: The Vertical Bar Graph provides summarized information of the performance counters.

Page 92 of 92

Copyright 2009 DMX Technologies

Você também pode gostar