Requirements for SolarWinds SAM

Requirements for SolarWinds SAM
Copyright © 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide.
No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published
or distributed, in whole or in part, or translated to any electronic medium or other means without the written
consent of SolarWinds. All right, title, and interest in and to the software and documentation are and shall remain
the exclusive property of SolarWinds and its respective licensors.
SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR
IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED
HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO
EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES,
WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF SOLARWINDS
HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
The SOLARWINDS and SOLARWINDS & Design marks are the exclusive property of SolarWinds Worldwide,
LLC and its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or
pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be
common law marks, registered or pending registration in the United States or in other countries. All other
trademarks mentioned herein are used for identification purposes only and may be or are trademarks or
registered trademarks of their respective companies.
Portions Copyright © ComponentOne, LLC 1991-2002. All Rights Reserved.
Portions of the following SolarWinds SAM Documentation is excerpted from:
IBM DeveloperWorks, © Copyright IBM Corporation 1994, 2012. Available at
http://www.ibm.com/developerworks/
Microsoft TechNet, “TechNet Library”, © 2010 Microsoft Corporation. All rights reserved. Available at
technet.microsoft.com.
Oracle Corporation, 2012 © 2010 Oracle Corporation. All rights reserved. Available at www.oracle.com
Portions of the component monitor information used in the AppInsight for SQL feature are provided courtesy of
the following sources:
http://technet.microsoft.com/en-us/library/ms190382.aspx
http://sql-articles.com/articles/performance-tunning/performance-counters/
http://linuxtechres.blogspot.com/2012/07/how-to-monitor-and-tune-microsoft-sql.html
http://blogs.msdn.com/b/askjay/archive/2011/07/08/troubleshooting-slow-disk-i-o-in-sql-server.aspx
http://www.grumpyolddba.co.uk/monitoring/Performance%20Counter%20Guidance%20-%20Windows%20Ser
ver.htm
http://www.quest.com/backstage/images/promotions/SQLServer-Perfmonance-Poster.pdf
http://sqlmag.com/t-sql/opening-microsofts-performance-tuning-toolbox
http://msdn.microsoft.com/en-us/library/dd672789(v=sql.100).aspx
http://sqlserverplanet.com/optimization/performance-counters
http://rds.blog.alibabainc.com/?tag=mssql-%E6%80%A7%E8%83%BD%E8%AE%A1%E6%95%B0%E5%99%A8
http://publib.boulder.ibm.com/tividd/td/ITMD/SC23-4852-00/en_US/HTML/mssql511rg02.htm#wq1
http://www.sql-server-performance.com/2005/hardware-bottlenecks/
http://blogs.msdn.com/b/teekamg/archive/2007/11/06/sql-server-memory-related-performance-counters.aspx
http://programming4.us/database/3424.aspx
http://www.informit.com/guides/content.aspx?g=sqlserver&seqNum=262
http://blogs.msdn.com/b/rafidl/archive/2010/06/07/check-if-you-have-sql-memory-pressure-using-perfmon.aspx
http://sqlserverplanet.com/dba/understanding-batch-requests-sec
http://www.databasejournal.com/features/mssql/article.php/3932406/Top-10-SQL-Server-Counters-for-MonitoringSQL-Server-Performance.htm
Portions of the following SolarWinds SAM Documentation is excerpted from:
Microsoft TechNet, “TechNet Library”, © 2010 Microsoft Corporation. All rights reserved.
Available at technet.microsoft.com
http://msdn.microsoft.com.
http://www.docstoc.com/docs/69756322/Performance-Counters-for-Microsoft-Products
http://support.microsoft.com/kb/968930.
http://powershell.com/cs/media/p/9869.aspx.
http://www.cs.cf.ac.uk/Dave/PERL/node174.html
http://msdn.microsoft.com/en-us/library/ee694763.aspx
http://technet.microsoft.com/en-us/library/ff823816.aspx
http://technet.microsoft.com/en-us/library/bb794879.aspx
http://technet.microsoft.com/en-us/library/gg670897.aspx
http://technet.microsoft.com/en-us/library/cc773676%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/bb691338.aspx
http://technet.microsoft.com/en-us/library/bb201689%28EXCHG.80%29.aspx
http://technet.microsoft.com/en-us/library/9tyc2s04(v=VS.80).aspx.
http://technet.microsoft.com/en-us/library/9tyc2s04(v=VS.80).aspx.
http://www.docstoc.com/docs/69756322/Performance-Counters-for-Microsoft-Products.
http://msdn.microsoft.com/en-us/library/cc773514%28v=ws.10%29.aspx.
http://technet.microsoft.com/en-us/library/ff367892.aspx.
http://msdn.microsoft.com/en-us/library/ms804612.aspx.
http://technet.microsoft.com/en-us/library/cc727402%28v=ws.10%29.aspx
http://technet.microsoft.com/en-us/library/cc726402%28v=ws.10%29.aspx
http://www.microsoft.com/technet/prodtechnol/WindowsServer2003/Library/IIS/0a6c9f07-a70c-4c3d-b93d5dfef593c744.mspx?mfr=true
http://msdn.microsoft.com/en-us/library/ee558869.aspx, http://msdn.microsoft.com/en-us/library/aa979484.aspx,
http://msdn.microsoft.com/en-us/library/aa979484%28v=office.12%29.aspx
http://www.saunalahti.fi/pesonpa/projects/exchange_server_2003/exchange_2003.php
http://technet.microsoft.com/en-us/library/cc754806%28v=ws.10%29.aspx.
http://msdn.microsoft.com/en-us/library/ee254010(v=bts.10).aspx.
http://technet.microsoft.com/en-us/library/gg670897(v=ocs.14).aspx .
http://technet.microsoft.com/en-us/library/gg670897(v=ocs.14).aspx .
http://msdn.microsoft.com/en-us/library/aa979484
(v=office.14).aspxhttp://www.webperformance.com/support/suite/manual50/Content/Load_Test_Statistics.htm
http://www.techrepublic.com/article/solutionbase-working-with-microsoft-windows-server-2003s-performancemonitor/5298961.
IBM Corporation, Copyright © 2012 IBM Corporation. All rights reserved. Available at http://www.ibm.com
http://www.ibm.com/developerworks/
http://publib.boulder.ibm.com/infocenter/pseries/v5r3/index.jsp?topic=/com.ibm.aix.cmds/doc/aixcmds6/vmstat.ht
m
http://www.scribd.com/No%20Starch%20Press/d/15737972-The-Book-of-Postfix-StateoftheArt-MessageTransport
http://www.linuxjournal.com/article/9454
http://www.informix.com.ua/articles/monitor/monitor.htm
http://www.ibm.com/developerworks/data/zones/informix/library/techarticle/0303fan/0303fan.html
http://ipmsupport.solarwinds.com/mibs_byoidtree.aspx?oid=1.3.6.1.4.1.334.72.1.1.10.17#h.
Portions of this document were originally created by and are excerpted from the following sources:
Oracle Corporation, 2012 © 2010 Oracle Corporation. All rights reserved. Available at www.oracle.com
http://docs.oracle.com/cd/E19623-01/820-6173/def-unbind-operation.htm
http://gurudatta-solaris.blogspot.com/2009/12/solaris-notes.html
http://dev.mysql.com/doc/refman/5.0/en/server-status-variables.html
http://download.oracle.com/docs
http://www.postgresql.org/docs/9.1/interactive/index.html
http://docs.oracle.com/javase/1.5.0/docs/api/java/lang/management/package-summary.html.
http://docs.redhat.com/docs/en-US/JBoss_Operations_Network/2.2/html/Managed_Resources_
Guide/JBossAS_Server.html.
Dirk Nachbar: Oracle Fusion Middleware & Application Server, Copyright 2015
http://dirknachbar.blogspot.com/2011/02/percentage-used-of-tablespaces.html
Symantec Corporation, Copyright © 2012, Symantec Inc. All rights reserved. Available at
http://www.symantec.com/business/support/index?page=content&id=TECH23710.
http://www.symantec.com/business/support/index?page=content&id=TECH102748
Citrix Corporation, “Citrix InfoCenter,” Copyright © 2012 Citrix Corporation. All rights reserved. Available at
http://support.citrix.com/proddocs/topic/infocenter/ic-how-to-use.html
RealNetworks, Inc., “Helix Server and Helix Proxy Troubleshooting Guide,” Copyright © 2012 RealNetworks,
Inc. All rights reserved. Available at
http://www.google.com/url?sa=t&rct=j&q=%22a%20mutex%20collision%20occurs%20when%20one%20serv
er%20process%20must%20wait%20for%20another%20%22&source=web&cd=4&ved=0CDoQFjAD&url=http
%3A%2F%2Fservice.jp.real.com%2Fhelp%2Flibrary%2Fguides%2FHelixServerWireline12%2Fpdf%2FServer
ProxyTroubleshoot.pdf&ei=uyqQT9_XE6ie2wXPo5iSBQ&usg=AFQjCNE3CpUHuLmpfScz2A9GOM9ysztgA&cad=rja.
Hewlett-Packard Company, Copyright © 2012 Hewlett-Packard Company. All rights reserved. Available at
http://www.hp.com
http://gurudatta-solaris.blogspot.com/2009/12/solaris-notes.html
Portions of the Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster documents are based on the
following source:
http://technet.microsoft.com/en-us/library/ee461009.aspx.
Internet Systems Consortium, Copyright © 2012 Internet Systems Consortium. All rights reserved. Available at
http://www.isc.org
http://www.isc.org/software/dhcp
Portions of the Microsoft Routing and Remote Access 2008-2012 R2 and Microsoft Routing and Remote Access
2008-2012 R2 (Events) document are based on the following content:
http://tech-nic.is-a-geek.org/eventid-windows-2008r2/routing-and-remote-access-service-infrastructure/.
Portions of the Remote Desktop Services Licensing document were originally created by and are excerpted from
the following sources:
Microsoft Corp., Copyright © 2012. All rights reserved. Available at http://www.microsoft.com/enus/download/details.aspx?id=17657
Portions of the Barracuda Spam and Virus Firewall document is based on the following:
http://techlib.barracuda.com/display/BSFv51/How+to+Use+SNMP+Monitoring.
Portions of the Trend Micro documents are based on the following:
http://downloadcenter.trendmicro.com/index.php?regs=NABU&clk=latest&clkval=3802&lang_loc=1
http://docs.trendmicro.com/all/ent/officescan/v10.6/en-us/osce_10.6_sp2_ag.pdf
Portions of the SQL Server 2008 Reporting Services document, the SQL Server 2008 Reporting Services R2
document, the SQL Server 2012 reporting Services document, and the SQL Server 2008-2012 Reporting Services
(Events) document are based on the following sources:
http://technet.microsoft.com/en-us/library/ms165307(v=sql.100).aspx
http://technet.microsoft.com/en-us/library/cc627471(v=sql.110).aspx
http://technet.microsoft.com/en-us/library/ms159650.aspx
Danga Interactive, Copyright © 2012 Danga Interactive. All rights reserved. Available at
http://www.php.net/manual/en/book.memcache.php.
MongoDB, Copyright © 2012 10gen, Inc. All rights reserved. Available at
http://www.mongodb.org/display/DOCS/serverStatus+Command.
O'Reilly Squid, Copyright © 2012 O'Reilly Media, Inc. All rights reserved. Available at
http://www.scribd.com/sivatcs/d/77305197-O-Reilly-Squid-the-Definitive-Guide.
Sybase, Copyright © 2012 Sybase, Inc. All rights reserved. Available at http://www.sypron.nl/mda.html,
http://infocenter.sybase.com/help/index.jsp?topic=/com.sybase.help.ase_15.0.sag1/html/sag1/sag1462.htm,
http://infocenter.sybase.com/help/index.jsp?topic=/com.sybase.dc20022_1251/html/monitoring/monitoring33.htm.
SAP Corporation, Copyright © 2012 SAP Corporation. All rights reserved. Available at
http://dcx.sybase.com/1101/en/dbadmin_en11/server-properties-perfapp.html and
http://dcx.sybase.com/1200/en/dbadmin/database-properties-perfapp.html#connpoolcachedcount-db-prop.
APC powerchute, Copyright © 2012. All rights reserved. Available at
http://danielthechskid.home.mchsi.com/appa6.htm.
Oracle Corporation, Copyright © 2012 Oracle Corporation. All rights reserved. Available at
http://docs.oracle.com/javase/1.5.0/docs/guide/management/overview.html and
http://docs.jboss.org/jbossas/docs/Server_Configuration_Guide/4/html/Additional_Services-Memory_and_Thread_
Monitoring.html.
http://docs.oracle.com/javase/1.5.0/docs/guide/management/overview.html.
TrendMicro, Copyright © 2012. All rights reserved. Available at
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CF4QFjAA&url=http%3A%2F%2F
www.uv.es%2Fdistrisoft%2Fantivirus%2Fcas%2Fman_01_spnt_58_1060_
en.pdf&ei=tw4cUOeJKqrY2QXCgIGgDw&usg=AFQjCNGocyArGtBrtOWmt29IlqGYCQhxQQ
Server Manager for JD Edwards EnterpriseOne. Copyright © 2012 JD Edwards Corporation. All rights reserved.
Available at http://servermanager.blogspot.com/2008/01/server-manager-logging-part-3.html;
IBM, Copyright © 2012. All rights reserved. Available at
http://publib.boulder.ibm.com/infocenter/db2luw/v9/index.jsp?topic=/com.ibm.db2.udb.admin.doc/doc/r0011478.ht
m.
Bind 9 Administrator Reference Manual”: http://ftp.isc.org/isc/bind9/cur/9.9/doc/arm/Bv9ARM.html.
Microsoft TechNet, “TechNet Library”, © 2010 Microsoft Corporation. All rights reserved. Available at
http://technet.microsoft.com/en-us/library/bb490957.aspx
Unidata, “Rocket software”, © 2010 Unidata. All rights reserved. Available at
http://www.rocketsoftware.com/u2/resources/technical-resources/unidata
Portions of this documentation are based on:
http://www.veeam.com/kb1518
http://forums.veeam.com/viewtopic.php?f=2&t=13559
Veeam Backup & Replication PowerShell Guide.
Portions of this document were originally created by and are excerpted from the following sources:
SAAS Corporation, Copyright © 2012 SAAS Corporation. All rights reserved. Available at:
http://www.ssas-info.com/analysis-services-articles/58-ssas-2008/1113-analysis-services-2008-performance-
counters,
http://allcomputers.us/windows_server/microsoft-sql-server-2008-analysis-services---monitoring-usage.aspx,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-queryperformance.aspx,
http://www.grumpyolddba.co.uk/monitoring/Performance%20Counter%20Guidance%20-%20SSAS.htm,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-processingperformance.aspx
http://msdn.microsoft.com/en-us/library/hh230807.aspx
http://www.ssas-info.com/analysis-services-articles/58-ssas-2008/1113-analysis-services-2008-performancecounters,
http://allcomputers.us/windows_server/microsoft-sql-server-2008-analysis-services---monitoring-usage.aspx,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-queryperformance.aspx,
http://www.grumpyolddba.co.uk/monitoring/Performance%20Counter%20Guidance%20-%20SSAS.htm,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-processingperformance.aspxhttp://www.ssas-info.com/analysis-services-articles/58-ssas-2008/1113-analysis-services2008-performance-counters,
http://allcomputers.us/windows_server/microsoft-sql-server-2008-analysis-services---monitoring-usage.aspx,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-queryperformance.aspx,
http://www.grumpyolddba.co.uk/monitoring/Performance%20Counter%20Guidance%20-%20SSAS.htm,
http://allcomputers.us/windows_server/Microsoft-SQL-Server-2008-Analysis-Services---Monitoring-processingperformance.aspx
MS IIS SMTP Server document are based on: http://msdn.microsoft.com/en-us/library/ms804618.aspx.
Microsoft copyright 2013
BizTalk Server 2010-2013 is based on the following sources:
http://msdn.microsoft.com/en-us/library/aa559591(v=bts.70).aspx;
http://msdn.microsoft.com/en-us/library/aa559893(v=bts.20).aspx.
http://msdn.microsoft.com/en-us/library/ee254010(v=bts.10).aspx.
http://www.microsoft.com/biztalk/en/us/orchestration.aspx;
http://msdn.microsoft.com/en-us/library/dd800372.aspx.
V-Server definition courtesy of the following:
https://library.netapp.com/ecmdocs/ECMP1196798/html/GUID-E643017F-041B-4ECC-BEA1E4D80E26A47E.html
Portions of the Exchange Active Sync Connectivity document are provided courtesy of the following sources:
Test-ActiveSyncConnectivity:
http://technet.microsoft.com/en-us/library/bb123540(v=exchg.150).aspx
Exchange 2013 templates are based on the following documents:
http://technet.microsoft.com/en-us/library/ff367877.aspx.
http://technet.microsoft.com/en-us/library/ff367871.aspx
Portions of the Clam AV document is based on the following information:
http://exchange.nagios.org/directory/Plugins/Anti-2DVirus/ClamAV/ClamAV-check-plugin/details.
Portions of the Websense document are courtesy of Websense, copyright 2013.
http://www.websense.com/content/support/library/shared/v75/wsga_getting_started/wws_install.aspx
http://www.websense.com/support/article/t-kbarticle/Websense-Web-Security-default-ports
Portions of the Blackberry Enterprise Server 10 Services (Windows) document are based on information found
at:
http://us.blackberry.com/business/software/bes-10.html
Portions of the Blackberry Enterprise Server 10 Statistic (SNMP) document are based on information found at:
http://us.blackberry.com/business/software/bes-10.html
Portions of the Microsoft DirectAccess documents are based on:
http://technet.microsoft.com/en-us/library/hh918442.aspx Microsoft, copyright 2013.
Potions the Oracle documents are based on the following and courtesy of Oracle, copyright 2013:
http://docs.oracle.com/cd/B12037_01/server.101/b10755/dynviews_1019.htm
http://docs.oracle.com/cd/B19306_01/server.102/b14237/dynviews_1019.htm
Portions of the Microsoft System Center Operations Manager 2012 document are courtesy of Microsoft Corp.
Copyright 2013.
http://msdn.microsoft.com/en-us/library/cc146632.aspx
http://technet.microsoft.com/en-us/library/bb932169.aspx
Portions of the AppInsight for IIS document are courtesy of Microsoft Corp. Copyright 2013.
http://technet.microsoft.com/en-us/library/bb742410.aspx
http://msdn.microsoft.com/en-us/library/ms972959.aspx
Portions of this document are courtesy of Kaspersky, copyright 2013:
http://support.kaspersky.com/9297
SolarWinds Server & Application Monitor, 2/24/2015, version 6.2
DJR
About SolarWinds
SolarWinds, Inc develops and markets an array of IT management, monitoring, and
discovery tools to meet the diverse requirements of today’s IT management and consulting
professionals. SolarWinds products continue to set benchmarks for quality and
performance and have positioned the company as the leader in IT management and
discovery technology. The SolarWinds customer base includes over 85 percent of the
Fortune 500 and customers from over 170 countries. Our global business partner
distributor network exceeds 100 distributors and resellers.
Contacting SolarWinds
You can contact SolarWinds in a number of ways, including the following:
Team
Contact Information
Sales
1.866.530.8100
http://www.solarwinds.com
Technical http://www.solarwinds.com/support, you need a customer account to access
Support the Customer Support area of the website.
User
Forums
http://www.thwack.com contains the community oriented user forums
Conventions
The documentation uses consistent conventions to help you identify items throughout the
printed and online library.
Convention
Specifying
Bold
Window items, including buttons and fields.
Italics
Book and CD titles, variable names, new terms
Fixed font
File and directory names, commands and code examples, text
typed by you
Straight brackets, as in
[value]
Optional command parameters
Curly braces, as in
{value}
Required command parameters
Logical OR, as in
value1|value2
Exclusive command parameters where only one of the options
can be specified
SolarWinds Server & Application Monitor Documentation
Library
The following documents are included in the Server & Application Monitor (SolarWinds SAM)
documentation library:
Document
Purpose
Administrator Guide
Provides detailed setup, configuration, and conceptual information
for SolarWinds SAM.
Evaluation Guide
Provides an introduction to SolarWinds Server & Application
Monitor features and instructions for installation and initial
configuration.
Page Help
Provides help for every window in the SolarWinds Server &
Application Monitor user interface
Quick Start Guide
Provides installation, setup, and common scenarios for which
SolarWinds Server & Application Monitor provides a simple, yet
powerful, solution.
Release Notes
Provides late-breaking information, known issues, and updates. The
latest Release Notes can be found at www.solarwinds.com.
The following documents supplement the Server & Application Monitor documentation library
with information about SolarWinds Common Components:
Document
Purpose
Orion Common
Components
Administrator Guide
Provides detailed setup, configuration, and conceptual
information for the common components.
Orion Common
Provides help for every window in the Orion Common
Components Page Help Components user interface.
Release Notes
Provides late breaking information, known issues, and updates.
The latest Release Notes can be found at www.solarwinds.com.
Note: With this release, Orion products are based on a set of common features that are
shared by all of the Orion products. Therefore you need to consult the documentation listed
above for the Orion Common Components in order to find information about all of the
common features.
Table of Contents
About SolarWinds
8
Contacting SolarWinds
8
Conventions
8
SolarWinds Server & Application Monitor Documentation Library
9
Table of Contents
10
Chapter 1: Introduction
85
Changes in this Guide from SAM 6.1.1 to 6.2
85
Applications Defined
86
Template/Application Relationship
86
SAM Glossary of Terms
87
How Does SolarWinds Server & Application Monitor Work?
89
Application Availability and Status
91
Chapter 2: Requirements and Installation
Requirements for SolarWinds SAM
93
93
SolarWinds Server Software Requirements
93
SolarWinds Server Hardware Requirements
95
Requirements for Virtual Machines and Servers
96
Requirements for the Orion database Server (SQL Server)
97
Additional SolarWinds SAM Requirements
99
FIPS Support
FIPS Manager
99
100
Server Sizing
101
Scalability
102
SNMP Requirements for Monitored Devices
103
Enabling Microsoft Internet Information Services (IIS)
103
Enabling IIS on Windows Server 2003
103
Enabling IIS on Windows Server 2008
106
Upgrading SolarWinds Server & Application Monitor
110
Upgrading NPM and SolarWinds SAM on Your Current Server
111
Upgrading SAM to a New Server While Keeping NPM on Your Current Server
111
Moving SolarWinds SAM to a different server
112
General Requirements
112
Database Requirements
113
Stopping SAM Services
113
To stop SolarWinds SAM services:
Creating a Database Backup File with Database Manager
To backup your Orion database using Database Manager:
Creating a Database Backup File with SQL Server Management Studio
To backup your Orion database using SQL Server Management Studio:
Restoring a Database Backup File for SQL Express Server
To restore your database backup file on a server running SQL Express Server:
Restoring a Database Backup File for SQL Server 2008
To restore your database backup file on a server running SQL Server 2008:
Updating SolarWinds SAM to Use the New Database Server
To update SolarWinds SAM to use a new database:
Reassigning Nodes
To reassign items to the new polling engine:
Moving SolarWinds SAM Security Certificates to a New Server
To replicate the original certificate:
Migrating Licenses with License Manager
To deactivate currently installed licenses:
Installing License Manager
113
114
114
115
115
116
116
117
117
118
118
119
119
121
121
122
122
123
To install License Manager:
123
Using License Manager
123
To deactivate currently installed licenses:
123
Upgrading SolarWinds APM when SolarWinds Failover Engine is Installed
On the primary/active server:
124
124
On the primary Server (assuming a successful upgrade of secondary completed):125
Installing SolarWinds Server & Application Monitor
126
Uninstalling SAM
131
Advanced Installation of SAM
132
To assign nodes to polling engines:
138
Activating Your License
138
To evaluate the software without a license:
138
To license the software on a server with Internet access:
139
To license the software on a server without Internet access:
139
Finishing SolarWinds SAM Installation
140
Follow the directions in the SolarWinds Configuration Wizard:
140
To configure Server & Application Monitor:
140
Excluding SolarWinds Data Directories from Anti-Virus Scanning
142
Exclude for Windows Server 2003:
142
Exclude for Windows Server 2008:
142
Running SolarWinds SAM
To run SolarWinds SAM:
143
143
Internet Explorer Security Settings
143
Licensing
143
To see the available component monitors remaining in your license:
Chapter 3: Common Tasks with SolarWinds SAM
147
149
Monitoring Web Site Performance
149
Deciding What to Monitor
150
Monitoring the Intranet Home Page
150
Monitoring the Corporate Home Page
151
Troubleshooting the HTTP Template
151
Monitoring IIS Application Pools
152
Deciding What to Monitor
153
What needs to be monitored:
153
Scanning for Applications Worth Monitoring
154
What needs to be monitored:
154
The administrator user name and passwords are:
154
Monitoring a Specific URL
To monitor a specific URL, follow the step outlined below:
Monitoring VMware Performance Counters
What needs to be monitored:
155
155
157
157
To create a new Application Monitor using the browsing method to select the 157
desired VMware performance counters:
Monitoring and Restarting Stopped Windows Services
What needs to be monitored:
Monitoring Large Directories
160
160
162
What needs to be monitored:
162
Troubleshooting the Large Directory Monitor
164
Chapter 4: Managing the Web Console
165
To manage the SolarWinds Web Console, navigate to the Settings page:
166
Refer to the sections that follow for details about the administrative commands
available in each category:
167
Discovery Central
168
Node & Group Management
168
Virtualization Settings
Accounts
Account List
Customize
169
169
169
170
Customize Menu Bars
170
Color Scheme
170
External Websites
170
Customized SAM Tabbed Sub-Views
170
Manage Alerts
171
Views
171
Manage Views
172
Add New View
172
Views by Device Type
172
Views by Application Type
172
Settings
172
Web Console Settings
172
Polling Settings
173
SAM Settings
173
SolarWinds Thresholds
173
Virtualization Thresholds
173
Details
173
Database Details
173
Polling Engines
174
Orion Core Details
174
License Details
174
Navigating the SolarWinds Web Console
174
Using Web Console Tabs
174
Using and Disabling Web Console Breadcrumbs
175
To disable web console breadcrumb navigation:
Managing Nodes from the Web Console
To manage the SolarWinds Web Console, navigate to the Settings page:
Unmanaging Nodes
To unmanage a node:
Adding Nodes for Monitoring
To add a device for monitoring in the SolarWinds Web Console:
Deleting Nodes from Monitoring
To delete a node from monitoring in the SolarWinds Web Console:
176
176
176
177
177
177
177
180
180
Deleting Applications or Volumes from Monitoring
181
Viewing Node Data in Tooltips
181
Editing Node Properties
182
To edit object properties in the SolarWinds Web Console:
Promoting a Node from ICMP to SNMP Monitoring
To promote an ICMP only node to SNMP:
Promoting a Node to WMI Monitoring
To promote a node to WMI:
Viewing Node Resources
To view a list of all resources present on a node:
Setting Node Management States
To set or change the management state of a node:
Unscheduled Node Polling and Rediscovery
To perform an unscheduled poll or rediscovery:
Unmanage Scheduling Utility
182
183
183
184
185
185
185
186
186
187
187
187
To schedule tasks to be stopped:
188
Monitoring Windows Server Memory
189
Scheduling a Node Maintenance Mode Time Period
189
Administrative Functions of the SolarWinds Web Console
Changing an Account Password
To change an account password:
189
189
190
Viewing Secure Data on the Web
190
Handling Counter Rollovers
190
To designate the type of counter used by SolarWinds SAM:
SolarWinds General Thresholds
191
191
SolarWinds General Threshold Types
191
Setting SolarWinds General Thresholds
193
To set SolarWinds SAM thresholds:
193
Customizing Views
Creating New Views
To create a new view:
Editing Views
193
194
194
195
To edit an existing view:
195
Configuring View Limitations
196
To enable a view limitation:
197
Copying Views
To copy a view:
Deleting Views
To delete an existing view:
Views by Device Type
197
198
198
198
198
To assign a view by device type:
198
Resource Configuration Examples
198
Selecting a Network Map
199
To add a network map to the web console:
199
Displaying a List of Objects on a Network Map
199
To display a list of network map objects:
199
Displaying a Custom List of Maps
200
To display a custom list of maps:
200
Displaying an Event Summary - Custom Period of Time
201
To display an event summary:
201
Specifying User-Defined Links
201
To enable a user-defined links resource:
201
Specifying Custom HTML or Text
202
To specify custom HTML or text:
202
Specifying a SolarWinds Report
203
To include a SolarWinds report:
203
Displaying a Custom List of Reports
203
To display a custom list of reports:
204
Filtering Nodes
204
To enable filtering on a node list:
204
Grouping Nodes
205
To enable grouping on a node list:
205
Customizing Web Console Menu Bars
206
To customize web console menu bars:
206
Changing the Web Console Color Scheme
208
To change the web console color scheme:
208
Changing the Web Console Site Logo
208
To change the web console banner:
208
Configuring the Available Product Updates View
To configure product updates:
Updating your SolarWinds Installation
To update your SolarWinds installation:
208
209
209
209
NOC View
209
Enabling NOC
210
Adding NOC views
Adding AppStack to a NOC View
210
212
Editing NOC views
214
Disabling NOC views
215
Customizing Charts in the SolarWinds Web Console
216
Chart Information:
216
Custom Chart Resource Title Bar Options
216
Edit Chart Title View
217
Exporting Views to PDF
218
To export a view to PDF:
Creating a Custom Summary View
To create or edit a custom summary view in the web console:
Creating and Editing External Website Views
To create or edit an external website view in the web console:
Custom Object Resources in the SolarWinds Web Console
Editing a Custom Object Resource
To edit a Custom Object resource:
218
218
218
219
219
220
220
220
Selecting Custom Objects and Resources
220
Available Custom Resources
221
Integrating SolarWinds Engineer’s Toolset
Configuring a Toolset Integration
To configure SolarWinds Toolset integration settings:
Adding Programs to a Toolset Integration Menu
To add a program to the SolarWinds Toolset Integration menu:
Web Console Configuration
Creating a Web Console Configuration Backup
To create a SolarWinds Web Console configuration backup:
Restoring a Web Console Configuration Backup
To restore a SolarWinds Web Console configuration backup:
Clearing a Web Console Configuration
To clear your SolarWinds Web Console configuration:
Logging in for the First Time as an Administrator
221
221
222
222
222
223
223
224
224
224
224
224
225
To log in to the SolarWinds Web Console:
225
Windows Authentication with Active Directory
225
To enable Active Directory Windows authentication to the web console:
225
Using the Web Console Notification Bar
226
Using the SolarWinds Web Console Message Center
227
To view and configure the Message Center:
Suppressing Events
Suppressing Events:
Using Node Filters
To apply a node filter:
227
227
228
228
228
Accessing Nodes Using HTTP, SSH, and Telnet
229
Using Integrated Remote Desktop
229
To launch Integrated Remote Desktop:
Using Audit Events
Adding the Audit Events resource:
Filtering Audit Events
230
230
231
231
To Filter Audit Events:
231
Editing Audit Events:
233
Chapter 5: SolarWinds SAM Charts and Resources
235
Application Availability Chart
235
Custom Chart
236
Custom Area Chart
239
Custom Bar Chart
239
Component Availability Chart
240
Custom Chart View
242
Printing Options
242
Chart Titles
242
Time Period
242
Sample Interval
243
Chart Size
243
Font Size
243
Data Export Options
243
Custom Line Chart
244
Custom Query Resource
244
Custom Table
245
Editing the Custom Table resource:
Custom Node Charts
246
247
Availability
247
CPU Load
248
Memory Usage
248
Packet Loss and Response Time
248
Custom Volume Charts
248
Event Log Message Details
249
Min/Max Average Chart
250
Adding the Chart:
250
Customizing the Chart
251
Zooming
251
Multiple Object Chart
252
Clicking Edit allows you to configure the characteristics of a selected multiple
objects chart:To add the Multiple Object Chart to your home page:
253
To configure the Multiple Object Chart:
253
Multiple Statistic Chart
Zooming
Multi Chart
Chapter 6: SolarWinds SAM Settings
Getting Started with SAM
254
254
256
259
260
Scan Nodes for Applications
260
Manually Assign Application Monitors
260
Component Monitor Wizard
260
Application Monitors
Manage Application Monitors
Application Monitor Templates
261
261
261
Manage Templates
261
Create a New Template
261
Component Monitors
261
Component Monitor Library
262
Manage Assigned Component Monitors
262
Manage Component Monitors within Templates
262
Application Detail Views
262
Views by Application Type
SAM Settings
262
262
Credentials Library
263
Data and Database Settings
263
Database Maintenance
263
To set the three Statistic Retention Intervals:
263
Polling Engine Mode
264
To set the Polling Engine Mode (v5.2 and earlier):
264
License Summary
SAM License Summary
thwack Community
264
264
264
Shared thwack Templates
265
SAM thwack Forum
265
Chapter 7: Discovering and Adding Nodes on a Network
Discovery Central
To access Discovery Central:
266
266
267
Virtualization Discovery
267
Application Discovery
267
Network Sonar Discovery
267
Discovering devices on your network from Discovery Central:
Using the Network Sonar Results Wizard
To select the results of a network discovery for monitoring in SAM:
268
274
274
Managing Scheduled Discovery Results
275
Using the Discovery Ignore List
276
To manage devices on the Discovery Ignore List:
Chapter 8: Application Discovery
276
278
To Access Application Discovery:
278
Select Nodes
278
Select Applications
278
Enter Credentials
279
Review and Start Scan
279
Add UX Monitors
280
Add Application Monitors
To add Application Monitors on the Add Application Monitors page:
Reading the Application Summary
280
280
281
Active Application Alerts
281
Application Health Overview
281
Applications with Problems
282
Last 25 Application Events
282
Thwack Latest Application Templates
283
Top 10 Components Monitored by Response Time
283
Top 10 Processes Monitored by CPU Load
283
Top 10 Processes Monitored by Physical Memory
283
Top 10 Processes Monitored by Virtual Memory
284
Top XX Monitored Processes by I/O Reads/Sec
284
Top XX Monitored Processes by I/O Writes/Sec
285
Top XX Monitored Processes by I/O Total Operations/Sec
286
Server Warranty Summary
287
Server Warranty Summary Alerts
Chapter 9: Managing Groups and Dependencies
To access the Manage Groups page:
Creating Groups
To create a new group:
Editing Groups
To edit properties of an existing group:
Managing Group Members
To add and remove the objects of an existing group:
Deleting Groups
To delete a group:
Managing the Display of Group Status
To configure the method used to determine the status of a selected group:
288
289
289
289
290
291
291
291
292
292
292
292
293
Managing Dependencies
294
Creating a Dependency
294
To create a dependency:
295
Editing a Dependency
To edit an existing dependency:
Deleting a Dependency
To delete an existing dependency:
Viewing Alerts on Child Objects
Chapter 10: Managing Accounts
Creating Accounts
To create a new user account:
Editing User Accounts
User Account Access Settings
To edit a user account:
296
296
297
297
297
298
298
298
299
300
301
Configuring Audible Web Alerts
302
To enable audible web alerts:
303
Setting Account Limitations
To set user account limitations:
303
303
Defining Pattern Limitations
305
Setting Default Account Menu Bars and Views
305
To set default menu bar and view options:
306
Configuring an Account Report Folder
To configure an account report folder:
307
308
Server & Application Monitor Settings
308
Orion General Settings
309
Integrated Virtual Infrastructure Monitor Settings
310
Chapter 11: Managing SolarWinds SAM Polling Engines
Viewing Polling Engine Status
To display the Polling Engine view:
Configuring Polling Engine Settings
To open the SolarWinds Polling Settings view:
SolarWinds Polling Settings
311
311
311
312
312
312
Polling Intervals
312
Polling Statistics Intervals
313
Network
313
Calculations & Thresholds
313
Calculating Node Availability
314
Node Status:
315
Percent Packet Loss:
315
Calculating a Baseline
315
Using the Polling Engine Load Balancer
316
To reassign nodes to a different polling engine:
316
Setting the Node Warning Level
317
Managing Packet Loss Reporting
317
To configure the Response Time Retry Count for your polling engine:
Chapter 12: Virtualization
VMware Monitoring
317
319
319
Virtual Machine Auto-Summary
320
Virtualization Alerting and Reporting
320
Requirements for Monitoring ESXi and ESX Servers
320
Enabling SNMP on VMware ESXi and ESX Servers
322
Enabling SNMP on VMware ESXi
322
To enable SNMP on VMware ESXi:
Enabling SNMP on ESX Server Version 3.5
To enable SNMP on ESX Server version 3.5:
Enabling SNMP on ESX Server Version 4.0
To enable SNMP on ESX Server version 4.0:
Creating ESX Server Credentials for SolarWinds SAM
To create ESX Server credentials for SolarWinds SAM:
Managing VMware Credentials in the Web Console
322
324
324
325
325
327
327
328
To update a VMware credential:
328
Adding Virtual Servers for Monitoring
328
Polling for VMware nodes Using the Network Sonar Wizard
328
Adding VMs from the Virtualization Assets Resource
328
Virtualization Summary
To view the Virtualization Summary:
Viewing ESX Host Details
329
329
329
Changing Polling Orders for ESX Servers
To poll a vCenter-managed ESX Host from the SolarWinds server:
Troubleshooting ESX Hardware Monitoring
Hyper-V Monitoring
330
330
330
331
Requirements for Monitoring Hyper-V Servers
331
Configuring Hyper-V Servers for Discovery
332
Modifying the Windows Firewall
333
Ensure the Core Networking rules are enabled
333
To allow core networking traffic through the Windows Firewall on Windows
2008 R2:
333
Enable the Windows Management Instrumentation (DCOM-In) rule
333
To allow WMI traffic through the Windows Firewall on Windows 2008 R2:
334
Create a new firewall rule to open the RPC ports
334
To open the RPC ports on Windows 2008 R2:
334
Enabling and Disabling Hyper-V Monitoring
334
List Resources Method:
335
Virtualization Summary Method:
335
Accessing Hyper-V Details
Virtualization Assets:
Chapter 13: Building Component Monitors and Templates
Certificate Credentials Library
336
337
338
340
Adding a Certificate to the Library
340
Assigning Certificate Credentials
340
A.) When Assigning a Template to a Node:
341
B.) Editing a Template Directly:
341
Understanding the Credentials Library
341
To set up a user account on a SQL server
342
Adding Credentials to the Credentials Library
343
To add credentials from the Credential Library page:
Editing Credentials in the Credentials Library
To edit an existing credential from the Credential Library page:
Deleting Credentials from the Credentials Library
343
343
343
343
To delete an existing credential from the Credential Library page:
Using Quick Credentials
To create and assign credentials using Quick Credentials when editing a template or Application Monitor:
Managing Assigned Application Monitors
Editing an Assigned Application Monitor
To edit an individual application:
Unmanaging Assigned Application Monitors
To unmanage assigned Application Monitors:
Remanaging Assigned Application Monitors
To remanage assigned Application Monitors:
Deleting Assigned Application Monitors
To delete assigned Application Monitors:
Application Monitor Thresholds
Inheriting Thresholds
344
344
344
345
345
345
346
346
347
347
347
347
348
348
Threshold Adjustments at the Template Level
349
Threshold Adjustments at the Component Monitor Level
349
Automatic Calculation of Baseline Data
To Change the Amount of Data Used in Baseline Calculations:
349
350
Multi-value Scripts and Thresholds
350
Applying Baseline Thresholds at the Template Level
352
To Edit and Apply Baseline Thresholds for a Template:
Applying Baseline Thresholds at the Application Level
To Edit and Apply Baseline Thresholds for an Application:
Latest Baseline Details
To View the Latest Baseline Details Page:
Understanding Latest Baseline Details
352
353
354
355
355
356
Understanding the Occurrences Chart
357
Understanding the Metric Over Time Chart
358
Understanding the Latest Baseline Statistics Table
359
Understanding Baseline Details and Setting Thresholds
360
Understanding Sustained Thresholds
360
Working with Component Monitors
361
Viewing the Component Monitor Library
362
Managing Assigned Component Monitors
362
Creating a New Template with Assigned Component Monitors
362
To quickly create a new template with assigned component monitors:
362
Assigning Component Monitors to a Node
363
To quickly assign component monitors to a node:
363
Copying Assigned Component Monitors to an Assigned Application Monitor
364
To quickly copy component monitors to an assigned Application Monitor:
364
Copying Assigned Component Monitors to an Application Monitor Template
364
To quickly copy component monitors to an Application Monitor template:
364
Editing Assigned Application Monitors
365
To edit the assigned Application Monitor for a component monitor:
365
Deleting Assigned Application Monitors
365
To delete an assigned component monitor:
365
Managing Component Monitors within Templates
365
Listing the Component Monitors Defined in a Template
366
To quickly see the different component monitors within your templates:
366
Creating a New Template from Existing Component Monitors
366
To create a new template that contains copies of existing component monitors:366
Creating Assigned Application Monitors from Existing Component Monitors
366
To create assigned Application Monitors from existing component monitors:
366
Copying a Component Monitor
367
To copy a component monitor to a template or an assigned Application Monitor:
367
Choosing Component Monitors and Templates Based on Protocol
RPC vs. WMI
Web Service Monitoring
368
368
368
JSON
369
SOAP Monitor
370
Definitions:
370
About the SOAP MonitorCurrently, the SOAP monitor within SAM can return a 370
status of either Up or Down, or return a status of Warning or Critical based on
response time thresholds. This monitor also has the ability to search for the
presence of a string. You can test the SOAP monitor in Edit mode. If the test
poll throws a web exception (indicating that there was a problem on the target)
the response content is extracted and you will be able to view the message to
help identify the issue.
Configuring the SOAP Monitor
370
Loading WSDL FilesThe SOAP monitor within SAM currently supports the
WSDL schema, which must be exposed on a URL. Once the WSDL file is successfully loaded, the file will be parsed automatically and the fields, highlighted
below, will populate.
371
Manually Entering XML
373
Scripting Custom Component Monitors
374
Creating a Linux/Unix Script Monitor
375
To adapt an existing Perl script to a Linux/Unix Script component monitor in a
new template:
375
Linux/Unix Scripts
378
Example Scripts
378
Scripts Must Report Status Through Exit Codes
378
Scripts with Text Output
379
Creating a Windows Script Monitor
380
Field Descriptions
381
Creating a Windows Script Monitor
383
To adapt an existing Visual Basic script to a Windows Script Monitor in a new
template:
383
Macros for Script Arguments
384
Scripts Must Report Status Through Exit Codes
384
Scripts with Text Output
385
Example Scripts
385
Creating a Nagios Script Monitor
387
Return Codes
387
Field Descriptions
388
Creating a Windows PowerShell Monitor
390
What needs to be monitored:
390
Troubleshooting the Lsass.exe PowerShell Monitor
393
Using Application Monitor Templates
393
Scanning Nodes for Applications
393
To use the application discovery:
394
Select Nodes
394
Select Applications
394
Enter Credentials
395
Review & Start Scan
395
Add UX Monitors
395
Manually Assign Application Monitors
395
To assign a template using the wizard:
395
To assign a template through the Manage Application Monitor Templates
page:
396
Creating New Templates
397
Creating New Templates Using the Traditional Method:
397
Creating New Templates Using the Browsing Method:
397
Managing Templates
398
Creating Templates
399
To create an application template:
399
Assign to Node
399
To create an assigned Application Monitor by assigning template(s) to nodes: 399
Editing Templates
400
To edit an application template:
400
Multi-Edit Templates
400
Ordering Components
401
Copying Templates
402
To copy an application template:
402
Exporting and Importing Templates Locally or Using Thwack
402
To export a template:
402
To import a template from a file:
403
To import a template from thwack:
403
Deleting Templates
404
To delete a template:
404
Tagging Templates
404
To add tags:
405
To remove tags:
405
Understanding Component Monitors and Application Monitor Templates
405
Requirements for Component Monitors and Templates that use WMI
407
Monitoring External Nodes
411
Custom Application Monitor Template Example: Creating a SolarWinds SAM Template
411
To create a SolarWinds SAM application template:
412
Web Service Monitoring
414
JMX Component Monitor Wizard
414
To add a JMX component monitor, perform the following steps:
414
Available Data Transformations
415
Conversion Value
417
Chapter 14: Asset Inventory
419
Asset Inventory Requirements
420
Third Party Software Required for Asset Inventory Information
421
HP
421
HP/VMWare
421
Dell/VMWare
421
IBM
421
VMWare
421
Asset Inventory Data Collection
421
Enabling the Asset Inventory Dashboard
422
To Enable Asset Inventory data collection via the Add Node Wizard:
422
To Enable Asset Inventory data collection via the Management Resource:
422
Viewing the Asset Inventory Dashboard
Navigating to the Asset Inventory page:
423
424
Custom Asset Information
424
Drivers
425
Firmware
426
Graphics and Audio
426
Hard Drives
427
Hosted Virtual Machines
428
Logical Volumes
428
Memory
429
Network Interfaces
430
Operating System Updates Applied
430
Out of Band Management
431
Peripherals
431
Ports and USB Controllers
432
Processors
432
Removable Media
433
Software Inventory
433
Storage Controllers
434
System Information
434
General
435
Hardware
435
Operating System
436
Windows Update Information
436
Chapter 15: AppInsight Applications
438
Template/Application Relationship
438
Changing between 32-bit and 64-bit polling methods:
AppInsight for SQL
AppInsight for SQL Requirements and Permissions
439
440
441
AppInsight for SQL Requirements
441
AppInsight for SQL Permissions
442
The following script will configure permissions for a SQL account:
443
AppInsight for SQL Licensing
443
Adding AppInsight for SQL to a Node
444
To Add AppInsight for SQL via the Management Resource:
Adding a Named Instance
446
446
AppInsight for SQL – Default Instances
446
Add a Node
447
Choose your Applications
448
Setting Properties
449
Editing the AppInsight for SQL Template
Editing the AppInsight for SQL Template:
Understanding the AppInsight for SQL Details View
Editing Resources
Navigating the AppInsight for SQL Details View
450
450
451
452
453
Navigating to the Database Details view:
455
Monitoring Clusters with AppInsight for SQL
456
AppInsight for SQL Alerts
459
AppInsight for SQL Details View (Summary Tab)
460
All Databases
461
Active Alerts
461
Application Availability
462
Zooming
463
Application Details
463
Buffer Manager
464
Cache
467
Connections
470
Disk
473
Latches and Locks
476
Memory
482
Pages
492
Processes and Services
498
Sessions
499
SQL Agent Job Status
502
SQL Errors
502
SQL Event Log Message Details
503
SQL Server
504
Top 10 Databases by Active User Connections
514
Top 10 Most Expensive Queries by CPU Time
515
AppInsight for SQL Details View (Queries Tab)
516
Most Expensive Queries
Database Details View
516
517
To navigate to the Database Details view:
517
Active User Connections
518
Connections
519
Database Availability
521
Zooming
522
Database Details
523
Database Disk I/O
524
Database Size by File
525
Log Flushes
526
Storage
530
Top 10 Clustered Indexes by Fragmentation
539
To change the thresholds for the Top Indexes for Database performance
counter:
540
Top 10 Most Expensive Queries by CPU Time
542
Top 10 Nonclustered Indexes by Fragmentation
543
Top 10 Tables by Size
545
Transaction Log Disk I/O
547
Transaction Log Size by File
548
Transactions
550
AppInsight for Exchange
554
AppInsight For Exchange Licensing
555
AppInsight for Exchange Requirements and Permissions
556
Quick Configuration and Navigation
558
Adding AppInsight for Exchange to a Node
558
Understanding the AppInsight for Exchange Details Views
563
Navigating the AppInsight for Exchange Details View
564
Advanced Manual Configuration
567
Changes that will be made to enable AppInsight for Exchange
568
Finding Exchange Credentials
569
Manually Configuring Exchange Server
571
Defining Exchange Credentials
571
Installing PowerShell 2.0 on Server 2008 R2:
572
Installing PowerShell 2.0 on Server 2012:
573
Create a Self-Signed Certificate:
574
WinRM 2.0
576
Create a Firewall Rule
576
Configuring IIS
578
For more information, see:
580
Finding Exchange URL Settings
581
To verify the PowerShell instance used by Exchange on a server, follow the
steps listed below:
581
PowerShell Permissions
584
Editing the AppInsight for Exchange Template
586
Attachment Extensions
587
AppInsight for Exchange Alerts
588
AppInsight for Exchange Details View
589
Active Alerts
590
Application Availability
590
Application Details
592
Calendar and Resource Booking
593
Critical Processes and Services
596
Exchange Event Log Message Details
603
Exchange Server
604
Information Store
609
Mailbox Database Copies
615
Mailbox Database Size and Space Used
618
Mailbox Database Status
619
Mail Database
624
Management
628
Replication
630
Replication Status Checks
634
Storage
637
Users By Mailbox Size
640
Users By % Mailbox Quota Used
642
Users By Messages Sent
644
AppInsight for Exchange Database Details View
646
To navigate to the Database Details view:
646
Active/Mounted Database Availability
646
Database Copies
648
Database Details
652
Database Disk I/O
660
Database File Size
661
Database I/O
662
Database Metrics
666
Events
669
Messages
671
Transaction Log Disk I/O
673
Transaction Log File Size
673
AppInsight for Exchange Mailbox Details View
674
Mailbox Details
674
Mailbox Synced Devices
676
Received Mail
676
Sent Mail
677
Total Mailbox and Attachments Sizes
678
Troubleshooting AppInsight for Exchange
680
Troubleshooting Permissions
680
Troubleshooting Exchange Performance Counters
683
Troubleshooting Error Codes in AppInsight for Exchange
686
Changing between 32-bit and 64-bit polling methods:
701
AppInsight for IIS
AppInsight for IIS Requirements and Permissions
AppInsight for IIS Requirements and Permissions
702
703
703
AppInsight For IIS Licensing
704
Understanding the AppInsight for IIS Details View
705
Editing Resources
706
AppInsight for IIS Alerts
707
Quick Configuration and Navigation
711
Adding AppInsight for IIS to a Node
711
Adding AppInsight for IIS via the Management Resource:
711
Editing the AppInsight for IIS Template
715
Editing the AppInsight for IISTemplate:
716
Navigating the AppInsight for IIS Details View
716
Navigating to the Website Details view:
718
Manually Configuring AppInsight for IIS
718
Installing PowerShell 2.0 and the WebAdministration Snapin
719
Downloading and Installing PowerShell 2.0 on Windows Server 2008:
719
Installing PowerShell 2.0 on Windows Server 2008
719
Installing PowerShell 2.0 on Windows Server 2008 R2
719
Set Execution Policy
721
Creating a Self-Signed Certificate
721
Creating a Firewall Rule
722
Updating WsMan Limits
722
Creating a WinRM Listener:
723
Finding IIS URL Settings
723
AppInsight for IIS Application Details View
725
Active Alerts
726
Application Availability
726
Application Details
728
Application Pools
728
Cache
730
Connections
733
IIS Average CPU and Memory Usage
735
IIS Average Network Traffic
737
Event Log Message Details
739
Management
739
Processes and Services
741
Sites
742
Top Page Requests by Average Server Execution Time
743
AppInsight for IIS Website Details View
745
Bindings
745
Connections
746
Files
749
Log Size by File
751
Management
751
Network I/O
752
Requests
753
Site Availability
756
Site Details
757
Site Size by Directory
758
SSL Certificate Expiration
758
Top Page Requests by Average Server Execution Time
759
Web Server Response Time
761
AppInsight for IIS Application Pool Details View
762
Application Pool Availability
763
Application Pool Details
764
Management
765
Worker Process Activation Service
765
Worker Process Cache
768
Worker Process Details
772
Worker Process Requests and Threads
773
Troubleshooting AppInsight for IIS
775
Access is denied when configuring AppInsight for IIS
776
Changing between 32-bit and 64-bit polling methods:
776
Credentials Test Failed
777
Polling fails due to a missing certificate.
778
IIS Polling Failed
779
Node Unreachable.
779
IIS Version Failed
780
WinRM Testing Failed
781
Error Code 1367
783
Error Code 1726
784
Error Code 16004
786
Error Code 16005
787
Error Code 16006
788
Error Code 16007
788
Error Code 16008
789
Error Code 16009
791
Error Code 16013
792
Error Code 16022
793
Error Code 16023
794
Error Code 16024
795
Error Code 16029
796
Error Code 16049
797
Error code 16090
798
Other Errors
800
An HTTPS listener currently exists on port 5986:
804
Create a Firewall Rule
805
Event IDs
806
Performance Counter Details View
815
Average Site Response Time
815
Performance Counters
816
Performance Counter Details
817
History Chart
818
Chapter 16: The AppStack Environment
820
Introduction to the AppStack Environment View
820
AppStack Categories and Data
825
Understanding AppStack
837
Understanding Status and Colors
Understanding Mixed Icons
Understanding Quick Links
838
838
839
Understanding Categories
Understanding the Category Status Summary
841
842
Understanding the Overview Bar:
842
Understanding Filtering Options
842
Understanding Filter Properties
843
Understanding Layouts
846
Understanding the AppStack Resource
848
Navigating AppStack
849
Using AppStack
850
Customizing the AppStack Environment View
852
Adding AppStack to a NOC View
854
Chapter 17: Agents
Agent Requirements
857
859
Accounts and Security Requirements:
860
Requirements for Remote Deployment from the Orion Server:Note: Other
remote or mass deployment methods do not have the same requirements.
861
Open Ports Requirements for Remote Deployment from the Orion Server:
861
Agent-Initiated (Active) Communication
861
Orion Server-Initiated (Passive) Communication
862
Agent Discovery
863
Add Agent via the Add Node Wizard
864
Windows Core Agent Installation
867
Deploying an Agent
868
Deploying Agent Software via Orion Server Push
868
Deploying the Agent Manually
872
Mass Deploying an Agent:
874
Packaging the Orion Agent for Deployment with Patch Manager
879
Gold Master Image
889
Agent Deployment in the Cloud
891
Manual Agent Deployment to Virtual Machines on Amazon Web Services:
891
Automated Agent Deployment to Virtual Machines on Amazon Web Services: 894
Automated Agent Deployment to Virtual Machines on Microsoft Azure:
897
Agent Settings
898
Managing Agents
901
Editing Agent Settings in the Control Panel
904
Agent Alerting
907
Certificates and the Agent
908
Changing the Agent Port
913
Changing Agent Modes
914
Keeping Track of Polling Methods
916
Connecting to a previously installed agent
919
Agent Performance Counters
919
Editing Agent Configuration
921
Changing between 32-bit and 64-bit polling methods:
Agent Alerting
922
923
Troubleshooting Agents and Deployment
924
Troubleshooting Server Push Deployment
925
Troubleshooting Manual Deployment
925
Troubleshooting Mass Deployment
926
Passive Agent: Connection Refused.
926
Passive Agent: Agent is not Running in Passive Mode.
927
Invalid Agent Version
927
Agent GUID is Different than the Requested ID.
927
Chapter 18: Alerting and Reporting
Alerting
928
928
Understanding Alerts
929
Managing Alerts
930
Managing Actions
931
Introduction to the Alert Wizard
933
Alert Properties
934
Trigger Conditions
935
Reset Condition
936
Time of Day
937
Trigger Actions
938
Reset Actions
940
Summary
942
Available Alerts
942
Adding Alerts
947
Adding Alert Actions
951
Sending an E-mail / Page
951
To configure an email/page action for an alert:
952
Playing a Sound
953
To configure a play sound action for an alert:
953
Logging an Alert to a File
954
To configure an alert log file for an alert:
954
Logging an Alert to the Windows Event Log
955
To configure alert logging to the Windows Event Log:
955
Logging an Alert to the NetPerfMon Event Log
956
To configure alert logging to the NetPerfMon Event Log:
956
Sending a Syslog Message
957
To configure an alert to send a Syslog message:
957
Executing an External Program
958
To configure an alert to execute an external program:
958
Executing a Visual Basic Script
959
To configure alerts to execute a Visual Basic (VB) script:
959
Emailing a Web Page
960
To configure an email web page action for an alert:
960
Using Text to Speech Output
961
To configure a text-to-speech output action for an advanced alert:
961
Sending a Windows Net Message
962
To configure SolarWinds to send a Windows Net message upon alert:
962
Sending an SNMP Trap
963
To configure SolarWinds to send an SNMP trap upon alert:
963
Restart IIS Site/Application Pool
964
Using Get or Post URL Functions
965
To configure SolarWinds to use GET or POST URL functions with alerts:
965
Dial Paging or SMS Service
966
Change Custom Property
966
To configure an email/page action for an alert:
966
Set Custom Status
967
To configure an email/page action for an alert:
967
Alert Details
968
Management
968
Alert Status Overview
969
Alert Definition Details
970
History of this Alert on this Object
972
Other Objects currently Experiencing the same Alert
972
Top 10 Objects by trigger count of this alert
973
Alert notes
974
Viewing Alerts in the SolarWinds Web Console
To view alerts in the Web Console:
Acknowledging Alerts in the Web Console
To acknowledge alerts using the SolarWinds Web Console:
Viewing Alerts from Mobile Devices
To view and acknowledge alerts from a mobile device:
Understanding Condition Groups
974
975
976
976
977
977
978
All Condition Group
978
Any Condition Group
978
None Condition Group
979
Not All Condition Group
979
SolarWinds SAM Alerts
979
Component Monitor Alerting Properties
980
Application Monitor Alerting properties
983
Application Monitor Variables for Alerts
983
Component Monitor Variables for Alerts
994
Web Console Based Reports
1009
Using Predefined Web Console Based Reports
1010
Predefined Server & Application Monitor Web Console Based Reports
1010
Application Reports
1010
Agent Reports
1012
Group Reports
1012
Hardware Health Reports
1013
Interface Reports
1014
Node Reports
1016
Creating and Editing Web Based Reports
1021
Edit Report Screen
1023
Report Width:
1023
Header Section:
1024
Logo
1024
Content Section:
1025
Page Layout
1025
Layout Columns
1027
For drop down Menu
1027
Edit Table
1028
Edit Resource Screen
1028
Table Layout
1029
Table Layout
1031
Table Layout (Column Details)
1031
Display Settings
1033
Creating a Scheduled Report
1033
Scheduling a Web-Based Report
1034
Creating a Web-Based Report Schedule
1034
Using an Existing Web-Based Report Schedule
1038
Adding a Custom Table to a Web-Based Report Column
Desktop Notification Tool
Chapter 19: Monitoring Quality of Experience
1038
1040
1044
Introduction
1045
Requirements
1045
Network Packet Analysis Sensor Requirements
1046
Server Packet Analysis Sensor Requirements
1046
Port Requirements
User Scenarios
1046
1047
Scenario: High Response Time
1047
Packet Analysis Sensor Licensing
1047
Viewing Packet Analysis Sensor Licensing Details
1047
Purchasing Additional Licenses
1048
Activating Additional Licenses
1048
Common Packet Analysis Sensor Deployment Scenarios
1049
Aggregation per application
1050
Aggregation with access to network (NPAS)
1051
Aggregation with access to application servers (SPAS)
1052
Aggregation per site
1053
Aggregation per site with access to network (NPAS)
1054
Aggregation per site with access to application servers (SPAS)
1055
Aggregation per computer
1056
Aggregation per computer with access to network (NPAS)
1057
Aggregation per computer with access to application servers (SPAS)
1058
Deploying a Network Sensor
1059
Deploying a Server Sensor
1060
Configuring Nodes and Applications to Monitor
1060
Monitoring QoE Applications
1061
Defining Custom HTTP Applications
1062
Advanced Sensor Configuration
1064
Configuring the Monitored Interface
1064
Configuring the Number of CPU Cores and Allocated Memory
1065
Packet Analysis Sensor Agents
1066
Quality of Experience Resources
1066
All Nodes with QoE Traffic
1066
Application Response Time (Time to First Byte)
1067
Application Response Time (Time to First Byte)
1068
Business Related vs. Social Traffic
1068
Changing an Application Productivity Rating
1069
Data Volume By Application
1069
Data Volume By Node
1070
Network Response Time (TCP Handshake) by Application
1071
Network Response Time (TCP Handshake) by Node
1072
QoE Applications/Nodes Exceeding Thresholds
1073
Configuring Response Time Thresholds
Quality of Experience Application Details
Managing QoE Applications
Quality of Experience Application Stats
Managing QoE Applications
1073
1074
1074
1075
1075
Top XX Application Response Time
1076
Top XX Data Volume
1077
Top XX Network Response Time (TCP Handshake)
1078
Top XX Transactions
1079
Traffic By Category
1080
Changing an Application Category
Traffic By Risk Level
1081
1082
Changing an Application Risk Level
1082
Transactions By Application
1083
Transactions By Node
Chapter 20: Monitoring Hardware Health
1084
1085
Hardware Items Monitored by SAM
1086
Hardware Monitoring and VMware
1086
Accessing Hardware Monitoring Agent Software
1087
Adding Server Hardware Monitoring
1088
Add Node Wizard
1088
Manually Add Hardware Monitoring
1088
Hardware Details
1089
Current Hardware Health Status
1090
Hardware Health Overview Chart
1091
Changing Threshold Values
1092
Hardware Health Chart
1095
Customizing the Hardware Health Chart
1096
Chapter 21: Viewing Performance and Status
1099
Understanding the SAM Application Summary
1099
Understanding SAM Application Details
1101
Understanding SolarWinds SAM Component Details
1102
Understanding SolarWinds SAM Component Settings
1104
Showing SolarWinds SAM Data in Node Details
1104
To enable SolarWinds SAM-specific resources:
Customizing SAM Application Summary Views
1104
1105
Pre-configured Summary Views
1105
Summary View Filtering Criteria
1106
To create a Filtered Applications Summary view based on the default SAM
Application Summary view:
1107
To add a summary view menu item to the menu bar in the Applications tab:
1107
Customizing Application Details Views
1108
Default Application Details View
1108
Custom Application Details View
1108
To customize an application details view for an assigned Application Monitor:
1108
Managing Custom Application Details Views
1109
To select a view for a template:
1109
To select a view for an application:
1109
Viewing Node and Application Data in Tooltips
1110
Node Tooltips
1110
Application Tooltips
1111
Monitoring Network Events in the Web Console
1111
Viewing Event Details in the Web Console
1111
To view event details in the Web Console:
1112
Acknowledging Events in the Web Console
1112
To acknowledge events in the Web Console:
Understanding Volume Details
To navigate to the Volume Details page:
Volume Details Resource
1112
1113
1113
1113
Volume Polling Details
1114
Total Disk IOPS
1114
Avg. Disk sec/Transfer
1115
Disk queue length
1117
Avg. Disk Space Used - Today
1118
Percent Disk Space Used - Today
1119
Volume Size
1120
Volume Thresholds and Planning
1121
Editing Capacity Planning Thresholds
1121
CPU Capacity Forecast Chart
1122
Memory Capacity Forecast Chart
1123
Node Resource Capacity Forecast
1125
Volume Capacity Forecast
1125
Top XX Capacity Problems
1126
Understanding Interface Details
1127
Interface Details Resource
1128
Percent Utilization
1128
Min/Max Average bps In/Out Chart
1129
Percent Utilization - Line Chart
1130
In/Out Errors and Discards
1132
Total Bytes Transferred
1133
Min/Max/Average Packets In/Out
1134
Chapter 22: Creating Account Limitations
Using the Account Limitation Builder
Creating an Account Limitation
To create an account limitation:
Deleting an Account Limitation
To delete an account limitation:
1137
1137
1137
1137
1138
1138
Chapter 23: Managing Processes, Services, Tasks, and Events in Real Time 1139
Real Time Process Explorer
Accessing the Real Time Process Explorer
Node Details page
1139
1140
1140
To navigate to the Node Details page:
1140
Application Details page
1141
To navigate to the Application Details page:
1141
Component Details page
1141
To navigate to the Component Details page:
1142
Monitoring Unmonitored Processes
To have SAM monitor a process that is not being monitored:
Using the Real Time Process Explorer
1142
1142
1142
To show all running processes:
1144
To show a set number of running processes:
1144
To pause polling:
1144
To end processes:
1144
To start polling:
1145
Real Time Process Explorer Alerts
1145
Real Time Process Information in Top XX Alerts
1145
Service Control Manager
Accessing the Service Control Manager
1148
1148
Application Details page
1148
To navigate to the Application Details page:
1149
Component Details page
1149
Node Details page
1149
To navigate to the Node Details page:
1150
Using the Service Control Manager
1150
Starting and Stopping a Service:
1151
Windows Scheduled Task Monitor
1152
Requirements for the Windows Scheduled Task Monitor
1152
Enabling the Windows Scheduled Task Monitor
1153
Accessing the Windows Scheduled Task Monitor
1155
Understanding the Windows Scheduled Task Monitor
1156
Alerting Using Windows Scheduled Task Monitor Macros
1157
1157
Windows Scheduled Task Monitor Returned Status Codes
1158
WTSM Status
Real Time Event Viewer
1161
1162
Accessing the Real Time Event Viewer
1163
To navigate to the Node Details page:
1163
To navigate to the Application Details page:
1163
To navigate to the Component Details page:
1164
Filtering Events
To Select a Log Type:
1164
1164
Reading Events
1166
Monitoring Events
1166
Component Monitor Wizard
1167
Chapter 24: Monitoring Syslog Messages
1168
Configuring the SolarWinds Syslog Port
1168
To configure the Syslog port:
Syslog Messages in the Web Console
1169
1169
Syslog Resources
1169
Viewing Syslog Messages in the Web Console
1170
To view Syslog messages in the Web Console:
Acknowledging Syslog Messages in the Web Console
To acknowledge Syslog messages in the SolarWinds Web Console:
Using the Syslog Viewer
Viewing and Acknowledging Current Messages
To view and acknowledge current Syslog messages:
Searching for Syslog Messages
To search the Syslog message list:
Syslog Server Settings
1170
1171
1171
1172
1172
1172
1172
1172
1173
To start and configure the Syslog Viewer:
1173
Configuring Syslog Viewer Filters and Alerts
1174
To configure Syslog Viewer filters and alerts:
1174
Available Syslog Alert Actions
1176
Forwarding Syslog Messages
1178
To configure the forward Syslog message action:
1178
Syslog Alert Variables
1178
Syslog Date/Time Variables
1178
Other Syslog Variables
1179
Syslog Message Priorities
1180
Syslog Facilities
1180
Syslog Severities
1181
Chapter 25: Monitoring SNMP Traps
1183
The SNMP Trap Protocol
1183
Viewing SNMP Traps in the Web Console
1183
To view SNMP traps in the Web Console:
Using the Trap Viewer
Viewing Current Traps
To view current trap messages:
Searching for Traps
To search the trap message list:
Trap Viewer Settings
1184
1184
1184
1184
1185
1185
1185
To start and configure the Trap Viewer:
1185
Configuring Trap Viewer Filters and Alerts
1186
To configure SolarWinds to send an SNMP trap upon alert:
1186
Available Trap Alert Actions
1187
Trap Alert Variables
1189
Trap Date/Time Variables
1189
Other Trap Variables
1191
Chapter 26: Managing the SolarWinds SAM Database
Using Database Manager
Adding a Server
To add a SQL server to Database Manager:
1192
1192
1193
1193
Creating Database Backups
1193
Restoring a Database
1193
To restore a database from backup:
1193
Compacting your Database
1194
Compacting Individual Tables
1194
Viewing Database Details
To view database details:
Viewing Table Details
1194
1194
1195
To view table details:
1196
Editing Database Fields
1196
To edit database fields with Database Manager:
Detaching a Database
To detach a database:
Using SQL Server Management Studio
To use SQL Server Management Studio to manage your database:
Database Maintenance
Running Database Maintenance
To run the Database Maintenance utility:
Migrating your Database
1196
1197
1197
1198
1198
1200
1200
1200
1201
Stopping SolarWinds Services
1201
To stop SolarWinds services:
1201
Migrating SolarWinds SAM
1201
To migrate SAM:
1202
Creating a Database Backup File with SQL Server Management Studio
1203
To backup your database using SQL Server Management Studio:
1203
To restore your database backup file on a server running SQL Server 2008: 1204
To update SAM to use a new database:
1205
Moving SAM to a New Server
1206
To replicate the original certificate:
1206
To export data from one Orion database and import it into another:
1207
Chapter 27: Creating Custom Properties
Creating a Custom Property
To create a property with Manage Custom Properties Editor:
Removing a Custom Property
To remove a custom property:
Importing and Exporting Custom Property Data
To import custom property data:
1209
1209
1210
1211
1211
1212
1212
To export custom property data:
Editing Custom Properties
1213
1214
To edit a custom property:
1214
To edit a custom property's value:
1214
Chapter 28: Additional Polling Engine and Web Console
Understanding How Polling Engines Work
1216
1216
SolarWinds SAM is Poller-Unaware By Default
1217
SolarWinds SAM Additional Polling Engines are Poller-Aware
1217
Requirements for Installing an Additional Polling Engine
1218
Installing an Additional Polling Engine
1219
To install the additional polling engine:
1220
To assign nodes to polling engines:
1220
Installing an Additional Web Console
1221
To install an additional Web Console:
1221
Copying the Default Reports
1221
Chapter 29: Orion Variables and Examples
1223
Variable Construction
1223
Variable Modifiers
1223
Orion Alert Variables
1224
General Alert Variables
1224
Date Time
1226
Group Variables
1227
SQL Query
1228
Status Values
1229
Node Variables
1230
Example Messages Using Variables
1235
Using Macro Formatters
1236
Syslog Alert Variables
1236
Syslog Date/Time Variables
1237
Other Syslog Variables
1238
Trap Alert Variables
Trap Date/Time Variables
1239
1239
Other Trap Variables
1240
Chapter 30: Status Icons and Identifiers
1242
Chapter 30: Interface Variables and Errors
1243
Interfaces
1243
Interface Traffic
1244
Interface Errors
1246
Chapter 31: SolarWinds Variables and Examples
1247
Variable Modifiers
1247
95th Percentile Calculations
1248
Regular Expression Pattern Matching
1249
Characters
1249
Character Classes or Character Sets [abc]
1249
Anchors
1251
Quantifiers
1252
Dot
1254
Word Boundaries
1254
Alternation
1254
Regular Expression Pattern Matching Examples
1255
Alert Engine Variables
1256
General
1256
Date/Time
1257
Group Variables
1258
SQL Query
1260
Status Variables
1261
Node Variables
1262
Volume Variables
1271
Hardware Specific Variables
1273
Hardware Status
1273
Node Hardware Type
1275
Node Hardware Sensor
1276
I/O Operations Macros
1277
Asset Inventory Alert Macros
1277
Example Messages Using Variables
Syslog Alert Variables
1279
1279
Syslog Date/Time Variables
1279
Other Syslog Variables
1281
Trap Alert Variables
1281
Other Trap Variables
1281
Trap Date/Time Variables
1282
Script Macros
1284
Node Custom Property Macros
1285
Application Custom Property Macros
1285
Baseline Threshold Macros
1285
Chapter 32: Network Atlas
1287
What is in a Map?
1287
Example Maps
1288
Installing Network Atlas
1289
Network Atlas Requirements
1289
Network Atlas Requirements
1289
Creating a Basic Map
1290
Starting Network Atlas
1290
To start Network Atlas:
Adding Map Objects
To add monitored objects to your map:
Connecting Map Objects Manually
To manually connect map objects:
Using Object Links to Represent Interface Status
To use object links to represent actual interface states:
1290
1291
1291
1292
1292
1292
1292
Interpreting Map Links
1292
Using Anchor Points to Reshape Map Links
1293
To use object link anchor points:
Adding a Background
1293
1293
Selecting a Background Color
1293
To set a map background color:
1293
Selecting a Background Texture
1293
To set a map background textures:
1293
Selecting a Background Image
1294
To select a background image:
1294
Clearing the Background
1295
Saving Maps
To save a map:
Opening Maps
To open a map:
1295
1295
1296
1296
Displaying Maps in the Web Console
1296
Map Resources in the Network Atlas Web Console
1296
Displaying Maps in the SolarWinds Web Console
1297
To display a saved map in the Home view of the SolarWinds Web Console: 1297
Displaying Maps in the SolarWinds EOC Web Console
1297
To display a saved map in the Home view of the SolarWinds EOC web con1297
sole:
Advanced Mapping Techniques
1298
Zooming In and Out of a Map
1298
Creating Nested Maps
1298
To create a nested map:
1300
Displaying Map Object Metrics
1300
To add the secondary status indicator:
1300
To change the thresholds of the metrics:
1300
Adding Independent Map Objects and Floating Labels
1301
To add an independent object:
1301
To add an independent label:
1301
Changing the Appearance of Map Objects
1301
To set the default representations of map objects:
1301
To change the representation of selected map objects:
1301
Pasting Custom Icons from the Windows Clipboard
1302
To paste a custom icon into Network Atlas:
1302
To delete a custom icon:
1303
Adding Custom Icons from Graphics Files
1303
To add custom icons from graphics files:
1304
To assign a custom icon to an object:
1304
Changing the Appearance of Links
To change the appearance of a link:
Changing the Appearance of Labels
1304
1304
1304
To move a label:
1304
To edit the text in a label:
1305
To change the appearance of a label:
1305
Linking Map Objects to URLs
To link a map object to a URL.
1305
1305
Linking or Embedding Maps in Web Pages
1306
Customizing SolarWinds Web Console Tooltips
1306
To add additional information to map object tool tips:
1306
Example Custom SolarWinds Node Tooltip
1307
Advanced Map Layouts
1307
Displaying Grid Guides
1307
To display a grid:
1307
To customize the grid:
1308
Aligning Map Objects
1308
Distributing Map Objects
1308
Selecting Automatic Layout Styles
1309
To arrange map objects according to a layout style:
Map Properties
1310
1310
Setting the Map Up Status Threshold
1310
To set the percentage of map objects that determine Up status of a map:
1310
Overriding Account Limitations
1310
To hide nodes from users who have account limitations:
1311
To reveal nodes to all users:
1311
Network Atlas Settings
1311
Network Atlas Tooltip Variables
1312
Application Variables
1312
Application Component Monitor Variables
1313
Date and Time Variables
1314
General Variables
1315
Node Variables
1316
Volume Variables
1322
Wireless Variables
1323
Group Variables
1324
Chapter 33: Configuring Automatic Login
Using Windows Pass-through Security
To enable IIS NT security for Windows Pass-through Security:
1326
1326
1327
Passing Login Information Using URL Parameters
1328
Using the DirectLink Account
1329
To enable a DirectLink account for the SolarWinds Web Console:
Chapter 34: Component Monitor Types
DHCP User Experience Monitor
1329
1330
1331
Statistic
1331
Field Descriptions:
1331
Directory Size Monitor
1333
Statistic
1334
Field Descriptions:
1334
DNS Monitor - TCP
1335
Statistic
1335
Field Descriptions:
1335
DNS User Experience Monitor
1336
Statistic
1336
Field Descriptions:
1337
DNS Monitor - UDP
Statistic
Download Speed Monitor
1338
1338
1339
Statistic
1339
Field Descriptions:
1339
Exchange Web Services User Experience Monitor
1340
Field Descriptions:
1341
File Age Monitor
1342
Statistic
1342
Field Descriptions:
1342
File Count Monitor
1344
Statistic
1344
Field Descriptions:
1344
File Existence Monitor
1346
Statistic
1346
Field Descriptions:
1346
File Change Monitor
1347
Statistic
1347
Field Descriptions:
1347
File Size Monitor
1349
Statistic
1349
Field Descriptions:
1349
FTP User Experience Monitor
1350
To configure the FTP User Experience Monitor and generate a snapshot check1351
sum:
Statistic
1351
Field Descriptions:
1351
FTP Monitor
1353
Statistic
1353
Field Descriptions:
1353
HTTP Form Login Monitor
1354
Statistic
1354
Troubleshooting
1354
Field Descriptions:
1355
HTTP Monitor
1358
Statistic
1358
Field Descriptions:
1358
HTTPS Monitor
1361
Statistic
1361
Field Descriptions:
1361
IMAP4 Monitor
1365
Statistic
1365
Field Descriptions:
1365
IMAP4 User Experience Monitor
1366
Statistic
1366
Field Descriptions:
1366
JMX Monitor
Field Descriptions:
LDAP User Experience Monitor
1368
1368
1370
Statistic
1370
Field Descriptions:
1370
Linux/Unix Script Monitor
1372
Statistic
1372
Field Descriptions:
1372
MAPI User Experience Monitor
1374
Install the MAPI Client on Your SolarWinds SAM Server
1374
Statistic
1375
Notes:
1375
Field Descriptions:
1375
Nagios Script Monitor
Field Descriptions:
1377
1377
NNTP Monitor
1379
Statistic
1379
Field Descriptions:
1379
ODBC User Experience Monitor
1380
Statistic
1380
Install ODBC Drivers on the SolarWinds SAM Server.
1381
TCP Ports
1381
Field Descriptions:
1381
To create the SQL Server connection string:
1382
Oracle User Experience Monitor
1383
Statistic
1384
Install Oracle Client on the SolarWinds SAM Server.
1384
TCP Ports
1384
Field Descriptions:
1384
Performance Counter Monitor
1388
Statistic
1389
Field Descriptions:
1389
POP3 Monitor
1391
Statistic
1392
Field Descriptions:
1392
POP3 User Experience Monitor
1393
Statistic
1393
Field Descriptions:
1393
Process Monitor - SNMP
1394
Statistic
1395
Field Descriptions:
1395
Process Monitor - WMI
1396
Statistic
1396
Field Descriptions:
1396
RADIUS User Experience Monitor
1398
Statistic
1398
Field Descriptions:
1398
Service Status – SNMP
1399
Statistic
1399
Field Descriptions:
1399
SMTP Monitor
1400
Statistic
1401
Field Descriptions:
1401
SNMP Monitor
1402
Statistic
1402
Field Descriptions:
1402
SOAP Component Monitor
1403
Field Descriptions:
1404
SQL Server User Experience Monitor
1407
Statistic
1407
Field Descriptions:
1407
SSL Certificate Expiration Date Monitor
Field Descriptions:
TACACS+ User Experience Monitor
1409
1409
1411
Statistic
1411
Field Descriptions:
1411
TCP Port Monitor
1412
Statistic
1412
Field Descriptions:
1412
Tomcat Server Monitor
1413
Statistic
1413
Field Descriptions:
1414
VMware Performance Counter Monitor
1416
Statistic
1416
Field Description:
1417
Web Link Monitor
1420
Statistic
1420
Field Descriptions:
1420
Windows Event Log Monitor
1422
Statistic
1422
Field Descriptions:
1422
Windows PowerShell Monitor
1426
Statistic
1426
Field Descriptions:
1426
Windows Script Monitor
1428
Field Descriptions:
1429
Windows Service Monitor
1431
Statistic
1431
Field Descriptions
WMI Monitor
1431
1432
Statistic
1433
Field Descriptions:
1433
Chapter 35: Filter Syntax Reference
1435
To apply a resource filter:
1435
Filter Syntax
SQL or SWQL?
SWQL Filter Syntax Examples
1435
1435
1436
Wildcards
1436
Filtering by Custom Property
1436
Filtering by Built-in Properties
1436
Examples
1436
Filtering by Status
1436
SQL Filter Syntax Examples
1437
Wildcards
1437
Filtering by Custom Property
1437
Examples
1437
Filtering by Status
1437
SWQL Resource Matrix
EOC Filters
1438
1438
Alert Resource Filters
1438
Orion SAM Resource Filters
1438
Events Filters
1441
Inventory Filters
1441
EOC Filters
1441
IP SLA Filters
1443
NCM Filters
1445
NTA Filters
1446
Wireless Filters
1446
Summary Report Filters
1447
SysLog Filters
1448
Trap Filters
IVIM Filters
1448
1448
Virtualization Summary
1448
Datacenter Details
1449
Cluster Details
1449
SolarWinds SAM Filters
1450
SAM Resource Filters
1450
Configuring and Integrating
JMX
JConsole
To login to JConsole:
Adding a JMX Component Monitor to SAM
To add a JMX Monitor to a node using the wizard:
1453
1453
1454
1455
1456
1456
Configuring Java Applications Servers for JMX
1459
Configuring Java Virtual Machines for SNMP
1475
Configuring a Standalone Java Virtual Machine
1475
Configuring Apache Tomcat (tested on version 7.0)
1478
Configuring JBoss (tested on versions 5.0.1, 5.1, and 6.0)
1479
Configuring GlassFish (tested on version 3.1):
1481
Configuring IBM WebSphere (tested on version 7.0):
1481
Configuring Oracle WebLogic (tested on version 10.3.4.0)
1482
Enabling Java SNMP monitoring for Weblogic
MAPI
The MAPI User Experience Monitor in SAM
1485
1486
1487
What credentials should a user use?
1487
Why does the profile have to be able to log in to the SAM server?
1487
Install the MAPI Client on the SolarWinds SAM Server
Field Descriptions of the MAPI Monitor:
Troubleshooting MAPI
1487
1489
1490
MAPI Probe Diagnostic Checklist
1491
Install CDO or Outlook
1491
Check the MAPI profile
1491
Check probe settings
1491
Mailbox recommendations
1492
Advanced Troubleshooting
1492
SolarWinds.APM.MAPI.exe Command Line Arguments
1492
In SAM v5.0+:
1493
New in SAM 5.0+ (not listed in the configuration file):
1494
Oracle
1495
Physical and Logical Structures
1495
Storage
1495
Disk files
1495
Configuring SAM to Monitor an Oracle Database Server
1496
Prerequisites for Oracle Server Monitoring
1496
Installing ODP.Net
1496
Installing the Basic Lite Oracle Client
1502
Adding an Oracle Database Server to SAM
1505
Monitoring an Oracle Database on an Existing Node
1512
Getting the Required Settings
1516
Troubleshooting
1519
Oracle Client Driver and Server Compatibility
1520
SAM is Unable to Load the Oracle Client Driver
1520
Troubleshooting Steps:
1521
Using Process Explorer to Determine if SAM is Loading the Correct Oracle Cli1522
ent Library
Using Process Monitor to Determine Why the Oracle Client Fails
1524
Oracle User Experience Monitor is Unable to Connect to the Oracle Server
1527
Troubleshooting steps:
1528
Using the Oracle SQL*Plus Tool to Troubleshoot Connectivity Issues:
1529
Connecting to an Oracle Server Using Simple Syntax
1529
Connecting to the Oracle Server Using Full Oracle Connection Syntax
1530
Executing queries using SQL*Plus
1532
PowerShell
PowerShell and SAM: Configuration and Usage
1534
1535
Exchange 2010 Management Tools
1535
Installation of Exchange Management Tools:
1536
64-bit vs. 32-bit
1539
Platform Scenarios
1539
Troubleshooting PowerShell Snap-In Compatibility
1540
PowerShell Templates and Monitors
1542
PowerShell Code with SAM
1546
Scripts Must Report Status Through Exit Codes
1548
Scripts with Text Output
1549
Remote Execution vs. Local Execution
1550
Script:
1550
To save this script as a PowerShell (ps1) file:
1551
To open the PowerShell console:
1551
To run this command via remote execution:
1551
To run this command via local execution:
1551
Execute Scripts Remotely via Secure WinRM
1552
PowerShell 2.0 Remoting Requirements
1553
PowerShell 2.0 Remoting Configuration
1554
Configuration of the Remoting Server
1554
Create a Self-signed Certificate
1554
Create a WinRM HTTPS Listener
1562
Adding a Firewall Exception
1564
Remoting Client/SAM Computer Configuration
Transferring the Certificate:
1565
1568
Communicate with Remoting Host
1572
Setup Windows PowerShell Monitor in SAM
1574
LDAP
LDAP Key Terms and Components
1577
1577
Distinguished Names
1577
Search Root
1578
Search Filter
1578
Basic LDAP Syntax
1578
The LDAP User Experience Monitor
1580
Use the LDAP Monitor to test that:
1580
How this Monitor Works:
1581
Integrating the LDAP User Experience Monitor
1581
Prerequisites
1581
Fields Defined
1581
Credentials
1583
How To...
1585
How To Add and Manage Resources in a Page View
1585
How To Change the Width and Number of Columns in a Page View
1587
How To Disable Asset Inventory Data Collection
1587
How to Handle Microsoft Server Clusters in AppInsight for SQL
1587
AppInsight for SQL: Create an alert trigger based on how much available space is
occupied by actual data in the database.
1588
How to Remove an Application Template from Multiple Nodes
1588
How to Monitor Multiple Instances of Sqlservr.exe
1588
How to Restart a Windows Service with an Alert Action
1589
How to Wrap a VBScript Around an Executable File
1590
How to Control Whether Alerts are Repeated or Suppressed if a Condition Still
Exists
1590
How to Stop the Polling of all Applications Monitored by SAM.
1591
How To Use VB Script to Monitor Your SSL Expiration Date
1591
How to Monitor an Application Process Launched from a Specific Path.
1595
Troubleshooting
Slow Performance on Windows Server 2008
To Disable TCP Auto-tuning:
1597
1598
1599
Why do my SAM WMI Monitors Show Status Unknown?
1599
Working with Temporary Directories
1600
Moving the SQL Server Temporary Directory
1600
Redefining Windows System Temporary Directories
1600
To Redefine Default System Temporary Directories:
WMI Troubleshooting Flowchart for SolarWinds SAM
1601
1602
Testing Local WMI Services
1603
Test WMI on the Target Server
1603
Reset the WMI Counters
1606
To manually reset the WMI counters:
1606
Testing Remote WMI Connectivity
1606
Remotely Test WMI on the Target Server
1606
Verify Administrator Credentials
1609
Enable Remote Procedure Call (RPC)
1609
To enable the RPC service:
1609
Configure Distributed Component Object Model (DCOM) and User Account
Control (UAC)
1609
Enabling DCOM
1610
To enable DCOM permissions for your Server & Application Monitor credentials:
Enabling Account Privileges in WMI
To enable namespace and sub-namespaces privileges:
Disabling Remote User Account Control for Workgroups
To disable remote UAC for a workgroup computer:
1610
1611
1611
1611
1612
Add a Windows Firewall Exception for Remote WMI Connections
1612
Do You Need an Additional Polling Engine?
1612
Verify SAM Component Configuration
1613
Service reporting, "Invalid Class"
1613
WMI is Still Not Working. Now What?
1614
Troubleshooting Hardware Health
1615
Hardware Prerequisite Checklist
1615
Hardware Troubleshooting Flowchart
1617
Troubleshooting an SNMP Node
1618
Using SNMPWalk.exe:
Troubleshooting a WMI Node
Using Wbemtest.exe to troubleshoot WMI:
Troubleshooting a VMWare Node
To determine if a node is polled through the vCenter or directly:
1619
1620
1620
1622
1623
Troubleshooting AppInsight for Exchange
1624
Troubleshooting Permissions
1624
Troubleshooting Exchange Performance Counters
1627
Troubleshooting Error Codes in AppInsight for Exchange
1630
Troubleshooting AppInsight for IIS
1645
Access is denied when configuring AppInsight for IIS
1647
Changing between 32-bit and 64-bit polling methods:
1647
Credentials Test Failed
1648
Polling fails due to a missing certificate.
1649
IIS Polling Failed
1649
Node Unreachable.
1650
IIS Version Failed
1651
WinRM Testing Failed
1652
Error Code 1367
1654
Error Code 1726
1655
Error Code 16004
1657
Error Code 16005
1658
Error Code 16006
1659
Error Code 16007
1659
Error Code 16008
1660
Error Code 16009
1662
Error Code 16013
1663
Error Code 16022
1664
Error Code 16023
1665
Error Code 16024
1666
Error Code 16029
1667
Error Code 16049
1668
Error code 16090
1669
Other Errors
1671
An HTTPS listener currently exists on port 5986:
1675
Create a Firewall Rule
1676
Event IDs
1677
Troubleshooting Agents
SAM Page Help
1686
1687
What Changes will be made?
1687
AppInsight for Exchange: Learn more
1688
Help me find these Credentials
1688
Manually Configuring AppInsight for IIS
1688
Inherit Credentials from Node
1689
AppStack: Hiding Up Objects
1689
How To Install PowerShell 2.0 on the Exchange Server
1689
Installing PowerShell 2.0 on Server 2008:
1689
Installing PowerShell 2.0 on Server 2012:
1690
Creating an Active Directory account with local administrative privileges.
Defining Exchange Credentials
1693
1693
Creating an Active Directory account with organization wide Exchange access
(View-Only-Organization Management and Mailbox Search Management
Role).
1694
Create a self-signed certificate.
1697
Create a Firewall Rule.
1698
1701
Setup PSLanguageMode for the PowerShell web site.
Prepare the PowerShell web site for configuration.
Configuring IIS
1701
1703
1703
Application Custom Properties
1705
Find Processes, Services and Performance Counters
1705
SolarWinds SAM Application Detail Reports
1705
Active Application Alerts
1706
Application Availability
1706
Application Details
1706
Last XX Application Events
1707
Application Dependencies
1707
Availability Statistics
1708
Custom Area Graph
1708
Custom Bar Graph
1708
Custom Line Graph
1709
Components
1709
Processes and Services
1709
Application Health Overview
1709
Application Summary Reports
1710
All Applications Tree
1711
Active Application Alerts
1711
Last 25 Application Events
1711
Applications With Problems
1712
Custom HTML Resource
1712
Down Applications
1712
Getting Started with SAM
1712
No Applications Defined
1712
thwack Community: Latest Application Monitor Templates
1712
Top XX Processes by CPU Load
1713
Top XX Processes by Physical Memory
1713
Top XX Components by Response Time
1714
Top XX Components by Statistic Data
1714
User Links Resource
1715
Top XX Processes by Virtual Memory
1715
What’s New in SolarWinds SAM
1716
SolarWinds SAM Charts
1716
Component Monitor Library
1716
Component Settings
1716
Configuration Settings for SolarWinds Server & Application Monitor
1717
Add New Application Monitors
1717
Application Discovery
1718
Assigned Application Monitor
1718
Create or Edit Template
1718
Create Assigned Application
1719
Create Assigned Application Monitor
1719
Credentials Library
1719
Data and Database Settings
1720
Database Settings
1720
Poller Setting
1720
Licensing Summary
1721
Manage Application Monitor Templates
1721
Manage Assigned Application Monitors
1722
Manage Assigned Component Monitors
1723
Manage Component Monitors Within Templates
1723
Conversion Value
1723
Customize Chart
1723
Creating a Windows Script Monitor
1725
Field Descriptions
1725
Available Data Transformations
1726
SolarWinds Server & Application Monitor Page Help
1730
Component Detail Reports
1730
Component Statistics – Linear Gauges
1730
Min/Max Average CPU Load
1732
Min/Max Average Physical Memory
1732
Min/Max Average Response Time
1733
Min/Max Average Statistic Data
1734
Min/Max Average Virtual Memory
1734
Component Availability
1735
Component Details
1735
Last XX Component Events
1736
Multi Component Statistics – Linear Gauges
1736
Multi Component Statistics – Statistic Data
1737
Multiple Value Component Statistics – Radial Gauges
1738
Multiple Statistic Chart
1739
Multiple Value Component Statistics – Linear Gauges
1739
Component Statistics – Radial Gauges
1740
Event Log Message Details Resource
1741
Node Details
1741
Applications
1742
Top XX Components by Response Time
1742
Top XX Processes by CPU Load
1743
Top XX Processes by Physical Memory
1743
Top XX Processes by Virtual Memory
1744
Top XX Components by Statistic Data
1744
Node Related XX Syslog Messages
1745
Tags
1745
SAM thwack Forum
1745
Shared Application Monitor Templates on thwack
1745
Finding Templates to Import
1746
Importing a Template
1746
Views by Application Type
1746
Real-Time Process Explorer
1746
Triggered Alerts - Last 30 Days
1747
Group Details
1747
CPUs by Percent Load
1747
Virtual Assets
1747
Adding VMs from the Virtual Assets Resource
1747
Virtual Asset Summary
1748
Node is not Being Polled via Windows Credentials
1748
Server & Application Monitor Template Reference
Active Directory
1752
1752
Active Directory 2003-2008 Services and Counters
1753
Active Directory 2008 R2-2012 Services and Counters
1759
AIX
1764
AIX
Monitored Components:
AIX LPD
Apache
Apache
1765
1765
1770
1770
1771
Apache (Windows)
Below is an example using the Scripts Arguments field:${IP},8080
APC PowerChute Agent (Windows)
Monitored Components:
1774
1775
1776
1776
Barracuda Spam and Virus Firewall
1779
Bind
1782
Bind (Linux - v9.5 and earlier)
Note: Tested on CentOS 5.5 and Bind 9.3.6 version.
Bind (Linux - v9.6 and higher)
Note: Tested on CentOS 5.5 and Bind 9.9.2 version.
1783
1783
1785
1785
Note: All monitors, except SNMP Process Monitor: Named, has the Count
statistic as difference option enabled and will show the statistical difference
from the last SAM polling cycle.All monitors except SNMP Process Monitor:
Named, require the following arguments: perl ${SCRIPT} path_to_rndc
path_to_named.statswhere path_to_rndc - This is full path to the rndc command. By default: /usr/local/sbin/rndc. path_to_named.stats - This is full path
1785
to named.stat file, which is generated by the “rndc stats” command.
Below is an example using the Scripts Arguments field:perl ${SCRIPT} /usr/local/sbin/rndc /var/named/named.stats
1785
Monitored Components:
BizTalk
BizTalk Server 2010 Adapters Performance Counters
Monitored Components:
BizTalk Server 2010 Host Throttling Performance Counters
Monitored Components:
1785
1793
1794
1794
1798
1798
BizTalk Server 2010 Message Box and Orchestrations Performance Counters 1805
BizTalk Server 2010 Availability Status
1810
BizTalk Server 2010-2013 Adapters Performance Counters
1812
Monitored Components
BizTalk Server 2010-2013 Availability Status
This template allows you to check the status of BizTalk statistics: Host
Instances, Orchestrations, Send Ports and Send Port Group by using WMI
queries.
1812
1816
1816
Prerequisites: WMI access on target server.Credentials: Administrator on target server.
1816
Note: Before using this template you should provide the correct names of
instances/ports/orchestrations in the Query field. See notes for each particular
monitor.
1816
Monitored Components
1816
BizTalk Server 2010-2013 Host Throttling Performance Counters
Monitored Components
1818
1818
BizTalk Server 2010-2013 Message Box and Orchestrations Performance Counters
1824
Monitored Components
Blackberry
1825
1829
Blackberry Delivery Confirmation
1830
Customizing Script Variables
1830
Blackberry Enterprise Server
1832
Monitored Components:
1832
Blackberry Enterprise Server 10 Services (Windows)
1833
Blackberry Enterprise Server 10 Statistic (SNMP)
1837
Cisco
1841
Cisco CallManager
1842
CiscoSecure ACS (via SNMP)
1844
Monitored Components:
CiscoWorks LAN Management Solution
Monitored Components:
Citrix
Citrix XenApp 5.0 Core Counters
Monitored Components
Citrix XenApp 5.0 ICA Session Counters
Monitored Components:
1844
1845
1845
1850
1851
1851
1855
1855
Citrix XenApp 5.0 Presentation Server Counters
1861
Citrix XenApp 5.0 Services
1866
Citrix XenApp 6.0 Core Counters
1869
Citrix XenApp 6.0 ICA Session
1872
Monitored Components:
Citrix XenApp 6.0 Presentation Server
1872
1878
Citrix XenApp 6.0 Services
1883
Clam AV
1885
CUPS
1887
DHCP User Experience Monitor
1889
Directory Size
1890
Distributed File System (DFS)
1891
DNS User Experience
1899
Download Speed Monitor
1900
Installing the Microsoft Windows Character Generator Service
1900
Enabling the Unix/Linux Character Generator Service
1900
Errors in Application Event Log
1902
Exchange 2007 and 2010
1903
Basic versus Advanced Templates
1903
Typical Usage Scenario
1903
Exchange 2007-2010 Client Access Role Services and Counters (Basic)
1905
Exchange 2007-2010 Mailbox Role Services and Counters (Basic)
1907
Exchange 2007-2010 Edge Transport Role Services and Counters (Basic)
1911
Exchange 2007-2010 Unified Messaging Role Services and Counters (Basic) 1914
Exchange 2007-2010 Common Performance Counters
1916
Exchange 2007-2010 Statistics with PowerShell
1919
Exchange 2007-2010 Hub Transport Role Services and Counters (Basic)
1926
Exchange 2007-2010 Mailbox Send and Receive Statistics with PowerShell
1929
Exchange 2010 Client Access Role Counters (Advanced)
1932
Exchange 2010 Mailbox Role Counters (Advanced)
1934
Exchange 2010 Hub Transport Role Counters (Advanced)
1939
Exchange 2010 Edge Transport Role Counters (Advanced)
1943
Exchange 2010 Unified Messaging Role Counters (Advanced)
1947
Exchange 2010 OWA Form Login (PowerShell)
1949
Exchange 2007 Client Access Role Counters (Advanced)
1950
Exchange 2007 Mailbox Role Counters (Advanced)
1952
Exchange 2007 Hub Transport Role Counters (Advanced)
1958
Exchange Server 2000 and 2003
1962
Exchange 2007 Edge Transport Role Counters (Advanced)
1963
Exchange 2007 Unified Messaging Role Counters (Advanced)
1967
Exchange 2007 Outlook Web Access (OWA) Form Login
1969
Exchange 2010 Statistics with PowerShell
1970
Basic versus Advanced Templates
1987
Typical Usage Scenario
1987
Exchange 2013 Client Access Role Services and Counters (Basic)
1987
Basic versus Advanced Templates
1990
Typical Usage Scenario
1990
Exchange 2013 Client Access Role Counters (Advanced)
1990
Exchange Active Sync Connectivity
1995
Files
File Age Monitor
1998
1999
Statistic
1999
Field Descriptions:
1999
File Change Monitor
2001
Monitored Components:
2001
File Count
2002
File Count Script
2003
Monitored Components:
File Existence Monitor
Monitored Components:
File Size Monitor
Monitored Components:
FTP User Experience
Monitored Components:
2003
2004
2004
2005
2005
2006
2006
GlassFish (JMX)
2007
GoodLink Server for Microsoft Exchange
2011
Monitored Components
Generic Mail Server
Monitored Components:
Group Policy Object (System and Application Logs)
2011
2015
2015
2016
Monitored Components:
Helix
Helix Universal Media Server (Linux/Unix)
Monitored Components:
Helix Universal Media Server (Windows)
Monitored Components:
HP-UX
Monitored Components:
HTTP
HTTP
Monitored Components:
2016
2020
2021
2021
2032
2032
2043
2043
2046
2048
2048
HTTPS Monitor
2049
HTTP Form Login
2050
Monitored Components:
IBM
2050
2050
IBM DB2
2051
IBM DB2 HADR Health
2055
IBM Informix
2058
IBM WebSphere (JMX)
2074
IMAP4 Round Trip Email
2077
Monitored Components:
ISC DHCP Server (Linux)
2077
2078
Note: Tested on CentOS 5.5 and ISC DHCP 3.0.5 version.
2078
Monitored Components:
2078
Java Application Server (SNMP)
2080
JBoss (JMX)
2087
Kaspersky Security Center Antivirus
2092
JD Edwards EnterpriseOne Server Manager (Windows)
2095
Monitored Components:
2095
LDAP User Experience Monitor
2098
Linux
2098
Linux CPU Monitoring Perl
2099
Monitored Components:
2099
Linux Disk Monitoring Perl
2101
Monitored Components:
2101
Linux Memory Monitoring Perl
Monitored Components:
Linux Sendmail Monitoring Perl
Monitored Components:
Log Parser
Log Parser (PowerShell)
Configuring Windows Remote Management (WinRM)
Log Parser (Perl)
Lotus
2104
2104
2107
2107
2108
2110
2110
2113
2114
Lotus Domino Server Processes and Network Ports (Windows)
2115
Lotus Domino Server Processes and Network Ports (Linux)
2118
Lotus Domino Server Statistics
2121
MAPI Round Trip Email
Monitored Components:
2125
2125
Memcached
2126
Microsoft Direct Access
2130
Microsoft DirectAccess 2008 R2
Configuring Windows Remote Management (WinRM)
Microsoft DirectAccess 2012
Configuring Windows Remote Management (WinRM)
Microsoft DirectAccess 2012 (Health with PowerShell)
Microsoft Dynamics
Microsoft Dynamics CRM 2011 Statistics
Monitored Components:
Microsoft Dynamics CRM 2011 Events
Monitored Components:
Microsoft Forefront
Microsoft Forefront Endpoint Protection 2010 (Client)
Monitored Components:
2130
2137
2137
2144
2144
2145
2146
2146
2152
2152
2158
2159
2159
Microsoft Forefront Endpoint Protection 2010 (Server)
2163
Microsoft Forefront Threat Management Gateway 2010
2166
Monitored Components:
Microsoft IIS
Internet Information Services and Counters (IIS)
2166
2171
2172
Monitored Components:
2172
Microsoft IIS SMTP Server
2174
Microsoft Lync
Microsoft Lync Server (Edge Role)
Monitored Components:
Microsoft Lync Server (Front-End Role)
Monitored Components:
Microsoft Lync Server (Mediation Role)
Monitored Components:
Microsoft Lync Server 2013 (Front-End Role)
Monitored Components:
Microsoft Lync Server 2013 (Edge Role)
Monitored Components:
Microsoft Lync Server 2013 (Mediation Role)
2177
2179
2179
2184
2184
2190
2190
2192
2192
2199
2199
2205
Monitored Components:
2205
Microsoft Message Queuing
2206
Microsoft Message Queuing (Performance)
Monitored Components:
Microsoft Message Queuing Events
Monitored Components
Microsoft Network Policy
Microsoft Network Policy Server Events
Monitored Components:
Microsoft Network Policy Server RADIUS Proxy
Monitored Components:
Microsoft Network Policy Server RADIUS Server
Monitored Components:
2207
2207
2211
2211
2227
2228
2228
2234
2234
2237
2237
Microsoft Routing and Remote Access
2239
Microsoft Routing and Remote Access 2008-2012 R2
2239
Microsoft Routing and Remote Access 2008-2012 R2 (Events)
2244
Microsoft SharePoint
2246
SharePoint Server 2007
2247
SharePoint Server 2010
2250
SharePoint Services (WSS) 3.0
2253
SharePoint Server 2013
2255
Monitored Components:
2255
Service: SharePoint Search Host Controller
2255
Service: SharePoint Server Search 15
2255
Service: SharePoint Timer Service
2255
Service: SharePoint Tracing Service
2255
Service: SharePoint User Code Host
2256
Service: Document Conversions Launcher
2256
Service: Document Conversions Load Balancer
2256
Current Requests
2256
Request Wait Time
2256
Requests Queued
2256
Requests Rejected
2257
Worker Process Restarts
2257
Requests/Sec
2257
Cache API Trims
2257
Cache API Hit Ratio
2258
Sql Query Executing time
2258
Executing Sql Queries
2258
Responded Page Requests Rate
2258
Executing Time/Page Request
2258
Current Page Requests
2258
Rejected Page Requests Rate
2259
Incoming Page Requests Rate
2259
Active Threads
2259
Microsoft SQL
SQL Server 2005 Analysis Services
Monitored Components:
SQL Server 2008 Analysis Services
Monitored Components:
SQL Server 2012 Analysis Services
Monitored Components:
SQL Server Query
Monitored Components:
2259
2260
2260
2265
2265
2271
2271
2276
2276
SQL Server 2008 Reporting Services
2276
SQL Server 2008 Reporting Services R2
2280
SQL Server 2012 Reporting Services
2284
SQL Server 2008-2012 Reporting Services (Events)
2289
Microsoft System Center
Microsoft System Center Configuration Manager 2012
Monitored Components
Configuring Windows Remote Management (WinRM)
Microsoft System Center Operations Manager 2012 (Agent)
Monitored Components
Configuring Windows Remote Management (WinRM)
Microsoft System Center Operations Manager 2012 (Management Server)
Monitored Components
2292
2292
2292
2298
2298
2298
2300
2300
2300
Configuring Windows Remote Management (WinRM)
2306
Microsoft Windows Internet Name Service (WINS)
2306
Microsoft Windows Internet Name Service (WINS) Statistic
Monitored Components:
Microsoft Windows Internet Name Service (WINS) Events
Monitored Components:
Microsoft Windows
2307
2307
2309
2309
2316
Windows 2003 -2008 FTP Service
2317
Windows 2008 R2 - 2012 FTP Service
2319
Windows DHCP Server
2321
Windows DNS Server
2327
Windows Network Load Balancing
2331
Windows Print Services
2340
Windows Remote Desktop Services (Session Host Role)
2341
Windows Update Monitoring
2350
Configuring Windows Remote Management (WinRM)
Microsoft Windows Server
Microsoft Windows Server 2003 Failover Cluster
Monitored Components:
Microsoft Windows Server 2008 Failover Cluster
Monitored Components:
Microsoft Windows Server 2012 Failover Cluster
Monitored Components:
Windows Server 2003 Domain Controller Security
2350
2352
2353
2353
2364
2364
2377
2377
2380
Configuring Windows Remote Management (WinRM)
2380
Monitored Components:
2380
Windows Server 2003-2012 Services and Counters
Monitored Components
2385
2385
Windows Server 2008 - 2012 Domain Controller Security
2388
Configuring Windows Remote Management (WinRM)
2388
Monitored Components
2389
Windows Server 2003-2012 Services And Counters
2395
Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster
2398
Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster (Advanced)
2411
Mongo
2412
MongoDB (Windows)
2413
MongoDB (Linux)
2417
MySQL
2422
Nagios Linux File & Directory Count Script
2432
Field Descriptions
Novell GroupWise
Novell GroupWise Post Office Agent (Windows)
2432
2435
2436
Novell GroupWise Message Transfer Agent (Windows)
2442
Novell GroupWise Post Office Agent (Unix)
2445
Novell GroupWise Message Transfer Agent (Unix)
2451
Office 365 User Statistics with PowerShell
2453
OpenLDAP
2456
Oracle
2459
Oracle Automatic Storage Management
Monitored Components
Oracle Database
Monitored Components:
Oracle WebLogic (JMX)
POP3 Round Trip Email
Monitored Components:
Postfix
Monitored Components:
2459
2459
2464
2464
2468
2475
2475
2476
2476
PostgreSQL
2480
Progress Database
2483
Progress Database (Linux and Unix)
2484
Arguments in Linux/Unix monitors:
2484
Monitored Components
2484
Progress Database (Linux and Unix sh script)
2489
Arguments in Linux/Unix monitors:
2489
Monitored Components:
2489
Remote Desktop Services Licensing
2493
RADIUS User Experience Monitor
2500
Server Clock Drift
2500
Server Clock Drift (PowerShell)
2501
Server Clock Drift (Perl)
2502
Solaris
2502
Solaris
2503
Solaris LPD
2508
Monitored Components:
2508
SolarWinds
Orion Server
2509
2510
Monitored Components:
2510
SolarWinds (Orion) Server
2515
Monitored Components:
2515
SolarWinds Failover Engine
2519
SolarWinds NetFlow Traffic Analyzer Database
2522
SolarWinds NetFlow Traffic Analyzer
2526
SolarWinds Web Performance Monitor (WPM) Player
2531
Monitored Components
Kiwi Syslog Server
Monitored Components:
Squid
2531
2534
2534
2536
Squid (Windows)
2537
Squid (Linux and Unix)
2545
SSL Certificate Expiration Date Monitor
2553
Streaming Media Services 2008
2554
Sybase
2558
Sybase ASE
2559
Sybase SQL Anywhere
2563
Symantec
Symantec Backup Exec Server
Monitored Components:
Symantec Backup Exec Remote Agent
2566
2568
2568
2575
Monitored Components:
2575
Symantec NetBackup Server
2577
Symantec NetBackup Client
2582
Symantec Endpoint Protection Server
2584
Monitored Components:
Symantec Endpoint Protection Client
2584
2586
Monitored Components:
2586
TACACS+ User Experience
2589
Terminal Licensing Server
Monitored Components
Tomcat Server
Monitored Components:
Trend Micro
2590
2590
2596
2596
2597
Trend Micro OfficeScan Client
2597
Trend Micro OfficeScan Server
2598
Trend Micro Server Protect (Windows)
2601
Monitored Components:
2601
UniData Database (Windows)
2604
Monitored Components
2604
Unix
2610
Unix CPU Monitoring Perl
2611
Monitored Components:
2611
Unix Disk Monitoring Perl
2614
Unix Memory Monitoring Perl
2616
Monitored Components:
2616
Veeam Backup and Replication Server
2619
VMWare
2621
VMware vCenter Server 5.5
2621
VMware ESX Host
2625
Web Link
2627
Websense Web Security
2627
Monitored Components
2627
Chapter 1:
Introduction
SolarWinds Server & Application Monitor (SolarWinds SAM) allows you to create
and monitor your own custom collection of monitored components, providing an
open field of opportunity to the network engineer. It also allows you to create
flexible Application Monitor templates to combine process monitors, port
availability, and performance counters, allowing you to assess the status of every
aspect of your application and the health of the application as a whole.
Changes in this Guide from SAM 6.1.1 to 6.2
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
AppInsight for IIS section has been added
Agents chapter has been added
The AppStack Environment chapter has been added
NOC View section has been added
Requirements for SolarWinds SAM have been upgraded. SQL Server 2008
is the lowest version supported by SAM 6.2
Volume Thresholds and Planning section has been added
Win 32 based alerting has been removed
Web based alerting section added, found at Alerting
Orion Variables and Examples chapter has been added
Monitoring Quality of Experience chapter has been added
Interface Variables and Errors page has been added
Desktop Notification Tool page has been added
Changing Threshold Values for Hardware Health Monitoring has been
updated
Status Icons and Identifiers page has been updated
Requirements for Component Monitors and Templates that use WMI page
has been updated
Templates added include the following:
l Kaspersky Security Center Antivirus
l SolarWinds Failover Engine
l Microsoft Dynamics CRM 2011 Statistics
l Microsoft Dynamics CRM 2011 Events
l Clam AV
85
Chapter 1: Introduction
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Blackberry Enterprise Server 10 Services (Windows)
Blackberry Enterprise Server 10 Statistic (SNMP)
Exchange Active Sync Connectivity
Office 365 User Statistics with PowerShell
SQL Server 2008 Reporting Services
SQL Server 2008 Reporting Services R2
SQL Server 2012 Reporting Services
SQL Server 2008-2012 Reporting Services (Events)
Barracuda Spam and Virus Firewall
VMware vCenter Server 5.5
Trend Micro OfficeScan Client
Trend Micro OfficeScan Server
Remote Desktop Services Licensing
Microsoft Routing and Remote Access 2008-2012 R2
Microsoft Routing and Remote Access 2008-2012 R2 (Events)
Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster
Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster
(Advanced)
Applications Defined
An application in SolarWinds SAM is considered a collection of component
monitors housed in a template. A component monitor is defined as a value
returned by a specific process, counter, status, or a value returned by a script.
With this received data, SolarWinds SAM can easily show you a myriad of vital
statistics concerning the health of your system.
Templates provide blueprints for the applications to be monitored. You can
quickly and easily customize numerous templates, using only the component
monitors you need for a specific environment. Take a look at the following
diagram:
Template/Application Relationship
The following illustration explains the Template and Application relationship and
is true for all templates, including AppInsight Aplications.
Here you can see that if you change something at the template level, the
applications based on that template will be affected. Conversely, if you change
something on the application level, only the individual application will be affected.
This inheritance relationship is beneficial if you need to make a great deal of
changes quickly. For example, rather than change one item on 100 applications
86
SAM Glossary of Terms
that are based on a single template (which requires 100 changes), you can more
easily change the one item on the template. That one change in the template will
trickle down to all 100 applications that are based on the template.
SolarWinds SAM recognizes and answers the complexity of today’s business
applications with scalability, flexibility, and reliability.
Refer to the following sections for more information:
l
l
SAM Glossary of Terms
How Does SolarWinds Server & Application Monitor Work?
SAM Glossary of Terms
Here is a list of fundamental terms with which you should be familiar. A tree-like
map is also provided to visualize how SAM operates.
87
Chapter 1: Introduction
Component Monitor – A component monitor is the fundamental element of an
application. Component monitors return the current status or value of a monitored
service or process. All component monitors return at least one value or one status
condition.
Node - A node is considered to be any endpoint of a given network. For example,
any server or computer on a network is considered a node. Sometimes a node is
referred to as a device.
Application - An application in SolarWinds SAM is a collection of component
monitors.
Template - A template is the blueprint for an application. It is a collection of
component monitors designed to monitor a server or application. You can
customize numerous templates using only the component monitors you need for a
specific environment.
The type of information returned by the component monitor is based upon the type
of monitor being utilized. For example, one type of monitor can report the up or
down status of a service or process, another monitor can return the percentage of
88
How Does SolarWinds Server & Application Monitor Work?
free space of a volume. Another type of component monitor can return up to ten
values. Each monitor type, along with its parameters and returned values and/or
states, is unique.
Each node, along with its applications and component monitors, can be viewed
from the SolarWinds SAM web console as shown in the diagram below. The view
can be customized to suit your needs.
How Does SolarWinds Server & Application Monitor Work?
Using UDP, TCP, SNMP, and WMI calls to your network framework and
application servers, SolarWinds Server & Application Monitor provides real time
feedback on your applications and trending through statistics stored in the Orion
89
Chapter 1: Introduction
database. Keeping with the SolarWinds common components infrastructure, there
are no agents installed on your servers and no remote software to maintain. All
calls are made in real time and displayed on a Web Console accessible from any
supported browser.
As a standalone product, SAM's operations can be visualized with the following
flowchart:
Installed as a module in your family of SolarWinds products, SAM can be
visualized with the following flowchart:
90
Application Availability and Status
Application Availability and Status
On any given poll, an application’s availability is either 100% or 0% based on the
status of the application. Availability is 100% if the application status is available,
warning, or critical. For any other status on that poll, SAM marks the availability at
0%.
The status of an application is determined by the worst status of the individual
component monitors for that application. For example, if one component for an
application is down, then the application is marked as down. If one component is
in a warning state and the rest of the components are up, then the application is
given a warning status.
91
Chapter 1: Introduction
With respect to how an application’s availability is calculated over time, SAM
aggregates the availability values to Hourly/Daily tables during database
maintenance, which is how the average is calculated. Availability for component
monitors is calculated in the same way.
92
Chapter 2:
Requirements and Installation
Installing SolarWinds Server & Application Monitor (SolarWinds SAM) is a wizard
driven process. Resource and space requirements are reasonable, and most
deployments do not require hardware updates to your SolarWinds Server.
This chapter discusses:
l
l
l
l
l
l
l
l
l
l
l
l
Requirements for SolarWinds SAM
FIPS Support
Server Sizing
SNMP Requirements for Monitored Devices
Upgrading SolarWinds Server & Application Monitor
Installing SolarWinds Server & Application Monitor
Activating Your License
Finishing SolarWinds SAM Installation
Excluding SolarWinds Data Directories from Anti-Virus Scanning
Running SolarWinds SAM
Internet Explorer Security Settings
Licensing
Requirements for SolarWinds SAM
SolarWinds recommends installing your SolarWinds product on one server, and
installing the Orion database on its own SQL Server. Installations of multiple
SolarWinds SAM servers using the same database are not supported.
Note: Solarwinds does not support installing SAM on domain controllers.
SolarWinds Server Software Requirements
The following table lists minimum software requirements and recommendations
for your SolarWinds server.
Software
Requirements
93
Chapter 2: Requirements and Installation
Operating
System
Windows Server 2003 R2 SP2, Windows Server 2008 R2†, with
IIS in 32-bit mode, Windows 2012, Windows 2012 R2, or
Windows 2012 Datacenter edition. IIS must be installed.
SolarWinds recommends that SolarWinds administrators have
local administrator privileges to ensure full functionality of local
SolarWinds tools. Accounts limited to use of the SolarWinds
Web Console do not require administrator privileges.
Notes:
l
l
l
Web
Server
SolarWinds does not support production installations of
SolarWinds products on Windows XP, Windows Vista, or
Windows 7 systems.
If you are installing SolarWinds SAM on Windows Server
2003, confirm that your full computer name is no longer
than 15 characters in length. Windows Server 2003 trims
any characters beyond the fifteenth, and this may prevent
SolarWinds services from properly identifying your
SolarWinds server.
For more information, see Additional SolarWinds SAM
Requirements
Microsoft IIS, version 6.0 and higher, in 32-bit mode.
DNS specifications require that hostnames be composed of
alphanumeric characters (A-Z, 0-9), the minus sign (-), and
periods (.). Underscore characters (_) are not allowed. For more
information, see RFC 952.
Warning: The following Windows accounts, as configured by
IIS 6.0 on Windows Server 2003 with their default security
settings, are required:
IUSR_<hostname>, as
a member of the Guests group ONLY.
IWAM_<hostname>, as
a member of the IIS_WPG group ONLY.
Disabling these accounts or changing any default settings of
these accounts may negatively affect the operation of your
SolarWinds installation. SolarWinds strongly recommends
against altering these accounts or their settings.
Note: SolarWinds neither recommends nor supports the
94
SolarWinds Server Hardware Requirements
installation of any SolarWinds SAM product on the same server
or using the same database server as a Research in Motion
(RIM) Blackberry server.
.NET
Version 3.5 .NET Framework, 4.0 is recommended.
Framework
SNMP
Trap
Services
Windows operating system management and monitoring tools
component
Web
Console
Browser
Microsoft Internet Explorer version 7 or higher with Active
scripting,
Firefox 13.0 or higher (Toolset Integration is not supported on
Firefox), Google Chrome
SolarWinds Server Hardware Requirements
The following table lists minimum hardware requirements and recommendations
for your SolarWinds server.
Note: Hardware requirements are listed by SolarWinds license level.
Hardware
AL150 - AL500
AL700 – AL1500
ALX
CPU
Speed
2.4 GHz
Dual Core 3.0 GHz
Quad Core 3.0 GHz
Note: Dual processor, dual core is recommended.
Hard Drive 4 GB
10 GB
25 GB
Space
Note: A RAID 1 drive for server operating system, SolarWinds
installation, and tempdb files is recommended. The SolarWinds
installer needs 1GB on the drive where temporary Windows
system or user variables are stored. Per Windows standards, some
common files may need to be installed on the same drive as your
server operating system.
Memory
4 GB
6 GB
8 GB
Application 161/SNMP and 443/SNMP. VMware ESX/ESXi Servers are polled
Ports
on 443.
95
Chapter 2: Requirements and Installation
17777/TCP open for SolarWinds module traffic
17778/ HTTPS open to access the SolarWinds Information Service
API
Requirements for Virtual Machines and Servers
SolarWinds installations on VMware Virtual Machines and Microsoft Virtual
Servers are fully supported if the following minimum configuration requirements
are met for each virtual machine.
Note: SolarWinds strongly recommends that you maintain your SQL Server
database on a separate physical server.
Virtual
SolarWinds Requirements by License Level
Machine
AL700 - AL1500
ALX
Configuration AL50 - AL500
CPU Speed
2.4 GHz
Dual Core 3.0 GHz
Quad Core 3.0
GHz
Allocated
Hard Drive
Space
4 GB
10 GB
25 GB
Memory
4 GB
Network
Interface
Each virtual machine on which SolarWinds is installed should
have its own, dedicated network interface card.
Note: Due to intense I/O requirements, SQL Server should be
hosted on a separate physical server configured as RAID 1+0.
RAID 5 is not recommended for the SQL Server hard drive.
6 GB
8 GB
Note: Since SolarWinds uses SNMP to monitor your network,
if you are unable to dedicate a network interface card to your
SolarWinds server, you may experience gaps in monitoring
data due to the low priority generally assigned to SNMP
traffic.
96
Requirements for the Orion database Server (SQL Server)
Requirements for the Orion database Server (SQL Server)
The following table lists software and hardware requirements for your Orion
database server. SolarWinds license levels are provided as a reference.
Requirements AL50 AL500
SQL Server
AL700 AL1500
ALX
SolarWinds supports the following versions of SQL Server:
• SQL Server 2008 wihtout SP, with SP1, with SP2, or with
SP3
• SQL Server 2008 R2 without SP, with SP1, or with SP2
• SQL Server 2012 without SP or with SP1
• SQL Server 2014
Notes:
l
l
l
l
Due to latency effects, SolarWinds does not recommend
installing your SQL Server and your SolarWinds server
or additional polling engine in different locations across
a WAN. For more information, see SolarWinds Knowledge Base article, “Can I install my SolarWinds server
or Additional Polling Engine and my Orion database
(SQL Server) in different locations across a WAN?”
Either mixed-mode or SQL authentication must be supported.
If you are managing your Orion database, SolarWinds
recommends you install the SQL Server Management
Studio component.
Use the following database SQL statement to check
your SQL Server version, service pack or release level,
and edition:
select SERVERPROPERTY ('productversion'),
SERVERPROPERTY ('productlevel'), SERVERPROPERTY
('edition')
CPU Speed
2.4 GHz
Dual Core
3.0 GHz
97
Quad Core 3.0 GHz
Chapter 2: Requirements and Installation
Hard Drive
Space
4 GB
Memory
4 GB
10 GB
25 GB
Note: Due to intense I/O requirements, a RAID 1+0 drive is
strongly recommended the SQL Server database and
SolarWinds data and log files. RAID 5 is not recommended
for the SQL Server hard drive. The SolarWinds installer
needs at least 1GB on the drive where temporary Windows
system or user variables are stored. Per Windows standards,
some common files may need to be installed on drive as your
server operating system.
6 GB
8 GB
Note: SolarWinds recommends additional RAM for
SolarWinds SAM installations utilizing more than 1,000
monitors. For optimal performance in larger ALX
environments, we recommend 8GB of RAM or greater.
Additional memory will improve both performance and
reliability.
Memory and
Additional
Pollers
Each additional poller requires 8GB of
additional RAM. For example, SAM plus 2
additional pollers would require 24GB of
RAM. 3 additional pollers would require
32GB of RAM, and so on.
PowerShell
SAM's PowerShell Script Monitor works
with PowerShell 1.0 and higher for local
execution.
Note: PowerShell 2.0 or higher is required for
remote execution.
The Configuration Wizard installs the following required x86 components if they
are not found on your Orion database server:
l
l
Microsoft SQL Server Native Client
Microsoft SQL Server Management Objects
98
Additional SolarWinds SAM Requirements
Additional SolarWinds SAM Requirements
Enterprise-level SolarWinds SAM deployments with the potential for more than
1,000 monitors may need additional computing resources above the standards
required for SolarWinds common components:
Component Monitors Additional Requirements
Up to 1,000
No additional requirements
More than 1,000
8+ GB RAM
† Important: If you
are running Windows Server 2008, you must upgrade to
Windows Server 2008 R2. SolarWinds SAM does not support Windows Server
2008 due to known WMI issues.
FIPS Support
FIPS (Federal Information Processing Standard) defines security and
interoperability standards for computers used by the U.S. federal government.
To enable FIPS in the Local Security Policy on Windows:
1. Click Start > Control Panel > System and Security > Administrative Tools,
and then double-click Local Security Policy.
2. Expand the Local Policies category in the left pane, and then click Security
Options.
3. Right-click System Cryptography: Use FIPS compliant algorithms for
encryption, hashing, and signing.
4. In the context menu that is displayed, click Properties.
5. In the Local Security Setting tab, click Enabled and then click OK.
Notes:
l FIPS can also be enabled as part of Group Policy.
l If using the FIPS Manager to enable/disable FIPS, you need to restart your
web browser to apply the new settings.
SolarWinds SAM installations on Windows Server 2008 R2 require a Microsoft
hotfix to realize the FIPS-compatibility features of this release. For more
information about this required Microsoft hotfix, see the article
http://support.microsoft.com/kb/981119. As noted in the KB article, you need to
enable FIPS first before applying the Microsoft hotfix.
99
Chapter 2: Requirements and Installation
If you use component monitors that have not passed FIPS testing, they may not
work properly when FIPS is enabled.
FIPS Manager
SolarWinds does provide a FIPS manager. The default location of this program is
C:\Program Files (x86)\SolarWinds\Orion\SolarWinds.FipsManager.exe.
The FIPS Manager allows you to switch between both Windows and SolarWinds
FIPS compatible mode. (FIPS mode in Windows needs to be disabled manually if
needed).
The following SolarWinds SAM component monitors have passed FIPS testing:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
DHCP User Experience Monitor
Directory Size Monitor
DNS Monitor - TCP
DNS Monitor - UDP
DNS User Experience Monitor
Download Speed Monitor
File Age Monitor
File Count Monitor
File Existence Monitor
File Size Monitor
FTP Monitor
HTTP Form Login Monitor
HTTP Monitor
HTTPS Monitor
IMAP4 Monitor
IMAP4 User Experience Monitor
LDAP User Experience Monitor
Linux/Unix Script Monitor
MAPI User Experience Monitor
NNTP Monitor
ODBC User Experience Monitor
Oracle User Experience Monitor
Performance Counter Monitor
POP3 Monitor
POP3 User Experience Monitor
Process Monitor - SNMP– FIPS not supported when SNMP is SNMPv3 and
using MD5.
Process Monitor - WMI
SMTP Monitor
100
Server Sizing
l
l
l
l
l
l
l
SNMP Monitor – FIPS not supported when SNMP is SNMPv3 and using
MD5.
SQL Server User Experience Monitor
TCP Port Monitor
Tomcat Server Monitor
Web Link Monitor
Windows Event Log Monitor
Windows Script Monitor
Server Sizing
SolarWinds SAM is capable of monitoring networks of any size, ranging from
small corporate LANs to large enterprise and service provider networks. Most
SolarWinds SAM systems perform well on 3.0 GHz systems with 4 GB of RAM
using default polling engine settings. However, when monitoring larger networks,
you should give additional consideration to the hardware used and the system
configuration.
There are three primary variables that affect scalability. The most important
consideration is the number of monitored components. Monitoring more than
1,000 components may require fine tuning for optimal performance. The second
variable to consider is polling frequency. For instance, if you are collecting
statistics more frequently than the default, the system will have to work harder and
system requirements will increase. Finally, the number of simultaneous users
accessing SolarWinds SAM directly impacts system performance.
When planning a SolarWinds SAM installation, there are four main factors to keep
in mind with respect to polling capacity: CPU, memory, number of polling
engines, and polling engine settings. For minimum hardware recommendations,
see “Requirements for SolarWinds SAM” on page 93. For more information about
polling engines, see “Additional Polling Engine and Web Console” on page 1216.
Installing SolarWinds SAM and SQL Server on different servers is highly
recommended, particularly if you are planning on having more that 1,000
component monitors. This scenario offers several performance advantages as the
SolarWinds SAM server does not perform any database processing and it does
not have to share resources with SQL Server.
If you plan to monitor 10,000 or more components, SolarWinds recommends that
you install additional polling engines on separate servers to help distribute the
work load. For more information about sizing SolarWinds SAM to your network,
contact the SolarWinds sales team or visit www.solarwinds.com. For more
101
Chapter 2: Requirements and Installation
information about configuring additional pollers, see “Additional Polling Engine
and Web Console” on page 1216.
Scalability
Stackable
Pollers Available?
Yes. For SAM 6.2 and higher. Two polling engines can be
installed on a single server.
Poller Remotability Available?
Yes, for SAM versions 5.5 and higher
Note: Poller remotability is a feature that enables the local
storage, using MSMQ, of up to ~1 GB of polled data per
poller in the event that the connection between the polling
engine and the database is temporarily lost.
Primary Poller
Limits
~8-10k component monitors per polling engine.
Scalability
Options
One APE for every 8-10k component monitors.
25-50 concurrent Orion Web Console users.
Maximum of 50k component monitors per primary
SolarWinds SAM installation (i.e. 1 SAM server + 4 APEs).
You can use up to 14 additional polling engines.
For more information about licensing, see Why are you
licensing by monitors instead of by servers?
WAN and/or
Minimal monitoring traffic is sent between the primary SAM
Bandwidth
server and any APEs that are connected over a WAN. Most
Considerations traffic related to monitoring is between an APE and the
SolarWinds database. Bandwidth requirements depend on
the size of the relevant component monitor. Based on 67.5
kB / WMI poll and a 5 minute polling frequency, the estimate
is 1.2 Mbps for 700 component monitors. For more
information, see How do SNMP and WMI polling compare?
Note: WMI is best suited for environments where latency is
< 100ms.
Other Considerations
WMI Security Blog
102
SNMP Requirements for Monitored Devices
SNMP Requirements for Monitored Devices
SolarWinds SAM can monitor the performance of any SNMPv1-, SNMPv2c-, or
SNMPv3-enabled device on your network. Consult your device documentation or
a technical representative of your device manufacturer to acquire specific
instructions for configuring SNMP on your device.
Notes:
l To properly monitor devices on your network, you must enable SNMP on all
devices that are capable of SNMP communications.
l Unix based devices should use the configuration of Net-SNMP version 5.5
or higher that is specific to the type of Unix-based operating system in use.
l SolarWinds SAM is capable of monitoring VMware ESX and ESXi Servers
versions 3.5 and higher with VMware Tools installed. For more information
about enabling SNMP and VMware Tools on your VMware device, consult
your VMware documentation or technical representative.
l If SNMPv2c is enabled on a device you want to monitor, by default,
SolarWinds SAM will attempt to use SNMPv2c to poll the device for performance information. If you only want SolarWinds SAM to poll using
SNMPv1, you must disable SNMPv2c on the device to be polled.
Enabling Microsoft Internet Information Services
(IIS)
To host the SolarWinds Web Console, Microsoft Internet Information Services
(IIS) must be installed and enabled on your SolarWinds SAM server. Windows
Server 2003 requires IIS version 6 while Windows Server 2008 requires IIS
version 7, as detailed in the following sections:
l
l
l
Enabling IIS on Windows Server 2003
Enabling IIS on Windows Server 2008
AppInsight for IIS Requirements and Permissions
Enabling IIS on Windows Server 2003
The following procedure enables IIS on Windows Server 2003.
To enable IIS on Windows Server 2003:
1. Click Start > Control Panel > Add or Remove Programs.
2. Click Add/Remove Windows Components.
103
Chapter 2: Requirements and Installation
3. Confirm that Application Server is checked, and then click Details.
4. Confirm that Internet Information Services (IIS) is checked, and then click
Details.
104
Enabling IIS on Windows Server 2003
5. Confirm that World Wide Web Service is checked, and then click Details.
6. Confirm that World Wide Web Service is checked, and then click OK.
7. Click OK on the Internet Information Services (IIS) window, and then click
OK on the Application Server window.
105
Chapter 2: Requirements and Installation
8. Confirm Management and Monitoring Tools is checked and click Details.
9. Confirm that both Simple Network Management Protocol and WMI SNMP
Provider are checked, and then click OK.
10. Click Next, and then click Finish when the wizard completes.
Note: You may be prompted to install additional components, to provide
your Windows Operating System media, or to restart your computer.
Enabling IIS on Windows Server 2008
IIS is enabled automatically after the SAM installation and prior to the start of the
Configuration Wizard. If the Configuration Wizard detects that IIS is not installed
106
Enabling IIS on Windows Server 2008
on Windows 2008, it installs IIS. The following manual procedure is provided for
Windows Server 2008 in case problems occur with the automatic IIS installation.
To enable IIS on Windows Server 2008:
1. Click Start > All Programs > Administrative Tools > Server Manager.
2. Click Roles.
3. Click Add Roles.
4. Click Next to start the Add Roles Wizard, and then check Web Server (IIS).
107
Chapter 2: Requirements and Installation
5. If you are prompted to add features required for Web Server (IIS), click
Add Required Features.
6. Click Next on the Select Server Roles window, and then click Next on the
Web Server (IIS) window.
7. Confirm that Common HTTP Features > Static Content is installed.
8. Check Application Development > ASP.NET.
108
Enabling IIS on Windows Server 2008
9. Click Add Required Role Services.
10. Check both Security > Windows Authentication and Security > Basic
Authentication.
109
Chapter 2: Requirements and Installation
11. Check Management Tools > IIS 6 Management Compatibility.
12.
13.
14.
15.
Click Next on the Select Role Services window.
Click Install on the Confirm Installation Selections window.
Click Close on the Installation Results window.
If you are currently enabling IIS as part of a SolarWinds SAM installation, restart the SolarWinds SAM installer.
Upgrading SolarWinds Server & Application Monitor
If you have version 3.1 or lower of SolarWinds APM installed, you must first
upgrade to NPM 10 and then upgrade to APM 3.5 before you can upgrade to
SAM 5.X. For more information, click Upgrade Instructions in any SolarWinds
NPM group on the License Management page of the Customer Portal.
Note: SolarWinds recommends creating a backup of your database before
starting any SolarWinds upgrade or installation.
If you have version 3.5 or later of APM installed, you have an option for
upgrading to APM 4.X, or SAM 5.X:
Upgrading NPM and SolarWinds SAM on Your Current Server
Notes:
l
l
l
Upgrading from SAM 5.5 to 6.1 is supported.
Always upgrade NPM first, then you can upgrade to SAM
If installed together on the same server, SAM and SolarWinds NPM share
the same database.
110
Upgrading NPM and SolarWinds SAM on Your Current Server
l
If installed on different servers, SAM and SolarWinds NPM each require
their own database. You cannot share one database between separate
SAM and SolarWinds NPM servers.
Upgrading NPM and SolarWinds SAM on Your Current Server
To upgrade both SolarWinds NPM and SolarWinds SAM on your current
SolarWinds server:
1. Upgrade SolarWinds NPM to version 10.3.
Note: For compatablitiy between specific versions of SolarWinds software,
refer to the following KB article: http://knowledgebase.solarwinds.com/kb/questions/1888/Compatibility+of+SolarWinds+Orion+Products+
2. Install SAM 5.X as described in the section “Installing SolarWinds Server &
Application Monitor ” on page 126.
Important: Always upgrade NPM on all SolarWinds servers first. After that is
complete, you can successfully upgrade. Failure to upgrade in the correct order
will result in the Configuration Wizard generating a Database Configuration
Failure error.
For more information, see “Installing SolarWinds Network Performance Monitor”
in the SolarWinds Network Performance Monitor Administrator Guide.
Upgrading SAM to a New Server While Keeping NPM on Your Current Server
To upgrade SAM to a new server:
1. Back up your current SolarWinds Server.
2. Shutdown SolarWinds NPM and SAM on your current SolarWinds Server.
3. Have your Database Administrator clone your Orion database to a different
name.
Note: To clone your Orion database, use the appropriate version of
Microsoft SQL Server Management Studio for your database. You can
download this from the Microsoft website if it is not already installed.
4. Uninstall SAM from your original SolarWinds Server.
a. Use Add or Remove Programs in Control Panel to remove
SolarWinds Server & Application Monitor.
b. The Configuration Wizard should be run automatically as part of the
uninstallation. If it is not, execute it manually by clicking Start > All
Programs > SolarWinds Orion > Configuration and AutoDiscovery > Configuration Wizard.
111
Chapter 2: Requirements and Installation
c. In the Configuration Wizard, select all components to be modified:
Database, Website, and Services, and then configure them appropriately for your original SolarWinds Server.
d. Ensure that you specify the original database.
e. Delete the SAM folder in the
<drive>:\INETPUB\SOLARWINDS\ORION directory, where <drive>
is the drive letter for the SAM Website Root Directory, for example:
C.
5. Copy the security certificate from the original server to the new server.
6. Install SAM on its new server as described in the section “Installing
SolarWinds Server & Application Monitor ” on page 126, and in the Configuration Wizard specify the new cloned database.
For more information, see Installing SolarWinds Server & Application Monitor
Moving SolarWinds SAM to a different server
Migrating SolarWinds SAM to a different server is a process that can take as little
as 30 minutes or as long as several hours, depending on the size of your Orion
database. Consider scheduling an appropriate maintenance window in which to
perform your migration. The process involves deactivating the licenses of your
products, stopping the services, migrating the products, and then uninstalling your
previous installation.
General Requirements
Moving your SolarWinds SAM implementation to a new server requires the
following:
l
l
l
Server hardware meeting minimum requirements for the new
SolarWinds SAM implementation.
Windows user account credentials that have been granted administrative
rights on both servers.
A license reset to register SolarWinds SAM on your new server. You will
need to install SolarWinds License Manager to manage the required license
migration.
Note: Maps and map objects created or edited in SolarWinds Network Atlas are
stored in the Orion database. If the database is successfully migrated, there is no
need to migrate any additional Network Atlas map files.
112
Database Requirements
Database Requirements
Ensure that you comply with the following requirements before you attempt to
modify or back up your existing database:
l
l
l
l
l
l
SolarWinds SAM version 6.0 and higher requires SQL Server 2008 or
higher.
Install your new database server. The following procedures assume you are
moving your database from one physical server to another and that the management tool (Enterprise Manager, SQL Server Management Studio
Express, or SQL Server Management Studio) is installed on the new database server.
If you want to use a Microsoft SQL Server Express database, recognize that
the database store is limited to 4GB.
Know the sa password to both your existing Orion database server and your
new database server.
Know the credentials to an account with administrator rights on both your
existing Orion database server and your new database server.
Have a maintenance window during which you can safely shutdown your
SolarWinds SAM services. You need to stop data collection to ensure that
your backup file matches your last active database state.
Stopping SAM Services
It is important to stop the SolarWinds SAM services that are currently writing to the
database. This ensures that you do not have data inconsistencies when you bring
your new database server online.
To stop SolarWinds SAM services:
1. Click Start > All Programs > SolarWinds Orion > Advanced Features >
Orion Service Manager.
2. Expand Services.
3. Click each service, except the SQL Server service, and then click Stop.
Notes:
l If you have more than one Polling Engine, you will need to stop each
additional Polling Engine before continuing.
l Do not stop the SQL Service. The SQL Service needs to be running in
order to make the necessary changes to the database.
4. Click File > Exit.
113
Chapter 2: Requirements and Installation
Creating a Database Backup File with Database Manager
Complete the following procedure if you want to use Database Manager.
To backup your Orion database using Database Manager:
1. Log on to the computer that hosts your current SolarWinds SAM server.
2. Click Start > All Programs > SolarWinds Orion > Advanced Features >
Database Manager.
3. If your SQL Server is not listed in the left pane, add your server, as
shown in the following steps:
a. Click Add Server.
b. Select the name of the SQL instance from the SQL Server list. If
your server is not listed, type the name or IP address.
c. Select the appropriate authentication type, and then click Connect
to Database Server.
4. Locate and right-click your database in the Database Manager tree in the
left pane, and then click Backup Database.
5. Type a Description of the database backup, and then specify a Backup
Filename, including the path.
Note: Click the ellipsis to directly select the Backup Filename.
6. Select either of the following options:
l If you want to attach your new database backup to the end of
the selected backup file, select Append to the end of the
Backup File.
l If you want to overwrite the selected backup file, select Overwrite Backup File.
7. Click OK.
8. If you are moving the SQL database to the new SolarWinds SAM
server, copy the new backup file to a folder on the new server.
9. Install SolarWinds SAM on the new server, but DO NOT run the Configuration Wizard yet. Reboot the server if prompted, and then register the
software.
Note: A new license key is required, and you will need to install
SolarWinds License Manager to manage the required license migration.
10. On the new server, click Start > SolarWinds Orion > Advanced
Features > Database Manager.
11. If your SQL Server is not listed in the left pane, add your server, as
shown in the following steps:
114
Creating a Database Backup File with SQL Server Management Studio
1. Click Add Server.
2. Select the name of the SQL instance from the SQL Server list. If
your server is not listed, type the name or IP address.
3. Select the appropriate authentication type, and then click Connect
to Database Server.
12. Locate and right-click on your server in the Database Manager tree in the
left pane, and then click Connect to Server.
13. If you moved the SQL database to the new server, perform the following
steps:
Note: Database Manager cannot create new folders. Therefore, specify a
path that already exists.
a. Click Database > Restore Database.
b. Click the ellipsis to Select the Database file to Restore.
c. If you want to verify the validity of the selected database, click
Verify.
d. Confirm or edit the name of the restored database in the Restore Database as the following Database name field.
e. If you want to restore the database as .MDF or .LOG files, provide appropriate filenames in the Restore Database in the following MDF and
LOG files fields.
f. Click OK.
14. Run the Configuration Wizard and specify the existing (or newly restored)
database on the Database setup section of the wizard. When prompted,
click Yes to use the existing database.
Note: Do not skip tabs or deviate from the tab order. Click Start, and then
click Continue to complete the wizard in order. Completing tabs out of
order may adversely affect the install process.
Creating a Database Backup File with SQL Server Management Studio
Complete the following procedure if your new database server uses SQL Server
2008.
To backup your Orion database using SQL Server Management Studio:
1. Log on to the new database server using an administrator account.
2. Click Start > All Programs > Microsoft SQL Server 2008 > SQL Server
Management Studio.
3. Specify the server name of the current Orion database server on the Connect to Server window.
115
Chapter 2: Requirements and Installation
4. If you are using SQL Server Authentication, click SQL Server Authentication in the Authentication field, and then specify your credentials in the
User name and Password fields.
5. Click Connect.
6. In the pane on the left, expand the name of the server hosting the SQL
instance you are using for SolarWinds SAM, and then expand Databases.
7. Right-click the name of your Orion database, and then click Tasks > Back
Up.
8. In the Source area, select Full as the Backup type.
9. In the Backup set area, provide an appropriate Name and Description for
your database backup.
10. If there is not already an appropriate backup location listed in the Destination area, click Add, and then specify and remember the destination path
and file name you provide. This is the location where your backup is stored.
Note: Remember, if your database is on a remote server, as recommended,
this backup file is also created on the remote database server. It is not created locally.
11. Click Options in the Select a page pane on the left.
12. In the Reliability area, check Verify backup when finished.
13. Click OK.
14. Copy the .bak file from your current Orion database server to your new database server.
Restoring a Database Backup File for SQL Express Server
Complete the following procedure if you are restoring your Orion database
backup file to a database server running SQL Express Server.
Note: Remember that SQL Express has a 4GB data store limitation. If at all
possible, consider using a production version of SQL Server.
To restore your database backup file on a server running SQL Express
Server:
1. Log on to the new database server using an administrator account.
2. Click Start > All Programs > Microsoft SQL Server 200X > SQL Server
Management Studio Express.
3. Click File > Connect Object Explorer.
4. Specify the name of the new Orion database server on the Connect to
Server window.
116
Restoring a Database Backup File for SQL Server 2008
5. If you are using SQL Server Authentication, click SQL Server Authentication
in the Authentication field, and then specify your credentials in the User
name and Password fields.
6. Click Connect.
7. Click the name of your server to view an expanded list of objects associated
with your server.
8. Click Databases, and then click Restore Database.
9. Leave To database blank.
10. Click From device, and then browse (…) to the location of your .bak file.
11. Click Add, and then navigate to the .bak file and click OK.
12. Click OK on the Specify Backup window.
13. Check Restore.
14. Select the name of your database from the To database field. It will now be
populated with the correct name.
15. Click Options in the left Select a page pane, and then check Overwrite the
existing database.
16. Ensure you select a directory that already exists for the files listed in the
Restore As column.
17. Click OK.
18. Open and run the configuration wizard to update your SolarWinds SAM
installation.
Restoring a Database Backup File for SQL Server 2008
Complete the following procedure if you are restoring your Orion database
backup file to a database server running SQL Server 2008.
To restore your database backup file on a server running SQL Server 2008:
1. Log on to the new database server using an administrator account.
2. Click Start > All Programs > Microsoft SQL Server 2008 > SQL Server
Management Studio.
3. Click File > Connect Object Explorer.
4. Specify the name of the new Orion database server on the Connect to
Server window.
5. If you are using SQL Server Authentication, click SQL Server Authentication in the Authentication field, and then specify your credentials in the
User name and Password fields.
6. Click Connect.
7. Click the name of your server to view an expanded list of objects associated
with your server, and then right-click Databases.
8. Click Restore Database.
117
Chapter 2: Requirements and Installation
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Leave To database blank.
Select From device, and then click Browse (…).
Confirm that File is selected as the Backup media.
Click Add.
Navigate to the .bak file, select it, and then click OK.
Click OK on the Specify Backup window.
In the Destination for restore area, select the name of your database from
the To database field.
Note: The To database is now populated with the correct name.
Check Restore next to the database backup you are restoring.
Click Options in the left Select a page pane.
Check Overwrite the existing database (WITH REPLACE).
For each Original File Name listed, complete the following steps to ensure a
successful restoration:
Log on to the new database server using an administrator account.
20. Select Leave the database ready to use by rolling uncommitted transactions…(RESTORE WITH RECOVERY), and then click OK.
21. Open and run the configuration wizard to update your SolarWinds SAM
installation.
Note: Due to the nature of security identifiers (SIDs) assigned to SQL
Server 2008 database accounts, SolarWinds recommends that you create
and use a new account for accessing your restored Orion database on the
Database Account window of the SolarWinds Configuration Wizard.
Updating SolarWinds SAM to Use the New Database Server
In general, SolarWinds recommends that you use SQL Server Authentication with
the sa login and password to ensure that SolarWinds SAM can always access
your SQL Server database, even when it is hosted remotely on a separate server.
To update SolarWinds SAM to use a new database:
1. Log on to your SolarWinds SAM server.
2. Click Start > All Programs > SolarWinds Orion > Configuration and
Auto-Discovery > Configuration Wizard.
3. Check Database, and then click Next.
4. Specify your new database server in the SQL Server field.
5. If you want to use SQL authentication, check Use SQL Server Authentication, and then provide the appropriate credentials.
Note: SolarWinds recommends that you use the sa login and password for
118
Reassigning Nodes
6.
7.
8.
9.
10.
11.
your database server to ensure that you are able to properly configure the
Orion database user account.
Click Next.
Select Use an existing database, select or type the Existing Database
name, and then click Next.
If you are prompted to use the existing database, click Yes.
Select Create a new account, and then provide a New Account name.
Notes:
l Creating a new account ensures that SolarWinds SAM has required
access to your migrated database.
l The New Account must be a member of the securityadmin server role.
l The sysadmin role and the sa user account are always members of
securityadmin.
Provide and confirm an account Password.
Click Next to start database configuration, and then click Finish to exit the
Configuration Wizard.
Reassigning Nodes
If a new name is used for the new SolarWinds SAM server, it is added to the
database as a new polling engine. All current nodes remain assigned to the old
polling engine name and must be reassigned to the new polling engine, as
shown in the following procedure.
To reassign items to the new polling engine:
1. Click Start > All Programs > SolarWinds Orion > Advanced Features >
Orion Service Manager.
2. Stop all SolarWinds services.
Notes:
l If you have more than one Polling Engine, you will need to stop each
additional Polling Engine before continuing.
l Do not stop the SQL Service. The SQL Service needs to be running in
order to make the necessary changes to the database.
3. Click File > Exit
4. Click Start > SolarWinds Orion > Database Utilities > Database
Manager.
5. Expand your SQL Server in the tree.
6. Expand the Orion database.
Note: By default, this database is named NetPerfMon.
7. Right-click on the Engines table, and then click Query Table.
8. Click Refresh to display the table entries.
119
Chapter 2: Requirements and Installation
9. Select Read-Write (Results can be edited).
10. Replace the value in the ServerName field for the old polling engine with
the server name of the new polling engine. In the previous graphic, the
OLD-SERVER is renamed NEW-SERVER.
Note: It is not necessary to update the IP field. The next time the service is
started, SolarWinds SAM discovers the new IP address, and the IP field is
updated automatically.
11. Delete the newly added engine from the table (EngineID: 2 in this example)
by clicking on the blank area to the left of the row to select it. Right-click anywhere in the selected row, and then click Delete Selected Rows.
12. Click Yes when prompted to confirm deleting the row.
Note: The final result will display the new server name with the IP address
of the old server. The next time the service starts, the IP field will be updated
with the IP address of the new server.
13. Close Database Manager.
120
Moving SolarWinds SAM Security Certificates to a New Server
Moving SolarWinds SAM Security Certificates to a New Server
SolarWinds SAM encrypts your sensitive data with a security certificate stored on
the original SolarWinds SAM server. To grant a new server access to this
encrypted data, you must copy the original security certificate to the new server.
Warning: If you do not replicate the original certificate, SolarWinds SAM on the
new server cannot access any credentials used by your component monitors, and
all of those component monitors will fail.
To replicate the original certificate:
1. Export the credential from the original server.
a. On the Start Menu, click Run, type MMC, and then click OK.
b. On the File menu, click Add/Remove Snapin, and then click Add.
c. Select Certificates and then click Add.
d. Select Computer account and then click Next.
e. Select Local computer and then click Finish.
f. Click Close.
g. Click OK.
h. Expand the Certificates (Local Computer) > Personal > Certificates
group.
i. Right-click SolarWinds Agent Provision (if present), and
SolarWinds-Orion, point to All Tasks on the shortcut menu, and then
click Export.
j. Click Next in the Certificate Export Wizard.
k. Select Yes, export the private key, click Next, and then click Next
again.
l. Type and confirm a password for this private key, and then click Next.
m. Specify the file name to which you want to save the certificate, click
Next, and then click Finish—the certificate is saved with a .pfx file
name extension.
2. Copy the .pfx certificate file to the new server.
3. Import the certificate to the new server.
a. On the Start Menu, click Run, type MMC, and then click OK.
b. On the File menu, click Add/Remove Snapin, and then click Add.
c. Select Certificates, and then click Add.
d. Select Computer account, and then click Next.
e. Select Local computer, and then click Finish.
f. Click Close.
g. Click OK.
h. Expand the Certificates (Local Computer) group.
121
Chapter 2: Requirements and Installation
i. Expand the Personal group.
j. Expand the Certificates group.
k. If there is a SolarWinds SAM Engine item in the list, right-click
SolarWinds Agent Provision and SolarWinds-Orion and select
Delete from the shortcut menu.
l. Right-click the Certificates—Personal—Certificates node, point to All
Tasks in the shortcut menu, and then click Import.
m. Click Next in the Certificate Import Wizard.
n. Specify the .pfx certificate file you copied to the server and then click
Next.
o. Enter the password for the private key, check Mark this key as exportable, and then click Next.
p. Select Place all certificates in the following store, and then select
Personal as the Certificate Store.
q. Click Next and then click Finish.
Migrating Licenses with License Manager
You must run License Manager on the computer where the currently licensed
SolarWinds products are installed before you can migrate licenses to a new
installation. The following procedure deactivates currently installed licenses that
can then be transferred to a new installation.
To deactivate currently installed licenses:
1. Click Start > All Programs > SolarWinds > SolarWinds License Manager.
2. Check the products you want to deactivate on this computer.
3. Click Deactivate.
4. Specify your SolarWinds Customer ID and password when prompted, and
then click Deactivate.
Note: Deactivated licenses are now available to activate on a new computer.
When you have successfully deactivated your products, log on to the computer on
which you want to install your products, and then begin installation. When asked
to specify your licenses, provide the appropriate information. The license you
deactivated earlier is then assigned to the new installation.
122
Installing License Manager
Installing License Manager
You will need to install License Manager on the computer from which you are
migrating currently licensed products.
Note: You must install License Manager on a computer with the correct time. If
the time on the computer is even slightly off, in either direction, from Greenwich
Mean Time (GMT), you cannot reset licenses without contacting SolarWinds
Customer Service. Time zone settings neither affect nor cause this issue.
To install License Manager:
1. Click Start > All Programs > SolarWinds > SolarWinds License Manager
Setup.
2. Click I Accept to accept the SolarWinds EULA.
3. If you are prompted to install the SolarWinds License Manager application,
click Install.
Using License Manager
You must run License Manager on the computer where the currently licensed
SolarWinds product is installed before you can migrate licenses to a new
installation. The following procedure deactivates currently installed licenses that
can then be transferred to a new installation.
To deactivate currently installed licenses:
1. Click Start > All Programs > SolarWinds > SolarWinds License Manager.
2. Check the products you want to deactivate on this computer.
3. Click Deactivate.
4. Specify your SolarWinds Customer ID and password when prompted, and
then click Deactivate.
Note: Deactivated licenses are now available to activate on a new computer.
When you have successfully deactivated your products, log on to the computer on
which you want to install your products, and then begin installation. When asked
to specify your licenses, provide the appropriate information. The license you
deactivated earlier is then assigned to the new installation.
123
Chapter 2: Requirements and Installation
Upgrading SolarWinds APM when SolarWinds Failover Engine is
Installed
Prior to attempting this upgrade you should read the entire procedure.
On the primary/active server:
Note: If the secondary server is the active server, omit step 1 below.
1. Switch active server to secondary, shutdown Failover Engine on
primary server. Using the SolarWinds Orion Failover Manager, select the
secondary (passive) server and click Make Active. Wait for the secondary
server to become active. After that stop Stop Orion Failover Engine from context menu of tray icon.
2. Shutdown Orion Failover Engine on the secondary (active) server. Stop
Orion Failover Engine on the secondary (active) server leaving the protected applications running from context menu of tray icon.
On the secondary server:
1. Upgrade the desired SolarWinds product :
a. Install the SolarWinds Update by running the setup program.
b. If asked, reboot the server. After the reboot is complete, shutdown
the Failover Engine and proceed with the Configuration Wizard.
c. Verify that SolarWinds is operational.
2. If the upgrade procedure was successful, proceed to step 4.
3. If Upgrade on the secondary server fails:
a. Research the cause of the upgrade failure.
b. If the issue can be resolved, then it is safe to proceed with the
upgrade procedure. Otherwise, you can revert to a previous version.
c. To revert to a previous version:
i. Uninstall the upgraded components.
ii. On the secondary server, launch the SolarWinds Failover
Engine. Configure the Server wizard and click on the
Machine tab. Change the Current role to Secondary/passive.
iii. Reboot the server.
iv. SolarWinds Failover Engine will start and SolarWinds will be
stopped.
v. On the primary server, launch the SolarWinds Failover
Engine. Configure the Server wizard and click on the
Machine tab. Change the Current role to Primary/active.
124
On the primary Server (assuming a successful upgrade of secondary completed):
vi. Restart SolarWinds Failover Engine on the primary server
and allow the system to synchronize.
vii. Start SolarWinds Failover Manager and check that the system completes the full system check.
Needs to be updated:
l
l
SQL is already updated, needs reverting.
SolarWinds is not able to uninstall/upgrade, needs repair of the previous
release.
4. Change the server role to Secondary/passive:
a. Start the Failover Engine in the context menu of the tray icon.
b. Stop the Failover Engine, including stopping all protected applications in the context menu of the tray icon.
c. Wait until all protected services are stopped.
d. Launch the Configure Server wizard and then click on the Machine
tab. Change the Current role to Secondary/passive.
e. Start the Failover Engine to enable the packet filter.
f. Shutdown Failover Engine.
On the primary Server (assuming a successful upgrade of secondary completed):
5. Perform upgrade on primary:
a. Disable Neverfail Packet Filter Driver on Public NIC
1. Open Properties of the Public Network Adapter.
l (e.g. in Network Connections window, accessible via
Control Panel, right click the Public Network Adapter
and select Properties)
2. Uncheck the Neverfail Packet Filter Driver item on the list
and close the window by clicking OK.
b. Install the SolarWinds Update by running the setup program.
c. If asked, reboot the server now. After the reboot is complete, shutdown Failover Engine and proceed with the Configuration Wizard.
d. Verify that SolarWinds is operational.
e. Enable the Neverfail Packet Filter Driver on Public NIC
1. Open Properties of the Public Network Adapter.
l (e.g. in Network Connections window, accessible via
Control Panel, right click the Public Network Adapter
and select Properties)
125
Chapter 2: Requirements and Installation
2. Check the Neverfail Packet Filter Driver item on the list and
close the window by clicking OK.
6. Resume the Failover Engine:
a. Start the Failover Engine on the Primary Server.
b. Launch the Failover Manager on the Primary Server and make the
Primary Server Active using the Make Active… button.
c. Start Failover Engine on the Secondary server.
d. Start Replication using the Start Replication… button in the Failover Manager.
7. License SolarWinds
a. If applicable, license the application(s) on the Active (Primary)
server.
8. If SolarWinds fails to start on the secondary server, follow the steps below:
1. Shutdown the Failover Engine.
2. Launch the Configure Server wizard and set the secondary server role to
passive.
3. Start the Failover Engine on the secondary server.
4. Start the Configure Server wizard on the primary server and set the server
role to active.
5. Start the Failover Engine on the primary server.
6. Launch the SolarWinds Orion Failover Manager and verify that the system
completes the Full System Check.
7. Investigate the cause of the SolarWinds failure on the secondary server.
Installing SolarWinds Server & Application Monitor
SolarWinds Server & Application Monitor offers an intuitive wizard to guide you
through installing and configuring the product. If you are performing a clean install
of SolarWinds SAM and also want to install SolarWinds NPM, you should install
SolarWinds NPM version 10.2.2 or higher. For more information, see “Installing
SolarWinds Network Performance Monitor” in the SolarWinds Network
Performance Monitor Administrator Guide.
To install or upgrade SolarWinds Server & Application Monitor:
1. Using an account with local administrative privileges, log on to the
SolarWinds server on which you want to install SolarWinds SAM. To avoid
permissions issues, this account should not be a domain account, and
126
Installing SolarWinds Server & Application Monitor
it should not be subject to any local or group policy restrictions.
2. If you downloaded the product from the SolarWinds website, complete
the following steps:
Using an account with local administrative privileges, log on to the
SolarWinds server on which you want to install SolarWinds SAM. To avoid
permissions issues, this account should not be a domain account, and
it should not be subject to any local or group policy restrictions.
3. If you are prompted to install any required components, such as
Microsoft .NET Framework 3.5 or Microsoft ASP.NET 2.0 AJAX Extensions, click Install and then complete the component installation.
Note: Downloading and installing Microsoft .NET Framework 3.5 may take
a long time, depending on your existing system configuration.
4. Review the Welcome text, and then click Next.
5. If the InstallShield Wizard detects that Microsoft Internet Information
Services (IIS) is not installed, suspend installation, quit setup, and then
install Internet Information Services (IIS).
6. If you had to install Internet Information Services (IIS), launch the
SolarWinds evaluation executable again.
7. Accept the terms of the license agreement, and then click Next.
127
Chapter 2: Requirements and Installation
8. Accept the default install location, or navigate to a different location, and
then click Next.
9. Select either the Express Install – Recommended option or the Advanced
Install option, and then click Next.
Important: The Express Install option is only available in the evaluation
version. The Full Install version does not include SQL server
128
Installing SolarWinds Server & Application Monitor
10. Click Next to start copying files. Installation begins.
11. After files are copied and installed, configuring begins automatically.
129
Chapter 2: Requirements and Installation
12. Click Finish to exit the Configuration Wizard.
13. Type Admin in the User Name field, and then click LOGIN.
130
Uninstalling SAM
14. The Network Sonar Wizard is displayed. Click Cancel and then confirm that
you want to cancel the network discovery by clicking OK.
Note: The wizard can be used to discover a set of nodes in your network.
You will use it later in this guide.
Uninstalling SAM
The following procedure fully uninstalls SAM and deletes the SAM database.
Notes:
l
l
This is a general uninstall procedure, and it may differ slightly from version
to version.
This is the recommended procedure when installing daily builds for testing.
To fully uninstall SAM and remove the SAM database:
1. Click Start > Control Panel > Add or Remove Programs.
2. Click SolarWinds Orion Server and Application Monitor..., and then click
Remove.
3. Complete the SAM uninstall wizard.
4. In the Add or Remove Programs window, click SolarWinds Job
Engine..., and then click Remove.
5. Complete the uninstallation of the SolarWinds Job Engine.
6. In the Add or Remove Programs window, click SolarWinds Orion Information Service, and then click Remove.
7. Complete the uninstallation of the SolarWinds Orion Information Service.
8. Click Start > Run...
9. Type regedit, and then click OK.
131
Chapter 2: Requirements and Installation
10. Expand HKEY_LOCAL_MACHINE > Software.
11. Delete both the SolarWinds and the SolarWinds.net folders.
12. If you are uninstalling Orion SAM from a 64-bit computer, expand HKEY_
LOCAL_MACHINE > Software > Wow6432Node, and then delete both the
SolarWinds and the SolarWinds.net folders.
13. Delete the SolarWinds folder from the Program Files folder on your main
volume. Typically, the Program Files folder is located at C:\Program
Files\.
14. Delete the SolarWinds folder from the Program Files\Common Files folder
on your main volume. Typically, the Common Files folder is located at
C:\Program Files\Common Files\.
15. Delete the SolarWinds website directory. Typically, the SolarWinds website
directory is located in C:\Inetpub\.
16. Delete the SolarWinds folder from the All Users\Application Data\ directory. Typically, this SolarWinds folder is located in C:\Documents and Settings\All Users\Application Data\.
17. Using your SQL Server tools, delete your Orion database. The Orion database is typically named NetPerfMon, and it can be found in the Databases
folder of your SQL Server management application.
18. Using your SQL Server tools, delete your Orion database user. The Orion
database user can be found by expanding Security > Logins in your SQL
Server management application.
Advanced Installation of SAM
SolarWinds Server & Application Monitor offers an intuitive wizard to guide you
through installing and configuring the product.
To install or upgrade SolarWinds Server & Application Monitor:
l
l
l
Using an account with local administrative privileges, log on to the
SolarWinds server on which you want to install SolarWinds SAM. To
avoid permissions issues, this account should not be a domain
account, and it should not be subject to any local or group policy
restrictions.
If you downloaded the product from the SolarWinds website, complete
the following steps:
a. Navigate to the location of your downloaded .zip file, and then
extract the evaluation package to an appropriate location.
b. Launch the SolarWinds SAM evaluation executable.
If you are prompted to install any required components, such as
Microsoft .NET Framework 3.5 or Microsoft ASP.NET 2.0 AJAX
132
Advanced Installation of SAM
l
l
l
Extensions, click Install and then complete the component installation.
Note: Downloading and installing Microsoft .NET Framework 3.5 may take
a long time, depending on your existing system configuration.
Review the Welcome text, and then click Next.
If the InstallShield Wizard detects that Microsoft Internet Information
Services (IIS) is not installed, suspend installation, quit setup, and then
install Internet Information Services (IIS).
If you had to install Internet Information Services (IIS), launch the
SolarWinds evaluation executable again.
1. Accept the terms of the license agreement, and then click Next.
133
Chapter 2: Requirements and Installation
2. Accept the default install location, or navigate to a different location, and then
click Next.
3. Select the Advanced Install option, and then click Next.
134
Advanced Installation of SAM
4. SAM will begin installation, taking you through multiple installation screens.
Click Next as prompted to be taken to the Database Settings of the Configuration
Wizard,
135
Chapter 2: Requirements and Installation
5. Configure the database for your environment by selecting the appropriate SQL
Server database and Authentication information, and then click Next.
6. Select whether to Create a new database, or Use an existing database, and
then enter the information as needed, then click Next.
7. Select whether to Create a new account, or Use an existing account, and
then enter the account information, then click Next.
136
Advanced Installation of SAM
l
If the Website Settings page is displayed, configure the IP Address, Port,
and Website Root Directory as appropriate and select whether you want to
enable automatic login, then click Next.
8. Ensure that all the services displayed in the Service Settings page are
checked, and then click Next.
137
Chapter 2: Requirements and Installation
9. Review the Configuration wizard Summary page, and then click Next.
10. Click Finish to complete the Configuration Wizard.
Note: If you encounter any issues with the additional polling engine, rerun the
Configuration Wizard on the SolarWinds SAM server.
To assign nodes to polling engines:
You can assign nodes to the polling engines by selecting the desired Polling
Engine in the Add Node wizard.
You can also perform Poller Load Balancing using the Monitor Polling Engines
tool to assign nodes to polling engines. Click Start > All Programs >
SolarWinds > Advanced Features > Monitor Polling Engines. Then click
Servers > Poller Load Balancing to display a dialog where you can assign
nodes to particular polling engines. For more information, see “Understanding
How Polling Engines Work" on page 1216.
Activating Your License
After installing the software through the setup wizard, you are prompted to enter
the license activation key for your product. If you do not have an activation key,
the product runs in a time-limited evaluation mode.
To evaluate the software without a license:
1. Click Continue Evaluation.
138
To license the software on a server with Internet access:
To license the software on a server with Internet access:
1. Click Enter Licensing Information.
2. Select I have internet access and an activation key.
3. Click the http://www.solarwinds.com/customerportal link to access the customer portal on the SolarWinds web site.
4. Log on to the portal using your SolarWinds customer ID and password.
5. Click License Management on the left navigation bar.
6. Navigate to your product, choose an activation key from the Unregistered
Licenses section, and then copy the activation key.
7. If you cannot find an activation key in the Unregistered Licenses section, contact SolarWinds customer support.
8. Return to the Activate SAM window, and then enter the activation key in the
Activation Key field.
9. If you access Internet web sites through a proxy server, click I access
the internet through a proxy server, and enter the proxy address and port.
10. Click Next.
11. Enter your email address and other registration information, and then click
Next.
To license the software on a server without Internet access:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Click Enter Licensing Information
Select This server does not have internet access, and then click Next.
Click Copy Unique Machine ID.
Paste the copied data into a text editor document.
Transfer the document to a computer with Internet access.
On the computer with Internet access, complete the following steps:
Browse to http://www.solarwinds.com/customerportal/licensemanagement.aspx and then log on to
the portal with your SolarWinds customer ID and password.
Navigate to your product, and then click Manually Register License.
If the Manually Register License option is not available for your product,
contact SolarWinds customer support.
Provide the Machine ID from Step 5, and then download your license key
file.
Transfer the license key file to the server.
Return to the Activate SAM window, browse to the license key file, and then
click Next.
139
Chapter 2: Requirements and Installation
Finishing SolarWinds SAM Installation
After activating your license, you are prompted to configure SolarWinds SAM.
Doing so configures the Orion database, web site, and services to work in your
specific environment.
Follow the directions in the SolarWinds Configuration Wizard:
Notes:
l Confirm that you have designated a SQL Server database instance for
SolarWinds SAM.
l Confirm that the Internet Information Services (IIS) Manager is not open
while the Configuration Wizard is running.
During configuration, the SolarWinds polling engine will shut down temporarily
with the result that, if you are actively polling, you may lose some polling data.
SolarWinds recommends that you perform upgrades during off-peak hours of
network usage to minimize the impact of this temporary polling stoppage.
To configure Server & Application Monitor:
1. If the Configuration Wizard has not loaded automatically, click Start >
All Programs > SolarWinds Orion > Configuration and AutoDiscovery > Configuration Wizard.
2. Click Next on the Welcome window of the Configuration Wizard.
3. If you are prompted to stop services, click Yes.
Note: To ensure that all updates and changes are installed correctly, it is
imperative that you stop all services.
4. Specify the SQL Server instance you want to use to store network data.
5. Provide the credentials, if necessary, that are required to log into the selected instance.
Notes:
l If you are using an existing database, the user account needs only
to be in the db_owner database role for the existing database.
l If you are using an existing SQL account, the user account needs
only to be in the db_owner database role for the SolarWinds SAM
database.
The selected instance must support mixed mode or SQL authentication with
strong passwords. A strong password must meet at least three of the following
four criteria:
l
l
Contains at least one uppercase letter.
Contains at least one lowercase letter.
140
To configure Server & Application Monitor:
l
l
Contains at least one number.
Contains at least one non-alphanumeric character, e.g., #, %, or ^.
For more information about authentication with strong passwords, see
http://msdn.microsoft.com/ms143705.aspx.
If you are using SQL Express, specify your instance as (local) and use a
strong password. For more information about authentication with strong
passwords, see http://msdn.microsoft.com/ms143705.aspx. Due to its inherent limitations, SolarWinds recommends against the use of SQL Express in
production environments.
l If you are creating a new database, the user account must be a member of
the dbcreator server role. The sysadmin role and the sa user account are
always members of dbcreator.
l If you are creating a new SQL account for use with SolarWinds SAM, the
user account must be a member of the securityadmin server role.
Note: The sysadmin role and the sa user account are always members of
securityadmin.
6. Click Next.
7. If you are creating a new database, select Create a new database,
provide a name for the new database, and then click Next.
Note: SolarWinds recommends against using non-alphanumeric characters in database names.
8. If you are using an existing database, select Use an existing database,
type the database name or select it from the list, and then click Next.
9. If you want to create a new SQL account for the SolarWinds SAM
polling engine and web console to use for accessing the database,
select Create a new account, provide an account name and password,
confirm the account password, and then click Next.
10. If you want to use an existing SQL account for the SolarWinds SAM
polling engine and web console to use for accessing the database,
select the existing account, provide the appropriate password, and then
click Next.
11. If you need to specify a particular IP Address for the SolarWinds SAM
Web Console, provide the IP address of the host web server.
Note: SolarWinds recommends the default All Unassigned unless your
environment requires a specific IP address for your SolarWinds Web Console.
12. Specify both the port through which you want to access the web console
and the volume and folder in which you want to install the web console
files.
Note: If you specify any port other than 80, you must include that port in the
l
141
Chapter 2: Requirements and Installation
13.
14.
15.
16.
17.
18.
19.
20.
21.
URL used to access the web console. For example, if you specify an IP
address of 192.168.0.3 and port 8080, the URL used to access the web
console is http://192.168.0.3:8080.
Click Next.
If you are prompted to create a new directory, click Yes.
If you are prompted to create a new website, click Yes.
Note: Choosing to overwrite the existing website will not result in the deletion of any custom SolarWinds SAM website settings you may have previously applied.
Confirm that all services you want to install are checked, and then click
Next.
Review the final configuration items, and then click Next.
Click Next on the Completing the SolarWinds Configuration Wizard dialog.
Click Finish when the SolarWinds Configuration Wizard completes.
Log in to the SolarWinds Web Console as an administrator.
Note: By default, you can log in with User Name Admin and no password.
If you have not discovered your network devices and added them to
the Orion database, the Network Discovery Wizard starts.
Excluding SolarWinds Data Directories from AntiVirus Scanning
Anti-virus programs may lock files used by the SolarWinds Job Engine v2 during
scanning. This can cause the SolarWinds Job Engine v2 services to stop and
restart, causing delayed polling and gaps in data for a poll cycle.
SolarWinds recommends that you exclude certain SolarWinds data directories
(depending on your Windows platform) from your anti-virus scanning to improve
performance and stability:
Exclude for Windows Server 2003:
C:\Documents and Settings\All Users\Application
Data\SolarWinds
Exclude for Windows Server 2008:
C:\ProgramData\SolarWinds
142
Running SolarWinds SAM
Running SolarWinds SAM
To run SolarWinds SAM:
1. Click Start > All Programs > SolarWinds Orion > Orion Web Console.
The SolarWinds Web Console is displayed. You can login by default by entering
the User name Admin and no password. Then click Login.
Internet Explorer Security Settings
If you are using Internet Explorer, SolarWinds recommends that you add the URL
of your SolarWinds website (http://FullSolarWindsServerName/), the URL of
SolarWinds support (http://support.solarwinds.com), and about:blank to the list of
trusted sites.
If you do not add these URLs to the list of trusted sites, you may see Internet
Explorer dialogs that contain messages similar to the following regarding
blocking website content:
l
l
Content from the website listed below is being blocked by the Internet
Explorer Enhanced Security Configuration.
To add the specified URLs to your trusted sites list, click the Add… button
in the Internet Explorer dialog.
For more information about adding sites to your trusted sites list, see the Microsoft
article, “Working with Internet Explorer Security Settings.”
Licensing
The SolarWinds SAM license you purchase is based on the number of allowed
assigned component monitors. A component monitor provides a statistic that you
want to monitor in SolarWinds SAM. You can have as many application templates
and assigned monitors as you need, as long as the number of assigned
component monitors does not exceed the license count.
If you have more assigned component monitors than allowed by your license, the
monitors that exceed your license limit are not activated, and their component
statuses are changed to "Not Licensed." You can either disable some assigned
component monitors to reduce your total assigned monitor count, or contact
SolarWinds about upgrading your SolarWinds SAM license.
How is SAM
Available License
Questions
143
Answers
Chapter 2: Requirements and Installation
licensed?
Tiers
By the
number of
Component
Monitors
AL150 (Up to 150
Component Monitors)
AL300
AL700
AL1100
ALX (Unlimited
component monitors
with standard polling
throughput).
What is a
Component
Monitor?
The value
returned by a
component
monitor is a
measurement
of application
health and
availability
that needs to
be monitored.
It can be a
process, a
service, a
performance
counter, a
port, an URL,
a User
Experience
Monitor, a
Nagios script,
and so on.
An
application
typically
consumes
15-25
component
monitors.
The
Windows
Scheduled
Task Monitor
consumes
five (5)
component
144
Licensing
monitors per
Windows
server.
AppInsight
for SQL
consumes 50
component
monitors per
database
instance.
AppInsight
for Exchange
consumes 50
component
monitors per
mailbox role
server.
AppInsight
for IIS
consumes 30
component
monitors per
monitored IIS
server.
Why Component
Monitors, and not
devices?
145
Monitorbased pricing
is flexible.
Monitorbased pricing
provides a
good
correlation of
price to
value.
Chapter 2: Requirements and Installation
Is it always on
component
monitors?
Technically,
it is based on
highest
number of
Nodes,
Volumes,
and
Component
Monitors
(refer to NPM
licensing for
Node &
Volume
definition),
but in almost
every case,
Component
Monitors is
the highest
factor. There
may be some
instances
where
Volumes or
Nodes would
be the
highest
factor.
Asset Inventory data collection
Asset Inventory data collection does not count against your SAM component
monitor license.
Windows Scheduled Task Monitor
The WSTM consumes five (5) license units per node.
Agents
Agent software is free. You remain bound by the limits of the license you own
regardless of how you poll information, either via an agent or another protocol.
146
To see the available component monitors remaining in your license:
AppInsight for SQL
When using AppInsight for SQL, 50 component monitors will count against your
licensed number of component monitors, per SQL instance.
AppInsight for Exchange
When using AppInsight for Exchange, 50 component monitors will count against
your licensed number of component monitors, per Exchange Server.
AppInsight for IIS
When using AppInsight for IIS, 30 component monitors will count against your
licensed number of component monitors, per monitored IIS server
Important: The example below illustrates a situation where you would have 40
available component monitors available, but have surpassed your allowed
number of 300 monitors by 60. The discrepancy is caused by AppInsight
application implementations. AppInsight applications are licensed as 50 monitors
per application and cannot be partially licensed, as is the case with typical
applications.
Note: SolarWinds SAM licenses do not have to mirror the license count of any
other installed SolarWinds product. For example, you can install SolarWinds
SAM with a 150 component license on a SolarWinds NPM server with an
unlimited node license.
To see the available component monitors remaining in your license:
1. Log on to the SolarWinds Web Console with an administrator account.
2. Click Applications.
3. Click SAM Settings.
147
Chapter 2: Requirements and Installation
4. Click SAM License Summary.
Note: As an alternative to the previous procedure, you can also click
License Details in the Settings page to view the used and available component monitors.
Licensing Information:
l
l
l
l
When using your Customer ID and password, you can use your individual
profile information.
You can get your license information from the customer portal using the customer portal link: https://customerportal.solarwinds.com/ instead of support.solarwinds.com
If you do not know your CustomerID and/or password, navigate to
http://www.solarwinds.com/support/ticket/serviceticket.aspx and request the
desired information.
To get your activation key, navigate to the Customer Portal and click
License Management, then click the plus sign [+].
Deactivation
If you have deactivation information, you should step through the deactivation
process a second time. You no longer need your Customer ID and password and
will prompted multiple times to confirm that you are sure you want to deactivate
your product.
License Paths
The License Manager will only work for people under active maintenance and
can be downloaded from the customer portal. You can activate or deactivate your
products using the License Manager, as well as see all products you have
installed on that computer.
148
Chapter 3:
Common Tasks with SolarWinds
SAM
The features and flexibility provided by Server & Application Monitor give highly
detailed insight into the performance quality of applications on your network. The
tasks presented in this chapter illustrate the value of Server & Application Monitor,
and how it can immediately offer you a significant return on your investment:
l
l
l
l
l
l
l
l
l
Monitoring Web Site Performance
Monitoring Microsoft Windows Performance
Monitoring IIS Application Pools
Scanning for Applications Worth Monitoring
Monitoring VMware Performance Counters
Monitoring and Restarting Stopped Windows Services
Creating a Custom Component Availability Report
Creating a Windows PowerShell Monitor
Monitoring Large Directories
Monitoring Web Site Performance
You are the website administrator for your company. You are responsible for the
Intranet web site accessed by the employees and the corporate web site
accessed by the customers. You want to make sure both your employees and
customers are able to access your web sites and that you are alerted to any
problems that would prevent them from doing so.
149
Chapter 3: Common Tasks with SolarWinds SAM
Deciding What to Monitor
The Intranet server is in your server room. To make sure only employees can
access the Intranet web site, the web site is secured using basic HTTP
authentication (htpasswd) that requires them to log on using a user name and
password. You decide to monitor this server using the HTTP template and the
valid credentials: user name "admin" and password "password.”
The corporate web server is hosted and managed by a web hosting company.
You can monitor the web site with the HTTP Template, but because you do not
have direct control over the server hardware, you will add the server to the Orion
database as an external node.
Monitoring the Intranet Home Page
We need to add the Intranet web server to the Orion database, and then assign
the SolarWinds SAM HTTP template to the web server.
1. Log on to the SolarWinds Web Console.
2. Click Applications if not already selected.
3. Add the Intranet web server to the Orion database.
a. Click Add a Node.
b. Type the Hostname or IP Address of the Intranet web server.
c. Check the ICMP (Ping only) check box, select the appropriate
Polling Engine (if applicable), and then click Next.
d. In the Add Application Monitors page, click Next.
Note: If you wish to add an Application Monitor to the node, you
may do so either here or from the Application Settings as described
elsewhere in this guide.
e. In the Change Properties page, click OK, Add Node.
150
Monitoring the Corporate Home Page
Assign the HTTP template to the Intranet web server node.
a.
b.
c.
d.
e.
f.
g.
h.
i.
j.
k.
l.
m.
n.
Click Applications if not already selected.
Click SAM Settings.
Click Manually Assign Application Monitors.
Select Web Server in the Show only list.
Select HTTP, and then click Next.
Expand the categories and locate your Intranet web server node, select
it, and then click Next.
Select <New Credential> in the Choose Credential list.
Type Intranet Admin in the Credential Name field.
Type admin in the User Name field.
Type password in the Password and Confirm Password fields.
Click Test.
If the test fails, see “Troubleshooting the HTTP Template.”
Click Assign Application Monitors.
Click Done.
Monitoring the Corporate Home Page
We need to add the corporate web server to the Orion database as an external
node, and then assign the HTTP template to the web server.
1. Log on to the SolarWinds Web Console.
2. Click Applications if not already selected.
3. Add the corporate web server to the Orion database as an external node.
a. Click Add a Node.
b. Type the Hostname or IP Address of the corporate web server.
c. Check the External check box, select the appropriate Polling Engine
(if applicable), and then click Next.
4. Assign the HTTP template to the corporate web server node.
a. Select Web Server in the Show only list.
b. Select HTTP.
c. Select Inherit credentials from template and then click Test.
d. If the test fails, see “Troubleshooting the HTTP Template.”
e. Click Next.
f. Enter the Name for your corporate web server.
g. Click OK, Add Node.
Troubleshooting the HTTP Template
If the web site requires a user name and password, verify that you are entering a
working user name and password.
151
Chapter 3: Common Tasks with SolarWinds SAM
If the SolarWinds SAM server must connect to the Internet through a web proxy:
1.
2.
3.
4.
5.
6.
7.
Click Assign Application Monitors even though the test failed.
Click Edit.
Click [+] to expand the HTTP Monitor component.
Click Override Template next to Use Proxy.
Check the Use Proxy check box.
Click Override Template next to Proxy Address.
Type the proxy address in the Proxy Address field using the syntax http://proxyaddress
8. Click Test All.
9. Click Submit.
10. Click Done.
Monitoring IIS Application Pools
You maintain a web server that hosts five different web sites through Internet
Information Services (IIS) 6.0 using application pools to separate each web site.
Everything was fine at first, but the average load time for the web pages has
doubled as business has grown, and you suspect it may be time to move at least
one of the web sites to a new server.
152
Deciding What to Monitor
Deciding What to Monitor
Internet Information Services 6.0 runs each application pool in a new instance of
wp3w.exe. Monitoring the five w3wp.exe instances individually will let you see
which web site is using the most system resources. You can then make a more
informed decision as to which web site you should move to the new server.
Note: w3wp.exe is running only if there are HTTP requests made to a server. To
keep w3wp.exe running if no HTTP requests are made to that server, add an
HTTP Monitor to the same application. The HTTP Monitor will then check the
same website and generate HTTP requests, thereby keeping w3wp.exe running.
What needs to be monitored:
Five instances of w3wp.exe, differentiated by application pool. SolarWinds SAM
can monitor them separately if you specify the application pool names in the
component monitors.
1. Log on to the SolarWinds Web Console.
2. Click Applications if not already selected.
3. Add the web server to the Orion database.
a. Click Add a Node.
b. Type the hostname or IP address of the Intranet web server.
c. Check the ICMP (Ping only) check box and then click Next.
d. In the Add Application Monitors page, click Next.
e. In the Change Properties page, Click OK, Add Node.
4. Find the wp3w.exe process on the web server.
a. Click Applications if not already selected.
b. Click SAM Settings.
c. Click Component Monitor Wizard.
d. Select Process Monitor – WMI as the monitor type, and then click
Next.
e. Click Browse, select the web server, and then click Select.
f. Enter WebServerAdmin in the Credential Name field.
g. Enter your administrator user name in the User Name field.
h. Enter your password in the Password and Confirm Password fields.
i. Click Next.
j. Wait for the process list to load.
k. Click the last page button to view the last page.
l. Check the check box next to w3wp.exe, and then click Next.
m. Change Monitor Name to Webpool1.
n. Enter webpool1 in the Command Line Filter field.
o. Change the CPU Warning Threshold to greater than 40.
153
Chapter 3: Common Tasks with SolarWinds SAM
p. Change the CPU Critical Threshold to greater than 50.
q. Click Add Another Component.
r. Repeat steps d through q, changing the Monitor Name and Command
Line Filter fields appropriately for the four remaining webpool filters.
s. After creating the monitors for all five w3wp.exe instances, click Next.
t. Select New Application Monitor.
u. Type Web Server Application Pools as the Application Monitor
Name, and then click Next.
v. Select the web server node, and then click Next.
w. Review the list of component monitors to create, and then click OK,
Create.
Scanning for Applications Worth Monitoring
You already use SolarWinds SAM for monitoring applications critical to your own
job functions. Now, you want to discover and monitor other applications that are
hosted in your organization's network.
What needs to be monitored:
You decide to scan for Windows and IIS because you have the Windows
administrator password to access many computers on the network and you have
a hunch at least a few of them are running IIS.
All the computers in your network are already in the Orion database, so there is
no need to add them.
The administrator user name and passwords are:
User Name: WAREHOUSE\Administrator
Password: H0merSamps0n
154
Monitoring a Specific URL
User Name: IT\Administrator
Password: FourLights
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Log on to the SolarWinds Web Console.
Click Applications if not already selected.
Click SAM Settings.
Click Scan Nodes for Applications.
Select nodes:
a. Click [+] to expand the node groups.
b. Select the nodes you want to scan, and then click Next.
Select applications to find.
a. Uncheck all applications except:
l Internet Information Services
l Windows Server 2003-2008.
b. Click Next.
Enter the credentials for the servers you are scanning:
a. Click Add Credential.
b. Type Warehouse Admin in the Credential Name field.
c. Type WAREHOUSE\Administrator in the User Name field.
d. Type H0merSamps0n in both the Password and Confirm Password
fields.
e. Click Submit.
f. Click Add Credential.
g. Type IT Admin in the Credential Name field.
h. Type IT\Administrator in the User Name field.
i. Type FourLights in the both the Password and Confirm Password
fields.
j. Click Submit.
k. Click Next.
Click Start Scan.
Click View SAM Summary Page.
Click View results (near the top of the page) after the SAM scan is complete.
Review the results of the scan.
Monitoring a Specific URL
To monitor a specific URL, follow the step outlined below:
1. Login to the Web Console and navigate to Settings.
2. Click Manage Nodes and then click Add Node.
155
Chapter 3: Common Tasks with SolarWinds SAM
3. Enter the URL you want to monitor (eg: www.google.com) and select “No
Status: External Node,” as highlighted below:
4. Click Next and then select Web Pages from the drop-down menu.
5. Check Web Link and select Inherit credentials from Template. Click Test
and then click Next.
156
Monitoring VMware Performance Counters
6. On the Change Properties page, review properties you wish to change and
then click, OK, Add Node.
7. Navigate to the Node Details page to review the results. To do this, click the
Home tab then drill down to your specific node in the All Nodes resource.
Monitoring VMware Performance Counters
You want to ensure the health of your VMware environment.
What needs to be monitored:
You want to create an Application Monitor that uses VMware performance
counters provided by the VMware wizard to monitor the health of various aspects
of your VMware environment.
To create a new Application Monitor using the browsing method to select
the desired VMware performance counters:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Component Monitor Wizard underneath Getting Started with SAM.
Select one of the following component monitor types, depending on
whether you want to browse for ESX or vCenter performance counters:
157
Chapter 3: Common Tasks with SolarWinds SAM
VMware ESX Performance Counter MonitorVMware vCenter Performance Counter Monitor
6. Click Next.
7. Type the IP address of the VMware node you want to browse, or click
Browse, select the node from the list, and click SELECT.
8. If suitable credentials already exist, choose the credential from the
Choose Credential list.
9. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
10. Click Next.
11. Select whether you want to monitor A single system or Multiple systems.
12. Choosing A single system will provide specific counters that apply to the
target system only.
Note: This option provides all available performance counters with
instances for the specified Entity Type. Since the performance counters
selected may contain instances, the Application Monitor or template created based on them cannot be considered as generic, and may only be
assigned to the specific target node you specified in step 7 above.
Choosing Multiple systems will provide more generic counters that can
be applied to multiple systems.
Note: This option provides only aggregate performance counters (without
instances). Therefore the Application Monitor or template created based on
them can be considered as generic and assigned to different ESX/vCenter
target hosts. In this case, monitors in the application or template created
will contain the special ${VMWARE_ENTITY_NAME} variable in the
Entity Name field of the monitor. When the monitor runs, this variable will
be resolved to the first available Entity on a target host with the desired
Entity Type (for example, the first Host System).
13. Select the desired VMware Entity Type to monitor:
l Cluster Compute Resource (only available if the VMware vCenter Performance Counter Monitor type is selected in step 5) – Data object that
aggregates the computation resources of its associated Host System
objects into one single computation resource for use by virtual machines.
The cluster services such as HA (High Availability), DRS (Distributed
Resource Scheduling), and EVC (Enhanced vMotion Compatibility),
enhance the usefulness of this single computation resource. This Entity
Type is specific to vCenter systems.
l Host System – Managed object type that provides access to a virtualization
host platform.
158
To create a new Application Monitor using the browsing method to select the
Resource Pool – Represents a set of physical resources which may be a
single host, a subset of a host's resources, or resources spanning multiple
hosts. You can subdivide Resource pools by creating child resource pools.
In order to run, a virtual machine must be associated as a child of a resource
pool. In a parent/child hierarchy of resource pools and virtual machines, the
root resource pool is the single resource pool that has no parent pool.
l Virtual Machine – Managed object type for manipulating virtual machines,
including templates that can be repeatedly deployed as new virtual
machines. This object type provides methods for configuring and controlling
a virtual machine.
14. If you selected the A single system option in step 11, select the desired
VMware Entity to monitor.
15. Select the desired Performance Object (group) to monitor. For example, if
you want to monitor CPU counters, select CPU.
16. Select the check boxes next to the counters to monitor for the selected Performance Object.
Note: To select all the counters listed, select the check box next to
Counter.
l
The selected counters are listed in the Selected items list with a red X
next to each one. To delete an item, click the red X next to the item and it
will be removed from the list.
17. If you want to select counters from an additional Performance Object,
select the next Performance object and then add the desired counters for it.
18. When you are finished selecting counters, click Next.
19. If you selected the A single system option in step 12, select the desired
counter instances to monitor:
a. Use the Group By drop down to display the counters for a particular Performance Object, or select All Counters.
b. Click the name of the desired counter to choose its instances.
c. Select the check box(es) next to the desired instance(s) to monitor.
Note: To select all the instances listed, select the check box next to
Instance Name.
The selected instances are then displayed in the Selected items list
with a red X next to each one. To delete an item, click the red X next to
the item and it will be removed from the list.
d. When you are finished selecting counter instances, click Next.
20. The Edit Properties page is displayed with the component monitors that
have been created for each of your selected counters or counters/instances.
Here you can modify settings such as the Monitor Name, which defaults to
159
Chapter 3: Common Tasks with SolarWinds SAM
the counter name that was selected. This is only a descriptive label, and
can be modified as desired.
If you chose the Multiple systems option in step 11, you can see the
special ${VMWARE_ENTITY_NAME} variable in the Entity Name field of
the monitor. When the monitor runs, this variable will be resolved to the first
available Entity on a target host with the desired Entity Type (for example,
the first Host System).
You also need to configure your warning and critical thresholds for
response time and statistic.
21. When you are finished editing monitor properties, click Next.
22. The Add to Application Monitor or Template page is displayed with the
Component list collapsed. Click [+] next to Component list to expand the
list of counters or counters/instances to be added.
23. Select New Application Monitor. Then enter a name for the new Application Monitor, for example: VMware Disk and CPU Monitor.
You can change the name of the Application Monitor up to and including
step 26.
24. If you selected the Multiple systems option in step 11, expand the list of
nodes and select the nodes to monitor. Only VMware ESX and vCenter
nodes are displayed.
25. Click Next.
26. Click OK, Create.
27. Click View SAM Summary Page.
28. Your new VMware monitor appears in the tree view for the All Applications
resource. The polling results for the new monitor are updated after a few
minutes.
Monitoring and Restarting Stopped Windows Services
You want to ensure the health of your Windows server by monitoring the services
that are running. If any services are stopped, they should be restarted.
What needs to be monitored:
You want to create an Application Monitor that monitors Windows services. You
also want to create an alert that attempts to restart any services that are stopped
and sends an email.
160
What needs to be monitored:
To create a new Application Monitor template using the browsing method to
select the desired Windows services and then assign it to the desired
nodes:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Component Monitor Wizard underneath Getting Started with SAM.
Select the following component monitor type:
Windows Service Monitor
Click Next.
Type the IP address of the Windows node you want to browse, or click
Browse, select the node from the list, and click SELECT.
If suitable credentials already exist, choose the credential from the
Choose Credential list.
If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
Click Next.
Browse the list of services and check the boxes for the services to monitor.
Adjust thresholds as desired.
Click Next.
Ensure that New Application Monitor Template Name is selected and
then enter a name for your new template, for example CustomWindowsServices.
Click Next.
Select the boxes for the desired nodes to monitor and click Next.
Click OK, Create to create the assigned Application Monitor.
To create an alert that restarts any stopped Windows services and sends an
email:
1. Click Start > All Programs > SolarWinds Orion > Alerting, Reporting,
and Mapping > Advanced Alert Manager.
2. Click Configure Alerts.
3. Scroll to the bottom of the list in the Manage Alerts dialog, and check the
box for Restart a service.
4. If you would also like to send an e-mail notification for the service
restart:
a. Highlight Restart a service and click Edit.
b. Select the Trigger Actions tab and then click Add New Action.
c. Select Send an E-Mail / Page and click OK.
161
Chapter 3: Common Tasks with SolarWinds SAM
d. Complete the e-mail info and click OK.
e. Click OK.
5. Click Done.
For more information about restarting Windows services with an alert action, see
“Restarting Windows Services with an Alert Action” on page 1.
Monitoring Large Directories
You already use the Directory Size monitor in SolarWinds SAM for monitoring
small and medium-sized directories. Now you need to monitor a very large
directory.
You discover the Directory Size monitor has problems monitoring the very large
directory, which contains hundreds or even thousands of files, because the
monitor timeout may lapse before the target computer can finish computing the file
sizes and sending the response.
In order to work around this issue, you decide to use the Windows Script monitor
instead to execute a Visual Basic script that uses the Scripting.FileSystemObject
to calculate the directory size.
What needs to be monitored:
You decide to monitor the very large directory using the Windows Script monitor,
because this method should be as fast as if you view the folder properties in
Windows Explorer to get the size and avoid the timeout issues.
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a New Template underneath Application Monitor Templates.
Type a name for your template in the Template Name field, for example
Large Directory Monitor.
6. If you want to turn on extended debug information to assist Customer
Support, expand Advanced and then set Debug logging On and specify
the Number of log files to keep.
Here you can also select either 32bit or 64bit from the drop down list
entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer Support.
162
What needs to be monitored:
7. Click Add Component Monitor.
8. Expand the Custom Component Monitors group, and then check Windows Script Monitor.
9. Click Submit.
10. Select credentials with appropriate permissions to run the script on the
SolarWinds SAM server, and that also has appropriate permissions to do
whatever else the script requires.
11. Copy the following Visual Basic script to get the directory size into the
Script Body field:
Dim folderPath
folderPath = WScript.Arguments(0)
Set fs=WScript.CreateObject ("Scripting.FileSystemObject")
Set folder= fs.GetFolder(folderPath)
WScript.Echo "Message: Folder " &folderPath & " is " & folder.Size
& " bytes large"
WScript.Echo "Statistic: " & folder.Size
The VB code does the following:
a. Reads the first argument passed to the script (the UNC pathname for
the directory to monitor) and stores it in folderPath.
b. Creates the Scripting.FileSystemObject and stores it in fs.
c. Gets the folder name from the saved command line argument and
stores it in folder.
d. Displays the message with the folder name and the folder size.
e. Displays the statistic (folder size in bytes).
Note: The script does no error checking, such as handling the case if
the folder does not exist.
12. Type the UNC pathname for the directory name to monitor into the Script
Arguments field.
You can use the token ${IP} and the IP address will be filled in with the IP
address of the target node to which the monitor is assigned when the Windows
Script monitor runs.
For example, if you type the following UNC pathname for the directory name in
the Script Arguments:
\\${IP}\c$\my_large_directory
163
Chapter 3: Common Tasks with SolarWinds SAM
the VBscript will get the size of the directory c:\my_large_directory on the node
to which the Windows Script monitor is assigned.
13. Specify the critical and warning thresholds appropriately based on the
desired directory size.
14. Click Submit.
15. Create an assigned Application Monitor by assigning the Large Directory
Monitor template to the desired node to monitor.
a. Click the Applications tab.
b. Click SAM Settings.
c. Click Manually Assign Application Monitors underneath Getting Started with SAM.
d. Select All in the Show only list.
e. Click Large Directory Monitor and then Next.
f. Click Manually Assign Application Monitors underneath Getting Started with SAM.
g. Select All in the Show only list.
h. Click Large Directory Monitor and then click Next.
i. Browse to the desired node to monitor, select it, and then click Next.
j. Enter itadmin in the Credential Name field.
k. Enter your administrator user name in the User Name field.
l. Enter your password in the Password and Confirm Password fields.
m. Click Test.
n. If the test fails, see “Troubleshooting the Windows 2003-2008 Template..”
o. Click Assign Application Monitors, and then click Done.
Troubleshooting the Large Directory Monitor
Verify that you are entering the user name and password of an administrator-level
account. If you think you have entered an incorrect credential, correct the mistake
and then retest.
If you made a mistake with the spelling of the directory name, correct it and then
retest.
164
Chapter 4:
Managing the Web Console
The SAM Web Console is an integral part of the SolarWinds family of products
that can be configured for viewing from virtually any computer connected to the
Internet. You can also customize the web console for multiple users and store
individually customized views as user profiles. Administrator functions are
accessed by clicking Settings in the top right of all SolarWinds Web Console
views.
The SolarWinds Web Console administrator manages the SolarWinds Website
using the commands listed in the various categories on the Settings page.
You can manage SolarWinds SAM nodes, groups, accounts, alerts, views, and
settings. You can also manage the navigation and look of SolarWinds SAM and
view information about available product updates. This guide is designed to
mirror the SAM interface, as shown below.
Note: If links appear not to work or misdirect you, clear your web cache which can
be done by clicking the Clear Web Cache button at the top right of the Settings
page, or by going through your browser's Options menu.
165
Chapter 4: Managing the Web Console
To manage the SolarWinds Web Console, navigate to the Settings page:
1. Log on to your SolarWinds Web Console with an Administrator account.
Note: Initially, Admin is the default administrator user ID with a blank password. You can change the password later using the Account Manager. For
more information, see Managing Accounts.
2. Click Settings near the top right of the SolarWinds Web Console to display
the Settings page.
166
Refer to the sections that follow for details about the administrative commands
Refer to the sections that follow for details about the administrative commands available in each category:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Getting Started with SolarWinds
Discovery Central
Network Sonar Discovery
Add a Node
Node & Group Management
Manage Nodes
Virtualization Settings
Manage Dependencies
Manage Groups
Accounts
Manage Accounts
Account List
Customize
Customize Menu Bars
Color Scheme
External Websites
Manage Alerts
Manage Advanced Alerts
Product Updates
Available Product Updates
SolarWinds Product Team Blog
Views
Manage Views
Add New View
Views by Device Type
Views by Application Type
Settings
Web Console Settings
Polling Settings
SAM Settings
SolarWinds Thresholds
Virtualization Thresholds
Details
Database Details
Polling Engines
Orion Core Details
License Details
167
Chapter 4: Managing the Web Console
l
l
Agents
Agent Settings
Discovery Central
Click Discovery Central on the Settings page to view a centralized overview of
the types and number of network objects you are monitoring with your currently
installed SolarWinds products.
Refer to “Discovering and Adding Nodes on a Network”.
Network Sonar Discovery
Click Network Sonar Discovery on the Settings page to discover a range of
nodes in your SolarWinds SAM.
For more information, refer to “Network Sonar Discovery”.
Add a Node
Click Add a Node on the Settings page to add a single device to your
SolarWinds SAM.
For more information, see "Adding Nodes for Monitoring".
Node & Group Management
The Node & Group Management category gives you access to the commands for
managing nodes, groups, and dependencies.
Refer to the following sections for more information:
Click Manage Nodes on the Settings page to add, view, and manage all
nodes and resources managed or monitored by your SolarWinds SAM
installation.
l Virtualization Settings
l
Click Manage Dependencies on the Settings page to manage dependencies for your SolarWinds SAM.
l
Click Manage Groups on the Settings page to manage groups for your
SolarWinds SAM.
Manage Nodes
l
Click Manage Nodes on the Settings page to add, view, and manage all nodes
and resources managed or monitored by your SolarWinds SAM installation.
168
Virtualization Settings
Virtualization Settings
Click Virtualization Settings on the Settings page to open the Virtualization
Settings view. Here you can view a list of currently monitored VMware ESX
Servers, VMware credentials, as well as Hyper-V information.
For more information, refer to “Virtualization”.
Manage Dependencies
Click Manage Dependencies on the Settings page to manage dependencies for
your SolarWinds SAM.
For more information, see "Managing Groups and Dependencies".
Manage Groups
Click Manage Groups on the Settings page to manage groups for your
SolarWinds SAM.
For more information, see "Managing Groups and Dependencies".
Accounts
The Accounts category gives you access to the commands for managing
accounts, permissions, and views.
Refer to the following sections for more information:
l
l
Manage Accounts
Account List
Manage Accounts
Click Manage Accounts on the Settings page to manage user accounts,
permissions, and views.
For more information, see "Managing Accounts".
Account List
Click Account List on the Settings page to open the SolarWinds Website
Accounts view, providing an immediate overview of web console user account
settings.
You may use this view to make changes to multiple accounts simultaneously and
immediately by clicking to check or clear options. Clicking an Account user
name opens the Account Manager for the selected account.
For more information, see "Managing Accounts".
169
Chapter 4: Managing the Web Console
Customize
The Customize category provides commands to customize the navigation and
appearance of your SolarWinds Web Console.
Refer to the following sections for more information:
l
l
l
l
Customize Menu Bars
Color Scheme
External Websites
Customized SAM Tabbed Sub-Views
Customize Menu Bars
Click Customize Menu Bars on the Settings page to configure the menu bars
seen by individual users.
Color Scheme
Click Color Scheme on the Settings page to select a default color scheme for
resource title bars.
For more information, see "Changing the Web Console Color Scheme".
External Websites
Click External Websites on the Settings page to designate any external website
as a SolarWinds Web Console view, appearing in the Views toolbar.
For more information, see "Creating and Editing External Website Views".
Customized SAM Tabbed Sub-Views
Sam allows you to add vertical tabs on any page in the web console, allowing
you to customize the data you view.
To enable SAM Sub-Views:
1. From the web console, click Customize Page in the upper-right hand
corner of the screen.
2. Check Enable Left Navigation.
3. The following screen appears:
170
Manage Alerts
4. To add a tab, click Add tab.
At this point, you can customize each sub-view tab with its own resources just as
you would for any other view.
For more information see, "Editing Views".
Manage Alerts
The Manage Alerts category gives you access to the commands that allow you to
edit, disable, enable, or delete currently configured advanced alerts.
Refer to the following section for more information:
l
Alerting and Reporting
Views
The Views category gives you access to the commands that allow you to manage
individual web console views as well as views for device and application types.
Refer to the following section for more information:
l
l
l
l
l
Manage Views
Add New View
Views by Device Type
Views by Application Type
Customizing Views
171
Chapter 4: Managing the Web Console
Manage Views
Click Manage Views on the Settings page to add, edit, copy, or remove individual
web console views.
For more information see “Customizing Views".
Add New View
Click Add New View on the Settings page to add a custom view with the
information you want to view.
For more information see “Customizing Views".
Views by Device Type
Click Views by Device Type on the Settings page to designate default views for
network nodes.
For more information, see "Views by Device Type".
Views by Application Type
Click Views by Application Type on the Settings page to specify a custom or a
default application details view for each application type.
For information, see “Views by Application Type”.
Settings
The Settings category gives you access to the commands that allow you to
manage configuration settings for the Web Console, polling, SAM, and
thresholds.
Refer to the following sections for more information:
l
l
l
l
Web Console Settings
Polling Settings
SolarWinds Thresholds
SolarWinds Thresholds
Web Console Settings
Click Web Console Settings on the Settings page to customize the function and
appearance of both the SolarWinds Web Console and the charts that are
displayed as resources in SolarWinds Web Console views.
For more information, see "Customizing Charts in the SolarWinds Web Console".
172
Polling Settings
Polling Settings
Click Polling Settings on the Settings page to define the configuration of polling
intervals, timeouts, statistics calculations, and database retention settings for your
SolarWinds SAM polling engine.
For more information, see "SolarWinds Polling Settings".
SAM Settings
Click SAM Settings on the Settings page to configure SolarWinds SAM and its
templates and component monitors.
For more information refer to “SolarWinds SAM Settings”.
SolarWinds Thresholds
Click SolarWinds Thresholds on the Settings page to configure SolarWinds
SAM threshold settings.
For more information, see "SolarWinds General Thresholds".
Virtualization Thresholds
Click Virtualization Thresholds on the Settings page to configure SolarWinds
SAM virtual threshold settings for VMware and Hyper-V objects.
For more information, see "SolarWinds General Thresholds".
Details
The Details category gives you access to the commands that allow you to view
configuration details for the database, polling engines, licenses, and modules.
Refer to the following sections for more information:
l
l
l
l
Database Details
Polling Engines
Orion Core Details
License Details
Database Details
Click Database Details on the Settings page to display details about the SQL
Server database currently used. For more information, see "Data and Database
Settings".
173
Chapter 4: Managing the Web Console
Polling Engines
Click Polling Engines on the Settings page to show the status and selected
configuration information for each currently operational polling engine. For more
information, see "Managing SolarWinds SAM Polling Engines".
Orion Core Details
Click Orion Core Details on the Settings page to display an information-only
page that displays details about your installation of the common components and
resources that all SolarWinds products share, including information about your
SolarWinds server, monitored object counts, and the version numbers of the
executables and DLLs required by any and all installed SolarWinds products.
License Details
Click License Details on the Settings page to display details about both your
SolarWinds SAM license and your monitored network.
This page also shows the version of the applications that you are running and the
versions of associated DLLs.
Navigating the SolarWinds Web Console
The SolarWinds Web Console offers two primary methods of navigation: top-level
web console tabs and view-level breadcrumbs. The following sections describe
how these navigation methods are used:
l
l
Using Web Console Tabs
Using and Disabling Web Console Breadcrumbs
Using Web Console Tabs
In the case of a basic SolarWinds SAM installation, the SolarWinds Web Console
displays the following tabs:
Home
The Home tab provides a menu bar of links to views aiding you in general
network management and monitoring. Information, like events and Top 10
lists, and technologies, like alerts, used to generate the views linked from
the Home menu are generally available to all SolarWinds modules. By
default, the SolarWinds Summary Home view displays when you click
Home from any view in the web console.
174
Using and Disabling Web Console Breadcrumbs
Applications
If you are viewing the SolarWinds Web Console on a server on which
SolarWinds SAM is installed, the Applications tab opens a menu of default
views for some of the many different types of applications SolarWinds SAM
can monitor. The SAM Summary Home view displays by default when you
click Home from any web console view.
Virtualization
The Virtualization tab provides access to specific views and resources that
are tailored for monitoring virtual devices.
Using and Disabling Web Console Breadcrumbs
As you navigate web console views, your location is recorded as a series of links,
or breadcrumbs, to the views you have opened. Each breadcrumb offers the
following navigation options:
Clicking a breadcrumb opens the corresponding view directly.
Clicking > next to a breadcrumb opens a clickable list of all other views at the
same navigation level in the web console. For example, if you are on a Node
Details view, clicking > displays a list of other monitored nodes.
Note: Only the first 50 monitored nodes, listed in alphanumeric order by IP
address, are displayed.
To customize the items in a breadcrumb drop down:
1. Click > at an appropriate level in a breadcrumb to open the drop down.
2. Click Customize this list.
3. Select a criterion from the menu, and then click Submit.
Note: All items in the customized list will be identical for the selected criterion.
Disabling Web Console Breadcrumbs
To ensure access is appropriately restricted for account-limited users, you may
want to disable breadcrumbs, as indicated in the following procedure.
175
Chapter 4: Managing the Web Console
To disable web console breadcrumb navigation:
1. Log on to your SolarWinds server using an account with administrative
access.
2. Open web.config (default location C:\Inetpub\SolarWinds\) for editing.
3. In the <appsettings> section, locate the following setting:
<add key=”DisableBreadCrumbs” value=”false”/>
4. Change “false” to “true,” as follows:
<add key=”DisableBreadCrumbs” value=”true”/>
5. Save web.config.
Note: If you run the Configuration Wizard after editing this setting, your
changes may be overwritten.
Managing Nodes from the Web Console
The SolarWinds Web Console administrator manages the SolarWinds Website
using the commands listed in the various categories on the Settings page. From
the Web Console, the administrator can manage nodes, groups, accounts, alerts,
views, and settings. The administrator can also manage the look and feel of
SolarWinds SAM and view information about available product updates.
To manage the SolarWinds Web Console, navigate to the Settings page:
1. Log on to your SolarWinds Web Console with an Administrator account.
Note: Initially, Admin is the default administrator user ID with a blank password. You can change the password later using the Account Manager. For
more information, refer to “Managing Accounts".
2. Click Settings at the top right of the SolarWinds Web Console to display the
Settings page.
Note: The Node Management feature is accessible by clicking Manage
Nodes either in the header of any All Nodes resource or in the Node &
Group Management grouping of the Website Administration page. The All
Nodes resource is included on the SolarWinds Summary Home view by
default, but you can include it on any other web console view as well. Confirm that the All Nodes resource is available on an appropriate Web Console view before continuing. For more information about adding resources
to SolarWinds Web Console views, see “Editing Views”.
Refer to the following sections for more information:
l
l
Unmanaging Nodes
Adding Nodes for Monitoring
176
Unmanaging Nodes
l
l
l
l
l
l
l
l
l
l
Deleting Nodes from Monitoring
Viewing Node Data in Tooltips
Editing Node Properties
Promoting a Node from ICMP to SNMP Monitoring
Viewing Node Resources
Setting Node Management States
Unscheduled Node Polling and Rediscovery
Monitoring Windows Server Memory
Scheduling a Node Maintenance Mode Time Period
Agents
Unmanaging Nodes
If you need to deactivate nodes for a period of time, you can do so by unmanaging
them. Changes you make to the managed or unmanaged status of a node takes
affect after the next polling cycle.
To unmanage a node:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Home tab.
Click Settings.
Click Manage Nodes.
Check the nodes you want to unmanage.
Click Unmanage and follow the prompts as needed.
Adding Nodes for Monitoring
The following procedure details the steps required to add a device for monitoring
in the SolarWinds Web Console.
To add a device for monitoring in the SolarWinds Web Console:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Nodes in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Click Add Node on the Node Management toolbar.
5. Provide the hostname or IP Address of the node you want to add in the
Hostname or IP Address field.
6. If the IP address of the node you are adding is dynamically assigned,
check Dynamic IP Address.
177
Chapter 4: Managing the Web Console
7. If you only want to use ICMP to monitor node status, response time,
or packet loss for the added node, check ICMP (Ping only).
8. If you want to add an External node to monitor a hosted application
with SolarWinds Server & Application Monitor, select No Status:
External Node.
Note: The External status is reserved for nodes hosting applications that
are to be monitored with SolarWinds Server & Application Monitor.
SolarWinds SAM will not collect or monitor any data about a node itself, if it
is marked as External.
9. If you want to monitor Windows Servers using WMI and ICMP, select Windows Servers: WMI and ICMP.
10. If you want to monitor Windows Servers using an agent, select Windows
Servers: Agent.
11. If you are adding a VMware device, check Poll for VMware to ensure
that SolarWinds SAM acquires any data the VMware device provides to
SNMP polling requests, and then complete the following steps to provide
required vCenter or ESX Server credentials. For more information, see “Virtualization" on page 319.
a. Select an appropriate vCenter or ESX credential.
Notes:
l If you are creating a new credential, select <New Credential>.
l If you are editing an existing credential, select the credential
you want to edit.
l SolarWinds recommends against using non-alphanumeric characters in VMware credential names.
b. If you are creating a new credential, provide a Credential name.
c. Provide an appropriate User name and a Password, and then provide
the password again in the Confirm password field.
d. Click Test to confirm the VMware credentials you have provided.
11. If you want to use SNMP and ICMP to monitor the added node, complete the following steps:
a. Select the Most Devices and the SNMP Version for the added node.
Notes:
l SolarWinds uses SNMPv2c by default. If the device you are
adding supports or requires the enhanced security features of
SNMPv3, select SNMPv3.
l If SNMPv2c is enabled on a device you want SolarWinds SAM to
monitor, by default, SolarWinds SAM will attempt to use
SNMPv2c to poll for performance information. If you only want
178
To add a device for monitoring in the SolarWinds Web Console:
12.
13.
l
l
14.
15.
16.
17.
18.
SolarWinds SAM to poll using SNMPv1, you must disable
SNMPv2c on the device to be polled.
b. If you have installed multiple polling engines, select the Polling
Engine you want to use to collect statistics from the added node.
Note: This option may not be available if you are only using one polling
engine to collect information from your network.
c. If the SNMP port on the added node is not the SolarWinds default
of 161, provide the actual port number in the SNMP Port field.
d. If the added node supports 64bit counters and you want to use
them, check Allow 64bit counters.
Note: SolarWinds fully supports the use of 64-bit counters; however,
these high capacity counters can exhibit erratic behavior depending on
manufacturer implementation. If you notice peculiar results when using
these counters, use the Node Details view to disable the use of 64-bit
counters for the device and contact the hardware manufacturer.
If you want SolarWinds to use SNMPv2c to monitor the added node,
provide valid community strings for the added node.
Note: The Read/Write Community String is optional, but SolarWinds does
require the public Community String at a minimum, for node monitoring. If
you want to use read/write SNMPv3 credentials, complete the following
steps in the Read / Write SNMPv3 Credentials area.
If you want SolarWinds to use SNMPv3 to monitor the added node,
provide the following SNMP Credentials, Authentication, and Privacy/Encryption settings:
SNMPv3 Username, Context, Authentication Method, and Password.
Note: If this password is a key, check Password is a key.
SNMPv3 Privacy/Encryption Method and Password.
Note: If this password is a key, check Password is a key.
If you want to save the provided credentials as a Credential Set in the
Credential Set Library, provide a Name, and then click Save.
If you want to delete a currently saved credential set, select the set to
delete, and then click Save.
If you are using SNMP to communicate with your added node, click
Validate SNMP after entering all credentials to confirm your SNMP settings.
Click Next.
Check the objects for the added node that you want SolarWinds to monitor
or manage. The following options are available in the Selection toolbar:
l Clicking All selects all listed devices for monitoring.
l Clicking None clears any checked devices.
179
Chapter 4: Managing the Web Console
Clicking All Volumes selects all listed volumes for monitoring.
After you have selected objects for monitoring, click Next.
If you want to edit the SNMP settings you provided earlier, change the
appropriate values in the SNMP area of the Change Properties page, and
then click Validate SNMP to confirm your new settings.
If you want to edit the default polling settings for your added node,
change the Node Status Polling or Collect Statistics Every values in the
Polling area of the Change Properties page, as appropriate.
Note: The Node Status Polling value refers to the number of seconds,
between the node status checks that SolarWinds performs on the added
node. The Collect Statistics Every value refers to the period of time
between updates SolarWinds makes to display statistics for the added
node.
If you have defined any custom properties for a monitored node,
provide appropriate values for the added node in the Custom Properties
area of the Change Properties page.
Note: The Custom Properties area is empty if you have not defined any
custom properties for monitored network objects.
Click OK, Add Node when you have completed properties configuration.
If you have successfully added the node, click OK on the dialog.
l
19.
20.
21.
22.
23.
24.
Deleting Nodes from Monitoring
The following procedure allows you to delete nodes from monitoring.
Warning: Deleting nodes from monitoring in the web console automatically stops
monitoring of all applications and volumes on the deleted nodes.
To delete a node from monitoring in the SolarWinds Web Console:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Nodes in the Node & Group Management area of the
SolarWinds Website Administration page.
4. Locate the node to delete using either of the following methods:
l Use the search tool above the node list to search your Orion database
for the node you want to delete.
l Select an appropriate Group by: criterion, and then click the appropriate group including the node to delete.
5. Check the node to delete in the list, and then click Delete on the toolbar.
180
Deleting Applications or Volumes from Monitoring
Deleting Applications or Volumes from Monitoring
You can select multiple applications on different nodes for simultaneous deletion.
The search tool above the node list can aid you in finding the proper device to
delete.
1. If you want to delete a monitored application or volume, use the following steps:
a. Locate the application to delete using either of the following methods:
l Use the search above the node list to search your Orion database
either for the object to delete or for its parent object to delete.
l Select a Group by: criteria, and then click the appropriate group
including the parent node of the object to delete.
b. If you have a list of node results, click [+] to expand the parent node
of the object you want to delete.
c. Check the object to delete, and then click Delete on the toolbar.
2. Click OK to confirm deletion.
Viewing Node Data in Tooltips
Node tooltips in SolarWinds SAM provide immediate status overviews of
monitored nodes. To get a quick overview of any monitored node in the web
console, hover over the device name. The information in the following tables
displays immediately.
Node Data
Node Status
Current status of the node. (Up, Down, Warning,
Unmanaged, or Unreachable)
IP Address
The IP address currently assigned to the selected node
Machine Type
The vendor icon and vendor description of the selected
node
Average
Response Time
The measured average response time of the selected node
as of the last node poll
Packet Loss
The percent of all transmitted packets that are lost by the
selected node as of the last node poll
CPU Load
The percent of available processing capacity on the
selected node that is currently used as of the last node poll
181
Chapter 4: Managing the Web Console
Memory Used
The percent of available memory on the selected node that
is currently used as of the last node poll
Editing Node Properties
The following procedure provides the steps required to edit monitored object
properties using the Node Management utility of the SolarWinds Web Console.
To edit object properties in the SolarWinds Web Console:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings at the top right of the web console, and then click Manage
Nodes in the Node & Group Management grouping.
3. Locate the object to edit using either of the following methods:
l Use the search tool above the node list to search your Orion database for either the object you want to edit or the parent node of the
volume you want to edit.
l Select an appropriate Group by criteria, and then click the appropriate group including either the node to edit or the parent of the
object to edit.
4. If you want to edit the properties of a monitored node, check the node
you want to edit, and then click Edit Properties.
5. If you want to edit the properties of a monitored object, click [+] next to
the parent node of the object you want to edit, check the object you want to
edit, and then click Edit Properties.
6. If you are editing the SNMP properties of a node, click Test after providing new settings to confirm they are valid for the edited node.
7. If the selected node is a VMware ESX Server and you want to poll it for
data using the VMware API, confirm that Poll for VMware is checked.
8. If you want to poll for ESX data using an existing ESX credential,
select the appropriate credential from the VMware credentials drop down
menu.
9. If you want to poll for ESX data using a new ESX credential, complete
the following steps:
a. Select <New Credential> in the Choose Credential drop down menu,
and then provide a new credential name in the Credential Name field.
Note: SolarWinds recommends against using non-alphanumeric characters in VMware credential names.
b. Add the credential User name and Password, as necessary.
c. Confirm the password and then click Validate VMware to confirm the
credentials you have provided are valid for the edited node.
182
Promoting a Node from ICMP to SNMP Monitoring
10. Edit additional device properties as needed, and then click Submit.
Promoting a Node from ICMP to SNMP Monitoring
After adding a node to the Orion database as an ICMP only node, you may need
to promote the node to SNMP to start collecting additional statistics. The Node
Management utility of the SolarWinds Web Console can easily promote your
node to SNMP without any loss of historical data.
Note: Once you promote a node from SNMP to WMI, you cannot go back to
polling via ICMP.
To promote an ICMP only node to SNMP:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console and then click Manage
Nodes in the Node & Group Management grouping of the SolarWinds
Website Administration page.
3. Locate the device to promote using either of the following methods:
l Use the search tool above the node list to search your Orion database for the node you want to promote.
l Select an appropriate Group by criteria, and then click the appropriate group including the node to promote.
4. Click Edit Properties, and then select Most Devices: SNMP and ICMP.
5. In the SNMP area, select the SNMP Version for the promoted node.
Note: SolarWinds uses SNMPv2c by default. If the promoted device supports or requires the enhanced security features of SNMPv3, select
SNMPv3.
6. If you have installed multiple polling engines, select the Polling Engine
you want to use to collect statistics from the added node.
Note: This option may not be available if you are only using one polling
engine to collect information from your network.
7. If the SNMP port on the added node is not the SolarWinds default of
161, provide the actual port number in the SNMP Port field.
8. If the added node supports 64 bit counters and you want to use them,
check Allow 64 bit counters.
Note: SolarWinds fully supports the use of 64-bit counters; however, these
high capacity counters can exhibit erratic behavior depending how they
are used. If you notice peculiar results when using these counters, use the
Edit Properties view to disable the use of 64-bit counters on the device in
question, and then contact the hardware manufacturer.
183
Chapter 4: Managing the Web Console
9. If you want to use SNMPv2c to monitor the promoted node, provide
valid community strings for the added node.
Note: The Read/Write Community String is optional, but SolarWinds
does require the public Community String, at minimum, for node monitoring.
10. If you want to use SNMPv3 to monitor the promoted node, provide the
following SNMPv3 credential settings:
l SNMPv3 User name and Context
l SNMPv3 Authentication Method and Password/Key
l SNMPv3 Privacy/Encryption Method and Password/Key
Note: Read/Write SNMPv3 Credentials are optional, but the public
Community String is required, at a minimum, for node monitoring.
11. If you want to edit an existing SNMPv3 credential set, select the name
of your set from the Saved Credential Sets list, and then edit the stored
settings.
12. If you want save the provided SNMPv3 credentials as a credential set,
provide a Name for your new credential set, and then click Save.
13. Click Validate SNMP after entering all required credentials to confirm your
SNMP settings.
14. If you want to change the default polling settings for your promoted
node, edit the Node Status Polling or Collect Statistics Every values in
the Polling area, as appropriate.
Note: The Node Status Polling value refers to the period of time, in
seconds, between the node status checks SolarWinds performs on the promoted node. The Collect Statistics Every value refers to the period of
time between updates SolarWinds makes to displayed statistics for the promoted node.
15. If you have defined any custom properties for monitored nodes,
provide appropriate values for the promoted node in the Custom Properties.
16. Click Submit when you have completed properties configuration for your
promoted node.
17. If you have successfully added the node, click OK on the dialog.
Promoting a Node to WMI Monitoring
After adding a node to the Orion database as an ICMP or SNMP node, you may
need to promote the node to WMI to start collecting additional statistics. The Node
Management utility of the SolarWinds Web Console can easily promote your
node to WMI without any loss of historical data.
184
To promote a node to WMI:
Note: Once you promote a node to WMI, you cannot go back to polling via ICMP.
Also, this option is only available in SAM 5.0 and above.
To promote a node to WMI:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console and then click Manage
Nodes in the Node & Group Management grouping of the SolarWinds Website Administration page.
3. Locate the device to promote using either of the following methods:
4.
l Use the search tool above the node list to search your Orion database
for the node you want to promote.
l Select an appropriate Group by criteria, and then click the appropriate
group including the node to promote.
5. Click Edit Properties, and then select, Windows Servers: WMI and ICMP.
6. Select existing WMI credentials, or create new credentials.
7. Optionally, you can click the Test button for verification.
8. If you want to change the default polling settings for your promoted
node, edit the Node Status Polling or Collect Statistics Every values in
the Polling area, as appropriate.
Note: The Node Status Polling value refers to the period of time, in
seconds, between the node status checks SolarWinds performs on the promoted node. The Collect Statistics Every value refers to the period of time
between updates SolarWinds makes to displayed statistics for the promoted
node.
9. If you have defined any custom properties for monitored nodes,
provide appropriate values for the promoted node in the Custom Properties.
10. Click Submit when you have completed properties configuration for your
promoted node.
11. If you have successfully added the node, click OK on the dialog.
Viewing Node Resources
The List Resources feature of the SolarWinds Web Console Node Management
utility allows you to immediately see all monitored volumes and charts on a
selected node, as shown in the following procedure.
To view a list of all resources present on a node:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
185
Chapter 4: Managing the Web Console
3. Click Manage Nodes in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Locate the node to view using either of the following methods:
l Use the search tool above the node list to search your Orion database
for the node you want to view.
l Select an appropriate Group by criteria, and then click the appropriate
group including the node to view.
5. Check the node you want to view from the list, and then click List
Resources on the Node Management toolbar.
Setting Node Management States
Monitored devices are regularly polled for operational status. Collected statistics
are displayed in the SolarWinds Web Console. Using the Node Management
feature of the SolarWinds Web Console, the management status of monitored
nodes, is easily set or changed, allowing you to either temporarily suspend data
collection or resume polling and statistics collection, as necessary. The following
procedure sets or changes management states for monitored nodes in the
SolarWinds Web Console.
Note: Setting a node to an unmanaged state automatically suspends the
management on the selected node.
To set or change the management state of a node:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Nodes in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Locate the node to manage using either of the following methods:
l Use the search tool above the node list to search your Orion database
for the device you want to manage.
l Select an appropriate Group by criteria, and then click the appropriate
group including the node to manage.
5. Check the node to change, and then click Unmanage or Remanage, as
appropriate, for the selected node.
6. If you have selected Unmanage, provide start and end times and dates for
your management suspension, and then click OK.
186
Unscheduled Node Polling and Rediscovery
Unscheduled Node Polling and Rediscovery
SolarWinds SAM polls devices for statistics and status regularly, according to the
polling settings available for configuration on the Polling Settings view in the
SolarWinds Web Console. For more information, see SolarWinds Polling
Settings. Sometimes, however, it may be necessary to conduct an unscheduled
poll or rediscovery of a monitored device. The Node Management utility gives you
this ability, as shown in the following procedure.
To perform an unscheduled poll or rediscovery:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Nodes in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Locate and check the node you want to poll or locate and check the node to
rediscover, using either of the following methods:
l Use the search tool above the node list to search your Orion database.
l Select an appropriate Group by criteria, and then click the appropriate
group including the node you want to poll or the node you want to
rediscover.
5. If you want to poll the selected node, click More Actions > Poll Now.
6. If you want to rediscover the selected node, click More Actions > Rediscover.
Note: When you click Poll Now, this reschedules a job to run "now" in the
job scheduler, meaning, if the job scheduler is already full, the job may not
execute immediately, but it will execute sooner than the next scheduled poll
cycle.
Depending upon how many components are in a given template, and the type of
component monitors that make up a template, it is not unusual for polling to take
several minutes for the process to fully complete. To see this behavior, click Edit
Application Monitor on the Application Details page and then click Test All.
Unmanage Scheduling Utility
Starting and stopping nodes, applications, and interfaces on a schedule is a task
best suited for the Unmanage Scheduling Utility. This can be found at Start >
SolarWinds Orion > Advanced Features > Unmanage Scheduling Utility.
187
Chapter 4: Managing the Web Console
To schedule tasks to be stopped:
1.
2.
3.
4.
5.
6.
7.
8.
Select either New Task or open an existing task by clicking Edit Task.
Click Add Items.
Click on the Web tab.
Select the items you want to schedule to be stopped by checking the check
box next to the item name.
Click Add.
Select the length of time you would like the selected item to be stopped.
Click OK.
Optionally, you can click Save Task to save your selections for future use.
To view the details of a selected item's schedule, simply check its box and its
details will appear in the Task Item Properties pane on the right.
188
Monitoring Windows Server Memory
From this view, you can change the settings of the item's schedule by selecting
an item and clicking Set Duration. Additionally, you can delete an item from the
unmanage schedule by selecting it and clicking Delete Checked Items.
Note: It is possible to create a conflict of schedules if you choose the same item
to be stopped using both the web console and the Unmanage Scheduling Utility
with different durations.
Monitoring Windows Server Memory
When SolarWinds SAM polls a Windows server for CPU load and memory
utilization, it pulls the amount of physical memory to define the 100% level, and
then it totals the amount of memory in use by each allocation to compute what
percentage of the physical memory is in use. This can result in memory utilization
readings over 100%, as many applications pre-allocate memory and swap before
it is actually needed. To work around this, you can also add physical memory as a
volume for these servers within SolarWinds. When monitored as a volume, the
values will be more in line with your expectations.
Scheduling a Node Maintenance Mode Time Period
When you need to perform maintenance on a node or its components, such as
upgrading firmware, installing new software, or updating security, you may want
to discontinue polling while the device is down for maintenance. Disabling
polling, or setting a node status as Unmanaged, while performing node
maintenance, maintains the accuracy of your data and prevents unnecessary alert
messages. For more information about disabling node polling to perform node
maintenance, see “Setting Node Management States” on page 186.
Administrative Functions of the SolarWinds Web
Console
The following sections describe the primary administrative functions performed by
a SolarWinds Web Console administrator.
l
l
l
Changing an Account Password
Viewing Secure Data on the Web
Handling Counter Rollovers
Changing an Account Password
SolarWinds Web Console administrators may change user account passwords at
any time, as shown in the following procedure.
189
Chapter 4: Managing the Web Console
Note: In environments where security is a priority, SolarWinds recommends
against providing a view where users may change their own web console
account passwords.
To change an account password:
1. Log in to the web console as an administrator.
2. Click Settings in the top right corner of the web console.
3. Click Manage Accounts in the Accounts grouping of the SolarWinds Website Administration page.
4. Select the user account with the password you want to change, and then
click Change Password.
5. Complete the New Password and Confirm Password fields, and then click
Change Password.
6. Click Continue when the password is successfully changed.
Viewing Secure Data on the Web
In the interest of security, sensitive network information, such as community
strings, logins, and passwords, is not viewable in the web console. However, if
you have secured your network, you may check Allow Secure Data On Web
(advanced) in the Calculations & Thresholds area of the SolarWinds Polling
Settings page to allow the passage of community strings through the web
console.
Note: This setting does not affect the display of custom reports that you export to
the web. For more information see “Creating and Viewing Reports” on page 1.
Handling Counter Rollovers
The Counter Rollover setting configures SolarWinds SAM to properly handle
counter rollovers. SolarWinds SAM is capable of handling either 32-bit or 64-bit
counters, but, by default, SolarWinds SAM assumes counters are 32-bit. 32-bit
counters have a maximum value of 232, or 4,294,967,296, and 64-bit counters, if
they are supported by your network devices, have a maximum value of 264, or
18,446,744,073,709,551,616.
Note: The 32-bit counters option is designated as Method 1 in the Counter
Rollover field on the SolarWinds Polling Settings page.
The following procedure designates the type of counter used by SolarWinds
SAM.
190
To designate the type of counter used by SolarWinds SAM:
To designate the type of counter used by SolarWinds SAM:
1. Log in to the web console as an administrator.
2. Click Settings in the top right of the web console, and then click Polling Settings in the Settings grouping of the SolarWinds Website Administration
page.
3. If you are using 64bit counters, select Method 2 in the Counter Rollover
field in the Calculations & Thresholds area.
Notes:
l If Method 2 is selected, SolarWinds SAM will intentionally skip a poll if
a polled value is less than the previous polled value to permit counting
to 264.
l SolarWinds fully supports the use of 64-bit counters; however, these
64-bit counters can exhibit erratic behavior in some implementations.
If you notice peculiar results when using these counters, disable the
use of 64-bit counters for the problem device and contact the device
manufacturer.
4. If you are using of 32bit counters, select Method 1 in the Counter
Rollover field in the Calculations & Thresholds area.
Note: If Method 1 is selected, when a rollover is detected, the time between
polls is calculated as (232 – Last Polled Value) + Current Polled Value.
SolarWinds General Thresholds
Many of the resources available in the SolarWinds Web Console are capable of
displaying error and warning conditions for the devices on your network. Errors
and warnings display in the SolarWinds Web Console. SolarWinds SAM uses the
values provided on the thresholds pages to determine when and how to display
errors and warnings in the SolarWinds Web Console. The following sections
provide more information about threshold types and configuration:
l
l
SolarWinds General Threshold Types
Setting SolarWinds General Thresholds
SolarWinds General Threshold Types
The following device conditions may be configured as SolarWinds General
Thresholds:
CPU Load
Monitored network devices experiencing CPU loads higher than the value
set for the High Level display in High CPU Load reports and resources.
191
Chapter 4: Managing the Web Console
Gauges for these devices also display as bold red. Monitored network
devices experiencing a CPU load higher than the value set for the Warning
Level, but lower than the value set for the High Level, display as red in
High CPU Load reports and resources. Gauges for these devices also
display as red.
Disk Usage
Monitored network devices experiencing a disk usage higher than the value
set for the High Level display as bold red in Disk Usage reports and
resources. Monitored network devices experiencing a disk usage higher
than the value set for the Warning Level, but lower than the value set for the
High Level, display as red in High Disk Usage reports and resources.
Percent Memory Used
Monitored network devices experiencing a percent memory usage higher
than the value set for the Error Level display in High Percent Utilization
reports and resources. Gauges for these devices also display as bold red.
Monitored network devices experiencing a percent memory usage higher
than the value set for the Warning Level, but lower than the value set for the
Error Level, display in High Percent Utilization reports and resources.
Gauges for these devices also display as red.
Percent Packet Loss
Monitored network devices experiencing a percent packet loss higher than
the value set for the Error Level display in High Percent Loss reports and
resources. Gauges for these devices also display as bold red. Monitored
network devices experiencing a percent packet loss higher than the value
set for the Warning Level, but lower than the value set for the Error Level,
display in High Percent Loss reports and resources. Gauges for these
devices also display as red.
SolarWinds SAM calculates percent packet loss using ICMP ping requests
made on the Default Poll Interval. SolarWinds pings monitored devices and
records the results of the ten most recent ping attempts. Percent packet loss
is expressed as the number of failed ping requests, X, divided by the
number of ping requests, 10. For more information about the Default Poll
Interval, see “SolarWinds Polling Settings” on page 312.
For example, if, at a given point in time, the last ten ping requests made of a
selected device resulted in 2 failures and 8 successes, the percent packet
loss for the selected device at the given time is reported as 2/10, or 20%.
192
Setting SolarWinds General Thresholds
Response Time
Monitored devices experiencing response times longer than the value set
for the Error Level display in High Response Time reports and resources.
Gauges for these devices also display as bold red. Devices experiencing
response times longer than the value set for the Warning Level, but shorter
than the value set for the Error Level, also display in High Response Time
reports and resources. Gauges for these devices also display as red.
SolarWinds SAM calculates response time using ICMP ping requests made
on the Default Node Poll Interval. SolarWinds pings monitored devices and
records the results of the ten most recent ping attempts. Average Response
Time is expressed as the average response time of these last 10 ping
requests. If SolarWinds SAM does not receive a ping response within the
Default Poll Interval, SolarWinds SAM will attempt to ping the
nonresponsive device once every 10 seconds for the period designated as
the Warning Interval. For more information, see “SolarWinds Polling
Settings” on page 312.
Setting SolarWinds General Thresholds
The following procedure configures SolarWinds General Thresholds.
To set SolarWinds SAM thresholds:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click SolarWinds Thresholds in the Settings group of the SolarWinds Website Administration page.
Note: For more information about SolarWinds General Thresholds, see
SolarWinds General Threshold Types.
4. Provide appropriate values for Error Level, High Level, or Warning Level
for selected thresholds.
Customizing Views
SolarWinds Web Console views are configurable presentations of network
information that can include maps, charts, summary lists, reports, events, and
links to other resources. Customized views can then be assigned to menu bars.
Note: In environments where security is a priority, SolarWinds recommends
against providing a view where users may change their own web console
account passwords.
193
Chapter 4: Managing the Web Console
Refer to the following sections for more information:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Creating New Views
Editing Views
Configuring View Limitations
Copying Views
Deleting Views
Views by Device Type
Resource Configuration Examples
Customizing Web Console Menu Bars
Changing the Web Console Color Scheme
Changing the Web Console Site Logo
Configuring the Available Product Updates View
Updating your SolarWinds Installation
Customizing Charts in the SolarWinds Web Console
Custom Node Charts
Custom Volume Charts
Custom Chart View
Creating New Views
You can customize the SolarWinds Web Console for individual users by logging
in as an administrator and creating new views as shown in the following
procedure.
Note: In environments where security is a priority, SolarWinds recommends
against providing a view where users may change their own web console
account passwords.
To create a new view:
1. Click Settings in the top right of the web console.
2. Click Manage Views in the Views group of the SolarWinds Website Administration page.
3. Click Add.
4. Enter the Name of New View.
5. Select the Type of View.
Note: The Type of View selection affects how the view is made accessible
to users, and your choice may not be changed later. For more information,
see Views by Device Type.
6. Click Submit.
194
Editing Views
After you have created a new view, the Customize Your View page opens. For
more information, see Editing Views.
Editing Views
The SolarWinds Web Console allows administrators to configure views for
individual users. The following steps are required to configure an existing view.
To edit an existing view:
1. Click Settings in the top right of the web console.
2. Click Manage Views in the Views group of the SolarWinds Website Administration page.
3. Select the view you want to customize from the list, and then click Edit.
4. If you want to change the column layout of your view, complete the following steps.
a. Click Edit to the right of the column widths.
b. Select the number of columns under Layout.
e. Provide the width, in pixels, of each column in the appropriate fields,
and then click Submit.
5. If you want to add a resource, repeat the following steps for
each resource:
a. Click [+] next to the column in which you want to add a resource.
b. Click [+] next to a resource group on the Add Resources page to
expand the resource group, displaying available resources.
c. Check all resources you want to add.
d. If you have completed the addition of resources to the selected
view, click Submit.
Notes:
l Resources already in your view will not be checked on this page
listing all web console resources. It is, therefore, possible to pick
duplicates of resources you are already viewing.
l Some resources may require additional configuration. For more
information, see “Resource Configuration Examples” on
page 198.
l Several options on the Add Resources page are added to the list
of resources for a page, but the actual configuration of a given
map, link, or code is not added until the page is previewed.
6. If you want to delete a resource from a column, select the resource, and
then click X next to the resource column to delete the selected resource.
7. If you want to copy a resource in a column, select the resource, and
then click next to the resource column to delete the selected resource.
195
Chapter 4: Managing the Web Console
8. If you want to rearrange the order in which resources appear in your
view, select resources, and then use the arrow keys to rearrange them.
9. If you have finished configuring your view, click Preview.
Note: A preview of your custom web console displays in a new window. A
message may display in the place of some resources if information for the
resource has not been polled yet. For more information, see “Resource
Configuration Examples” on page 198.
10. Close the preview window.
11. When done, click Done.
Notes:
l For more information about adding a customized view to menu bars
as a custom item, see “Customizing Web Console Menu Bars” on
page 206.
l For more information about assigning your customized view as the
default view for a user, see “Editing User Accounts” on page 299.
Configuring View Limitations
As a security feature, the web console gives administrators the ability to apply
device-based view limitations. The following views and limitations are available:
Managed Views that
Support Limitations
Available Limitations
SAM Application Details
Single Network Node
System Contact Pattern
SAM Component Details
Group of Nodes
Single Machine Type
SAM Summary
Node Name Pattern
Single Hardware
Manufacturer
Cluster Details
System Name Pattern IP Address Pattern
Current Top 10 Lists
Group of Machine
Types
Group of Volumes
Custom Summary
Machine Type
Pattern
Single Group
Datacenter Details
Hardware
Manufacturer
Group of Groups
196
To enable a view limitation:
ESX Host Details
Device Status
Group Name Pattern
Group Details
System Location
Application Name Pattern
Group Summary
System Location
Pattern
Group of Application
Names
Node Details
System Contact
Specific Applications
SolarWinds Summary
Home
Customize Problem
Areas
Virtual Center Details
Virtualization summary
Volume Details
The following procedure configures a view limitation:
To enable a view limitation:
1. Click Settings in the top right of the web console, and then click Manage
Views in the Views group of the SolarWinds Website Administration page.
2. Select the view to which you want to add a limitation, and the click Edit.
3. In the View Limitation area of the Customize View page, click Edit.
4. Select the type of view limitation you want to apply, and then click
Continue.
5. Provide or check appropriate strings or options to define the device types to
include or exclude from the selected view, and then click Submit.
Note: The asterisk (*) is a valid wildcard. Pattern limitations restrict views to
devices for which the corresponding fields include the provided string.
Copying Views
When you want to create multiple views based on the same device type, copying
views allows you to create one view, and then use that view as a template to
create other new views. The following steps copy an existing view.
197
Chapter 4: Managing the Web Console
To copy a view:
1.
2.
3.
4.
Click Settings in the top right of the web console.
Click Manage Views in the Views group.
Select the view you want to copy, and then click Copy.
If you want to edit a copied view, follow the procedure in Editing Views.
Deleting Views
The following steps delete an existing view.
To delete an existing view:
1. Click Settings in the top right of the web console.
2. Click Manage Views in the Views grouping of the SolarWinds Website
Administration page.
3. Select the view you want to delete, and then click Delete.
Views by Device Type
There are vast differences among network objects and the statistics they report,
but the SolarWinds Web Console can make it easier to view network data by
displaying object details by device type, giving you the ability to have a different
view for each unique type of device you have on your network, including routers,
firewalls, and servers. The following steps assign a view by any available device
type.
To assign a view by device type:
1. Click Settings in the top right of the web console, and then click Views by
Device Type in the Views group of the SolarWinds Website Administration
page.
2. Select available Web Views for the different types of devices that
SolarWinds is currently monitoring or managing on your network.
3. Click Submit.
Resource Configuration Examples
Several resources that may be selected from the Add Resources page require
additional configuration. Included in this section are examples of these resources
and the steps that are required for their proper configuration.
198
Selecting a Network Map
Selecting a Network Map
Network maps created with SolarWinds Network Atlas can give a quick overview
of your network, right from the main web console view.
Note: Clicking the resource title in the title bar menu displays the resource by
itself in a browser window.
The following procedure adds a network map to the SolarWinds Web Console.
To add a network map to the web console:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to which you want to add the map, and then click Edit.
3. Click [+] next to the view column in which you want to display the new map.
4. Click [+] next to Network Maps, check Network Map, and then click Submit.
5. Click Preview on the Customize Your View page.
6. Click Edit in the Network Map resource title bar.
7. If you do not want to use the default title provided, enter a new Title for
the title bar of the added map.
8. If you want a subtitle, enter a new Subtitle for the added map.
Note: Titles and subtitles may be entered as either text or HTML.
9. Select from the list of available maps.
10. Select the Scale at which you want to display the map.
Note: If you leave the Scale field blank, the map will display at full scale,
based on the size of the column in which the map displays.
11. Click Submit.
Displaying a List of Objects on a Network Map
When your web console view includes a network map, it can be helpful to
maintain a list of network objects that appear on the map. The following
procedure enables a resource listing network map objects.
Note: Clicking the resource title displays the resource in a new browser window.
To display a list of network map objects:
1. Create a new view or edit an existing view.
Note: For more information, see “Customizing Views” on page 193.
2. Select the view to display the list of network map objects, and then click
Edit.
199
Chapter 4: Managing the Web Console
3. Click [+] next to the view column in which you want to display the new list of
network map objects.
4. Click [+] next to Network Maps, check List of Objects on Network Map,
and then click Submit.
5. Click Preview on the Customize Your View page.
6. Click Edit in the title bar of the List of Objects on Network Map resource.
7. If you do not want to use the default title provided, enter a new Title for
the header of the objects list.
8. If you want a subtitle, enter a new Subtitle for the added objects list.
Note: Titles and subtitles may be entered as either text or HTML.
9. Select from the list of available maps for the objects that you want to populate your list, and then click Submit.
Displaying a Custom List of Maps
The web console allows you to populate a custom view with a list of available
network maps. Each map in your custom list, when clicked, opens in a new
window. The following procedure enables a custom network maps list resource.
Note: Clicking the resource title displays the resource in its own browser window.
To display a custom list of maps:
1. Create a new view or edit an existing view.
Note: For more information, see “Customizing Views” on page 193.
2. Select the view to which you want to add the custom list of network maps,
and then click Edit.
3. Click [+] next to the view column in which you want to display the custom
list of network maps.
4. Click [+] next to Network Maps.
5. Check Custom List of Maps, and then click Submit.
6. Click Preview on the Customize Your View page, and then click Edit in the
title bar of the Custom List of Maps resource.
7. If you do not want to use the default title provided, enter a new Title for
the header of the maps list.
8. If you want a subtitle, enter a new Subtitle for the custom list of maps.
Note: Titles and subtitles may be entered as either text or HTML.
9. Check the maps you want to include in your maps list.
10. Click Submit.
200
Displaying an Event Summary - Custom Period of Time
Displaying an Event Summary - Custom Period of Time
You may want your web console view to display an event summary for a specified
period of time. The following procedure details the steps to include an event
summary in your web console.
Note: Clicking the resource title in the title bar menu displays the resource by
itself in a browser window.
To display an event summary:
1. Create a new view or edit an existing view.
Note: For more information about creating a new view or editing an existing
view, see “Customizing Views” on page 193.
2. Select the view to include the event summary, and then click Edit.
3. Click [+] next to the view column that will display the event summary.
4. Click [+] next to Events.
5. Check Event Summary – Custom Time Period, and then click Submit.
6. Click Preview on the Customize Your View page.
7. Click Edit in the title bar of the Event Summary resource.
8. If you do not want to use the default title provided, enter a new Title for
the header of the event summary.
Note: Titles may be entered as either text or HTML.
9. Select the time period for displaying events from Display Events for the following Time Period.
10. Click Submit.
Specifying User-Defined Links
The User-Defined Links option may be used to create quick access to external
websites or customized views. URLs of your customized views can be copied
from their preview pages and pasted in a User-Defined Links field. The following
steps enable user-defined links from within your web console.
Note: Clicking the resource title in the title bar menu displays the resource by
itself in a browser window.
To enable a user-defined links resource:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to which you want to add the user-defined links resource.
3. Click Edit.
4. Click [+] next to the view column to display the user-defined links resource.
201
Chapter 4: Managing the Web Console
5.
6.
7.
8.
9.
10.
Click [+] next to Miscellaneous
Check User Defined Links.
Click Submit.
Click Preview on the Customize Your View page.
Click Edit in the title bar of the User Defined Links resource.
If you do not want to use the default title provided, enter a new Title for
the links list.
11. If you want a subtitle, enter a new Subtitle for the links list.
Note: Titles and subtitles may be entered as either text or HTML.
12. Enter the following information for each link you want to define:
Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
13. Click Submit.
Specifying Custom HTML or Text
In situations where you have static information that you want to provide in the web
console, use the Custom HTML or Text option. The Custom HTML or Text
option may also be used to create quick access to your customized views. The
following procedure will create a static content area within your web console for
displaying text or HTML content.
Note: Clicking the resource title displays the resource in a new browser window.
To specify custom HTML or text:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to include the custom HTML or text.
3. Click Edit.
4. Click [+] next to the column to display the custom HTML or text.
5. Click [+] next to Miscellaneous, and then check Custom HTML or Text.
6. Click Submit.
7. Click Preview on the Customize Your View page.
8. Click Edit in the title bar of the Custom HTML or Text resource.
9. If you do not want to use the default title provided, enter a new Title for
the specified content area.
10. If you want a subtitle, enter a new Subtitle for the specified content area.
Note: Titles and subtitles may be entered as either text or HTML.
11. Enter content as either text or HTML into the Raw HTML field.
12. Click Submit.
202
Specifying a SolarWinds Report
Specifying a SolarWinds Report
The web console is able to incorporate reports that you have created in
SolarWinds Report Writer into any view. The following procedure will take a
report that you have created with Report Writer and include it within a web
console view.
Note: Clicking the resource title in the title bar menu displays the resource by
itself in a browser window.
To include a SolarWinds report:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to which you want to add the report.
3. Click Edit.
4. Click [+] next to the view column in which you want to display the report.
5. Click [+] next to Report Writer.
6. Check Report from SolarWinds Report Writer.
7. Click Submit.
8. Click Preview on the Customize Your View page.
9. Click Edit in the title bar of the Report from SolarWinds Report Writer
resource.
10. If you do not want to use the default title provided, enter a new Title for
the included report.
11. If you want a subtitle, enter a new Subtitle for the included report.
Note: Titles and subtitles may be entered as either text or HTML.
12. Select a Report to include.
13. If you want to add a filter to the included report, enter an appropriate
query in the Filter Nodes field.
Note: Filter Nodes is an optional, advanced, web console feature that
requires some knowledge of SQL queries. Click [+] next to Show Filter
Examples to view a few example filters.
14. Click Submit.
Displaying a Custom List of Reports
The web console allows you to populate a custom view with a custom reports list.
When clicked from the list, each report opens in a new window. The following
procedure details the steps required to enable a custom list of network reports.
Note: Clicking the resource title displays the resource in a new browser window.
203
Chapter 4: Managing the Web Console
To display a custom list of reports:
1. Create a new view or edit an existing view. For more information, see Customizing Views.
2. Select the view to which you want to add the custom list of reports, and then
click Edit.
3. Click [+] next to the column to display the custom list of reports.
4. Click [+] next to Report Writer.
5. Check Custom List of Reports, and then click Submit.
6. Click Preview on the Customize Your View page, and then click Edit in the
title bar of the Report from SolarWinds Report Writer resource.
7. If you do not want to use the default title provided, enter a new Title for
the header of the reports list.
8. If you want a subtitle, enter a new Subtitle for the custom list of reports.
Note: Titles and subtitles may be entered as either text or HTML.
9. Check the reports that you want to include in your custom list of reports.
10. Click Submit.
Filtering Nodes
Your SolarWinds Web Console can maintain a customizable node list for your
network. Node lists may be configured for specific views using SQL query filters.
The following steps set up node filtering for node lists included in web console
views.
Note: Clicking the resource title displays the resource in a new browser window.
To enable filtering on a node list:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to which you want to add the node list
3. Click Edit.
4. Click [+] next to the view column in which you want to display the node list.
5. Click [+] next to Node Lists.
6. Check All Nodes – Table, and then click Submit.
7. Click Preview on the Customize YourView page, and then
8. Click Edit in the title bar of the All Nodes – Table resource.
9. If you do not want to use the default title provided, enter a new Title for
the node list.
10. If you want a subtitle, enter a new Subtitle for the node list.
Note: Titles and subtitles may be entered as either text or HTML.
11. If you want to filter your node list by text or IP address range,
204
Grouping Nodes
12. provide the text or IP address range by which you want to filter your node list
in the Filter Text field, as shown in the following examples:
l Type Home in the Filter Text field to list all nodes with “Home” in the
node name or as a location.
l Type 192.168.1.* in the Filter Text field to list all nodes in the
192.168.1.0-255 IP address range.
13. Select the property that is appropriate to the filter text provided above, as
shown in the following examples:
l If you typed Home in the Filter Text area, select Node Name or
Location to list nodes with “Home” in the node name or as a location.
l If you typed 192.168.1.*in the Filter Text area, select IP Address to
list only nodes in the 192.168.1.0-255 IP address range.
l If you want to apply a SQL filter to the node list, enter an appropriate query in the Filter Nodes (SQL) field.
Notes:
l Filter Nodes (SQL) is an optional, advanced, web console feature that requires some knowledge of SQL queries. Click [+] next
to Show Filter Examples to view a few example filters.
l By default, node list resources are designed to sort nodes alphabetically by node caption. This configuration cannot be overwritten using a SQL filter, so order by clauses included in SQL
filters are redundant and will result in Custom SQL filter formatting errors.
14. Click Submit.
Grouping Nodes
Your SolarWinds Web Console can maintain a customizable node list for your
network. Node lists may be configured for specific views with node grouping. The
following steps set up node grouping for node lists included in web console
views.
Note: Clicking the resource title in the title bar menu displays the resource by
itself in a browser window.
To enable grouping on a node list:
1. Create a new view or edit an existing view.
Note: For more information, see Customizing Views.
2. Select the view to which you want to add the node list, and then click Edit.
3. Click [+] next to the view column in which you want to display the node list.
4. Click [+] next to Node Lists.
205
Chapter 4: Managing the Web Console
5.
6.
7.
8.
9.
10.
11.
12.
Check an appropriate node list, and then click Submit.
Click Preview on the Customize YourView page.
Click Edit in the title bar of the All Nodes – Tree (AJAX) resource.
If you do not want to use the default title provided, enter a new Title for
the node list.
If you want a subtitle, enter a new Subtitle for the node list.
Note: Titles and subtitles may be entered as either text or HTML.
Select up to three criteria, in specified levels, for Grouping Nodes within
your web console view.
If you want to apply a SQL filter to the node list, enter an appropriate
query in the Filter Nodes field.
Notes:
l Filter Nodes (SQL) is an optional, advanced, web console feature
that requires some knowledge of SQL queries. Click [+] next to Show
Filter Examples to view a few example filters.
l By default, node list resources are designed to sort nodes alphabetically by node caption. This configuration cannot be overwritten
using a SQL filter, so order by clauses included in SQL filters are
redundant and will result in Custom SQL filter formatting errors.
Click Submit.
Customizing Web Console Menu Bars
The menu bars displayed at the top of every page may be configured to display
various menu items. You can also define menu items and add them to custom
menu bars. For more information about customizing menu bars for individual
accounts, see “Editing User Accounts” on page 299.
The following procedure customizes a web console menu bar:
To customize web console menu bars:
1. Click Settings in the top right of the web console.
2. Click Customize Menu Bars in the Customize grouping of the SolarWinds
Website Administration page.
3. If you want to modify an existing menu, click Edit beneath the menu bar
you want to modify, and then click and drag items between the Available
items list on the left and the Selected items list on the right until the Selected items list includes all the items you want to include in your edited
menu.
Note: Hover over any view title to read a description. Selected items dis-
206
To customize web console menu bars:
4.
5.
6.
7.
8.
9.
play from left to right in the edited menu bar as they are listed from top to
bottom.
If you want to create a new menu bar, complete the following steps:
a. Click New Menu Bar, and then provide a Name for the New Menu
Bar.
b. Click and drag the buttons you want to include in your new menu bar
from the Available items list on the left to their correct relative locations
in the Selected items list on the right.
Note: Hover over any view title to read a view description. Selected
items display from left to right in the new menu bar as they are listed
from top to bottom.
If you want to add menu items, complete the following steps:
a. Click Edit under the menu bar to which you are adding the new item.
b. Click and drag the items you want to include in your new menu from the
Available items list on the left to their correct relative locations in the
Selected items list on the right.
Notes:
l Hover over any view title to read a view description. Selected
items display from left to right in the new menu bar as they are listed from top to bottom.
l If you check Reports from the Select Menu Items page, you must
also enable reports for the accounts that use the menu bar. For
more information, see “Configuring an Account Report Folder” on
page 307.
If you want to add a custom menu item, complete the following steps:
a. Click Edit under the menu bar to which you are adding the custom item.
b. Click Add.
c. Provide the Name, URL, and Description of your custom menu
item.
d. If you want the menu option to open in a new window, check
Open in a New Window.
e. Click OK.
If you want to delete a menu item, click and drag the item to delete from
the Selected items list on the right to the Available items list on the left.
Warning: Do not delete the Admin option from the Admin menu bar.
If you want to change the location of an item in your menu, click and
drag items to move them up and down in the Selected items list.
If you have finished editing your menu bar, click Submit.
207
Chapter 4: Managing the Web Console
Changing the Web Console Color Scheme
The overall color scheme of the SolarWinds Web Console may be changed to
any of several color schemes that are viewable by all users, as shown in the
following procedure.
To change the web console color scheme:
1. Click Settings in the top right of the web console.
2. Click Color Scheme in the Customize grouping.
3. Select the desired color scheme, and then click Submit.
Changing the Web Console Site Logo
The SolarWinds Web Console can be configured to display your logo instead of
the default SolarWinds banner across the top of every web console page. The
following steps change the default SolarWinds web console banner.
To change the web console banner:
1. Create an appropriately sized graphic to replace the SolarWinds logo.
Notes:
l The SolarWinds banner file is 271x48 pixels at 200 pixels/inch.
l The SolarWinds.com End User License Agreement prohibits the
modification, elimination, or replacement of either the SolarWinds.com logo and link on the menu bar or the SolarWinds copyright
line at the bottom of the page.
2. Place your graphic in the images directory.
Note: By default, it is in C:\Inetpub\SolarWinds\NetPerfMon\.
3. Log in to the web console as an administrator.
4. Click Settings in the top right of the web console.
5. Click Web Console Settings in the Settings grouping of the SolarWinds
Website Administration page.
6. Type the new logo image name as a replacement for
SolarWinds.Logo.jpg in the Site Logo URL field.
Configuring the Available Product Updates View
The SolarWinds Web Console can automatically check for the availability of any
updates to your currently installed SolarWinds products. By default, the web
console regularly checks for product updates automatically, as indicated by the
dates and times reported as Last Check and Next Check, but you can click
Check Now at any time to see an up-to-the-minute update. If updates are
208
To configure product updates:
available, a note is posted in the web console notification bar and updates are
listed in this view, where you can then select and download them as needed.
Note: For more information about downloading listed product updates, see
Updating your SolarWinds Installation.
To configure product updates:
1. Log in to the web console as an administrator, and then click Settings in the
top right corner of the web console.
2. Click Available Product Updates in the Product Updates grouping.
3. If you want to disable the automatic check for product updates, clear
Check for product updates, and then click Save Settings.
4. If you want to ensure that updates are listed for all currently installed
SolarWinds products, including SolarWinds NPM, SolarWinds SAM,
and all SolarWinds modules, check Show all updates.
5. Click Save Settings.
Updating your SolarWinds Installation
If your Product Updates view is configured to list SolarWinds updates, you can
download them directly from the Product Updates view.
To update your SolarWinds installation:
1. Log in to the web console as an administrator, and then click Settings in the
top right corner of the web console.
2. Click Available Product Updates in the Product Updates grouping.
3. Click Check Now to refresh the updates list.
4. If there are any updates you want to ignore, check the updates to ignore,
and then click Ignore Selected.
5. Check the updates you want to apply, and then click Download Selected.
6. Save and then execute downloaded installers. For more information, see
either the readme.txt file packaged with the downloaded update or review
related documentation available at www.solarwinds.com.
NOC View
SAM offers a Network Operations Center (NOC) view that hides console tools
while automatically rotating through custom views. NOC view mode enables you
to customize views for optimal display on large network operations center
screens. Once you click on an object in NOC view mode, you will be taken out of
NOC view mode and then taken to that object's details page.
209
Chapter 4: Managing the Web Console
You can quickly turn on the NOC view from the web console by the link provided
in the upper right-hand corner of the web console, as shown:
While in the NOC view you can easily exit and edit the NOC view from the web
console by the menu provided in the upper right-hand corner of the web console,
as shown:
For more information, refer to the following sections:
l
l
l
l
l
Enabling NOC
Adding NOC views
Editing NOC views
Disabling NOC views
Adding AppStack to a NOC View
Enabling NOC
NOC view mode enables you to customize web console views for optimal display
on large network operations center screens.
To enable NOC view mode for an existing view:
1. Click Customize Page in the top right of the view for which you want to
enable NOC view mode.
2. Check Enable NOC view mode.
3. Click Done.
Adding NOC views
Adding a NOC view:
210
Adding NOC views
1. From the web console, click Customize Page in the upper right-hand
corner.
2. If not already done so, check Enable Left Navigation.
3. Click Add Tab.
4. Add a name for the tab in the field provided, then click Update. The new tab
appears in the column to the left.
5. If not already done so, check Enable NOC view mode.
6. Add the resources you want to each column by clicking the green [+], then
selecting resources from the pop-up dialog, as shown:
211
Chapter 4: Managing the Web Console
7. When done, click Add Selected Resources.
8. Click Done & Go To NOC to save and view the newly created NOC view.
9. The newly added NOC view appears. The dots correspond to the different
tabs/screens created earlier in Step 3.
Adding AppStack to a NOC View
Viewing the AppStack Environment in a NOC view can only be achieved by first
adding a new NOC view, and then creating and applying an AppStack filter for
this new view. Once complete, the AppStack resource will become part of the
NOC view with the filter already applied.
To add the AppStack Resource to a NOC view, take the following steps:
212
Adding AppStack to a NOC View
1. From the web console, click Customize Page in the upper right-hand
corner.
2. If not already done so, check Enable Left Navigation.
3. Click Add Tab.
4. Add a name for the tab in the field provided, then click Update. The new tab
appears in the column to the left.
5. Add the AppStack Environment resource to a column by clicking the
green [+], then selecting AppStack Environment from the pop-up dialog,
as shown:
6. Click Add Selected Resources.
213
Chapter 4: Managing the Web Console
7. If not already done so, check Enable NOC view mode, then click Done.
8. Navigate to Home > Environment.
9. Filter your AppStack Environment according to you needs. When done,
click Apply Filter.
10. Save the Layout as AppStack Environment, which was added in Step 5.
11. View the NOC by navigating to Home > Show in NOC Mode.
For more information, see NOC View.
Editing NOC views
To Edit a NOC view:
1. From the web console, navigate to Settings > Created NOC Views, as
shown:
214
Disabling NOC views
2. Check the view you want to edit, and then click Edit.
3. Make your changes, and then click Done & Go to NOC.
Disabling NOC views
To Disable a NOC view:
1. From the web console, navigate to Settings > Created NOC Views, as
shown:
2. Check the view you want to edit, and then click Disable NOC.
215
Chapter 4: Managing the Web Console
3. Confirm the dialog to have your view removed from the list.
Customizing Charts in the SolarWinds Web Console
Clicking any chart opens the Custom Chart view in a new window, displaying the
selected chart with additional chart customization options. For more information
about the Custom Chart view, see “Custom Chart View”.
You can also configure any custom chart resource in the SolarWinds Web
Console directly from the resource title bar either by selecting from the drop down
menu of options or by clicking Edit to display the Edit Chart Title view, as
described in the following sections.
Chart Information:
l
l
If SAM is upgraded to version 6.0 or higher, legacy charts already assigned
to views will be upgraded.
Charts from earlier versions of SAM will be renamed to have the prefix
"Legacy" and must be added manually.
Custom Chart Resource Title Bar Options
The title bar menu of the custom chart resource provides the following options for
viewing chart data:
l
l
l
l
View chart data over the Last 7 Days or over the Last 30 Days
Select Edit Chart to view and modify chart settings.
Note: This is the same as clicking Edit in the title bar.
View Chart Data as an HTML format document
View Chart Data in Excel to see chart data in an Excel™-compatible format
216
Edit Chart Title View
Edit Chart Title View
Click Edit in the title bar of a custom chart resource to display the Edit Chart Title
view. This view provides the following options to configure your chart resource:
Select a Chart allows you to change the chart type displayed in the current
resource. Chart options are determined in accordance with the type of view
displaying the resource you are currently editing. For more information about
available node charts, see “Custom Node Charts” on page 247. For more
information about available volume charts, see “Custom Volume Charts”.
The Time Period for the selected chart may be any of the following:
Last Hour
Last 2 Hours
Last 24 Hours Today
Yesterday
Last 7 Days
This Month
Last 30 Days Last 3 Months This Year
Last Month
Last 12 Months
The Sample Interval for the selected chart may be any of the following:
Every Minute
Every 5 Minutes Every 10 Minutes Every 15 Minutes
Every 30 Minutes Every Hour
Every 2 Hours
Every 12 Hours
Every 7 Days
One a Day
Every 6 Hours
Notes:
l Each sample interval is represented on a chart by a single point or bar. Data
within a selected sample interval is summarized automatically.
l Due to limits of memory allocation, some combinations of time periods and
sample intervals require too many system resources to display, due to the
large number of polled data points. As a result, charts may not display if the
time period is too long or if the sample interval is too small.
The Trend Line option allows you to enable the trend line feature of SolarWinds
SAM charts. By enabling trend lines on SolarWinds SAM charts, you can see
potential future results as they are extrapolated from collected historical data.
Note: Due to the broad array of factors that can affect the performance of devices
on your network, trend lines provided on SolarWinds SAM charts are intended as
approximate predictions of future data only. For more information, see "95th
Percentile Calculations" on page 1248.
217
Chapter 4: Managing the Web Console
Exporting Views to PDF
Many views in the SolarWinds Web Console may be exported directly to portable
document format (.pdf). Views that may be exported display Export to PDF in the
top right corner of the exportable view.
Note: The Export to PDF feature requires IIS Anonymous Access. Confirm that
the IUSR_SERVERNAME user is in the local Users group on your SolarWinds
server.
To export a view to PDF:
1.
2.
3.
4.
Open the web console view to export.
Click Export to PDF in the top right corner of the view.
If you are prompted to save the .pdf file, click Save.
Navigate to an appropriate location, provide an appropriate file name, and
then click Save.
Creating a Custom Summary View
The SolarWinds Custom Summary View enables you to create a fully customized
object-based view composed solely of resources you have selected. The
following procedure creates a custom summary view in the web console.
To create or edit a custom summary view in the web console:
1.
2.
3.
4.
5.
Click Home > Custom Summary.
Click Edit in any Custom Object Resource.
Provide a Title and Subtitle for the selected Custom Object Resource.
Click Select SolarWinds Object.
On the Select a network object window, use the Show only and Group by
selection fields, as appropriate, to filter the list of monitored objects.
6. Select the SolarWinds object on which you want to base the selected Custom Object resource, and then click Select SolarWinds object.
7. Select the type of information you want the custom resource to display
about the selected object, and then customize the resource, as indicated in
the following steps:
a. If you have selected an alerts resource, indicate whether or not you
want to display acknowledged alerts by checking or clearing Show
Acknowledged Alerts, as appropriate.
b. If you have selected a resource to which SQL filters may be
applied, edit available SQL filters as appropriate. For more information,
see “Using Node Filters” on page 228.
218
Creating and Editing External Website Views
c. If you have selected a resource with an AutoHide option, select
Yes or No to enable or to disable the Auto-Hide feature, respectively. If
enabled, the resource is automatically hidden if and when related data
is not present in the Orion database.
d. If you have selected a sortable list resource, in the Sort By field select
the property by which you want the list sorted.
e. If you have selected a gaugestyle resource, select a gauge Style
and provide a Gauge Size.
f. If you have selected a chartstyle resource, select an appropriate
Time Period and Sample Interval, and then indicate whether or not
you want to show a Trend Line.
g. If you have selected a Universal Device Poller resource, select the
Universal Device Poller and Chart Format, and then configure all
other options as required for similar resource types.
8. Click Submit.
Note: For more information about customizing available resource types,
click Help in the header of any resource on the Custom Summary view,
and then click the corresponding resource type.
Creating and Editing External Website Views
With the external website view feature, any SolarWinds SAM administrator can
select any external website and designate it as a SolarWinds Web Console view,
as shown in the following procedure.
To create or edit an external website view in the web console:
1. Click Settings in the top right of the web console.
2. Click External Websites in the Customize grouping of the SolarWinds
Website Administration page.
3. If you want to delete an existing external website, click Delete next to
the website you want to delete, and then click OK to confirm the deletion.
4. If you want to add a new external website, click Add.
5. If you want to edit an existing external website, click Edit next to the
name of the website you want to edit.
6. Provide a Menu Title for the external website to display in the Views toolbar.
7. If you want to include a heading within the view, provide an optional
Page Title to display within the view.
8. Provide the URL of the external website, in http://domain_name format.
219
Chapter 4: Managing the Web Console
9. Select the Menu Bar to which you want to add the new external website
link.
Note: For more information about customizing menu bars, see “Customizing Web Console Menu Bars” on page 206.
10. Click OK.
11. Click Preview to view the external website as the web console will display
it.
Custom Object Resources in the SolarWinds Web
Console
The SolarWinds Web Console provides a Custom Object resource that enables
you to configure any of a wide array of resources to display performance data for
any specific monitored objects. The following sections provide more information
about editing a Custom Object resource, selecting monitored objects, and
configuring the data displayed in a Custom Object resource:
l
l
l
Editing a Custom Object Resource
Selecting Custom Objects and Resources
Available Custom Resources
Editing a Custom Object Resource
The following procedure edits a Custom Object resource.
To edit a Custom Object resource:
1. Click Edit in the header of a Custom Object resource.
2. Edit the resource Title and Subtitle as appropriate.
3. Click Select SolarWinds Object to select an appropriate monitored object.
For more information, see “Selecting Custom Objects and Resources.”
4. If you have completed your edits, click Submit.
Selecting Custom Objects and Resources
The following procedure selects a network object for a selected Custom Object
resource.
To select a custom monitored object for a Custom Object resource:
1. Click Edit in the header of a Custom Object resource.
2. Click Select SolarWinds Object.
3. In the Show only: field, select the type of object you want to monitor in the
Custom Object resource.
220
Available Custom Resources
4. In the Group by: field, select an appropriate object grouping criterion.
Note: Defined custom properties are listed for all grouping types.
5. Click the object to monitor in the list on the left, and then select it in the
main pane grouping criterion.
6. Click Select SolarWinds Object.
7. Select the desired resource type in the Select object resource field, and
then configure options as required. For more information about available
resources, see “Available Custom Resources.”
Available Custom Resources
A Custom Object resource may be configured to provide the same data as any of
a number of SolarWinds Web Console resources for a selected network object:
Notes:
l Resource availability is dependent on the SolarWinds products installed.
l For more information about any available custom resource, click Help in
the resource title to view the corresponding help topic.
Integrating SolarWinds Engineer’s Toolset
When you are browsing the SolarWinds Web Console from a computer that
already has a SolarWinds Toolset installed, SolarWinds SAM allows you to
launch Toolset tools directly from your web browser. Right-clicking any monitored
object listed in a SolarWinds Web Console running the Toolset Integration
displays a menu of available Toolset tools and functions. The following sections
detail the configuration of the available Toolset integration.
Note: For more information about the SolarWinds Engineer’s Toolset tools, see
www.solarwinds.com.
Refer to the following sections for more information:
l
l
Configuring a Toolset Integration
Adding Programs to a Toolset Integration Menu
Configuring a Toolset Integration
The following procedure configures SolarWinds Toolset for integration within the
SolarWinds Web Console.
Note: The first time the Toolset tools are accessed, a security warning may be
displayed. Click Yes to allow the Toolset integration.
221
Chapter 4: Managing the Web Console
To configure SolarWinds Toolset integration settings:
1. Right-click any monitored object displayed within the SolarWinds Web
Console.
2. Click Settings.
3. Click SNMP Community String.
Note: The first time you launch a tool requiring an SNMP community string
from the right-click menu, the SNMP Community String window displays.
4. If you want to delete any or all saved community strings, select the
strings that you want to delete, and then click Remove, or click Remove
All.
5. Click Menu Options, and then configure the right-click menu as follows:
a. If you want either to add menu items to the right-click menu or to
remove menu items from the right-click menu, move menu items
between the list of Available Menu Options on the left and Selected
Menu Options on the right by selecting items in either column and clicking the right and left arrows, as appropriate.
b. If you want to change the order of menu items, select items and then
click the up and down arrows next to the Selected Menu Options list.
c. If you want to add a separator between items, move the -----------menu option from the Available list to the Selected list, and then move
it to your preferred location within the Selected Menu Options list.
6. Click Automatic Menu Items.
7. Check either or both, if available, of the following options:
Automatically add sub-menu items to the “MIB Browser (Query MIB)”
menu option from the MIB Brower’s Bookmarks.Automatically add
sub-menu items to the “Real Time Interface Monitor” menu option
from the Real Time Interface Monitor saved report types.
Note: These options expand the list of available menu items by incorporating menu links to MIB browser bookmarks and Real Time Interface
Monitor saved reports, respectively.
Adding Programs to a Toolset Integration Menu
The following procedure provides the steps required to add any external scripts or
applications to the SolarWinds Toolset integration menu.
To add a program to the SolarWinds Toolset Integration menu:
1. If you want to add an external script to the Toolset Integration menu,
save the script in an appropriate location on the install volume of your
SolarWinds server (e.g. <InstallVolume>:\\Scripts\).
222
Web Console Configuration
2. If you want to add an external application to the Toolset Integration
menu, install the application in an appropriate location on the install
volume of your SolarWinds server (e.g. <InstallVolume>:\\Application\).
3. Open SWToolset.MenuOptions, the Toolset Integration menu configuration file, in a text editor.
Note: By default, SWToolset.MenuOptions is located in the following
folder: <InstallVolume>:\\Program Files\SolarWinds\Common\.
4. Save a copy of SWToolset.MenuOptions as SWToolset_Old.MenuOptions.
5. Add the following line between the <MenuOptions></MenuOptions> tags
of the SWToolset.MenuOptions file:
<MenuOption Visible="TRUE" Title="ApplicationName" BeginGroupp="FALSE" HasSubMenu="FALSE" ExecStringg="<InstallVolume>:\\Application\ExecutableFile" Icon="" Extra=""
Parent="" Required="4"/>
Note: The string supplied for Title is the name for the added script or
application that will display in the menu. The string supplied for the
ExecString is the path to the script or application executable file.
6. Save the new SWToolset.MenuOptions to automatically update the Toolset Integration menu.
Web Console Configuration
SolarWinds SAM has the ability to create, restore and clear your web console
configuration
Refer to the following sections for more information:
l
l
Creating a Web Console Configuration Backup
Restoring a Web Console Configuration Backup
Creating a Web Console Configuration Backup
The following procedure uses the SolarWinds Web Configuration
Backup/Restore utility to create a backup of your SolarWinds Web Console
configuration.
Note: The SolarWinds Web Configuration Backup/Restore utility does not create
a backup of the Orion database. As a result, configuration backups do not retain
any of the network device data or statistics for any monitored network objects.
223
Chapter 4: Managing the Web Console
To create a SolarWinds Web Console configuration backup:
1. Locate and run the OrionWebBackup.exe utility, typically located at C:\Program Files (x86)\SolarWinds\Orion.
2. Click Create Backup.
3. Name your backup and click Save.
Restoring a Web Console Configuration Backup
The following procedure uses the SolarWinds Web Configuration
Backup/Restore utility to restore a saved backup of your SolarWinds Web
Console configuration.
Warning: Do not restore web console configurations from any version of
SolarWinds SAM prior to the version currently installed.
To restore a SolarWinds Web Console configuration backup:
1. Locate and run the OrionWebBackup.exe utility, typically located at C:\Program Files (x86)\SolarWinds\Orion.
2. Select a Backup file from the list.
3. Choose either Merge or Overwrite for the restoration process.
4. Click Restore Backup.
Clearing a Web Console Configuration
The following procedure clears an existing SolarWinds Web Console
configuration.
Warning: Clearing a web console configuration deletes all existing user
accounts, account and view settings, and menu bar customizations. SolarWinds
recommends you create a backup of your current SolarWinds Web Console
configuration before you clear it to confirm that no issues arise as a result of the
deletion of your web console customizations.
To clear your SolarWinds Web Console configuration:
1. Locate and run the OrionWebBackup.exe utility, typically located at C:\Program Files (x86)\SolarWinds\Orion.
2. Click File > Clear Web Configuration.
3. Click Yes to confirm the deletion of your current web console configuration.
224
Logging in for the First Time as an Administrator
Logging in for the First Time as an Administrator
When you launch the SolarWinds Web Console, you are presented with a login
view requiring both a User Name and a Password.
To log in to the SolarWinds Web Console:
1. Launch the SolarWinds Web Console
l Click Start > All Programs > SolarWinds > Orion Web Console.
l Or launch a browser on your SolarWinds server and enter http://ip_
address or http://hostname, where ip_address is the IP address of
your SolarWinds host server, or where hostname is the domain name
of your SolarWinds server.
2. Enter Admin as your User Name, and then click Login.
Notes: Until you set a password, you can log in as Admin with no Password. After your first login, you may want to change the Admin password.
For more information, see Changing an Account Password.
Windows Authentication with Active Directory
As of SolarWinds Core version 2010.2, the SolarWinds Web Console can
authenticate Active Directory users and users who are members of Active
Directory security groups.
To enable Active Directory Windows authentication to the web console:
1. Install and configure Active Directory on your local network.
Notes:
l For more information about installing Active Directory on Windows
Server 2003, see the Microsoft Support article, “How To Create an
Active Directory Server in Windows Server 2003.”
l For more information about Active Directory on Windows Server
2008, see the Microsoft TechNet article, “Active Directory Services.”
2. If you want to enable automatic login for web console accounts using Windows Authentication, configure the SolarWinds Web Console as shown in
the following steps:
a. Click Start > All Programs > SolarWinds Orion > Configuration and
Auto-Discovery > Configuration Wizard.
b. Check Website, and then click Next.
c. After providing the appropriate IP Address, Port, and Website Root
Directory, select Yes – Enable automatic login using Windows
225
Chapter 4: Managing the Web Console
Authentication.
d. Click Next, and then complete the Configuration Wizard.
3. Log in to the web console using the appropriate domain and user, providing Domain\Username or [email protected] as the web console User
name.
Using the Web Console Notification Bar
Below the web console menu bar, the SolarWinds notification bar provides
informational messages related to the following SolarWinds SAM features:
l
l
l
l
l
l
l
If you have configured the SolarWinds Web Console to check for product
updates, an announcement displays in the notification bar when an update,
including any upgrade, service pack, or hotfix, to SolarWinds SAM or any
other SolarWinds modules you currently have installed becomes available.
For more information about SolarWinds Product Updates, see Product
Updates.
If you have configured the SolarWinds Web Console to store blog posts,
new and unread posts to the SolarWinds Product Team Blog are
announced in the notification bar. For more information about SolarWinds
Product Updates, see Product Updates.
If you have currently configured a scheduled discovery, results display in
the notification bar when the discovery completes. For more information
about Scheduled Discovery, see “Discovery Central."
If you are currently using SolarWinds SAM to monitor any VMware ESX or
ESXi Servers, the notification bar can display messages communicating the
number of ESX nodes found during any discovery, and, if any discovered
ESX nodes require credentials, the notification bar tells you. For more
information about managing ESX Servers, see Virtualization.
For more information about any displayed notification bar message, click
More Details and a web console view relevant to the displayed message
opens.
To delete a posted message, either click Dismiss Message next to the displayed message, or properly address the situation mentioned in the posted
notification.
To remove the notification bar from your web console, click Close (X) at the
right end of the notification bar.
226
Using the SolarWinds Web Console Message Center
Using the SolarWinds Web Console Message
Center
The Message Center provides a single, customizable view in the web console
where, in a single table, you can review all events, alerts, traps and Syslog
messages on your network.
To view and configure the Message Center:
1. Click Home > Message Center.
2. If you only want to see messages for specific devices, select appropriate device properties in the Filter Devices area.
3. In the Filter Messages area, select the Time period for the messages you
want to review, and then provide the number of messages you want to
show.
4. If you want to show all messages, Including messages that have been
acknowledged, check Show acknowledged in the Filter Messages area.
5. If you only want to see certain types of messages, filter messages as
shown in the following steps:
a. If you want to view alerts, confirm that Show triggered alerts is
checked, and then select the type of alerts to display.
b. If you want to view event messages, confirm that Show event messages is checked, and then select the type of events to display.
c. If you want to view Syslog messages, confirm that Show syslog
messages is checked, and then select the Severity and Facility of the
Syslog messages you want to display.
d. If you want to view received traps, confirm that Show received traps
is checked, and then select the Trap type and Community String of
the traps you want to display.
e. If you want to view Audit Events, confirm that Show Audit Events is
checked, and then select the Action Type of the User you want to display.
6. Click Refresh to update the list of displayed messages.
Suppressing Events
There is no option within SAM to suppress event types from the web console;
however, suppression can be accomplished by modifying the database directly.
You can suppress specific events based on the event type. In order to do this,
refer to the following screenshot and steps:
227
Chapter 4: Managing the Web Console
Suppressing Events:
1. Open Microsoft SQL Server Management Studio.
2. Modify the dbo.Event types table.
3. Change the number in the Record column from 1 to 0 to suppress a specific
event.
Note: SAM supports event suppression for every SAM event type (event
types from 500 to 532):
Using Node Filters
When you are managing or monitoring large numbers of network devices, node
list resources can easily become very large and difficult to navigate. Filters are
optional SQL queries that are used to limit node list displays for easier resource
navigation. SQL queries can be made on any predefined or custom properties.
For more information about defining custom properties, see “Creating a Custom
Property".
To apply a node filter:
1. Click Edit in any node list resource.
2. Provide an appropriate SQL query in the Filter Nodes (SQL) field, and then
click Submit.
The following are a few example filters with associated SQL queries.
228
Accessing Nodes Using HTTP, SSH, and Telnet
Note: By default, node list resources are designed to sort nodes alphabetically by
node caption. This configuration cannot be overwritten using a SQL filter, so order
by clauses included in SQL filters are redundant and will result in Custom SQL
filter formatting errors.
Filter the results to only show nodes that are not Up:
Status<>1
The following are valid status levels:
0 = Unknown (current up/down status of the node is unknown)
1 = Up (The node is responding to PINGs)
2 = Down (The node is not responding)
3 = Warning (The node may be responding, but the connection from the server to
the Node is dropping packets)
Only show Cisco devices: Vendor = 'Cisco'
Only show devices in Atlanta. (using a custom property named City):
City = 'Atlanta'
Only show devices beginning with "AX3-": Caption Like 'AX3-*'
Only show Nortel devices that are Down:
Vendor Like 'Nortel*' AND Status=2
Only show devices ending in '-TX': Vendor Like '*-TX'
Accessing Nodes Using HTTP, SSH, and Telnet
The SolarWinds Web Console supports the use of HTTP, SSH, and Telnet
protocols for remote device access if associated applications like PuTTy and
FiSSH on your SolarWinds server are properly registered. For more information,
see the MSDN article, “Registering an Application to a URL Protocol.” Launch
remote access applications from any Details view as follows:
l
l
l
To browse directly to the viewed device using a web browser, click
To open a secure shell (SSH) to a monitored device, click .
To open a Telnet session with a monitored device, click .
.
Using Integrated Remote Desktop
Sometimes it is necessary to console into a remote server to troubleshoot an
issue. This can be accomplished within the SolarWinds Web Console as follows:
229
Chapter 4: Managing the Web Console
Note: Press Ctrl+Alt+Break to enter/exit full screen mode.
To launch Integrated Remote Desktop:
1. Open the Node Details view for the server you want to view remotely.
Note: The easiest way to open the Node Details view is to click the remote
server you want to view in any All Nodes resource.
2. Click , located at the of the Node Details view.
Note: Depending on the security settings of your browser, you may be
asked to install an ActiveX control for remote desktop viewing. Follow all
prompts to install this required control.
3. Verify the Server IP address or hostname, select an appropriate Screen
Size, and then click Connect.
Using Audit Events
SAM offers the ability to audit itself. For example, you may want to know who
added a node to SAM and when. The Last XX Audit Events resource provides
this ability.
Note: This resource is only available for users with administrative rights.
The fields for this view are:
l
l
l
Date/Time: Displays the date and time of the listed event.
User: Displays the user who performed the event.
Action: Displays the action that was taken by the listed user.
230
Adding the Audit Events resource:
From this view, you can click on either the user or the node which is linked to
more information about that particular item. Clicking All Audit Events will allow
you to select the audit events you want displayed, in addition to other selfexplanatory options.
Adding the Audit Events resource:
1.
2.
3.
4.
5.
Click Customize Page in the top right corner of the web console.
Click the [+] in either column.
Search for "Audit."
Select the resource you want, and then click Add Selected Resources.
Click Done.
For more information, see Filtering Audit Events.
Filtering Audit Events
SAM allows you to filter Audit Events based on device, time, and message.
To Filter Audit Events:
1. Click All Audit Events.
2. Select the filters you want to apply by checking the appropriate boxes and
items from the drop down menus, as highlighted below.
231
Chapter 4: Managing the Web Console
3. Click Apply.
Complete SAM Audit Event List:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
All action types
User login
User logout
User account added
User account deleted
Alert acknowledged
Alert note changed
View added
View deleted
View edited
Custom property added
Custom property deleted
Custom property edited
List resources added
232
Editing Audit Events:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
List resources deleted
List resources edited
Orion settings edited
Orion web settings edited
Group added
Group deleted
Group edited
Group member definition added
Group member definition deleted
Group member definition changed
Node added
Node deleted
Node managed
Node unmanaged
Node polling engine changed
Node edited
Interface added
Interface deleted
Interface managed
Interface unmanaged
Process terminated
Service state changed
Node rebooted
Application added
Application deleted
Application modified
Application managed
Application unmanaged
Application template added
Application template deleted
Application template modified
Credentials added
Credentials deleted
Credentials modified
Editing Audit Events:
Clicking Edit will allow you to choose what audit events you want displayed in
addition to selecting the time period for the events, as well as the number of
events to display.
233
Chapter 4: Managing the Web Console
1. Click Edit.
2. Check the events you want to be displayed in the resource.
3. Click Submit.
234
Chapter 5:
SolarWinds SAM Charts and
Resources
Following is a list of the available charts within SAM:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Application Availability Chart
Custom Area Chart
Custom Bar Chart
Custom Chart View
Custom Line Chart
Custom Node Charts
Custom Volume Charts
Custom Table
Custom Query Resource
Event Log Message Details
Min/Max Average Chart
Multiple Object Chart
Multiple Statistic Chart
Multi Chart
Application Availability Chart
This chart lets you visualize the amount of time an application was in a particular
state of availability. This chart is interactive. Hovering over any part of the chart
will provide detailed information.
The tooltip indicates the number of times the application was in a certain state.
For example, in the previous illustration, an application was polled 12 times in
one hour (every five minutes) and was deemed available (up) 10 times, in a
Critical state once, and in a Warning state once.
235
Chapter 5: SolarWinds SAM Charts and Resources
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons; 1 hour, 12 hours, or 24 hours. Alternatively,
you can have the chart show a specific time range by dragging the mouse over a
small area of the chart, or by adjusting the sliders in the smaller chart below the
main chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Note: The Export button will open the Custom Chart allowing you to export this
data to both MS Excel and HTML.
Custom Chart
The Custom Chart resource allows you to easily view data based on your needs.
To customize it, simply click Edit in the upper right-hand corner of the resource.
236
Custom Chart
From the Edit page, you can define the titles, datasource, time period, labels,
units displayed, the type of chart to be used, and an optional sum of the data.
To customize your chart:
1.
2.
3.
4.
5.
6.
7.
After adding this resource to a page, click Edit.
Enter a Title and optional Subtitle.
Select a datasource by clicking, Select Datasource.
Select a time period for the data from the Time Period drop down list.
Enter a label for the left Y axis.
Select the units to be displayed from the Units Displayed drop down list.
Select the type of chart to be displayed from the Chart Type drop down list.
237
Chapter 5: SolarWinds SAM Charts and Resources
8. Optionally choose to display the sum of the data by checking, Show the
sum of all data.
9. Clicking More will allow you to customize further by optionally changing the
Display Name, Color, showing the 95th percentile, and trend line.
10. Optionally repeat Steps 5 - 9 for the Y axis on the right side of the chart.
11. Select a Sample Interval from the drop down list.
12. Optionally filter the results from the options provided.
13. When done, click Submit.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
238
Custom Area Chart
Custom Area Chart
The Custom Area Chart resource allows you to easily view data as shown in
percentage format. To customize it, simply click Edit in the upper right-hand
corner of the resource.
Use the check box in the legend as a toggle to show/hide data on the chart.
Clicking Export will allow you to export the data to either an HTML or Excel file.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Custom Bar Chart
The Custom Bar Chart resource allows you to easily view data as shown in
percentage format. To customize it, simply click Edit in the upper right-hand
corner of the resource.
239
Chapter 5: SolarWinds SAM Charts and Resources
Use the check box in the legend as a toggle to show/hide data on the chart.
Clicking Export will allow you to export the data to either an HTML or Excel file.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Component Availability Chart
The Component Availability Chart is a straightforward bar chart that provides a
visual representation of the percentage of availability of a selected component.
240
Component Availability Chart
Clicking the Edit button will provide a menu of components to choose from to
have represented on the chart, as the following illustration depicts:
Note: This option is only available on the Application Details page and not the
Component Details page. Clicking the chart itself, as opposed to the Edit button,
will bring up additional, self-explanatory options.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons; 1 hour, 12 hours, or 24 hours. Alternatively,
you can have the chart show a specific time range by dragging the mouse over a
241
Chapter 5: SolarWinds SAM Charts and Resources
small area of the chart, or by adjusting the sliders in the smaller chart below the
main chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Note: The Export button will allow you to export this data to both MS Excel and
HTML.
Custom Chart View
Charts in the SolarWinds Web Console are easily customizable. Clicking a chart
opens the Custom Chart view in a new window. The following sections describe
options that are available on the Custom Chart page to modify the presentation of
a selected chart.
Note: Click Refresh at any time to review changes you have made.
Printing Options
To print your customized chart, click Printable Version and a
printable version of your customized chart displays in the browser.
Chart Titles
Chart Titles are displayed at the top center of a generated chart. The
Chart Titles area allows you to modify the Title and Subtitles of your
generated chart.
Note: SolarWinds may provide default chart titles and subtitles. If you
edit any of the Chart Titles fields on the Custom Chart page, you can
restore the default titles and subtitles by clearing the respective fields,
and then clicking Submit.
Time Period
Predefined and custom time periods are available for generated
charts. You may designate the time period for a chart by either of the
following methods:
l
Select a predefined period from the Select a Time Period:
menu.
242
Sample Interval
l
Provide custom Beginning and Ending Dates/Times in the
appropriate fields in the Time Period area.
Sample Interval
The sample interval dictates the precision of a given chart. A single
point or bar is plotted for each sample interval. If a sample interval
spans multiple polls, data is automatically summarized and plotted as
a single point or bar on the chart.
Note: Due to limits of memory allocation and the large number of
polled data points, some combinations of time periods and sample
intervals may require too many system resources to display. As a
result, charts may not display if the time period is too long or if the
sample interval is too small.
Chart Size
Chart Size options configure the width and height, in pixels, of the
chart. You can maintain the same width/height aspect ratio, or scale
the chart in size, by entering a width in the Width field and then
entering 0 for the Height.
Font Size
Font sizes for generated charts are variable. The Font Size option
allows you to select a Small, Medium, or Large size font for your chart
labels and text.
Note: Font Size selections are maintained in the printable version of
your chart.
Data Export Options
The Display Data from Chart area provides the following options to
export chart data as either Excel-compatible Raw Data or as
HTML-formatted Chart Data:
l
l
To view chart data in an Excel-compatible format, click Raw
Data, and then follow the prompts, if provided, to open or save
the resulting raw data file.
To view HTML-formatted chart data in a new browser, click
Chart Data.
243
Chapter 5: SolarWinds SAM Charts and Resources
Custom Line Chart
The Custom Line Chart resource allows you to easily view data as shown in
percentage format. To customize it, simply click Edit in the upper right-hand
corner of the resource.
Use the check box in the legend as a toggle to show/hide data on the chart.
Clicking Export will allow you to export the data to either an HTML or Excel file.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Custom Query Resource
The Custom Query resource allows you to create a custom resource based on a
SolarWinds Query Language (SWQL) query. The query provided in this resource
244
Custom Table
is run against your SolarWinds database, and the results are displayed in an
appropriate grid.
Clicking Edit allows you to configure your Custom Query resource, as indicated
in the following procedure.
To configure a Custom Query resource:
1.
2.
3.
4.
Click Edit in the Custom Query resource.
Provide an appropriate Title.
Provide an appropriate Subtitle.
Enter your custom SWQL query in the Custom SWQL Query field.
Notes:
l For more information about creating valid custom SWQL queries, see
"Using SWQL (Semantic Web Query Language)".
l
Do not end your custom SWQL query with a comment. Closing your
query with a comment may comment out required query clauses that
are automatically appended to your custom query to ensure full
resource functionality in the web console.
5. Designate the Number of Rows Per Page in the resource.
Note: If your query returns a large number of objects, you can decrease the
load on your SolarWinds server by breaking your results into pages. This
setting indicates the number of objects the web console should display in
the resource at any given time.
6. Click Submit.
Custom Table
The Custom Table resource allows you to easily view data that can be
customized to suit your needs. To customize it, simply click Edit in the upper
right-hand corner of the resource.
245
Chapter 5: SolarWinds SAM Charts and Resources
Editing the Custom Table resource:
Once in Edit mode, You can select and adjust the following options for this
resource:
l
l
l
l
l
l
l
Title and subtitle: Used to change the labels of the Title and Subtitle.
Datasource: This will allow you to create queries and add conditions.
When you add a condition, you will be given the option to add a field or use
pre-existing fields. Your choices will be reflected in the Custom Table
resource once it has been updated.
Time Period: Select the time period for data to be displayed in the resource.
Table Layout: Once a Datasource is selected, you can add columns and
then arrange them by dragging them into position. Clicking [X] will delete
the column from view.
Sort Results: Allows you to choose how the data will be sorted and displayed.
Group Results: Allows you to choose how the data will be grouped.
Filter Results: Allows you to choose how many records will be displayed
based on either a set number or a percentage.
246
Custom Node Charts
Custom Node Charts
The following node-related charts, grouped by type, are available as resources
within the SolarWinds Web Console. To add any of these charts to a web console
view dealing with monitored nodes, add the Custom Node Chart resource to the
Node Details view. For more information about adding resources to SolarWinds
Web Console views, see “Customizing Views” on page 193.
Availability
The following charts are available to display node availability information over
custom time periods for nodes monitored by SolarWinds.
l
l
l
Availability
Availability – Autoscale
Availability and Response Time
247
Chapter 5: SolarWinds SAM Charts and Resources
CPU Load
The following charts display CPU loading information over specified periods of
time for nodes monitored by SolarWinds.
l
l
Average CPU Load
Min/Max/Average CPU Load
Memory Usage
The following charts present memory usage information over custom time periods
for nodes monitored by SolarWinds.
l
l
l
l
Average Memory Usage
Memory/Buffer Failures
Min/Max/Average Memory Usage
Percent Memory Used
Packet Loss and Response Time
The following charts are available to display historical statistics about packet loss
and response time for nodes monitored by SolarWinds.
l
l
l
l
l
l
l
Availability and Response Time
Average Response Time
Average Response Time and Packet Loss
Min/Max/Average Response Time
Min/Max/Average Response Time and Packet Loss
Percent Loss – Bar Chart
Percent Loss – Line Chart
Custom Volume Charts
The following volume-related charts, grouped by type, are available as resources
within the SolarWinds Web Console. To add any of these charts to a web console
view dealing with monitored volumes, add the Custom Volume Chart resource to
the Volume Details view. For more information about adding resources to
SolarWinds Web Console views, see “Customizing Views” on page 193.
Allocation Failures
Shows the number of disk allocation failures that have occurred on the
selected volume.
Min/Max/Average Disk Usage
248
Event Log Message Details
Shows both the total disk space available and the average amount of disk
space used on the selected volume. Bars are also included to show
minimum and maximum levels of disk usage.
Percent Disk Usage
Shows the total available disk space and the average amount of disk space
used, as a percentage of the total available, on the selected volume.
Volume Size
Shows the total disk space available on the selected volume.
Event Log Message Details
The Event Log Message Details resource allows you to read each message of
the event log in its entirety. This resource is found on the Component Details
page and can return the following information:
l
l
l
l
l
l
l
l
Number of events matching the criteria as defined by the user
Event type / Level (Error, Warning, Information, and so on).
Event code / Event ID
Log file (Application, Security, and so on).
Time generated
Computer name
User
Message
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, and Last Page.
249
Chapter 5: SolarWinds SAM Charts and Resources
Clicking on Show More will expand the resource to fill a separate screen.
Clicking on any message in this resource will bring up the entire message that
was created in the event log, as shown below:
Alerts with this resource can be used with the complete message text of events.
For more information see, " Other Syslog Variables" on page 1179.
This collection of detailed data is enabled by default. To disable this, navigate to
the event log monitor component, as shown below:
Min/Max Average Chart
The Min/Max Average Chart has been updated from previous releases to show
more information and provide more flexibility. These charts can be found by
navigating to the Component Details page or the Application Details page.
Adding the Chart:
1.
2.
3.
4.
Navigate to the Component Details page or the Application Details page.
Click Customize Page in the top right corner of the web console.
Click the [+] in either column.
Select a category to group items by from the Group by drop down menu:
Note: The Classic category reflects the tree views found in previous versions of SAM for this resource.
250
Customizing the Chart
5. Select the charts you want, and then click Add Selected Resources.
6. Click Done.
Customizing the Chart
This chart can be customized to view the following data by clicking the Edit button
at the top-right of the chart. The available data to this chart are as follows:
l
l
l
l
l
CPU Load
Physical Memory
Virtual Memory
Response Time
Statistic Data
Clicking Edit also reveals several self-explanatory options. Clicking Export will
allow you to export the data to both Excel and HTML formats.
This resource is made up of three sections: the toolbar, the main chart, and the
lower chart. This allows you to visualize the selected data by viewing the
minimums, maximums, and averages of the data for a selected time period.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons; 1 Day, 1 Week, or 1 Month, as highlighted in
the above illustration. Alternatively, you can have the chart show a specific date
251
Chapter 5: SolarWinds SAM Charts and Resources
range by dragging the mouse over a small area of the chart, or by typing in
specific dates in the From and To fields, also highlighted.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders, highlighted above. The main
view of the chart will display the selected time period between the two sliders of
the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over.
By default, all statistics are shown in the main chart. You can add or remove any
statistic from the chart by checking and unchecking any statistic from the legend
at the lower left of the resource.
Multiple Object Chart
The Multiple Object Chart resource allows you to simultaneously view data for
multiple objects on the same chart. Objects may be on the same node or on
different nodes.
252
Clicking Edit allows you to configure the characteristics of a selected multiple
Clicking Edit allows you to configure the characteristics of a selected multiple objects chart:
To add the Multiple Object Chart to your home page:
1.
2.
3.
4.
Click the Home tab to get to the Summary view.
Click Customize Page on the top right of the page.
Click the green [+] to the right of where you want to add this chart.
From Add Resources to SolarWinds Home Summary page, select and
expand Multiple Series Charts.
5. Check Multiple Object Chart, and then click Submit, and then click Done.
To configure the Multiple Object Chart:
1. Once the chart is on your Home Summary page, click Edit at the top right
of the chart.
2. From this page, you can have multiple options to choose from, including:
i. Title: This allows you to change the title of your chart.
ii. Subtitle: This allows you to add a subtitle to your chart.
iii. Choose Objects: This allows you to choose the type of objects to display from the drop down menu provided. You can remove an object
from the list by clicking the red X to its right.
253
Chapter 5: SolarWinds SAM Charts and Resources
iv. Select a Chart: This allows you to chart various aspects of what you
intend to monitor.
v. Choose Objects: Click the Select SolarWinds Object button to choose
which objects you want charted based on your selection in step iii.
vi. Limit Series: Checking this box and setting the number of series will
limit the number of items displayed on the chart to the specified amount.
vii. Show Sum in Data Series: This allows you to chart the total of the other
objects graphed and is represented by its own plot line.
viii. Time Period: This allows you to set the range displayed on the chart.
ix. Sample Interval: This allows you to set the interval that this chart is
updated.
Multiple Statistic Chart
This chart provides the ability to graphically visualize multiple statistics
simultaneously, as well as view the statistics in the table below. The advantage of
this view is that you can easily determine how certain processes and services are
performing in relation to others. For example, you may notice that a spike in RAM
usage results in higher CPU usage. This charted information allows you to get a
quick overview of what is being monitored and may answer why certain
unexpected events are occurring.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons at the top of the chart. Alternatively, you can
have the chart show a specific time range by dragging the mouse over a small
area of the chart, or by adjusting the sliders in the smaller chart below the main
chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
254
Zooming
The Multiple Statistic Chart can be added to either the Application Details
page or the SAM Component Details page.
To add the Multiple Statistic Chart to either page, take the following steps:
1. Drill down to either the Application Details page or the SAM Component
Details page.
2. Click Customize Page on the far top right of the page.
3. Click the green [+] to the right of the column in which you want to add this
chart.
4. Select and expand SAM Charts - Historical charts for SAM.
5. Check Multiple Statistic Chart, and then click Submit, then click Done.
To configure the Multiple Statistic Chart, take the following steps:
1. Once the chart is on your Details page, click Edit at the top right of the
chart.
2. From this page, you can have several options to choose from, including:
i. Title: This allows you to change the title of your chart.
ii. Select a Time Period: This allows you provide a range for your chart.
iii. Select a Sample Interval: This allows you to select how often the chart
is updated.
255
Chapter 5: SolarWinds SAM Charts and Resources
iv. Chart All or Selected Statistics: This allows you to chart certain or all
aspects of what you intend to monitor.
For more information, see Creating a Windows Script Monitor
Multi Chart
This chart provides the ability to graphically visualize multiple statistics
simultaneously at the application level without the need to drill down into each
component monitor.
The advantage of this view is that you can easily determine how certain
processes are performing in relation to others. For example, you may notice that a
spike in RAM usage results in higher CPU usage. This charted information allows
you to get a quick overview of what is being monitored and may answer why
certain unexpected events are occurring.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons at the top of the chart. Alternatively, you can
have the chart show a specific time range by dragging the mouse over a small
area of the chart, or by adjusting the sliders in the smaller chart below the main
chart.
The Multi Chart can be added from the Application Details page.
256
Multi Chart
To add the Multi Chart to the Application Details page, take the following
steps:
1. Drill down to the Application Details page.
2. Click Customize Page on the far top right of the page.
3. Click the green [+] to the right of the column in which you want to add this
chart.
4. Search for "Multi Chart."
5. Check Multi Chart, and then click Add Selected Resources, then click
Done.
To configure the Multi Chart, take the following steps:
1. Once the chart is on your Application Details page, click either Edit, Select a
chart, or Configure this resource.
2. From this page, you have several options to choose from, including:
i) Title: This allows you to change the title of your chart.
ii) Subtitle: This allows you to change the subtitle of your chart.
257
Chapter 5: SolarWinds SAM Charts and Resources
iii) Select components:
iv) Show Thresholds: This allows Warning and Critical Thresholds to
be displayed as yellow and red bands, respectively.
v) Default zoom range: Allows you to choose the time period of data
to be displayed.
vi) Amount of historical data to load: Allows you to select the
amount of historical data to be displayed.
vii) Sample interval: Allows you to set the polling time for the
components in this chart.
258
Chapter 6:
SolarWinds SAM Settings
You can configure Applications, Templates, and Component Monitors through the
SolarWinds Web Console by using the SAM Settings page.
To configure SolarWinds SAM:
1. Log on to your SolarWinds Web Console with an Administrator account.
Note: Initially, Admin is the default administrator user ID with a blank password.
2. Click the Applications tab.
3. Click SAM Settings.
Refer to the sections that follow for details about the administrative commands
available in each category:
l
l
l
l
l
l
l
l
l
l
l
Getting Started with SAM
Scan Nodes for Applications
Manually Assign Application Monitors
Component Monitor Wizard
Application Monitors
Manage Application Monitors
Application Monitor Templates
Manage Templates
Create a New Template
Component Monitors
Component Monitor Library
259
Chapter 6: SolarWinds SAM Settings
l
l
l
l
l
l
l
l
l
l
l
l
Manage Assigned Component Monitors
Manage Component Monitors within Templates
Application Detail Views
Views by Application Type
SAM Settings
Credentials Library
Data and Database Settings
License Summary
SAM License Summary
thwack Community
Shared thwack Templates
SAM thwack Forum
Getting Started with SAM
The Getting Started with SAM category gives you access to the commands that
allow you to start monitoring your applications or add new Application Monitors.
Refer to the following sections for more information:
l
l
l
Scan Nodes for Applications
Manually Assign Application Monitors
Understanding the Credentials Library
Scan Nodes for Applications
Click Scan Nodes for Applications on the SAM Settings page to scan nodes
and automatically add Application Monitors.
For more information, see “Scanning Nodes for Applications” on page 393.
Manually Assign Application Monitors
Click Manually Assign Application Monitors on the SAM Settings page to
assign Application Monitors to server nodes.
For more information, see “Manually Assign Application Monitors” on page 260.
Component Monitor Wizard
Click Component Monitor Wizard on the SAM Settings page to pick the
processes, services, and performance counters you want from a list to create a
new template.
For more information, see “Creating New Templates Using the Browsing Method:”
on page 397.
260
Application Monitors
Application Monitors
The Application Monitors category gives you access to the commands that allow
you to actively monitor nodes using a collection of component monitors to
determine the overall health of applications.
For more information, see “Managing Assigned Application Monitors” on
page 345.
Manage Application Monitors
Click Manage Application Monitors on the SAM Settings page to view, edit, and
delete assigned Application Monitors and their component monitors.
For more information, see “Managing Assigned Application Monitors” on
page 345.
Application Monitor Templates
The Application Monitor Templates category gives you access to the commands
that allow you to edit, copy, export, import, delete, and create new templates.
For more information, see “Managing Templates” on page 398.
Manage Templates
Click Manage Templates on the SAM Settings page to edit, copy, export, import,
and delete templates.
For more information, see “Managing Templates” on page 398.
Create a New Template
Click Create a New Template on the SAM Settings page to create a new
application template and its component monitors.
For more information, see “Creating New Templates” on page 397.
Component Monitors
Component monitors are the building blocks of SolarWinds SAM. This category
gives you access to the commands that allow you to monitor the status and
performance of different aspects of an application.
Refer to the following sections for more information:
261
Chapter 6: SolarWinds SAM Settings
l
l
l
Component Monitor Library
Manage Assigned Component Monitors
Manage Component Monitors within Templates
Component Monitor Library
Click Component Monitor Library on the SAM Settings page to view the
component monitors that are provided in the library for monitoring the status and
performance of different aspects of an application.
For more information, see “Viewing the Component Monitor Library” on page 362.
Manage Assigned Component Monitors
Click Manage Assigned Component Monitors on the SAM Settings page to
view and manage assigned component monitors.
For more information, see “Managing Assigned Component Monitors” on
page 362.
Manage Component Monitors within Templates
Click Manage Component Monitors within Templates on the SAM Settings
page to view and manage component monitors that are inside the Application
Monitor templates.
For more information, see “Managing Templates” on page 398.
Application Detail Views
The Application Detail Views category gives you access to the command that
allows you to customize application detail views.
Views by Application Type
Click Views by Application Type on the SAM Settings page to customize
application detail views by application (template) type. You can choose between
displaying a generic view or a custom view for each application (template) type.
SAM Settings
The SAM Settings category gives you access to the commands that allow you to
view and manage the SAM Settings for credentials and data access.
l
l
For more information, see "SolarWinds SAM Settings"
For more information, see “Understanding the Credentials Library”
262
Credentials Library
For more information, see "Data and Database Settings"
l
Credentials Library
Click Credentials Library on the SAM Settings page to create, edit, and delete
the credential sets component monitors use to access protected system
resources.
For more information, see “Understanding the Credentials Library” on page 341.
Data and Database Settings
Click Data and Database Settings on the SAM Settings page to set the
database maintenance interval:
The four options are as follows:
l
l
l
l
l
Detail Statistics Retention
Hourly Statistics Retention
Daily Statistics Retention
Event Log Message Retention
Baseline Data Collection Duration
Database Maintenance
The amount of data collected in the database is dependent upon the size of the
data collected as well as the number of applications and component monitors you
define.
Due to the volume of data collected, detailed statistics are stored in hourly
averages after a specified time period (7 days, by default). Hourly statistics are
compressed into daily statistics after a number of days (30 days, by default).
Detailed statistics retention is based on the individual polling intervals for each
component monitor. These settings allow you to set a length of time after which
SolarWinds SAM purges data from the database.
Note: Before modifying your database settings, consider noting your database
size and amount of data collection for a week. When the week is complete,
recheck your database size. This should help you forecast and plan for an
appropriate data compression and retention period.
To set the three Statistic Retention Intervals:
1. Log on to your SolarWinds Web Console with an Administrator account.
Note: Initially, Admin is the default administrator user ID with a blank password.
263
Chapter 6: SolarWinds SAM Settings
2.
3.
4.
5.
Click the Applications tab.
Click SAM Settings.
Click Data and Database Settings.
Specify the appropriate values for the SolarWinds SAM data retention settings.
Polling Engine Mode
Note: The option to change Polling Engine Modes has been removed for SAM
5.5 and higher. For more information, see
http://knowledgebase.solarwinds.com/kb/questions/4429/
The polling engine mode specifies the behavior of both the main polling engine
and any additional ones you may have.
To set the Polling Engine Mode (v5.2 and earlier):
1. Log on to your SolarWinds Web Console with an Administrator account.
Note: Initially, Admin is the default administrator user ID with a blank password.
2. Click the Applications tab.
3. Click SAM Settings.
4. Click Data and Database Settings.
For more information, see "Managing the SolarWinds SAM Database" on page
1192.
License Summary
The License Summary category gives you access to the command that allows
you to view the license information summary.
For more information, see "SAM License Summary" on page 264.
SAM License Summary
Click SAM License Summary on the SAM Settings page to see a comparison
between the number of active component monitors and the limit allowed by your
SolarWinds SAM license.
thwack Community
The thwack Community category gives you access to the commands that allow
you to view and download useful information from the thwack community for
264
Shared thwack Templates
SolarWinds users.
Refer to the following sections for more information:
l
l
Shared thwack Templates
SAM thwack Forum
Shared thwack Templates
Click Shared thwack Templates on the SAM Settings page to browse and use
application templates contributed by fellow administrators.
For more information, see “Exporting and Importing Templates Locally or Using
Thwack” on page 402.
SAM thwack Forum
Click SAM thwack Forum on the SAM Settings page to browse the information
provided in the SAM thwack Forum.
For more information, visit thwack.com
265
Chapter 7:
Discovering and Adding Nodes on a
Network
There are two methods to add nodes in SolarWinds SAM:
l
l
Add a Single Node
For more information, see Adding Nodes for Monitoring.
Network Sonar Discovery
This chapter describes the process of discovering network devices and then
adding them to the Orion database via Network Sonar Discovery.
The method recommended largely depends on the number of nodes to be added.
To discover and add a larger number of nodes across your enterprise, the
Network Sonar Discovery and Network Sonar Results wizards are available,
respectively. This chapter provides instructions for quickly populating your
SolarWinds SAM database with the nodes you want to monitor and manage with
SAM. The Web Console also provides an easy to use Web Node Management
wizard suited to discovering and adding individual nodes.
Refer to the following sections for more information:
l
l
l
l
l
Discovery Central
Network Sonar Discovery
Using the Network Sonar Results Wizard
Managing Scheduled Discovery Results
Using the Discovery Ignore List
Discovery Central
Discovery Central provides a centralized overview of the types and number of
nodes you are monitoring. You can also access Network Discovery and
Virtualization Discovery from within Discovery Central.
266
Chapter 7: Discovering and Adding Nodes on a Network
To access Discovery Central:
1. Click Settings at the top right of the SolarWinds Web Console.
2. Click Discovery Central in the Getting Started with SolarWinds category.
Note: Clicking Go to SolarWinds Home opens the SolarWinds Summary
Home view for your entire monitored network.
Refer to the following sections for more information:
l
l
Virtualization Discovery
Application Discovery
Virtualization Discovery
The Virtualization Discovery category displays information for both VMware and
Hyper-V infrastructures on your network. To use virtualization discovery, click
Network Sonar Discovery to discover multiple nodes or click Add A Single
Device to add a single node. For more information, see “Polling for VMware
nodes Using the Network Sonar Wizard” on page 328.
Application Discovery
SolarWinds SAM can scan nodes and automatically assign the Application
Monitors it deems suitable for each scanned node. You control the nodes to be
scanned, the application templates used in the scan, and the scanning
parameters that determine a match. For more information, see "Application
Discovery" on page 278.
Network Sonar Discovery
SolarWinds SAM employs the easy to use Network Sonar Wizard in order to aid
in the discovery of nodes on your network. Before using the Network Sonar
Wizard, consider the following points about network discovery in SAM:
l
l
l
The Network Sonar Wizard recognizes network devices that are already in
your Orion database and prevents you from importing duplicate devices.
CPU and Memory Utilization charts are automatically enabled for your Windows, Cisco Systems, VMware, and Foundry Networks devices.
The community strings you provide in the Network Sonar Wizard are only
used for SNMP GET requests, so read-only strings are sufficient.
The following procedure steps you through the discovery of devices on your
network using the Network Sonar Wizard, automatically followed by the Network
Sonar Results Wizard:
267
Discovering devices on your network from Discovery Central:
Discovering devices on your network from Discovery Central:
1. From the web console, navigate to Settings > Network Sonar Discovery.
2. If you want to create a new discovery, click Add New Discovery.
3. If you have already defined a network discovery, a number of options
are available on the Network Sonar Discovery tab. Select one of the following:
l If you want to edit an existing discovery before using it, select
the discovery you want to edit, and then click Edit.
l If you want to use an existing discovery to rediscover your network, select the discovery you want to use, click Discover Now,
and then complete the Network Sonar Results Wizard after discovery completes. For more information about network discovery
results, see “Using the Network Sonar Results Wizard.”
l If you want to import some or all devices found in a defined discovery that you may not have already imported for monitoring,
select a currently defined discovery, and then click Import All Results. For more information about network discovery results, see
“Using the Network Sonar Results Wizard” on page 274.
l If you want to import any newly enabled devices matching a
defined discovery profile, select a currently defined discovery, and
then click Import New Results. For more information about network
discovery results, see “Using the Network Sonar Results Wizard”
l If you want to delete an existing discovery profile, select a currently defined discovery and then click Delete.
5. If the devices on your network do not require community strings
other than the default strings public and private provided, click Next
on the SNMP Credentials view.
6. If any of your network devices require community strings other than
public and private or if you want to use an SNMPv3 credential, complete the following steps to add the required SNMP credential.
Note: Repeat the following procedure for each new community string. To
speed up discovery, highlight the most commonly used community strings
on your network, and then use the arrows to move them to the top of the
list.
268
Chapter 7: Discovering and Adding Nodes on a Network
a. Click Add New Credential, and then select the SNMP Version of your
new credential.
b. If you are adding an SNMPv1 or SNMPv2c credential, provide the
new SNMP Community String.
c. If you are adding an SNMPv3 credential, provide the following information for the new credential:
l User Name, Context, and Authentication Method
l Authentication Password/Key, Privacy/Encryption Method
and Password/Key, if required.
d. Click Add.
7. Click Next on the SNMP Credentials view.
8. Tc Check all existing nodes polling with agents for node changes and
updates, check the box provided. when done, click Next.
9. If you want to discover any VMware VCenter or ESX Servers on your
network, confirm that Poll for VMware is checked, and then complete the
following steps to add or edit required VMware credentials.
Note: Repeat the following procedure for each new credential. To speed
up discovery, use the up arrow to move the most commonly used credentials on your network to the top of the list.
269
Discovering devices on your network from Discovery Central:
a. Click Add vCenter or ESX Credential.
b. If you are using an existing VMware credential, select the appropriate credential from the Choose Credential drop down menu.
c. If you are adding a new VMware credential, select <New Credential> in the Choose Credential drop down menu, and then provide
a new credential name in the Credential Name field.
Note: SolarWinds recommends against using non-alphanumeric characters in VMware credential names.
d. Add or edit the credential User Name and Password, as necessary.
e. Confirm the password, and then click Add.
9. Click Next on the Local vCenter or ESX Credentials for VMware view.
10. If you want to discover devices located on your network within a specific range of IP addresses, complete the following procedure.
Note: Only one selection method may be used per defined discovery.
a. Click IP Ranges in the Selection Method menu, and then, for each IP
range, provide both a Start address and an End address.
Note: Scheduled discovery profiles should not use IP address ranges
that include nodes with dynamically assigned IP addresses (DHCP).
b. If you want to add another range, click Add More, and then repeat
the previous step.
Note: If you have multiple ranges, click X to delete an incorrect range.
c. If you have added all the IP ranges you want to poll, click Next.
270
Chapter 7: Discovering and Adding Nodes on a Network
11. If you want to discover devices connected to a specific router or on a
specific subnet of your network, complete the following procedure:
Note: Only one selection method may be used per defined discovery.
a. Click Subnets in the Selection Method menu.
b. If you want to discover on a specific subnet, click Add a New Subnet, provide both a Subnet Address and a Subnet Mask for the
desired subnet, and then click Add.
Note: Repeat this step for each additional subnet you want to poll.
c. If you want to discover devices using a seed router, click Add a
Seed Router, provide the IP address of the Router, and then click
Add.
Notes:
l Repeat this step for each additional seed router you want to use.
l Network Sonar reads the routing table of the designated router
and offers to discover nodes on the Class A network (255.0.0.0
mask) containing the seed router and, if you are discovering
devices for a SolarWinds SAM installation, the Class C networks
(255.255.255.0 mask) containing all interfaces on the seed router,
using the SNMP version chosen previously on the SNMP Credentials page.
l Networks connected through the seed router are NOT automatically selected for discovery.
d. Confirm that all networks on which you want to conduct your network
discovery are checked, and then click Next.
12. If you already know the IP addresses or hostnames of the devices
you want to discover and include in the Orion database, complete the
following procedure:
a. Click Specific Nodes in the Selection Method menu.
b. Type the IPv4 or IPv6 addresses or hostnames of the devices you want
to discover for monitoring into the provided field.
Note: Type only one address or hostname per line.
c. Click Validate to confirm that the provided addresses and hostnames
are assigned to SNMP-enabled devices.
d. If you have provided all the addresses and hostnames you want to
discover, click Next.
13. Configure the options on the Discovery Settings view, as detailed in the following steps:
271
Discovering devices on your network from Discovery Central:
a. Provide a Name and Description to distinguish the current discovery
profile from other profiles you may use to discover other network areas.
Note: This Description displays next to the Name in the list
of available network discovery configurations on the
Network Sonar view.
b. Position the slider or type a value, in ms, to set the SNMP Timeout.
Note: If you are encountering numerous SNMP timeouts during Network Discovery, increase the value for this setting. The SNMP Timeout
should be at least a little more than double the time it takes a packet to
travel the longest route between devices on your network.
c. Position the slider or type a value, in ms, to set the Search Timeout.
Note: The Search Timeout is the amount of time Network Sonar Discovery waits to determine if a given IP address has a network device
assigned to it.
d. Position the slider or type a value to set the number of SNMP Retries.
Note: This value is the number of times Network Sonar Discovery will
retry a failed SNMP request, defined as any SNMP request that does
not receive a response within the SNMP Timeout defined above.
e. Position the slider or type a value to set the Hop Count.
Note: If the Hop Count is greater than zero, Network Sonar Discovery
searches for devices connected to any discovered device. Each connection to a discovered device counts as a hop.
f. Position the slider or type a value to set the Discovery Timeout.
Note: The Discovery Timeout is the amount of time, in minutes,
272
Chapter 7: Discovering and Adding Nodes on a Network
14.
15.
16.
17.
Network Sonar Discovery is allowed to complete a network discovery. If
a discovery takes longer than the Discovery Timeout value provided,
the discovery is terminated.
If you only want to use SNMP to discover devices on your network,
check Use SNMP only.
Note: By default, Network Sonar uses ICMP ping requests to locate
devices. Most information about monitored network objects is obtained
using SNMP queries.
If multiple SolarWinds polling engines are available in your environment, select the Polling Engine you want to use for this discovery.
Click Next.
If you want the discovery you are currently defining to run on a regular schedule, select either Custom or Daily as the discovery
Frequency, as shown in the following steps:
Notes:
l Scheduled discovery profiles should not use IP address ranges that
include nodes with dynamically assigned IP addresses (DHCP).
l Default Discovery Scheduling settings execute a single discovery of
your network that starts immediately, once you click Discover.
l Results of scheduled discoveries are maintained on the Scheduled
Discovery Results tab of Network Discovery. For more information
about managing scheduled discovery results, see “Managing Scheduled Discovery Results” on page 275.
a. If you want to define a custom discovery schedule to perform the
currently defined discovery repeatedly in the future, select Custom
and then provide the period of time, in hours, between discoveries.
b. If you want your scheduled discovery to run once daily, select
Daily, and then provide the time at which you want your discovery to
run every day, using the format HH:MM AM/PM.
18. If you do not want to run your network discovery at this time,
select No, don’t run now, and then click Save or Schedule,
depending on whether you have configured the discovery to run
once or on a schedule, respectively.
19. If you want your Network Sonar discovery to run now, click Discover to start your network discovery.
273
Using the Network Sonar Results Wizard
Note: Because some devices may serve as both routers and
switches, the total number of nodes discovered may be less than
the sum of reported routers discovered plus reported switches discovered.
Using the Network Sonar Results Wizard
The Network Sonar Results Wizard directs you through the selection of nodes for
monitoring opens whenever discovery results are requested. This will happen
either when the Network Sonar Wizard completes or when Import All Results or
Import New Results is clicked for a selected discovery.
The following steps detail the selection of discovered nodes for monitoring in
SolarWinds SAM.
To select the results of a network discovery for monitoring in SAM:
1. On the Device Types to Import page, check the device types you want to
monitor, and then click Next.
Note: If you are not sure if you want to monitor a specific device type, check
the device type in question. Later, you can delete the device using Web
Node Management.
2. On the Volume Types to Import page, check the volume types you want to
monitor, and then click Next.
Note: If you are not sure you want to monitor a specific volume type, check
the volume type in question. Later, you can delete the volume of the selected type using Web Node Management.
3. If you want to import nodes, even when they are already known to be
polled by another polling engine, check the option in the Allow Duplicate
274
Chapter 7: Discovering and Adding Nodes on a Network
Nodes section. For more information about working with multiple polling
engines, see Managing SolarWinds SAM Polling Engines.
4. If there are any devices on the Import Preview that you do not ever
want to import, check the device to ignore, and then click Ignore. Selected
nodes are added to the Discovery Ignore List. For more information, see
Using the Discovery Ignore List.
5. Confirm that the network objects you want to monitor are checked on the
Import Preview page, and then click Import.
Note: Imported devices display in the All Nodes resource.
Managing Scheduled Discovery Results
The Scheduled Discovery Results tab of Network Discovery provides a list of all
recently discovered, changed, or imported devices on your monitored network.
Results are compared between discoveries and results are listed on this tab. The
following procedure provides guidelines for managing discovery results.
To manage scheduled discovery results:
1. Click Start > All Programs > SolarWinds > Configuration and AutoDiscovery > Network Discovery.
2. Click Scheduled Discovery Results.
3. Select the type of devices you want to view from the Status menu in the left
pane. The following options are available:
o Select Found to view all devices discovered by a scheduled discovery.
o Select Changed to view all devices that have changed between
recent scheduled discoveries. Changes include the addition of
device configuration changes.
o Select Imported to view all devices you have recently imported to
your Orion database. For more information about importing devices,
see “Using the Network Sonar Results Wizard” on page 274.
o Select Ignored to view all devices you have added to your Discovery Ignore List. For more information about the Discovery Ignore
List, see “Using the Discovery Ignore List” on page 276.
o Select Found and Changed to view a combined list of all devices
found or changed as described above.
o Select All except Ignored to view all discovered, changed or imported devices you have not already designated as Ignored, as
detailed above.
275
Using the Discovery Ignore List
4. If you want to apply a grouping criterion to organize your listed results, select an appropriate criterion from the Group by menu in the left
pane.
5. If there are changed or discovered nodes in the results list that you
want to add to your Orion database, check them and then click Import
Nodes.
6. If there are devices you want SolarWinds SAM to ignore in future discoveries, regardless of discovered updates or changes, check the
nodes to ignore, and then click Add to Ignore List. For more information
about the Discovery Ignore List, see “Using the Discovery Ignore List” on
page 276.
Using the Discovery Ignore List
Often, devices are found during a network discovery that you never intend to
monitor with SolarWinds SAM. The Discovery Ignore List is a record of all such
devices on your network. By placing a device on the Discovery Ignore List you
can minimize the SNMP processing load associated with discovering devices
that you never intend to monitor.
To manage devices on the Discovery Ignore List:
1. Click Start > All Programs > SolarWinds > Configuration and AutoDiscovery > Network Discovery.
2. If you want to view the current Discovery Ignore List, click Discovery
Ignore List.
3. If you want to add devices to the Discovery Ignore List, complete the
following procedure:
a. Click Scheduled Discovery Results.
b. Check devices you want to ignore, and then click Add to Ignore List.
4. If you want to remove devices from the Discovery Ignore List, complete the following procedure:
a. Click Scheduled Discovery Results, and then
b. Check the devices you want to remove from the list.
c. Click Remove from Ignore List.
d. Confirm that you want to stop ignoring the selected items by clicking
OK.
After the Network Sonar Wizard completes the node discovery and imports the
results, you are taken directly to the Application Discovery Wizard to discover
applications to monitor on the nodes.
276
Chapter 7: Discovering and Adding Nodes on a Network
For more information, see Application Discovery.
277
Chapter 8:
Application Discovery
SolarWinds SAM can scan nodes and automatically assign the Application
Monitors it deems suitable for each scanned node. You control the nodes to be
scanned, the application templates used in the scan, and the scanning
parameters that determine a match.
To Access Application Discovery:
1. Click Settings at the top right of the SolarWinds Web Console.
2. Now click Discovery Central in the Getting Started with SolarWinds category.
3. In the Application Discovery category, click Discover Applications to
begin using the wizard-like interface.
For more information, see Add Application Monitors.
Select Nodes
1. Click [+] in the list to expand the node groups and to select the nodes you
want to scan.
2. When you are finished selecting nodes, click Next.
Select Applications
To keep the scanning time to a minimum, we recommend you initially
scan for a limited number of application templates. To see more
application templates, select a different template group from the Show
Only list.
To adjust the template assignment criteria, expand Advanced Scan
Settings and move the slider to the desired setting:
Exact Match
All the components must match to assign the template.
Strong Match
Most of the components must match to assign the template.
278
Chapter 8: Application Discovery
Partial Match
Some of the components must match to assign the template.
Minimal Match
At least one component must match to assign the template.
When you are finished selecting applications, click Next.
Enter Credentials
Some application templates require credentials either to access
restricted resources, or to run within the context of a specific user. To
scan for these templates, add the necessary credentials to the list. If a
template you are scanning for requires credentials, the credentials in
this list are tried in the order in which they appear.
Warning: Credentials are tried several times over the course of a
scan, so an incorrect password is likely to lock out an account. To
avoid potential account lockouts that affect actual users, we
recommend you create and use service accounts. A service account is
an account created specifically for the purpose of providing
credentials to use for SolarWinds monitoring. With service accounts,
no actual user is affected by an account lockout if a password should
be entered incorrectly.
If you have domains sharing user names with different passwords, we
recommend you run separate application discoveries for each domain.
When you are finished entering credentials, click Next.
Review and Start Scan
Review the summary for the scan. If the automatic discovery matches
templates that are already assigned to the node, by default the
template is not assigned a second time. If you want to assign duplicate
templates, select Yes, Assign Anyway from the Do you want to
assign duplicates list.
Click Start Scan to begin the scan. The scan runs in the background.
If you like, click View progress near the light bulb icon toward the top
of the page to view the progress of the scan. You are notified by a
message near the top of the window when scanning is completed.
Click View Results to see the results of the scan. Click View SAM
279
Add UX Monitors
Summary Page (or > SAM Application Summary) to display the
SAM summary page.
Add UX Monitors
You cannot scan for user experience (UX) monitors, but you can
assign them to nodes manually. Adding monitors from this page does
not affect your scan.
Add Application Monitors
After adding individual nodes, you are prompted by the Add Application
Monitors page to add applications for monitoring the desired application(s) on
the new node as described below.
To add Application Monitors on the Add Application Monitors page:
1. Use the Show Only list to select the desired category for the Application
Monitors you want to add.
2. Check the check box next to the Application Monitor(s) you want to assign.
3. The selected Application Monitor(s) are added to the list of Selected applications.
4. If you change your mind and want to delete an application, click the red
X next to the name of the application in the Selected applications list.
5. If suitable credentials already exist, choose the credential from the
Choose Credential list.
6. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
7. Click Test to test the credentials and component monitors against the test
node.
8. If the test fails, troubleshoot the problem based on the error messages, and
then retest the node.
9. Click Next.
10. On the Change Properties page, modify any of the information as needed,
such as the Node Status Polling interval (in seconds) and the Collect Statistics Every frequency (in minutes).
11. Click OK, Add Node.
280
Chapter 8: Application Discovery
Reading the Application Summary
The SAM Application Summary is the first view displayed after launching Server
& Application Monitor. This view provides insight into application health and
performance conditions over your entire network. The resources listed in this
section are the default views included in the SAM Application Summary.
Active Application Alerts
This resource provides the current application-specific alerts, including the time
the alert fired, the name of the application that caused the alert, and the alert
message. Click the Network Node to see the SolarWinds Node Details view.
Click the Application Name to see the SAM Application Details view.
Application Health Overview
This resource provides a status overview of all your assigned application
monitors. Click a status to list the assigned application monitors in that status.
The following statuses are depicted on the Application Health Overview:
Application Up
Assigned application monitors with all component monitors responding and
operating within their thresholds.
Application Critical
281
Applications with Problems
Assigned application monitors with at least one component monitor
operating past the critical threshold.
Application Down
Assigned application monitors with at least one unresponsive component
monitor.
Application Warning
Assigned application monitors with at least one component monitor
operating past the warning threshold.
Other
Assigned application monitors that are suspended due to licensing
restrictions.
Unknown
Assigned application monitors with status that cannot yet be determined.
Applications with Problems
This resource lists the assigned application monitors reporting any status other
than up.
Last 25 Application Events
This resource provides a list of application-centric events from the time period you
specify. The default time period shows the last 25 application events. Clicking
Edit allows you to change the time period, limiting the events displayed in the
resource.
282
Chapter 8: Application Discovery
Thwack Latest Application Templates
This resource lists the newest application monitor templates that have been
added to the Thwack community web site. Click a template to open its download
web page.
Top 10 Components Monitored by Response Time
This resource provides a list of the component monitors with the slowest
response time.
Top 10 Processes Monitored by CPU Load
This resource provides a list of the component monitors consuming the most
CPU.
Top 10 Processes Monitored by Physical Memory
This resource provides a list of the component monitors consuming the most
physical memory.
283
Top 10 Processes Monitored by Virtual Memory
Top 10 Processes Monitored by Virtual Memory
This resource provides a list of the component monitors consuming the most
virtual memory.
Top XX Monitored Processes by I/O Reads/Sec
This resource displays the total number of I/O Read operations per second.
Fields:
l
l
Process Name: Displays the name of the listed process. Clicking a process in the list will take you to the Component Details page for that process.
Application Name: Displays the name of the listed application that contains the listed process. Clicking an application in the list will take you to
the Application Details page for that application.
284
Chapter 8: Application Discovery
l
l
Network Node: Displays the name of the listed node that contains the listed application and process. Clicking a node in the list will take you to the
Node Details page for that node.
IO Reads: Displays the current rate of Input/Output reads.
Note: Clicking Edit will allow you to change the Title, Sub-Title, and Maximum
Number of Monitors to Display.
Hovering the mouse over any part of this resource will reveal a tooltip with
detailed information about the item listed.
For more information, see the following:
l
l
Top XX Monitored Processes by I/O Writes/Sec
Top XX Monitored Processes by I/O Total Operations/Sec
Top XX Monitored Processes by I/O Writes/Sec
This resource displays the total number of I/O Write operations per second.
Fields:
l
l
l
l
Process Name: Displays the name of the listed process. Clicking a process in the list will take you to the Component Details page for that process.
Application Name: Displays the name of the listed application that contains the listed process. Clicking an application in the list will take you to
the Application Details page for that application.
Network Node: Displays the name of the listed node that contains the listed application and process. Clicking a node in the list will take you to the
Node Details page for that node.
IO Writes: Displays the current rate of Input/Output writes.
285
Top XX Monitored Processes by I/O Total Operations/Sec
Note: Clicking Edit will allow you to change the Title, Sub-Title, and Maximum
Number of Monitors to Display.
Hovering the mouse over any part of this resource will reveal a tooltip with
detailed information about the item listed.
For more information, see the following:
l
l
Top XX Monitored Processes by I/O Reads/Sec
Top XX Monitored Processes by I/O Total Operations/Sec
Top XX Monitored Processes by I/O Total Operations/Sec
This resource displays the total number of I/O operations per second.
Fields:
l
l
l
l
Process Name: Displays the name of the listed process. Clicking a process in the list will take you to the Component Details page for that process.
Application Name: Displays the name of the listed application that contains the listed process. Clicking an application in the list will take you to
the Application Details page for that application.
Network Node: Displays the name of the listed node that contains the listed application and process. Clicking a node in the list will take you to the
Node Details page for that node.
Total IOPS: Displays the current rate of Input/Output.
Note: Clicking Edit will allow you to change the Title, Sub-Title, and Maximum
Number of Monitors to Display.
Hovering the mouse over any part of this resource will reveal a tooltip with
detailed information about the item listed.
For more information, see the following:
286
Chapter 8: Application Discovery
l
l
Top XX Monitored Processes by I/O Reads/Sec
Top XX Monitored Processes by I/O Writes/Sec
Server Warranty Summary
This resource displays warranties currently expired and set to expire on the
current node. This is done by SAM periodically checking the status of each
server's warranty against Dell, HP, and IBM's online warranty validation servers.
Clicking a node in the summary list will take you the Node Details view for that
node. You can expand and collapse the tree views by clicking [+] and [-]
respectively.
You can visually see warranties nearing their expiration dates by examining the
dates in the Expiration Date column. Also, if a warranty expiration date crosses a
Warning or Critical threshold, progress bars will appear as yellow and red,
respectively. Clicking Edit will allow you to customize threshold values as well as
filter the warranties you want displayed.
287
Server Warranty Summary Alerts
l
l
l
Expired Warranties: Lists the nodes that currently have expired warranties.
Warranties Due to Expire: Lists the nodes that have warranties nearing
their expiration date.
Next 5 Warranties Set to Expire: Lists the top five warranties nearing their
expiration date.
Clicking Edit will allow you to fine tune the information displayed in this resource,
as shown below:
Server Warranty Summary Alerts
One alert is included with Server Warranty Summary:
1. Alert me when a node warranty expires in 30 days - Disabled by default
288
Chapter 9:
Managing Groups and Dependencies
Groups and dependencies enable you to more effectively manage your network.
Groups give you the ability to logically organize monitored objects, regardless of
device type or location, and dependencies allow you to more faithfully represent
what can actually be known about the nodes of your network, eliminating “false
positive” alert triggers and providing more accurate insight into the state of your
nodes.
Groups contain SolarWinds objects that report a status such as nodes, volumes,
applications, and even other groups. You create, delete, and modify groups from
the Manage Groups page.
Note: Nesting a group within another does not create a strict parent/child
relationship. You can include any group as a member in any number of other
groups.
To access the Manage Groups page:
1. Log on to the SolarWinds Web Console.
2. Click Settings in the top right of the web console.
3. Click Manage Groups in the Node & Group Management grouping of the
SolarWinds Website Administration page.
The following sections provide more information about creating and managing
groups in SAM:
l
l
Creating Groups
Managing the Display of Group Status
Creating Groups
Creating a group is a straightforward process of selecting the SolarWinds objects
you want the group to contain. At creation time, you can also decide how you
want SolarWinds to roll up the status of the group members.
289
Chapter 9: Managing Groups and Dependencies
It is also possible to specify group members on the basis of shared properties by
adding them with a dynamic query. SolarWinds objects added through dynamic
queries are automatically added or removed from the group.
Refer to the following sections for more information:
l
l
l
l
Editing Groups
Managing Group Members
Deleting Groups
Managing the Display of Group Status
To create a new group:
1. Click Start > All Programs > SolarWinds > Orion Web Console.
2. Click Settings in the top right of the web console.
3. Click Manage Groups in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Click Add New Group.
5. Enter a name for the group in the Name field, and then expand Advanced.
6. If you want the group to roll up the worst status of the group
members, select Show Worst Status.
7. If you want the group to roll up the best status of the group members,
select Show Best Status.
8. If you want the group to display a warning status if the group members have a mixture of different statuses, select Mixed Status shows
warning.
9. Click Next.
10. If you want to individually select group members, follow these steps:
a. In the Show Only list, select the type of SolarWinds object you want to
add as a group member.
b. Check the check box of the SolarWinds object and then click Add to
Group.
11. If you want to dynamically select group members based on shared
properties, follow these steps:
a. Click Add dynamic query.
b. Type a name for the query in the Dynamic query object name
field.
c. Select a SolarWinds object type in the SolarWinds Object is
list.
d. Click Add Condition to specify further selection properties.
Note: Use the question mark (?) character as a multiple
290
Editing Groups
character wildcard. Use the underscore (_) character as a
single character wildcard.
e. Click Preview to verify that the dynamic query is selecting your
intended objects.
f. Click Save.
12. Continue adding individual SolarWinds objects or dynamic queries until
you have finished building your group.
13. Click Create Group.
Editing Groups
You can edit the properties of an existing group or add and remove objects.
These are separate editing tasks.
To edit properties of an existing group:
1. Click Start > All Programs > SolarWinds > Orion Web Console.
2. Click Settings in the top right of the web console.
3. Click Manage Groups in the Node & Group Management grouping of the
SolarWinds Website Administration page.
4. Check the group you want to edit, and then click Edit Properties.
5. Edit the Name and Description of the selected group, as appropriate.
6. If you want to manage the members of the selected group, click Add &
Remove Objects. For more information about managing group members,
see Managing Group Members.
Note: Expand the Contains summary for the selected group to see all member objects in the group.
7. If you want to configure the calculation of displayed group status or
the frequency with which group status is refreshed, expand Advanced,
select a Status rollup mode, and then provide a Refresh frequency.
Note: For more information about status rollup for groups, see Managing the
Display of Group Status.
8. Click Submit.
Managing Group Members
The following procedure manages the objects included within a defined group.
291
Chapter 9: Managing Groups and Dependencies
To add and remove the objects of an existing group:
1. Click Start > All Programs > SolarWinds > Orion Web Console.
2. Click Settings in the top right of the web console, and then click Manage
Groups in the Node & Group Management grouping of the SolarWinds
Website Administration page.
3. Check the group you want to edit, and then click Add & Remove Objects.
Deleting Groups
Deleting an existing dependency is a straightforward process, as shown in the
following procedure.
To delete a group:
1. Click Start > All Programs > SolarWinds > Orion Web Console.
2. Click Settings in the top right of the web console, and then click Manage
Groups in the Node & Group Management grouping of the SolarWinds
Website Administration page.
3. Check the group you want to delete, and then click Delete.
Managing the Display of Group Status
The status of any particular group is determined by the status of the members of
the group. There are three methods for determining the status displayed for a
selected group of monitored objects:
Note: For more information about object states in SolarWinds, see “Status Icons
and Identifiers.”
Show Best Status is most useful for displaying groups that are defined as
collections of redundant or backup devices. The following table indicates how
the Show Best Status option operates:
Note: Compare Group Status results under the Show Best Status option with
results for the same groups of objects under the Show Worst Status option.
Object States
(Up, Warning, Down)
(Warning, Up)
(Warning, Down, Unknown)
Group Status
(Up)
(Up)
(Warning)
292
To configure the method used to determine the status of a selected group:
Show Worst Status ensures that the worst status in a group of objects is
displayed for the whole group. The following table indicates how the Show Worst
Status option operates:
Object States
Group Status
(Up, Warning, Down)
(Down)
(Warning, Down)
(Warning)
(Warning, Down, Unknown)
(Down)
Mixed Status shows Warning ensures that the status of a group displays the
worst warning-type state in the group. If there are no warning-type states, but the
group contains a mix of up and down states, then a Mixed Availability ( ) warning
status is displayed for the whole group. The following table indicates how the
Mixed Status shows Warning option operates:
Object States Group Status
(Critical)
(Critical)
(Mixed Availability)
The following procedure configures the method used to determine group status.
To configure the method used to determine the status of a selected group:
1. Click Start > All Programs > SolarWinds > SolarWinds Web Console.
2. Settings in the top right of the web console, and then click Manage
Groups in the Node & Group Management grouping of the SolarWinds
Website Administration page.
3. Check the group you want to edit, and then click Edit Properties.
4. Expand Advanced, and then select a Status rollup mode, as follows:
a. If you want the group to roll up the worst status of the group members, select Show Worst Status.
b. If you want the group to roll up the best status of the group members, select Show Best Status.
c. If you want the group to display a warning status if the group members have a mixture of different statuses, select Mixed Status
shows warning.
293
Chapter 9: Managing Groups and Dependencies
5. Click Submit.
Managing Dependencies
Dependencies in SolarWinds allow you to account for topological constraints on
your network. These constraints may be either the result of the design of a
specific device, or the result of the physical architecture of your network itself.
SolarWinds offers an Unreachable status to account for the case when a device
may appear to be down when its status is actually indeterminate, due to another
device being down or unresponsive.
Likewise, SolarWinds also makes it possible to define dependencies among
distinct devices, as in the case of a subnet of devices on your network that
depends on a single WAN link to connect with the rest of your network. In this
case, if you have defined a group consisting of the devices in this dependent
subnet, you can then define a dependency where the dependent subnet is a child
group to the parent router that is serving as the WAN link to the rest of your
network. For more information about groups, see Managing Groups and
Dependencies.
The power of dependencies becomes evident when considering alerts. If you
have an alert configured to trigger when a monitored object is down, you only
want that alert to trigger if a monitored objects is positively down. In other words,
you do not want an down object alert to trigger for an object that is not actually
down. Without dependencies, all monitored objects on a monitored node that is
unresponsive to ICMP queries will also report as down. With dependencies in
use, these child objects will instead display as Unreachable, saving you the
hassle of sorting through numerous false alerts resulting from the failure of a
single node to respond promptly to a status query.
Refer to the following sections for more information:
l
l
l
l
Creating a Dependency
Editing a Dependency
Deleting a Dependency
Viewing Alerts on Child Objects
Creating a Dependency
Creating a new dependency is a straightforward process of selecting the parent
and children objects, as shown in the following procedure.
294
To create a dependency:
To create a dependency:
1. Click Start > All Programs > SolarWinds > SolarWinds Web Console.
2. Click Settings in the top right of the web console, and then click Manage
Dependencies in the Node & Group Management grouping of the
SolarWinds Website Administration page.
3. Click Add new dependency.
4. On the Select Parent page, complete the following steps:
a. Use the Show only: and Group by: selection fields to customize the
list of displayed objects and groups.
Note: The properties listed in the Group by selection field are
dynamic.
b. Select the parent object or group in the main pane, and then click Next.
Note: If you want to define a dependency so that the reported states of
child objects are dependent on the status of multiple parent objects, create a group including all parent objects, and then select it on this view.
For more information, see “Creating Groups” on page 289.
5. On the Choose Child page, complete the following steps:
a. Edit the Dependency name, as appropriate.
b. Use the Show only: and Group by: selection fields to customize the
list of displayed objects and groups.
Note: Properties listed in the Group by: selection field are dynamically
dependent on the selection in the Show only: field.
c. Select the child object or group in the main pane, and then click Next.
Note: If you want to define a dependency so that the reported states of
multiple child objects are dependent on the status one or more parent
objects, create a group including all child objects, and then select it on
this view. For more information, see “Creating Groups” on page 289.
6. On the Review Dependency view, review the current settings for the configured dependency.
Notes:
l If any advanced alerts are configured on parent or child objects,
they will be listed on this view. Click [+] to expand alert details.
l In the event that a parent object is down, all alerts configured on any
child objects in a dependency on the down parent object are automatically suppressed.
7. Click Submit to accept the dependency definition.
295
Chapter 9: Managing Groups and Dependencies
Editing a Dependency
Editing an existing dependency is a straightforward process, as shown in the
following procedure.
To edit an existing dependency:
1. Click Start > All Programs > SolarWinds > SolarWinds Web Console.
2. Click Settings in the top right of the web console, and then click Manage
Dependencies in the Node & Group Management grouping of the
SolarWinds Website Administration page.
3. Check the dependency you want to edit, and then click Edit.
4. On the Select Parent page, complete the following steps:
a. Use the Show only: and Group by: selection fields to customize the
list of displayed objects and groups.
Note: Properties listed in the Group by: selection field are dynamically
dependent on the selection in the Show only: field.
b. Select the parent object or group in the main pane, and then click Next.
Note: If you want to define a dependency so that the reported states of
child objects are dependent on the status of multiple parent objects, create a group including all parent objects, and then select it on this view.
For more information, see “Creating Groups” on page 289.
5. On the Choose Child page, complete the following steps:
a. Edit the Dependency name, as appropriate.
b. Use the Show only: and Group by: selection fields to customize the
list of displayed objects and groups.
Note: Properties listed in the Group by: selection field are dynamically
dependent on the selection in the Show only: field.
c. Select the child object or group in the main pane, and then click Next.
Note: If you want to define a dependency so that the reported states of
multiple child objects are dependent on the status one or more parent
objects, create a group including all child objects, and then select it on
this view. For more information, see “Creating Groups” on page 289.
6. On the Review Dependency view, review the current settings for the configured dependency.
Notes:
l If any advanced alerts are configured on parent or child objects, they
will be listed on this view. Click [+] to expand alert details.
l If a parent object is down, all alerts configured on any child objects in
a dependency on the down parent object are automatically suppressed.
296
Deleting a Dependency
7. Click Submit to accept the dependency definition.
Deleting a Dependency
Deleting an existing dependency is a straightforward process, as shown in the
following procedure.
To delete an existing dependency:
1. Click Start > All Programs > SolarWinds > SolarWinds Web Console.
2. Click Settings in the top right of the web console, and then click Manage
Dependencies in the Node & Group Management grouping of the
SolarWinds Website Administration page.
3. Check the dependency you want to delete, and then click Delete.
4. Click Yes to confirm deletion of the selected dependency.
Viewing Alerts on Child Objects
In the event that a parent object is down, all advanced alerts configured on any
child objects in a dependency on the down parent object are automatically
suppressed. The following procedure displays all advanced alerts currently
configured on any child objects in a selected dependency.
To view alerts on child objects in a selected dependency:
1. Click Start > All Programs > SolarWinds > SolarWinds Web Console.
2. Click Settings in the top right of the web console.
3. Click Manage Dependencies in the Node & Group Management grouping of the SolarWinds Website Administration page.
4. Check the dependency that includes the child object on which the alerts you
want to view are configured, and then click Alerts on Child.
297
Chapter 10:
Managing Accounts
SolarWinds Web Console user accounts, permissions, and views are established
and maintained with the SolarWinds Account Manager. When Advanced
Customization is enabled on the SolarWinds Website Settings page, you can use
Account Manager to customize menu bars and views for different users. For more
information, see Customizing Views.
Notes:
l This guide assumes that Advanced Customization has been enabled. If it
has not been enabled, the range of options available on the pages referenced in the following sections is much more limited. For more information, see Setting Account Limitations.
l To prevent issues with web console accounts, your SQL Server should not
be configured with the no count connection option enabled. The no count
option is set in the Default connection options area of the Server
Properties > Connections window of SQL Server Management Studio
Refer to the following sections for more information:
l
l
Creating Accounts
Editing User Accounts
Creating Accounts
New SolarWinds Web Console user accounts may be created by any web
console administrator. The following procedure creates a new web console user
account.
To create a new user account:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Account in the Accounts grouping of the SolarWinds Website Administration page.
4. Click Add New Account.
298
Chapter 10: Managing Accounts
5. Select the type of account you want to add, and then click Next.
6. If you selected SolarWinds individual account, complete the following
steps:
a. Provide a User Name and a Password for the SolarWinds individual
account.
b. Confirm the password, and then click Next.
c. Define user settings and privileges, as appropriate. For more information, see Editing User Accounts.
7. If you selected Windows individual account, complete the following
steps:
a. Provide the User Name and Password for a user that has administrative access to your Active Directory or local domain.
b. In the Search for Account area, enter the User name of the Active Directory or local domain user for whom you want to create a new web console account, and then click Search.
c. In the Add Users area, select the users for whom you want to create
new web console accounts, and then click Next.
8. If you selected Windows group account, complete the following steps:
a. Provide the User Name and Password for a user that has administrative access to your Active Directory or local domain.
b. In the Search for Account area, enter the Group name of the Active Directory or local domain group for which you want to create a new web
console account, and then click Search.
c. In the Add Users area, select the users for whom you want to create
new web console accounts, and then click Next.
When the new account is created, the Edit User Account view displays, showing
all configurable account options. For more information about editing account
settings, see Editing User Accounts.
Editing User Accounts
The Edit User Account page provides options for configuring web console user
accounts. On the Edit User Account page, administrators can disable an account,
set an account expiration date, grant administrator and node management rights,
set user view limitations, define a default menu bar, and set several other defaults
defining how a user account views and uses the SolarWinds Web Console.
299
User Account Access Settings
The following sections and procedures detail the configuration of user accounts.
Note: To reset a password, click Change Password at the bottom of the page.
l
l
l
l
l
l
User Account Access Settings
Setting Account Limitations
Defining Pattern Limitations
Setting Default Account Menu Bars and Views
Configuring an Account Report Folder
Configuring Audible Web Alerts
User Account Access Settings
The following procedure is a guide to setting user account access.
300
Chapter 10: Managing Accounts
To edit a user account:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Accounts in the Accounts grouping of the SolarWinds Website Administration page.
4. Select the account that you want to edit, and then click Edit.
5. Set Account Enabled to Yes or No, as appropriate.
Note: Accounts are enabled by default, and disabling an account does not
delete it. Account definitions and details are stored in the Orion database
in the event that the account is enabled at a later time.
6. If you want the account to expire on a certain date, click Browse (…)
next to the Account Expires field, and then select the account expiration
date using the calendar tool.
Note: By default, accounts are set to Never expire. Dates may be entered
in any format, and they will conform to the local settings on your computer.
7. If you want to allow the user to remain logged-in indefinitely, select
Yes for the Disable Session Timeout option.
Note: By default, for added security, new user accounts are configured to
timeout automatically.
8. If you want to grant administrator rights to the selected account, set
Allow Administrator Rights to Yes.
Notes:
l Granting administrator rights does not also assign the Admin menu
bar to a user. If the user requires access to Admin options, they must
be assigned the Admin view. For more information, see “Setting
Default Account Menu Bars and Views” on page 305.
l Administrator rights are not granted by default, but they are required
to create, delete, and edit accounts. User accounts without administrator rights cannot access Admin page information.
9. If you want to allow the user to manage nodes directly from the
SolarWinds Web Console, set Allow Node Management Rights to Yes.
Note: By default, node management rights are not granted.
10. If you want to allow the user to customize views, set Allow Account to
Customize Views to Yes.
Note: By default, customized view creation is not allowed. Changes made
to a view are seen by all other users that have been assigned the same
view.
11. Designate whether or not to Allow Account to Clear Events and
Acknowledge Alerts.
301
Configuring Audible Web Alerts
12. Select whether or not to Allow Browser Integration.
Note: Browser integration can provide additional functionality, including
access to right-click menu options, depending on client browser capabilities.
13. If you want to enable audible alerts through the client browser, select
a sound from the Alert Sound list.
Note: By default, sounds are stored in the Sounds directory, located at
C:\Inetpub\SolarWinds\NetPerfMon\Sounds. Sounds in .wav format that
are added to this directory become available as soon as the Edit User
Account page refreshes.
14. Provide the maximum Number of items in the breadcrumb list.
Note: If this value is set to 0, all available items are shown in breadcrumb
drop down lists.
Configuring Audible Web Alerts
When browsing the SolarWinds Web Console, audible alerts can be sounded
whenever new alerts are generated. When enabled, you will receive an audible
alert the first time, after login, that an alert is displayed on the page. This alert may
come from either an alert resource or the Alerts view. You will not receive audible
alerts if the Alerts view or the alert resource you are viewing is empty.
Following the initial alert sound, you will receive an audible alert every time an
alert is encountered that was triggered later than the latest alert that has already
been viewed.
For example, a user logs in and sees a group of alerts with trigger times ranging
from 9:01AM to 9:25AM, and the user receives an audible alert. If the user
browses to a new page or allows the current page to auto-refresh, a new alert
sounds if and only if an alert triggered later than 9:25AM is then displayed.
302
Chapter 10: Managing Accounts
To enable audible web alerts:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Manage Accounts in the Accounts grouping of the SolarWinds Website Administration page.
4. Select the account you want to configure.
5. Click Edit.
6. Select the sound file you want to play when new alerts arrive from the Alert
Sound list.
Note: By default, sounds are stored in the Sounds directory, located at
C:\Inetpub\SolarWinds\NetPerfMon\Sounds. Sounds in .wav format that
are added to this directory become available as soon as the Edit User
Account page refreshes.
7. Click Submit.
Setting Account Limitations
Account limitations may be used to restrict user access to designated network
areas or to withhold certain types of information from designated users. The
following procedure sets user account limitations.
To set user account limitations:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console, and then click Manage
Accounts in the Accounts group of the SolarWinds Website Administration page.
3. If you want to limit an individual user account, complete the following
steps:
a. On the Individual Accounts tab, check the account you want to limit.
b. Click Edit.
c. Click Add Limitation in the Account Limitations section.
d. Select the type of limitation to apply, and then click Continue.
Notes:
l Because SolarWinds NetFlow Traffic Analyzer (NTA) initially
caches account limitations, it may take up to a minute for
303
To set user account limitations:
account limitations related to SolarWinds NTA to take effect in
SolarWinds NTA.
l Account limitations defined using the Account Limitation Builder
display as options on the Select Limitation page. Account limitations can be defined and set using almost any custom properties. For more information, see Creating Account Limitations.
e. Define the limitation as directed on the Configure Limitation page that
follows. For more information about defining pattern-type limitations,
see Defining Pattern Limitations.
4. If you want to limit a group account, complete the following steps:
Note: Limitations applied to a selected group account only apply to the
group account and not, by extension, to the accounts of members of the
group.
a. On the Groups tab, check the group account you want to limit.
b. Click Edit.
c. Click Add Limitation in the Account Limitations section.
d. Select the type of limitation to apply, and then click Continue.
Notes:
l Because SolarWinds NetFlow Traffic Analyzer (NTA) initially
caches account limitations, it may take up to a minute for
account limitations related to SolarWinds NTA to take effect in
SolarWinds NTA.
l Account limitations defined using the Account Limitation Builder
display as options on the Select Limitation page. Account limitations can be defined and set using almost any custom properties. For more information, see Creating Account Limitations.
e. Define the limitation as directed on the Configure Limitation page that
follows. For more information about defining pattern-type limitations,
see Defining Pattern Limitations.
5. Click Add Limitation in the Account Limitations section.
6. Select the type of limitation to apply from the list, and then click Continue.
Notes:
l Account limitations defined using the Account Limitation Builder display as options on the Select Limitation page. Account limitations
can be defined and set using almost any custom properties. For
more information, see “Creating Account Limitations” on page 1137.
l Because SolarWinds NetFlow Traffic Analyzer (NTA) initially
caches account limitations, it may take up to a minute for account
limitations related to SolarWinds NTA to take effect in SolarWinds
NTA.
304
Chapter 10: Managing Accounts
7. Define the limitation as directed on the Configure Limitation page that follows. For more information about defining pattern-type limitations, see
Defining Pattern Limitations.
Defining Pattern Limitations
Pattern limitations may be defined using OR, AND, EXCEPT, and NOT operators
with _ and * as wildcard characters. The following examples show how to use
available operators and wildcard characters:
Note: Patterns are not case sensitive.
foo matches only objects named "foo.”
foo_ matches all objects with names consisting of the string "foo" followed by
only one additional character, like foot or food, but not seafood or football.
foo* matches all objects with names starting with the string "foo,” like football or
food, but not seafood.
*foo* matches all objects with names containing the string "foo,” like seafood or
Bigfoot.
*foo* OR *soc* matches all objects containing either the string "foo" or the string
"soc,” including football, socks, soccer, and food.
*foo* AND *ball* matches all objects containing both the string "foo" and the
string "ball,” including football but excluding food.
*foo* NOT *ball* matches all objects containing the string "foo" that do not also
contain the string "ball,” including food but excluding football.
*foo* EXCEPT *ball* matches all objects containing the string "foo" that do not
also contain the string "ball,” including food but excluding football.
You may also group operators using parentheses, as in the following example.
(*foo* EXCEPT *b*) AND (*all* OR *sea*) matches seafood and footfall, but not
football or Bigfoot.
Setting Default Account Menu Bars and Views
The Default Menu Bar and Views section provides several options for configuring
the default menu bar and views for your user account. The following procedure is
a guide to setting these options.
305
To set default menu bar and view options:
To set default menu bar and view options:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console, and then click Manage
Accounts in the Accounts grouping of the SolarWinds Website Administration page.
3. Select the account that you want to configure, and then click Edit.
4. Scroll down to Default Menu Bar and Views.
5. Select a Home Tab Menu Bar from the available list.
Note: This is the default menu bar displayed when you click Home in the
SolarWinds Web Console. If you are editing a user account that must have
administrator privileges, set the Home Tab Menu Bar to Admin.
6. Select an Application Tab Menu Bar from the available list.
Note: This is the default menu bar displayed when you click Applications
in the SolarWinds Web Console. If you are editing a user account that must
have administrator privileges, select Admin.
7. Select a Virtualization Tab Menu Bar from the available list.
Note: This is the default menu bar displayed when you click Virtualization
in the SolarWinds Web Console. If you are editing a user account that must
have administrator privileges, select Admin.
8. If you have installed any additional SolarWinds modules, select a
SolarWinds Module Tab Menu Bar from each available list.
Note: This step configures the default menu bar displayed when you click
the tab corresponding to an installed module in the SolarWinds Web
306
Chapter 10: Managing Accounts
9.
10.
11.
12.
13.
14.
15.
Console. If you are editing an account that must have administrator privileges, select Admin.
Select a Home Page View.
Note: If no Home Page View is specified, the default is designated to be
the same as the page that is specified in the Default Summary View field
below.
If the Home Page View you have selected refers to a specific network
device, select a Default Network Device by clicking Edit and selecting
from the list of available devices on the next page.
Note: If the Home Page View you have selected does not require a specific
network device, SolarWinds will select a device to display, automatically.
Select a Default Summary View for the account.
Note: This is typically the same as the Home Page View.
If you want all reports to be available for the account, select \Reports
from the Report folder list in the Default Menu Bars and Views area.
Note: If you are creating a new user, you must designate the Report Folder
the new account is to use to access SolarWinds reports. By default, no
report folder is configured for new users. The Reports directory is located in
the SolarWinds SAM installation directory:
C:\Program Files\SolarWinds\Orion\.
If you want to designate default Node, Volume, and Group Details
Views for this account, expand SolarWinds General Settings, and then
select appropriate Node Detail, Volume Detail, and Group Detail Views.
If you want to designate default Virtualization Summary Manager,
Cluster Details, and Datacenter Details Views for this account, expand
Integrated Virtual Infrastructure Monitor Settings, and then select appropriate default views.
Click Submit.
Configuring an Account Report Folder
Reports may be assigned to an account by creating sub-directories within the
Reports directory. Desired reports are included within the sub-directory, and the
sub-directories are then made available for assignment to an account. This
provides a level of security when reports are included in a view or added as
custom menu items. For more information, see “Creating and Editing External
Website Views” on page 219.
307
To configure an account report folder:
To configure an account report folder:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console, and then click Manage
Accounts in the Accounts group of the SolarWinds Website Administration
page.
3. Select the account you want to configure, and then click Edit.
4. If you want all reports to be available for the account, select \Reports
from the Report folder list in the Default Menu Bars and Views area.
Note: If you are creating a new user, you must designate the Report Folder
the new account is to use to access SolarWinds reports. Bydefault, no report
folder is configured for new users. The Reports directory is located in the
SolarWinds SAM installation directory:
C:\Program Files\SolarWinds\Orion\.
5. Click Submit.
Server & Application Monitor Settings
From here, you can select the SAM defaults for the following, as shown in the
illustration below.
To navigate to this page, take the following steps:
1. From the web console, navigate to Settings > Manage Accounts.
2. Select an account to edit by checking its box. when done, click Edit.
3. The following options appear. Select the options you want, when done, click
Submit.
308
Chapter 10: Managing Accounts
Orion General Settings
From here, you can select the Orion defaults for the following, as shown in the
illustration below:
l
l
l
Node Details View: This view is used when details about a single Network
Node are displayed.
Volume Details View: This view is used when details about a single physical or logical Volume are displayed.
Group Details View: This view is used when details about a single Group
are displayed.
309
Integrated Virtual Infrastructure Monitor Settings
Integrated Virtual Infrastructure Monitor Settings
From here, you can select the Integrated Virtual Infrastructure defaults for the
following, as shown in the illustration below:
l
l
l
Virtualization Manager Summary View: This view is the target of the
"VMware Summary" link in the page header.
Cluster Details View: This view is used when details about a single Cluster
are displayed.
Datacenter Details View: This view is used when details about a single
Data Center are displayed
310
Chapter 11:
Managing SolarWinds SAM Polling
Engines
To ensure that your polling engines are optimized to run at peak performance,
you will need to occasionally tune them. If you use more than one polling engine,
you will need to balance the load so that each engine can perform optimally.
Refer to the following sections for more information:
l
l
l
l
l
l
l
Viewing Polling Engine Status
Configuring Polling Engine Settings
SolarWinds Polling Settings
Calculating Node Availability
Using the Polling Engine Load Balancer
Setting the Node Warning Level
Managing Packet Loss Reporting
Viewing Polling Engine Status
The SolarWinds Web Console provides the Polling Engines view, giving you
immediate insight into the performance of all polling engines in your SolarWinds
installation.
To display the Polling Engine view:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Polling Engines in the Details group.
For more information about configuring the settings on this view in addition to
configuring all other available polling engine variables, see Configuring Polling
Engine Settings.
311
Chapter 11: Managing SolarWinds SAM Polling Engines
Configuring Polling Engine Settings
Settings for your SolarWinds SAM polling engine are configured on the
SolarWinds Polling Settings view within the SolarWinds Web Console.
To open the SolarWinds Polling Settings view:
1. Log in to the SolarWinds Web Console as an administrator.
2. Click Settings in the top right of the web console.
3. Click Polling Settings in the Settings group.
SolarWinds Polling Settings
The following poller settings are configurable on the SolarWinds Polling Settings
view.
Refer to the following sections for more information:
l
l
l
l
Polling Intervals
Polling Statistics Intervals
Network
Calculations & Thresholds
Polling Intervals
The following settings configure default polling intervals. To apply poller settings,
click ReApply Polling Intervals.
Default Node Poll Interval
Devices are regularly polled to determine status and response time on this
designated interval. By default, this interval is 120 seconds.
Default Volume Poll Interval
Volumes are regularly polled to determine status and response time on this
designated interval. By default, this interval is 120 seconds.
Default Rediscovery Interval
Your entire network is polled on this interval to detect any re-indexed
devices. Monitored network devices are also checked for IOS upgrades
permitting EnergyWise support. By default, this interval is 30 minutes.
Lock custom values
312
Polling Statistics Intervals
This option is enabled by default. Enabling this option automatically saves
any polling customizations made on the SolarWinds Polling Settings view.
Polling Statistics Intervals
The following settings configure default polling intervals for device statistics. To
apply poller settings, click ReApply Polling Statistic Intervals.
Default Node Statistics Poll Interval
Device performance statistics are regularly polled on this interval. By
default, this interval is 10 minutes.
Default Volume Statistics Poll Interval
Volume performance statistics are regularly polled on this interval. By
default, this interval is 15 minutes.
Network
The following settings configure ICMP and SNMP requests.
ICMP Timeout
All ICMP (ping) requests made by the SolarWinds poller time out if a
response is not received within the period designated. By default, this
period is 2500ms.
ICMP Data
This string is included within all ICMP packets sent by SolarWinds.
SNMP Timeout
All SNMP requests made by the SolarWinds poller time out if a response is
not received within the period designated. By default, this period is 2500ms.
SNMP Retries
If a response to an SNMP poll request made by the SolarWinds poller is not
received within the configured SNMP Timeout, the SolarWinds poller will
conduct as many retries as designated by this value. By default, this value is
2.
Calculations & Thresholds
The following settings designate methods for calculating availability and
transmission rate baselines, select the SolarWinds SAM node warning level and
313
Chapter 11: Managing SolarWinds SAM Polling Engines
counter type, and indicate security preferences for community strings and other
potentially sensitive information in the web console.
Availability Calculation (advanced)
This setting designates the type of calculation SolarWinds SAM performs to
determine device availability. For more information, see “Calculating Node
Availability” on page 314.
Baseline Calculation (advanced)
Upon startup, SolarWinds can calculate a baseline for the transmission
rates of the various elements of your network. This baseline is used as a
starting point for any comparison statistics. For more information, see
“Calculating a Baseline” on page 315.
Allow Secure Data on Web (advanced)
In the interest of security, sensitive information about your network is not
viewable in the SolarWinds Web Console. However, if your network is
properly secured, you may check this option to allow the viewing of
community strings and other potentially sensitive information within the web
console.
Note: This setting does not affect the display of custom reports that you
export to the web. For more information see “Creating and Viewing Reports”
on page 1.
Node Warning Level
Devices that do not respond to polling within this designated period of time
display as Down in the web console. By default, this value is 120 seconds.
Counter Rollover
This option sets the type of counter SolarWinds SAM is to use. For more
information, see “Handling Counter Rollovers” on page 190.
Calculating Node Availability
The Availability Calculation setting on the SolarWinds Polling Settings view
provides a choice between the following two methods for determining device
availability.
314
Node Status:
Node Status:
The default method is based upon the historical up or down status of the selected
node. The selected node is polled for status on the Default Node Poll Interval
defined on the SolarWinds Polling Settings view. For more information, see
SolarWinds Polling Settings.
If the selected node responds to a ping within the default interval, the node is
considered up, and a value of 100 is recorded in the Response Time table of the
Orion database. If the node does not respond to a ping within the default interval,
the node is considered down and a value of 0 is recorded in the Response Time
table of the Orion database. To calculate node availability over a selected time
period, the sum of all Response Time table records for the selected node over the
selected time period is divided by the selected time period, providing an average
availability over the selected time period.
Percent Packet Loss:
The second method is a more complicated calculation that effectively bases the
availability of a selected node on its packet loss percentage. As in the Node
Status method, the selected node is polled for status. If it responds within the
Default Node Poll Interval defined on the SolarWinds Polling Settings view, a
value of 100 is averaged with the previous 10 availability records. For more
information, see SolarWinds Polling Settings.
The result of the Percent Packet Loss calculation is a sliding-window average. To
calculate node availability over a selected time period, the sum of all results in the
Response Time table for the selected node over the selected time period is
divided by the selected time period, providing an average availability over time.
Note: The Percent Packet Loss method introduces a historical dependency into
each availability node record. In general, it is best to leave calculations based on
Node Status unless you specifically need node availability based on packet loss.
Calculating a Baseline
Much of the raw data that SolarWinds SAM polls from nodes is provided initially
as counter values. If you do not need statistics immediately, or if you do not want
SolarWinds SAM to calculate a baseline at startup, disable baseline calculation
at startup by setting the Baseline Calculation option on the SolarWinds Polling
Settings view to False. For more information, see Configuring Polling Engine
Settings.
315
Chapter 11: Managing SolarWinds SAM Polling Engines
Note: Baseline calculation requires significant data gathering and processing.
Until baseline calculation is completed, both SolarWinds SAM server
performance and the CPU performance of some of network routers may be
adversely affected.
Using the Polling Engine Load Balancer
The Polling Engine Load Balancer is a useful tool for reassigning nodes to a new
polling engine, deleting an unused polling engine, and performing load balancing
between multiple polling engines. The tool is available within the Monitor Polling
Engines application, which is an advanced feature of SolarWinds SAM.
Reassigning nodes to new polling engines may be required in the following
situations:
l
l
Moving or renaming your SolarWinds SAM server
Merging two or more SolarWinds servers
If these or any other conditions present the need for reassignment, complete the
following procedure to reassign nodes to a new polling engine.
To reassign nodes to a different polling engine:
1. Click Start > All Programs > SolarWinds > Advanced Features >
SolarWinds Service Manager.
2. Click Shutdown Everything.
Note: Confirm that you stop the SolarWinds Network Performance Monitor
Service on all polling engines.
3. Click Start > All Programs > SolarWinds > Advanced Features > Monitor Polling Engines.
4. Click Servers > Poller Load Balancing.
5. Select the nodes you want to reassign.
Note: Use Shift + click to highlight multiple consecutive rows, and use
Ctrl + click to highlight multiple non-consecutive rows.
6. Click Polling Engines > Move Selected Nodes to *, substituting the target
polling engine for *. The node is reassigned, and it reflects the name of the
polling engine in the polling engine column.
7. Click Start > All Programs > SolarWinds > Advanced Features >
SolarWinds Service Manager to restart SolarWinds services.
316
Setting the Node Warning Level
Setting the Node Warning Level
A device may drop packets or fail to respond to a poll for many reasons. Should
the device fail to respond, the device status is changed from Up to Warning. On
the SolarWinds Polling Settings view, you can specify the Node Warning Level,
which is the length of time a device is allowed to remain in the Warning status
before it is marked as Down. During the interval specified, the service performs
"fast polling" (ICMP) to continually check the node status.
Note: You may see events or receive alerts for down nodes that are not actually
down. This can be caused by intermittent packet loss on the network. Set the
Node Warning Interval to a higher value to avoid these false notifications. For
more information about packet loss reporting, see “Managing Packet Loss
Reporting” on page 317.
To set the Node Warning Level:
1. Log in to the SolarWinds Web Console using an account with administrative
rights.
2. Click Settings in the upper right of the web console, and then click Polling
Settings in the Settings group of the SolarWinds Website Administration
view.
3. In the Calculations and Thresholds group, set the Node Warning Level to an
appropriate interval, in seconds.
Note: The default Node Warning Level interval is 120 seconds.
4. Click Submit.
Managing Packet Loss Reporting
To manage the amount of network-wide packet loss reported by SolarWinds,
configure the Response Time Retry Count for your polling engine. This setting
designates the number of times SolarWinds retries ICMP pings on a monitored
device before packet loss is reported.
Note: This configuration change requires an insertion into your Orion database. If
possible in your environment, SolarWinds recommends installing and using the
SQL Server Management Studio to perform this insertion.
To configure the Response Time Retry Count for your polling engine:
1. Create a full backup of your Orion database.
2. On your SolarWinds server, click Start > All Programs > SolarWinds >
Advanced Features > SolarWinds Service Manager.
317
Chapter 11: Managing SolarWinds SAM Polling Engines
3. Click Shutdown Everything.
4. On your Orion database server, click Start > All Programs > Microsoft
SQL Server > SQL Server Management Studio.
5. Select your Orion database Server name.
6. Select an appropriate Authentication type, provide any required credentials, and then click Connect.
7. Expand Databases > SolarWindsDatabaseName > Tables.
8. Click New Query.
9. Type the following query into the empty SQL query field:
Note: Specify your own custom values for Maximum, CurrentValue, and
DefaultValue.INSERT INTO [SolarWindsDatabaseName].[dbo].[Settings] (SettingID, Name, Description, Units, Minimum, Maximum, CurrentValue, DefaultValue) VALUES (‘SWNetPerfMon-Settings-Response
Time Retry Count’, ‘Response Time Retry Count’, ‘Number of times
SolarWinds retries ICMP pings on a monitored device before reporting
packet loss’, ‘’, 1, Maximum, CurrentValue, DefaultValue)
10. Click Execute.
11. Close SQL Server Management Studio.
12. On your SolarWinds server, click Start > Run, type regedit, and then click
OK.
13. Expand HKEY_LOCAL_MACHINE > SOFTWARE > SolarWinds.Net >
SWNetPerfMon.
14. Right-click Settings, and then click New > String Value.
15. Enter Response Time Retry Count as the New Value.
16. Right-click Response Time Retry Count, and then click Modify.
17. In the Value data field, enter the CurrentValue provided in the query above,
and then click OK.
18. Close the Registry Editor.
19. Click Start > All Programs > SolarWinds > Advanced Features >
SolarWinds Service Manager.
20. Click Start Everything.
318
Chapter 12:
Virtualization
SolarWinds Integrated Virtual Infrastructure Monitoring (IVIM) built into
SolarWinds SAM lets you monitor today's modern network fabric of virtual
networks, virtualized data centers, and private clouds. The deep visibility into your
virtualized environments helps you ensure that network performance helps and
not hinders your virtualization projects
SAM is capable of monitoring VMware ESXi and ESX Servers versions 3.5 and
higher as well as Microsoft's Hyper-V up to and including Hyper-V 2012 R2.
Note: A node can either be a VMware ESX/vCenter server or Hyper-V server, not
both.
VMware Monitoring
Monitor your entire VMware virtual infrastructure from the highest to the lowest
level: vCenter → datacenter → cluster → ESX hosts → individual virtual
319
Chapter 12: Virtualization
machines. Track availability and performance metrics including CPU, memory,
storage, and network bandwidth utilization
Virtual Machine Auto-Summary
Automatically discover identify and monitor new virtual machines added to any
VMware host server or updated during vMotion.
Virtualization Alerting and Reporting
SolarWinds' native alerting and reporting capabilities extend seamlessly to your
virtual infrastructure.
Refer to the following sections for more information:
l
l
l
l
l
l
Requirements for Monitoring ESXi and ESX Servers
Managing VMware Credentials in the Web Console
Adding Virtual Servers for Monitoring
Virtualization Summary
Viewing ESX Host Details
Changing Polling Orders for ESX Servers
Requirements for Monitoring ESXi and ESX Servers
The following table provides minimal requirements for effectively using
SolarWinds SAM to monitor your VMware ESXi and ESX Servers.
Note: SolarWinds SAM uses the VMware API to poll most performance data from
devices running ESX Server versions 3.5 and 4.0. Before SAM can start polling
ESX Servers, you must ensure that you have created credentials on your ESX
Servers for the SAM polling engines. Information on how to do this can be found
here: KB Article 2177.
Credentials created for the SAM polling engines must have read-only rights, at
minimum.
Requirement
Description
SNMP
SolarWinds SAM uses SNMP to
monitor all ESXi and ESX Servers. For
more information about enabling
SNMP, refer to the following sections:
l
Enabling SNMP on VMware
ESXi
320
Requirements for Monitoring ESXi and ESX Servers
l
l
l
Enabling SNMP on ESX Server
Version 3.5
Enabling SNMP on ESX Server
Version 4.0
Creating ESX Server Credentials
for SolarWinds SAM
VMware API
SolarWinds SAM uses the VMware
API to poll most performance data from
devices running ESXi and ESX Server
versions 3.5 and 4.0. For more
information about creating required
credentials, see “Creating ESX Server
Credentials for SolarWinds SAM” on
page 327.
VMware Tools
VMware Tools must be installed on all
ESXi and ESX Servers you intend to
monitor. VMware Tools is not required
on virtual machines running on
monitored ESXi and ESX servers, but
additional information, including IP
addresses, are made available when
VMware Tools is installed on virtual
machines hosted by monitored ESXi
and ESX Servers.
The following table provides a summary of the methods used by SolarWinds SAM
to monitor VMware ESX Servers.
Notes:
l
l
Both SAM and NPM share the same VIM module, so their monitoring methods are identical.
VIM gathers Network utilization information via VMware API, but not individual interfaces (e.g. Interfaces under “List Resources”) or interface status
(Up/Down). Interface status is only available via SNMP, which is part of
NPM.
321
Chapter 12: Virtualization
3.5
3i
4
4i
5i
Detection as ESX Server VMware API
Volumes
SNMP N/A SNMP N/A
SNMP
Interfaces
SNMP N/A SNMP SNMP (partial) SNMP
CPU
SNMP N/A SNMP SNMP
Memory
SNMP N/A SNMP SNMP
Total Memory
VMware API
Guest VM List
VMware API
Enabling SNMP on VMware ESXi and ESX Servers
SolarWinds SAM uses SNMP to poll performance data from VMware ESXi and
ESX Servers. In order to make this performance data available to SolarWinds
SAM, you must enable SNMP on your VMware ESXi and ESX Servers, as
described in the following sections:
Note: VMware only makes a limited amount of information available to SNMP
queries for VMware ESXi and ESX Servers version 4.0 and higher. To access
additional information on these versions, SolarWinds SAM utilizes the VMware
API.
Enabling SNMP on VMware ESXi
The following procedure enables SNMP on VMware ESXi:
Note: The following procedure to enable SNMP requires the vSphere command
line interface (CLI). The vSphere CLI is not packaged with your ESXi Server by
default, so you will need to download it from VMware, as indicated.
To enable SNMP on VMware ESXi:
1. Download and install the VMware vSphere command line interface from the
VMware Download Center (http://downloads.vmware.com/d/).
2. Use the vSphere CLI to view your ESXi server SNMP settings, as indicated
in the following procedure:
322
To enable SNMP on VMware ESXi:
a. In the Perl\bin directory of your vSphere installation, execute the following script:
perl ..\..\bin\vicfg-snmp.pl --server ip_address –s
Notes:
C:\Program Files\VMware\VMware vSphere CLI\Perl\bin is
the default location of the vSphere Perl\bin directory.
l Replace ip_address with the IP address of your ESXi server,
and replace cstring with the community string you are adding.
For most environments, the community string public should be
sufficient.
b. Enter an appropriate user name at the prompt.
l
Note: For most environments, root should be sufficient.
c. Enter the associated password at the prompt.
3. Use the vSphere CLI to enable SNMP on your ESXi server, as indicated in
the following procedure:
a. In the Perl\bin directory of your vSphere installation, execute the following script to add an appropriate community string:
perl ..\..\bin\vicfg-snmp.pl --server ip_address -c cstring
Note: Replace ip_address with the IP address of your ESXi server,
and replace cstring with the community string you are adding. For
most environments, the community string public should be sufficient.
b. Enter an appropriate user name at the prompt.
Note: For most environments, root should be sufficient.
c. Enter the associated password at the prompt.
d. In the Perl\bin directory of your vSphere installation, execute the following script to enable SNMP:
perl ..\..\bin\vicfg-snmp.pl --server ip_address –E
Note: Replace ip_address with the IP address of your ESXi server.
e. Enter an appropriate user name at the prompt.
Note: For most environments, root should be sufficient.
f. Enter the associated password at the prompt.
4. Reboot your ESXi server to allow settings to take effect.
323
Chapter 12: Virtualization
Enabling SNMP on ESX Server Version 3.5
The following procedure enables SNMP on ESX Server version 3.5.
Note: For more information about ESX Server 3.5 and ESX Server MIBs, see the
VMware document, “Basic System Administration - ESX Server 3.5, ESX Server
3i version 3.5, VirtualCenter 2.5.”
To enable SNMP on ESX Server version 3.5:
1. Log in to your ESX Server using an account with administrative privileges.
2. Open snmpd.conf in a text editor.
Notes:
l
l
The default location for snmpd.conf is
root/etc/snmp/snmpd.conf.
To use the default text editor, nano, in a default ESX Server version
3.5 environment, enter nano /etc/snmp/snmpd.conf at the prompt.
3. Locate the rocommunity setting and replace the default community string
public with an appropriate read-only community string for your
environment.
Note: Use commas to separate multiple community strings.
4. Save snmpd.conf, and then close your editor.
Note: If you are using nano, press Ctrl+X to close nano, and then enter Y
to save snmpd.conf.
5. Enter chkconfig snmpd on to enable SNMP when you reboot your ESX
Server.
6. Enter esxcfg-firewall -e snmpd to allow SNMP through the ESX Server
firewall.
7. Enter service snmpd start to start the SNMP service.
8. Confirm that SNMP polling is enabled on your ESX Server by entering the
following command:
snmpwalk -v1 -c cstring localhost .1.3.6.1.4.1.6876 | grep 6876.1
Note: Replace cstring with the community string you provided above.
9. After entering the snmpwalk command, your ESX Server should return
information similar to the following:
324
Enabling SNMP on ESX Server Version 4.0
SNMPv2-SMI::enterprises.6876.1.1.0 = STRING: "VMware ESX Server"
SNMPv2-SMI::enterprises.6876.1.2.0 = STRING: "3.5.0"
SNMPv2-SMI::enterprises.6876.1.3.0 = OID: SNMPv2SMI::enterprises.6876.60.1.3.5.0
SNMPv2-SMI::enterprises.6876.1.4.0 = STRING: "153875"
Note: The MIB OID SNMPv2-SMI::enterprises.6876.1.4.0 returns the
build number for your product, so it may not be the same as the build
number displayed above.
Enabling SNMP on ESX Server Version 4.0
The following procedure enables both the system default SNMP daemon snmpd
and the proprietary VMware SNMP daemon vmware-hostd on VMware ESX
Server version 4.0:
Note: For more information about ESX Server 4.0 and ESX Server MIBs, see the
VMware document, “vSphere Basic System Administration - Update 1, ESX 4.0,
ESXi 4.0, vCenter Server 4.0.”
To enable SNMP on ESX Server version 4.0:
1. Log in to your ESX Server using an account with administrative privileges.
2. Open snmp.xml in a text editor.
Notes:
l
l
The default location for snmp.xml is root/etc/vmware/snmp.xml.
To use the default text editor, nano, in a default ESX Server version
4 environment, enter nano /etc/vmware/snmp.xml at the prompt.
3. Locate the communities tag, and then replace the default community
string public with an appropriate read-only community string for your
environment.
Note: Use commas to separate multiple community strings.
4. Locate the enable tag, and then confirm it is set to true.
5. Locate the port tag and confirm it is set to 171.
6. Locate the targets tag and confirm it is set to [email protected]/cstring.
Note: Replace cstring with the community string you provided above.
7. Save snmp.xml, and then close your editor.
325
Chapter 12: Virtualization
Note: If you are using nano, press Ctrl+X to close nano, and then enter Y
to save snmp.xml.
8. Enter service snmpd stop to confirm that the SNMP service is stopped.
9. Open snmpd.conf in a text editor.
Notes:
l
l
The default location for snmpd.conf is
root/etc/snmp/snmpd.conf.
To use the default text editor, nano, in a default ESX Server version
4 environment, enter nano /etc/snmp/snmpd.conf at the prompt.
Edit snmpd.conf to include the following two lines:
10. view systemview included .1.3.6.1.4.1.6876
proxy -v 1 -c cstring 127.0.0.1:171 .1.3.6.1.4.1.6876
Note: Replace cstring with the community string you provided above.
11. Save snmpd.conf, and then close your editor.
Note: If you are using nano, press Ctrl+X to close nano, and then enter Y
to save snmpd.conf.
12. Enter service mgmt-vmware restart to restart the mgmt-vmware service.
13. Enter service snmpd start to start the SNMP service.
14. Enter chkconfig snmpd on to enable SNMP when you reboot your ESX
Server.
15. Enter esxcfg-firewall -e snmpd to allow SNMP through the ESX Server
firewall.
16. Confirm that SNMP polling is enabled on your ESX Server by entering the
following command:
snmpwalk -v1 -c cstring localhost .1.3.6.1.4.1.6876 | grep 6876.1
Note: Replace cstring with the community string you provided above.
17. After entering the snmpwalk command, your ESX Server should return
information similar to the following:
SNMPv2-SMI::enterprises.6876.1.1.0 = STRING: "VMware ESX"
SNMPv2-SMI::enterprises.6876.1.2.0 = STRING: "4.0.0"
SNMPv2-SMI::enterprises.6876.1.4.0 = STRING: "208167"
326
Creating ESX Server Credentials for SolarWinds SAM
Note: The OID SNMPv2-SMI::enterprises.6876.1.4.0 returns your product
build number, so it may not be the same as the build number above.
Creating ESX Server Credentials for SolarWinds SAM
SolarWinds SAM uses the VMware API to poll most of its performance data from
devices running ESX Server versions 3.5 and 4.0. You must create credentials on
your ESX Servers for the SolarWinds SAM polling engine, as shown in the
following procedure:
Note: Credentials created for the SolarWinds SAM polling engine must have
read-only rights as a minimum.
To create ESX Server credentials for SolarWinds SAM:
1. Log in to your ESX Server using an account with administrative privileges.
Note: Typically, the root user name and password is sufficient.
2. If you are prompted with an untrusted SSL certificate warning, click
Ignore to continue using the current SSL certificate.
3. Open the Users & Groups tab, and then click Users.
4. Right-click the Users view, and then click Add.
5. On the Add New user window, complete the following procedure:
Note: The User Name and Password provided in this step must be
provided either in your initial network discovery or whenever you use Web
Node Management to add the current ESX Server to SolarWinds SAM for
monitoring.
6.
7.
8.
9.
10.
11.
a. Provide both a Login and a User Name for the SolarWinds SAM
polling engine.
b. Enter and confirm a Password.
c. Click OK.
Open the Permissions tab.
Right-click the Permissions view, and then click Add Permission.
On the Assign Permissions window, click Add.
Select the user you just created, and then click Add.
Click OK on the Select Users and Groups window.
Select an appropriate role in the Assigned Role area, and then click OK on
the Assign Permissions window.
The credential you have created is now available to use for monitoring your ESX
Server. For more information about adding your ESX Server to the Orion
database for monitoring, see Managing VMware Credentials in the Web Console.
327
Chapter 12: Virtualization
Managing VMware Credentials in the Web Console
If you have to update the user name or password of a VMware credential, you can
do so from the VMware Credentials Library tab.
To update a VMware credential:
1.
2.
3.
4.
5.
6.
Log in to the web console.
Click Settings.
Click Virtualization Settings in the Node & Group Management section.
Click the VMware Credentials Library tab.
Check the credential you need to update, and then click Edit Credential.
Make the necessary updates, and then click OK.
Adding Virtual Servers for Monitoring
VMware Vcenter, ESX servers, and Hyper-V virtual machines are added to the
Orion database in the same ways other devices are added for monitoring in the
SolarWinds Web Console
Polling for VMware nodes Using the Network Sonar Wizard
The Network Sonar Wizard is the recommended method for adding VM Servers
for monitoring in the SolarWinds Web Console. With Network Sonar Discovery,
you can define all required credentials at once on the Local ESX Credentials for
Vmware view. For more information, see "Virtualization Discovery" on page 267.
Adding VMs from the Virtualization Assets Resource
1. Log in to the web console.
2. Point to the Virtualization tab and then click Virtualization Summary.
3. Click the [+] next to any ESX or Vcenter server listed in the Virtualization
Assets resource to expand the list of virtual machines.
4. Click a virtual machine that is not currently managed by SolarWinds.
Unmanaged VMs are listed in italic type.
5. Click Yes, Manage this Node.
6. If the VM is not running, manually enter the IP address of the VM in the
Hostname or IP Address field.
7. Check any additional options required to monitor the VM, and then click
Next.
8. Follow the remainder of the Add Node wizard to completion, and then click
OK, Add Node.
328
Virtualization Summary
Virtualization Summary
The Virtualization Summary view shows the overall status of your virtualized
infrastructure.
To view the Virtualization Summary:
1. Log in to the SolarWinds Web Console.
2. Point to the Virtualization tab and then click Virtualization Summary.
The Virtualization Summary view is pre-configured to display the following
resources:
Top XX Hosts by CPU Load
Top XX Hosts by Number of Running
VMs
Top XX Hosts by Percent Memory
Used
Top XX Hosts by Network Utilization
VMware Assets
VMware Asset Summary
Hyper-V Assets
Hyper-V Asset Summary
To change the properties or contents of any resource, click Edit in the resource
box.
Viewing ESX Host Details
The ESX Host Details page is displayed when you click an ESX Host server in
the Virtualization Summary. This page is pre-configured to display the following
resources:
Active Alerts on this Node
Availability Statistics
Average Response Time & Packet
Loss Graph
Average Response Time & Packet
Loss Gauge
CPU Load & Memory Utilization Gauge Disk Volumes
ESX Host Details
Event Summary
List of Virtual Machines
Min/Max AverageCPU Load Graph
Node Details
Polling Details
Virtual Machine CPU Consumption
Virtual Machine Memory Consumption
329
Chapter 12: Virtualization
Virtual Machine Network Traffic
To change the properties or contents of any resource, click Edit in the resource
box.
Changing Polling Orders for ESX Servers
If your VMware ESX hosts are controlled by VMware vCenter servers,
SolarWinds obtains the status of the ESX hosts from the vCenter server instead of
polling the ESX hosts directly.
To poll the ESX servers directly you must change the Poll Through setting of the
ESX host from the Virtualization Settings page. From this page, you can also
disable and enable polling for ESX hosts and vCenter servers.
To poll a vCenter-managed ESX Host from the SolarWinds server:
1.
2.
3.
4.
Log in to the web console.
Click Settings.
Click Virtualization Settings in the Node & Group Management section.
Point to any column heading, click the upside-down triangle, and then click
Columns > Polling Through.
5. Select the ESX hosts you want to poll directly.
6. Click Poll Through > Poll ESX server directly.
Troubleshooting ESX Hardware Monitoring
When an ESX server returns the message, Unable to connect to remote server,
check the following:
l
l
Ensure CIM is enabled on the ESX server. To enable CIM on ESX/ESXi,
refer to the following section: "Hardware Monitoring and VMware" on page
1086.
Ensure port 5989 is opened on the firewall
If the ESX server returns the message, Unable to establish session with all
provided credentials, check the following:
l
l
Verify the VMware credentials in the VIM are correct
Verify the account belongs to the root user group
330
Hyper-V Monitoring
Hyper-V Monitoring
SAM natively supports monitoring of Microsoft's Hyper-V server and its guests.
By default, the statistic collection interval is set to ten minutes.
Note: A node can either be a VMware ESX/vCenter server or Hyper-V server, not
both.
Requirements for Monitoring Hyper-V Servers
The following table provides minimal requirements for effectively using
SolarWinds SAM to monitor your Hyper-V Servers:
Requirement
Description
Hyper-V version
All versions of Hyper-V are
supported, up to and
including Hyper-V 2012 R2.
WMI
SolarWinds SAM uses WMI
to monitor all Hyper-V
Servers. SNMP is not
supported when monitoring
Hyper-V servers. For more
information about enabling
WMI, refer to the following
section: Testing Local WMI
Services on page 1603.
Note: If switching from SNMP
to WMI to monitor a Hyper-V
server, certain previously
monitored data will be lost as
a result of the protocol
change.
For example: If you have
NPM installed and are
monitoring an interface via
331
Chapter 12: Virtualization
SNMP, switching to WMI to
monitor Hyper-V will cause
the interface's historical data
to be lost. You can either
monitor Hyper-V via WMI or
an interface via SNMP, not
both.
Number of Virtual
Machines
SolarWinds recommends
fewer than 1,000 virtual
machines running on any one
Hyper-V server.
Configuring Hyper-V Servers for Discovery
For data collection and inspection of Microsoft Windows Hyper-V hosts through
Windows Management Instrumentation (WMI), each server running Hyper-V
requires:
1. A user account with elevated credentials
2. Changes to the firewall
The following table lists the discovery requirements in detail.
Item
Need
User
Account
Depending on your implementation, supply one of the following as
credentials for the credentials database:
l
l
l
For domain-based authentication, a domain account with
membership in the Administrators group on the monitored
application server.
For workgroup authentication, a built-in administrator
account on the monitored application server
For workgroup authentication, a local user account with membership in the Administrators group and the User Account
Control (UAC) setting "Run all administrators in Admin
Approval Mode" disabled on the monitored application
server.
Windows Ensure that core networking, Windows Management
Firewall
Instrumentation (WMI), and RPC traffic can traverse the firewall.
332
Modifying the Windows Firewall
Modifying the Windows Firewall
You must allow core networking, WMI, and RPC traffic through the firewall of the
monitored server. The following procedure walks you through allowing this traffic
through the Windows Firewall on Windows 2008 R2.
Notes:
l
l
If you have restricted the range of dynamic RPC ports, you must ensure that
each host is able to access that port range.
If you are connecting to Hyper-V hosts through a DMZ or hardware firewall,
you must open the corresponding rules and ports on the hardware.
To allow the correct traffic through the Windows firewall, you must perform the
following steps:
1. Ensure the core networking rules are enabled
2. Enable the Windows Management Instrumentation (DCOM-In) rule
3. Create a new rule to open the RPC ports
Ensure the Core Networking rules are enabled
You must ensure that the core networking rules are enabled to collect information
successfully from Hyper-V hosts.
Note: If the rule has a green icon with a checkmark in front of it, the rule is
enabled.
To allow core networking traffic through the Windows Firewall on Windows
2008 R2:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Administrative Tools >Windows Firewall with
Advanced Security.
3. Click Inbound Rules in the left navigation pane.
4. Ensure that all Core Networking rules are enabled. If not, select the disabled rule and then click Enable Rule in the Action menu.
Enable the Windows Management Instrumentation (DCOM-In) rule
You must ensure that the Windows Management Instrumentation (DCOM-In)
rule is enabled to collect information successfully from Hyper-V hosts.
Note: After enabling the Windows Management Instrumentation (DCOM-In) rule,
common WMI checks indicate that WMI is not enabled. This is expected behavior.
333
Chapter 12: Virtualization
To allow WMI traffic through the Windows Firewall on Windows 2008 R2:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Administrative Tools >Windows Firewall with
Advanced Security.
3. Click Inbound Rules in the left navigation pane.
4. Click Windows Management Instrumentation (DCOM-In), and then click
Enable Rule in the Action menu.
Create a new firewall rule to open the RPC ports
You must open the RPC ports to collect information successfully from Hyper-V
hosts. This is best done by creating a new firewall rule.
To open the RPC ports on Windows 2008 R2:
1. Log on to the computer you want to monitor with an administrator account.
2. Navigate to Start > Administrative Tools > Windows Firewall with
Advanced Security.
3. Click Inbound Rules in the left navigation pane.
4. Click Actions > New Rule…
5. In Rule Type, select Custom and click Next.
6. Select This program path and enter %SystemRoot%\System32\dllhost.exe in the text box.
7. In Services, click Customize to ensure that Apply to all programs and services is selected, and click OK.
8. Click Next
9. In Protocol type, select TCP.
10. In Local port, select RPC Dynamic Ports.
11. In Remote port, select All Ports.
12. Click Next.
13. Apply to any local and remote IP addresses and click Next.
14. In Action, ensure that Allow the connection is selected and click Next.
15. Select all profiles (Domain, Private, and Public) and click next.
16. Enter a name, such as SAM WMI Dynamic Ports.
17. Click Finish
The new rule will now appear in the list of inbound rules.
Enabling and Disabling Hyper-V Monitoring
Hyper-V monitoring is automatically enabled on WMI nodes after a Network
Sonar Discovery is run. For information on enabling WMI, see "Testing Local WMI
334
List Resources Method:
Services" on page 1603.
There are two ways to toggle Hyper-V monitoring; via the Manage Nodes page,
and through the Virtualization Summary resource.
Warning: If Hyper-V polling is disabled, all historical data will be lost. To retain
historical data, use the Virtualization Summary method and select Unmanage.
List Resources Method:
1. From the web console, click Settings in the upper right-hand corner of the
screen.
2. In the Node & Group Management resource, click Manage Nodes.
3. Select the desired node by checking it, and then click List Resources.
4. Check or uncheck Hyper-V, if available.
Virtualization Summary Method:
Warning: If Hyper-V polling is disabled, historical data will be lost. To retain
historical data, select Unmanage. When you choose to remanage the node, all
historical data will be available.
1. In the web console, click the Virtualization tab.
335
Chapter 12: Virtualization
2. In the Virtualization Assets resource. Click Virtualization Settings.
3. In Virtualization Settings, click the Hyper-V tab.
4. Click List Resources.
Note: You can temporarily enable/disable polling of Hyper-V by selecting a
node from the list and clicking either Disable Hyper-V Polling or Enable
Hyper-V Polling. If you check a disabled node, the Enable Polling button
will become enabled. The converse is also true.
5. Check or uncheck Hyper-V and then click Submit.
Accessing Hyper-V Details
Hyper-V is incorporated into multiple resources found in SAM's web console on
the Virtualization tab. Following is just one example:
336
Virtualization Assets:
Virtualization Assets:
With Hyper-V being native to SAM, you can drill down to the Node Details page
from this view. If the node in this view is not managed, you will be prompted to go
to the Add Node wizard to have this node managed.
Clicking Edit will allow you to filter the vendors that are shown in this view.
337
Chapter 13:
Building Component Monitors and
Templates
The following diagram illustrates the work flow involved in creating an application
to be monitored by SolarWinds Server & Application Monitor.
338
Chapter 13: Building Component Monitors and Templates
Refer to the following sections for more information:
l
l
l
l
l
Understanding Component Monitors and Application Monitor Templates
Choosing Component Monitors and Templates Based on Protocol
Requirements for Component Monitors and Templates that use WMI
Monitoring External Nodes
Understanding the Credentials Library
339
Certificate Credentials Library
l
l
l
l
l
l
l
l
Using Application Monitor Templates
Managing Assigned Application Monitors
Working with Component Monitors
Scripting Custom Component Monitors
Custom Application Monitor Template Example: Creating a SolarWinds
SAM Template
Conversion Value
Available Data Transformations
Certificate Credentials Library
Certificate Credentials Library
The Certificate Credentials Library allows you to import and store certificates for
use at a later time.
Typically, you need to associate credentials with component monitors and
templates to enable them to retrieve application data. For added security, SAM
offers the ability to store certificates in the Certificate Credentials Library.
Certificates can be used for authentication with Linux devices monitored in SAM.
Linux, Unix, and Nagios script monitors also support certificate based
authentication.
The PEM format (OpenSSH) is supported.
Adding a Certificate to the Library
To add a certificate to the library:
1. From the Web Console, navigate to Settings > SAM Settings > Certificate
Credentials Library.
2. Click Add New Credential.
3. Enter a name in the Credential Name field.
4. Enter a User Name in the User Name field.
5. Click Browse… to load a private key from a file.
6. Enter a password in the Private key content password field.
7. Select the Private key type: either RSA or DSA.
8. Click Submit to save the certificate credential to the library.
Assigning Certificate Credentials
There are two ways to assign Certificate Credentials; when assigning a template
to a node, and when editing a template directly.
Which method should I use?
340
Chapter 13: Building Component Monitors and Templates
l
l
If every node uses unique private keys, then editing the application after it
has been assigned is the best option. Use method A.
If most or all of your nodes use the same private key, then you should edit
the credentials directly in the template. Use method B.
A.) When Assigning a Template to a Node:
1. Assign a template to a node.
2. When asked to choose credentials, select the Inherit credentials from template option.
3. Click Assign Application Monitors.
4. Edit the template by clicking Edit next to the name of the template, as
shown below.
5. From here, you can select one or more Linux/Unix/Nagios script component
monitors to edit by checking the boxes to the left of each monitor and then
clicking Multi-Edit.
6. Check the Authentication Type box and select Username and PrivateKey
from the drop down menu.
7. Check the Credential for Monitoring box and select the credentials you
want to use from the drop down menu, and then click Save.
B.) Editing a Template Directly:
1. Select the template you want to edit.
2. Change the Authentication Type option to Username and PrivateKey for
each component monitor that should use this authentication type.
3. From the Credential for Monitoring field drop down menu, select the credentials you want to use with your monitors, and then click Submit.
Understanding the Credentials Library
You typically need to associate credentials with component monitors to enable
them to retrieve application data. For example, to use a WMI monitor, you must
provide valid domain or computer credentials. Or, if your web server requires
341
To set up a user account on a SQL server
credentials, you must provide the appropriate credentials to access the protected
sections of your site.
You can work with credentials by:
l
l
l
l
Adding credentials to the Credentials Library for use later. See the section
Adding Credentials to the Credentials Library.
Creating credentials on the spot (Quick Credentials) when editing templates
and component monitors. See the section Using Quick Credentials.
Editing credentials. See the section Editing Credentials in the Credentials
Library.
Deleting credentials. See the section Deleting Credentials from the Credentials Library.
To set up a user account on a SQL server
1. Open Enterprise Manager.
2. In the console tree, double-click Microsoft SQL Servers, click SQL Server
Group, and then SQLComputerName (Windows NT).
3. Double-click Databases, and then double-click your database of choice.
4. Right-click Users, and then click the New Database User menu.
5. Next to Login name, type:
domain\username
6. Next to User name, type your user name.
7. Select the Public check box, and then select all of the following objects:
l
l
l
l
l
l
l
db_owner
db_accessadmin
db_securityadmin
db_ddladmin
db_datareader
db_datawriter
db_backupoperator
Important:
l
Do not select db_denydatareader or db_denydatawriter. These objects
allow members to deny Read or Write permissions to data in the database.
For more information, see http://technet.microsoft.com/enus/library/cc787483%28v=ws.10%29.aspx
Notes:
342
Chapter 13: Building Component Monitors and Templates
l
l
l
SolarWinds Server & Application Monitor uses the same SNMP credentials
that you entered during node discovery. There is no need to specify additional credentials for SNMP operations.
SolarWinds SAM stores credentials encrypted in the database.
The ability to Inherit Windows credentials from node is available in the
drop down list.
Adding Credentials to the Credentials Library
Perform the following to add credentials for later use.
To add credentials from the Credential Library page:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Credentials Library.
Click Add New Credential.
Provide a friendly name for the credential set. SolarWinds Server & Application Monitor displays this name in the Credential for Monitoring field of
monitors that accept credentials.
7. Provide the user name and password, and then confirm the password and
click Submit. If you are providing windows credentials for accessing and
harvesting information through WMI, ensure you provide the account name
in the following syntax: domainOrComputerName\userName for domain
level authentication or userName for workgroup level authentication.
You can assign credentials to all the associated components of a template or
Application Monitor.
Editing Credentials in the Credentials Library
Perform the following to edit credentials for later use.
To edit an existing credential from the Credential Library page:
1. Click Edit for the desired credential.
2. Modify the information as needed.
3. Then click Submit.
Deleting Credentials from the Credentials Library
Perform the following to delete credentials from the Credentials Library.
343
To delete an existing credential from the Credential Library page:
To delete an existing credential from the Credential Library page:
1. Navigate to the Credentials Library: Admin > Settings > SAM Settings >
Credentials Library.
2. Click Delete for the desired credential.
3. Click OK to confirm the deletion.
Using Quick Credentials
Perform the following to use Quick Credentials:
To create and assign credentials using Quick Credentials when editing a
template or Application Monitor:
1. If the credential you want to assign does not exist, create it by following
these instructions:
a. Select <New Credential> in the Choose Credential field.
b. Type a name for the new credential in the Credential Name field.
c. Type the user name for the credential in the User Name field.
d. Type the password in the Password field, and type it again in the Confirm Password field.
2. If you want to assign an existing credential, select the credential from
the Choose Credential field.
3. Click Set Component Credentials to set this credential as the credential
for all the components in the Application Monitor or template.
Note: The ability to Inherit Windows credentials from node is available in
the drop down list. Anywhere you have the option to specify credentials for
an application template or component monitor, you also have the the
option to utilize the existing WMI credentials already used to manage the
host.
344
Chapter 13: Building Component Monitors and Templates
Managing Assigned Application Monitors
You can manage Assigned Application Monitors by referring to the following
sections:
l
l
l
l
l
l
Application Discovery
Add Application Monitors
Editing an Assigned Application Monitor
Unmanaging Assigned Application Monitors
Remanaging Assigned Application Monitors
Deleting Assigned Application Monitors
Editing an Assigned Application Monitor
You can override the template inheritance relationship by editing the components
of an assigned Application Monitor. Any modifications you make to an
application’s components or component properties are independent from the
template, including: adding new components and removing existing components
New components that you add to the application are not governed by the original
template used to create the application. Modified component properties override
the original template settings.
To edit an individual application:
1.
2.
3.
4.
5.
6.
7.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Application Monitors.
Click the group containing the application you want to edit.
Check the application you want to edit, and then click Edit Properties.
If you want to turn on extended debug information to assist Customer
Support, expand Advanced, set Debug logging On, and specify the Number of log files to keep.
Here you can also select either 32bit or 64bit from the drop down list
entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer Support.
8. Click Override Template for each polling setting and specify the new
value.
9. Expand the component you want to modify, and then click Override Template and specify new values.
345
Unmanaging Assigned Application Monitors
10. If you want to add components unique to this specific application,
click Add Component Monitor.
Note: You can select multiple component monitors of the same type to be
added by entering a number in the field next to the check box for the component monitor and then checking the check box.
11. Click Submit to apply your changes.
Note: Custom Properties on Assigned Applications can be defined when
editing the Assigned Application, as shown below:
Unmanaging Assigned Application Monitors
If you need to deactivate assigned application monitors for a period of time, you
can do so by unmanaging them. Changes you make to the managed or
unmanaged status of an application take affect after the next polling cycle.
To unmanage assigned Application Monitors:
1.
2.
3.
4.
5.
6.
7.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Application Monitors.
Click the group containing the application you want to unmanage.
Check the application(s) you want to unmanage, and then click Unmanage.
Specify the date / time when you want to begin the period when the application is unmanaged.
8. Specify the date / time when you want to end the period when the application is unmanaged.
9. Then click OK.
-or-
346
Chapter 13: Building Component Monitors and Templates
1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click the Applications tab.
3. Click an assigned Application Monitor in any resource to view its SAM
Application Details View page.
4. Click Unmanage in the Application Details section.
5. Set the duration of the unmanaged state, and then click OK.
Note: Unmanaging a node in SolarWinds SAM automatically unmanages
its assigned SolarWinds SAM applications for the same duration.
Remanaging Assigned Application Monitors
Remanage an assigned Application Monitor in order to immediately resume
monitoring an unmanaged application.
To remanage assigned Application Monitors:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Application Monitors.
Click the group containing the application you want to remanage.
Check the application(s) you want to remanage, and then click Remanage.
-or1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click the Applications tab.
3. Click an assigned Application Monitor in any resource to view its SAM
Application Details view page.
4. Click Remanage in the Application Details section.
Deleting Assigned Application Monitors
Delete an assigned Application Monitor if you have no further need of it.
To delete assigned Application Monitors:
1.
2.
3.
4.
5.
6.
7.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Application Monitors.
Click the group containing the application you want to delete.
Check the application(s) you want to delete, and then click Delete.
You are prompted whether you want to delete the selected Application Monitors. Click Yes to perform the delete operation.
347
Application Monitor Thresholds
Application Monitor Thresholds
In general, thresholds are markers that indicate certain levels have been reached.
Many component monitors used in SAM applications have thresholds that can be
adjusted and set.
Once set, thresholds can act as trigger points. For example, if you are monitoring
CPU usage, having a Critical threshold set at 90% would be typical. You can then
use this threshold as a trigger to send an email alert to inform you of the Critical
status once that threshold has been breached.
Normally, an administrator would need to monitor his applications for several
weeks in order to collect enough data to be used as a baseline. Once a baseline
has been established, the administrator can then make an educated guess as to
how he should set his Warning and Critical thresholds for his component
monitors. With this is mind, if thresholds are set too low, the administrator would
be getting alerts all the time. If set too high, problems can occur without the
administrator's knowledge.
Baseline data, as well as Warning and Critical thresholds for application
monitors, can be gathered and calculated automatically. The option to enter
thresholds manually remains available.
Note: By default, I/O thresholds of Windows Service Monitors are not set.
For more information, refer to the following sections:
l
l
l
l
l
l
l
Inheriting Thresholds
Automatic Calculation of Baseline Data
Applying Baseline Thresholds at the Template Level
Applying Baseline Thresholds at the Application Level
Latest Baseline Details
Understanding Latest Baseline Details
Understanding Sustained Thresholds
Inheriting Thresholds
Thresholds can be adjusted at the template level or on the individual component
monitor level of an application.
348
Chapter 13: Building Component Monitors and Templates
Threshold Adjustments at the Template Level
If adjusting thresholds on the template level, either manually entered or calculated
using baseline data, any changes made will trickle down to the component
monitor level for applications based on this template. This means the component
monitors within the application inherit the changes made in the template.
Threshold Adjustments at the Component Monitor Level
If you change thresholds at the component monitor level, only thresholds of the
individual component monitor will be affected. Thresholds on the parent template,
or other applications based on that parent template, will not be affected.
Automatic Calculation of Baseline Data
In general, baseline data is calculated on demand; however, seven days of data
is the recommended minimum amount of data needed for baseline calculations to
be considered accurate.
349
To Change the Amount of Data Used in Baseline Calculations:
Baseline data for macros, such as ${USE_BASELINE}, are automatically calculated
during nightly database maintenance.
Once thresholds are calculated and applied to component monitors, the
thresholds remain static until manually re-applied. This is not a moving baseline
that is calculated nightly based on the last seven days of data. A moving baseline
would mask data spikes and other anomalies that need to be highlighted.
Note: Thresholds set manually may yield more desirable results if you are
familiar with the nuances of your environment.
To Change the Amount of Data Used in Baseline Calculations:
1. From the web console, navigate to Settings > SAM Settings > Data &
Database Settings.
2. Enter a number of days, and then click Submit.
Note: The value for the Baseline Data Collection Duration field cannot exceed
the value defined for the Detail Statistics Retention field (located at the top of the
Data & Database Settings section).
For more information, see:
l
l
Baseline Threshold Macros .
Understanding Sustained Thresholds.
Multi-value Scripts and Thresholds
The format for using the Threshold macros with multi-value scripts is as follows:
l
l
${Threshold.Warning.DisplayName}
${Threshold.Critical.DisplayName}
350
Chapter 13: Building Component Monitors and Templates
351
Applying Baseline Thresholds at the Template Level
Applying Baseline Thresholds at the Template Level
Applying and editing thresholds at the template level will affect any and all
applications that are based on that template.
To Edit and Apply Baseline Thresholds for a Template:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Check a template and click Edit from the toolbar.
3. If selecting only one component monitor, click [+] to expand the monitor
details.
a. Click Use Latest Baseline Thresholds, as shown:
Note: Once this box is checked, the Warning and Critical fields will
automatically populate with the macro, ${USE_BASELINE}.
b. Select the options for sustained thresholds, if desired:
Note: For more information, see Understanding Sustained
Thresholds.
352
Chapter 13: Building Component Monitors and Templates
4. If selecting more than one component monitor, select the monitors you
want by checking the boxes next to their names.
a. Click Multi-Edit.
Note: Multi-Edit will only become available when the selected component monitors are of the same type.
b. Check the Statistic Threshold check box on the pop-up window,
then check the Use thresholds calculated from baseline data
check box.
Note: The Use thresholds calculated from baseline data check
box will not become available until the Statistic Threshold check
box has been checked.
Note: Once the Use thresholds calculated from baseline data
box is checked, the Warning and Critical fields will automatically
populate with the macro, ${USE_BASELINE}.
c. Click Save.
5. When done, click Submit.
Applying Baseline Thresholds at the Application Level
Applying and editing thresholds at the application level will only affect the
component monitors of the current application.
353
To Edit and Apply Baseline Thresholds for an Application:
To Edit and Apply Baseline Thresholds for an Application:
1. From the web console, click the Applications tab.
2. In the All Applications resource, expand the tree and then click an application.
3. From the Application Details resource, click Edit Application Monitor.
4. If selecting only one Component Monitor, click [+] to expand the monitor
details.
a. Click Override Template.
Note: The current values for the thresholds will appear in the Warning and Critical fields
b. Click Use Latest Baseline Thresholds, as shown:
c. When applied, the values will change and a blue icon will appear
indicating that baseline thresholds are being used.
5. If selecting more than one component monitor, use the check boxes to
select the monitors you want to edit, and then click Multi-Edit.
a. Click Multi-Edit.
Note: Multi-Edit will only become available when the selected
354
Chapter 13: Building Component Monitors and Templates
component monitors are of the same type.
b. Check the Statistic Threshold check box on the pop-up window,
then check the Use thresholds calculated from baseline data
check box.
Note: Once the second box is checked, the Warning and Critical
fields will automatically populate with the macro, ${USE_BASELINE}.
For more information, see "Understanding Latest Baseline Details"
on page 356.
c. Click Save.
6. When done, click Submit.
For more information, see Understanding Sustained Thresholds.
Latest Baseline Details
Details about how baseline data, as well as Warning and Critical thresholds are
calculated, can be found on the Latest Baseline Details page. This page details
the data collection and calculation process using several graphs and tables.
To View the Latest Baseline Details Page:
1. From the web console, click the Applications tab.
2. In the All Applications resource, expand the tree and then click an application.
355
Understanding Latest Baseline Details
3. From the Application Details resource, click Edit Application Monitor.
4. Find a component monitor in the list and click [+] to expand the monitor
details.
5. Click Override Template.
6. Click Latest Baseline Details.
Understanding Latest Baseline Details
The two tabbed charts and table below them detail how baseline statistics and
thresholds are calculated for individual component monitors based on the
collected data.
356
Chapter 13: Building Component Monitors and Templates
Note: Clicking Use Recommended Thresholds will not affect the chart.
Understanding the Occurrences Chart
The horizontal (X) axis displays the range of values collected by the current
component monitor during the data collection period. The vertical (Y) axis
displays the frequency of each value collected during the data collection period.
The three colors of the chart show the values of the component monitor during
different time periods: Day, Night, and All Hours. You can show or hide these
time periods by checking and un-checking their respective boxes in the legend.
You can have the chart show a specific time range by dragging the mouse over a
small area of the chart. Hovering over any area of the chart will provide a tooltip
with detailed information about that area of the chart.
357
Understanding the Metric Over Time Chart
If you zoom in, a Reset Zoom button will appear.
The yellow and red shading of the chart indicates the recommended Warning and
Critical thresholds, respectively. These shaded areas are taken from the values
recorded in the Latest Baseline Statistics table.
Note: The ability to check and un-check the boxes in the legend is for visual
purposes only and will not affect the values generated for calculated thresholds.
Understanding the Metric Over Time Chart
The horizontal (X) axis displays the time period for when the values were
collected for the current component monitor. The vertical (Y) axis displays the
range of all the values collected during the charted time.
In other words, the light blue bars show the range of values for the statistics
collected during the charted time period. The bottom of the bars indicates the
lowest statistic collected, or the minimum. The top of the bars indicates the
highest statistic collected, or the maximum. The blue line of the chart shows the
average values of the component monitor through time.
Using the legend, you can show or hide these statistics by checking and unchecking their respective boxes.
You can have the chart show a specific time range by dragging the mouse over a
small area of the chart or by using the sliders located at the bottom of the chart.
Hovering over any area of the chart will provide a tooltip with detailed information
about that area of the chart.
358
Chapter 13: Building Component Monitors and Templates
The yellow and red of the chart indicates the recommended Warning and Critical
thresholds, respectively. These shaded areas are taken from the values recorded
in the Latest Baseline Statistics table.
Note: The ability to check and un-check the boxes in the legend is for visual
purposes only and will not affect the values generated for calculated thresholds.
Understanding the Latest Baseline Statistics Table
Along with the minimum and maximum values displayed, the Latest Baseline
Statistics table at the bottom of the display shows the average baseline statistics
surrounded by three levels of standard deviation for both day and night data. This
table highlights the recommended Warning and Critical thresholds in yellow and
red, respectively.
In addition to using the recommended threshold values, you can hover the mouse
over any value in the table to bring up a tooltip dialog. The tooltip dialog allows
you to visualize, but not change, the value for the Warning or Critical threshold to
the value you are hovering over by simply clicking either link in the dialog.
Visualizing a value in this way will affect the chart above the table by
repositioning the shading indicating the Warning and Critical threshold areas.
359
Understanding Baseline Details and Setting Thresholds
Understanding Baseline Details and Setting Thresholds
The right column of this view provides information about the data's calculation
and usage and allows you to set thresholds.
In the Current Thresholds Settings area, you can manually change the values for
both the Warning and Critical thresholds, or use the recommended values by
clicking Use Recommended Thresholds.
Additionally, you can add logic for these thresholds by selecting an operator from
the drop down list such as Greater Than, Less Than, Equal To, and so on. The
logical operator selected will apply to both the Warning and Critical thresholds
and cannot be separated. For example, if you select the Greater Than or Equal
to operator with a Warning threshold value of 80 and a Critical threshold of 90,
the thresholds will be considered met if the returned value for the current
performance counter meets or exceeds 80 for Warning or 90 for Critical.
Understanding Sustained Thresholds
The highlighted fields in the following illustration are available for configuring
sustained thresholds:
360
Chapter 13: Building Component Monitors and Templates
The following two tables demonstrate possible sustained threshold conditions
based on the illustration above and how the Warning and Critical conditions are
met:
Working with Component Monitors
Component monitors are the building blocks of SolarWinds SAM. Each monitors
the status and performance of a different aspect of an application.
361
Viewing the Component Monitor Library
You can perform the following activities to manage components using the
commands on the SAM Settings page:
l
l
l
Viewing the Component Monitor Library
Managing Assigned Component Monitors
Managing Component Monitors within Templates
Viewing the Component Monitor Library
The component monitors in the library are grouped by monitor type in the tree
view display. For each component monitor, two numbers are displayed.
l
l
The first number represents the number of Application Monitor templates
that contain the specified component monitor.
The second number represents the number of Application Monitors that contain the specified component monitor.
Expanding a component monitor shows two categories:
l
l
Application Monitor templates that contain the specified component monitor
Application Monitors that contain the specified component monitor
Expanding a category displays the names of the templates or Application
Monitors for the category, respectively. Clicking the name of a template or
Application Monitor takes you to a page where you can edit that item.
Managing Assigned Component Monitors
You can manage individual component monitors that have been assigned to
collect data on a single object such as a process, port, or performance counter.
Management operations are described in the following sections:
l
l
l
l
l
l
Creating a New Template with Assigned Component Monitors
Assigning Component Monitors to a Node
Copying Assigned Component Monitors to an Assigned Application Monitor
Copying Assigned Component Monitors to an Application Monitor Template
Editing Assigned Application Monitors
Deleting Assigned Application Monitors
Creating a New Template with Assigned Component Monitors
To quickly create a new template with assigned component monitors:
1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click the Applications tab.
3. Click SAM Settings.
362
Chapter 13: Building Component Monitors and Templates
4. Click Manage Assigned Component Monitors.
5. Select the desired component type or assigned Application Monitor whose
component monitors you want to list.
6. Select the desired component monitor(s) to add to the new template.
7. Click Create New Template, specify the information for the new template,
and then click Submit.
Refer to the section “Creating New Templates” on page 397 for details
about specifying the template information.
8. To add additional component monitor(s) to add to the new template, click
Add Component Monitor.
9. Expand the component groups and check all the additional component
monitors you want to add.
Note: You can select multiple component monitors of the same type to be
added by entering a number in the field next to the check box for the component monitor and then checking the check box.
10. Click Submit.
11. Configure the component monitor settings, and then click Submit.
The new template is added to the list of all Application Monitor Templates.
Assigning Component Monitors to a Node
To quickly assign component monitors to a node:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Assigned Component Monitors.
Select the desired component type or assigned Application Monitor whose
component monitors you want to list.
Select the desired component monitor(s) to assign to a node.
Click Assign to Node.
Enter the name for the application, polling frequency, and polling timeout.
If you want to turn on extended debug information to assist Customer
Support, expand Advanced, set Debug logging On, and specify the Number of log files to keep. Here you can also select either 32bit or 64bit from
the drop down list entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer
Support.
363
Copying Assigned Component Monitors to an Assigned Application Monitor
10. Click Next.
11. Select the nodes to which you want to assign the Application Monitor, and
then click Next.
12. If suitable credentials already exist, choose the credential from the
Choose Credential list.
13. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
14. Click Test to test the credentials and component monitors against the test
node.
15. If the test fails, troubleshoot the problem based on the error messages,
and then retest the node.
16. If the test passes, click Assign Application Monitors.
Copying Assigned Component Monitors to an Assigned Application Monitor
To quickly copy component monitors to an assigned Application Monitor:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Assigned Component Monitors.
Select the desired component type or assigned Application Monitor whose
component monitors you want to list.
Select the desired component monitor(s) to copy to an assigned Application Monitor.
Click Copy to Assigned Application Monitor.
Select the desired Application Monitor(s) to copy to and click Submit.
Click OK to acknowledge the successful copy.
Copying Assigned Component Monitors to an Application Monitor Template
To quickly copy component monitors to an Application Monitor template:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Assigned Component Monitors.
Select the desired component type or assigned Application Monitor whose
component monitors you want to list.
6. Select the desired component monitor(s) to copy to an assigned Application Monitor.
364
Chapter 13: Building Component Monitors and Templates
7. Click Copy to Application Monitor Template.
8. Select the desired template(s) to copy to and click Submit.
9. Click OK to acknowledge the successful copy.
Editing Assigned Application Monitors
To edit the assigned Application Monitor for a component monitor:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Assigned Component Monitors.
Select the desired component type or assigned Application Monitor whose
component monitors you want to edit.
6. Select the desired component monitor whose assigned Application Monitor you want to edit.
7. Click Edit Assigned Application Monitor.
8. Edit the desired settings and then click Submit. The edited Application
Monitor is displayed in the list of Assigned Application Monitors.
Deleting Assigned Application Monitors
To delete an assigned component monitor:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Assigned Component Monitors.
Select the desired component type or assigned Application Monitor whose
component monitor(s) you want to delete.
6. Select the desired component monitor(s) that you want to delete.
7. Click Delete.
8. Click Yes to confirm the deletion of the component monitor(s).
Managing Component Monitors within Templates
You can manipulate and manage the component monitors that are inside the
Application Monitor templates in several ways:
l
l
l
l
Listing the Component Monitors Defined in a Template
Creating a New Template from Existing Component Monitors
Creating Assigned Application Monitors from Existing Component Monitors
Copying a Component Monitor
365
Listing the Component Monitors Defined in a Template
Listing the Component Monitors Defined in a Template
To quickly see the different component monitors within your templates:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Manage Component Monitors (within Templates), near the top right
corner of the window.
6. Select Template in the Group by list.
7. Select the desired template whose component monitors you want to list.
Creating a New Template from Existing Component Monitors
To create a new template that contains copies of existing component monitors:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Manage Component Monitors (within Templates), near the top right
corner of the window.
6. Check the check box next to the component monitors you want in the new
template.
7. Click Create New Template, specify the information for the new template,
and then click Submit.
Refer to the section “Creating New Templates” on page 397 for details about
specifying the template information.
Creating Assigned Application Monitors from Existing Component Monitors
To create assigned Application Monitors from existing component monitors:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Manage Component Monitors (within Templates), near the top right
corner of the window.
366
Chapter 13: Building Component Monitors and Templates
6. Check the check box next to the component monitors you want in the
assigned Application Monitors.
7. Click Assign to Node.
8. Specify the name for the application, polling frequency, and polling timeout.
9. If you want to turn on extended debug information to assist Customer
Support, expand Advanced, set Debug logging On, and specify the Number of log files to keep. Here you can also select either 32bit or 64bit from
the drop down list entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer Support.
10. Click Next.
11. Select the nodes for which you want to create the assigned Application Monitors, and then click Next.
12. If suitable credentials already exist, choose the credential from the
Choose Credential list.
13. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
14. Click Test to test the credentials and component monitors against the test
node.
15. If the test fails, troubleshoot the problem based on the error messages, and
then retest the node.
16. If the test passes, click Assign Application Monitors.
Copying a Component Monitor
To copy a component monitor to a template or an assigned Application Monitor:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Manage Component Monitors (within Templates), near the top right
corner of the window.
Check the check box next to the component monitors you want to copy.
Click Copy to.
If you want to copy to an assigned Application Monitor, click Copy to
Assigned Application Monitor.
If you want to copy to a template, click Copy to Application Monitor
Template.
367
Choosing Component Monitors and Templates Based on Protocol
10. Check the check boxes next to the template or assigned Application Monitors to which you wish to copy the component monitors, and then click Submit.
Choosing Component Monitors and Templates
Based on Protocol
If you have a choice between components or templates that return the needed
value using different protocols, consider the following guidelines for making your
choice, based on the protocol:
1. SNMP is the best protocol to use from the reliability and speed perspective.
It is much faster and more reliable than both Performance counters and
WMI, and it has lowest impact on system performance.
2. WMI calls can sometimes take a relatively long time, and they have a significant overhead.
RPC vs. WMI
The reason some SAM templates only use RPC is primarily customer demand.
RPC is generally considered more reliable. It also uses less overheard making it
faster than WMI and it is firewall friendly. There are distinct advantages and
disadvantages to both RPC and WMI, which is why SAM utilizes both methods
for retrieving information.
For more information, see Agents.
Web Service Monitoring
For custom web services that need to be monitored, SAM offers the ability to
utilize the following technologies:
l
l
JSON: JavaScript Object Notation (JSON) is an open standard format that
uses human-readable text to transmit data objects consisting of attribute–
value pairs. It is used primarily to transmit data between a server and web
application, as an alternative to XML.
Note: Inserted JSON content cannot exceed 1MB in size.
SOAP: Simple Object Access Protocol (SOAP) is a protocol used for
exchanging information in the implementation of web services in computer
networks. It relies on XML for its message format, and usually relies on other
application layer protocols. The SOAP monitor is useful if you have custom
368
Chapter 13: Building Component Monitors and Templates
web services that need to be monitored.
Note: Currently, the SOAP monitor within SAM can return a status of either
Up or Down, or return a status of Warning or Critical based on response
time thresholds. This monitor also has the ability to search for the presence
of a string.
For more information, see:
l
l
l
l
l
Component Monitor Types
SOAP Monitor
HTTP Monitor
HTTPS Monitor
JSON
JSON
JSON is accepted in the HTTP monitor and HTTPS monitor, as shown below.
Following is an example of JSON code:
{
"firstname": "Kate"
"lastname": "Asaff"
"age" : 29
"city" : "Austin"
}
Notes:
l
l
Inserted JSON content cannot exceed 1MB in size.
SolarWinds Technical Support does not provide support for custom scripts.
For more information, see:
l
l
HTTP Monitor
HTTPS Monitor
369
SOAP Monitor
SOAP Monitor
This page provides general information concerning the SOAP monitor and how it
works. For information concerning the individual fields of the SOAP monitor, see
SOAP Component Monitor.
Note: Currently, the SOAP monitor within SAM can return a status of either Up or
Down, or return a status of Warning or Critical based on response time
thresholds. This monitor also has the ability to search for the presence of a string.
Definitions:
l
l
l
SOAP: (Simple Object Access Protocol) is a protocol used for exchanging
information in the implementation of web services in computer networks. It
relies on XML for its message format, and usually relies on other application
layer protocols, most notably Hypertext Transfer Protocol (HTTP).
WSDL: (Web Services Description Language). The Web Services Description Language is an XML-based interface description language that is used
for describing the functionality offered by a web service.
XML: Extensible Markup Language is a markup language that defines a set
of rules for encoding documents in a format that is both human-readable
and machine-readable.
About the SOAP Monitor
Currently, the SOAP monitor within SAM can return a status of either Up or Down,
or return a status of Warning or Critical based on response time thresholds. This
monitor also has the ability to search for the presence of a string. You can test the
SOAP monitor in Edit mode. If the test poll throws a web exception (indicating
that there was a problem on the target) the response content is extracted and you
will be able to view the message to help identify the issue.
For more information, see Configuring the SOAP Monitor.
Configuring the SOAP Monitor
The are two ways to configure the SOAP monitor:
l
l
Loading a WSDL file.
Manually entering XML.
370
Chapter 13: Building Component Monitors and Templates
Loading WSDL Files
The SOAP monitor within SAM currently supports the WSDL schema, which must
be exposed on a URL. Once the WSDL file is successfully loaded, the file will be
parsed automatically and the fields, highlighted below, will populate.
Once the WSDL file has been successfully loaded, you can specify values for the
available arguments. There are two types of arguments, simple, and complex.
A simple argument is one where you can define the value directly. A
complex.argument (e.g. structures, classes, list, and so on) must be user-defined
in the XML format. It is recommended that complex arguments be used only by
experienced users.
Note:The Advanced Settings are read-only and displays additional information.
Because the SOAP envelope is based on the WSDL schema, the Advanced
Settings values should not be changed.
The SOAP XML field contains the SOAP envelope which is generated by the
WSDL and dynamically changes as you make changes to the SOAP settings. In
this field you can check what will be sent to the web service.
Important: If changes are made to any of the base SOAP settings, the content of
the SOAP XML will be re-generated and your changes will be lost.
371
Loading WSDL FilesThe SOAP monitor within SAM currently supports the WSDL
372
Chapter 13: Building Component Monitors and Templates
Manually Entering XML
The following is an example of a Complex argument and would be placed in the
Parameters field. SAM will automatically take the code and place it where it
belongs in the envelope:
<tempPhoneNumber xmlns:ns2="http://schemas.xmlsoap.org/soap/encoding/" xsi:type="ns2:Array"
ns2:arrayType="ns1:TemporaryPhoneNumber[3]">
<item xsi:type="ns1:TemporaryPhoneNumber">
<startDate xsi:type="xsd:int">37060</startDate>
<endDate xsi:type="xsd:int">37064</endDate>
<phoneNumber xsi:type="xsd:string">+1-212-5551234</phoneNumber>
</item>
<item xsi:type="ns1:TemporaryPhoneNumber">
<startDate xsi:type="xsd:int">37074</startDate>
<endDate xsi:type="xsd:int">37078</endDate>
<phoneNumber xsi:type="xsd:string">+1-212-5554321</phoneNumber>
</item>
<item xsi:type="ns1:TemporaryPhoneNumber">
<startDate xsi:type="xsd:int">37088</startDate>
<endDate xsi:type="xsd:int">37092</endDate>
<phoneNumber xsi:type="xsd:string">+1-212-5557890</phoneNumber>
</item>
</tempPhoneNumber>
XML can also be entered manually by typing or pasting XML.
373
Scripting Custom Component Monitors
For more information, see:
l
l
Web Service Monitoring
SOAP Component Monitor
Scripting Custom Component Monitors
Ten output pairs can be returned when using script monitors. This new ability
greatly improves flexibility in the way information is returned.
A usage example using the PowerShell script monitor might go something like
this:
Imagine you have an Exchange PowerShell script. With multiple values returned,
you can get a mail traffic report broken down by day, hour, message size, and
number of recipients.
Note: If you exceed the maximum number of allowed output pairs of ten, the
remainder above the tenth output pair will simply be ignored.
The following sections provide information and guidance to help you create some
of the more complicated types of component monitors.
l
l
Creating a Linux/Unix Script Monitor
Creating a Windows Script Monitor
374
Chapter 13: Building Component Monitors and Templates
l
l
Creating a Nagios Script Monitor
Creating a Windows PowerShell Monitor
For general information about the settings for each component monitor, click the
More Information help link in the SolarWinds SAM component monitor
description.
Note: SolarWinds fully supports scripts written and provided by the company;
however, we do not provide customer support for custom scripts written by outside
sources. SolarWinds does provide sample scripts that we do support located at:
C:\Program Files\SolarWinds\Orion\APM\Sample-Script Monitors.
For information on using Data Transformations, refer to the following sections:
l
l
Conversion Value
Available Data Transformations
Creating a Linux/Unix Script Monitor
Linux/Unix Script component monitors allow you to execute a command line
script that can return statistical data. When collecting information for this monitor,
Server & Application Monitor runs the script with the credentials you define with
the Credential Library.
Note: A maximum of 10 output pairs can be returned. If you exceed the maximum
allowed, remove the excess output pairs or they will simply be ignored.
To adapt an existing Perl script to a Linux/Unix Script component monitor in
a new template:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a new template underneath Application Monitor Templates.
Type a name for your template in the Template Name field.
If you want to turn on extended debug information to assist Customer
Support, expand Advanced, set Debug logging On, and specify the Number of log files to keep.
Here you can also select either 32bit or 64bit from the drop down list
entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer Support.
7. Click Add Component Monitor.
8. Expand the Custom Component Monitors group, and then check
Linux/Unix Script Monitor.
375
To adapt an existing Perl script to a Linux/Unix Script component monitor in a
9. Click Submit.
10. Select credentials with SSH permissions in the Credential for Monitoring
field.
11. Type a valid working directory in the Script Working Directory field
12. Click Edit to open the script dialog and enter your script into the Script
Body field.
13. Type the Linux command that runs the script in the Command Line field. It
should be similar to the following: perl ${SCRIPT} arg1 arg2.
Note: {SCRIPT} is replaced by the actual file name of the script after
it’s deployed to the target node. (A temporary file is created in temp
directory for the script).
14. Click Get Script Output. SAM will then test the script by executing it and
parse its output, then return the values.
15. Click Save.
16. Specify the critical and warning thresholds.
17. Click Submit.
Here is a sample Perl script using the Linux/Unix component monitor returning
multiple output pairs, in this case, two: Note: The code in red shows where the
output pairs are defined.
#!/usr/bin/perl
if (@ARGV[0] =~ /\bhelp\b/)
{
print "MemoryUsage.pl SNMPver community hostname\n";
print "SNMPver - version of SNMP protocol\n";
print "community - community name of SNMP protocol\n";
print "hostname - Target host\n";
}
# Get hostname and trim newline
$localhost = `hostname`;
$localhost =~ s/\s*$//g;
$hostname = shift || $localhost;
376
exit 1;
Chapter 13: Building Component Monitors and Templates
$community = shift || "public";
$version = shift || "v1";
$results = "";
$MIB_TotalMemory = "UCD-SNMP-MIB::memTotalReal.0";
#$MIB_TotalMemory = "UCD-SNMP-MIB::memTotalReal.0";
$outres = "snmpget -$version -c $community $hostname $MIB_
TotalMemory |";
open(OUTMEM,$outres) || die "Unable read pipe\n";
while ($line = <OUTMEM>) {
if ($line =~ /\bINTEGER\b/) {
$indval = index($line,"=");
$indval=inde($line,":",$indval);
$val = substr($line,$indval+1,length($line) - $indval);
$val =~ s/[a-zA-Z\/\n ]//
print "Message.1: Available memory at host \"$hostname\": $val
in kB\n";
print "Statistic.1: $val\n";
print "Message.2: Again, the available memory at host \"$hostname\": $val in kB\n";
print "Statistic.2: $val \n";
exit 0;
}
}
print "Statistic: 0\n";
exit 1;
Below is the output from this script:
377
Linux/Unix Scripts
Linux/Unix Scripts
Linux/Unix scripts are uploaded by SSH and then run on the target node using
the string from the Command Line field.
You can use the following variable in the command line field:
${SCRIPT}
Replaced with the script body.
You can use the following variables in the script body field:
${IP}
Replaced with the target node’s IP address.
${USER}
Replaced with the user name from the credential.
${PASSWORD}
Replaced with the password from the credential.
Example Scripts
There are several sample scripts installed with SolarWinds SAM you can use to
create Linux/Unix script component monitors. These sample scripts are installed
on your SolarWinds SAM server, in the folder:
C:\Program Files\SolarWinds\Orion\APM\SampleScriptMonitors\LinuxScript
s
Scripts Must Report Status Through Exit Codes
Scripts must report their status by exiting with the appropriate exit code:
Exit Code
Meaning
0
Up
378
Chapter 13: Building Component Monitors and Templates
1
Down
2
Warning
3
Critical
Any other value Unknown
For example, if you want to inform SolarWinds SAM that a Script reports Up
status, you would exit the script using code similar to the following, where 0
reports Up:
Wscript.quit(0)
Scripts with Text Output
Scripts report additional details by sending text to the script’s standard output.
In APM 4.0.2 and earlier, each line of output contained a single detail in the
following format:
DetailType:Value
# Script output comment
Message: The directory contains too many files.
Statistic: 5
While this is still true, SAM now supports multiple values returned by a script
using the following format.
Statistic.Name1: xMessage.Name1: abc
Statistic.Name2: yMessage.Name2: abc
Detail
Type
Required Meaning
Statistic
Yes
A numeric value used to determine how the monitor
compares to its set thresholds. This must be an integer
value, (negative numbers are supported).
Statistic.Name1: 123Statistic.Name2: 456
379
Creating a Windows Script Monitor
Message No
An error or information message to be displayed in the
monitor status details. Note: Multi-line messages are
supported. To use this functionality print each line using
a separate command. For example:
Message.Name1: abc
Message.Name2: def
There is a limit of ten Statistic and Message pairs for the script. These can
be placed anywhere in the script output. The Statistic and Message names
you give must contain valid letters and/or numbers.
Note: A maximum of 10 output pairs can be returned. If you have exceeded the
maximum allowed, remove the excess output pairs or they will simply be ignored.
Sample output:
# Script comment: This shows two pairs. Ten pairs are possible.
Statistic.CPU: 31.08
Message.CPU: svchost.exe cpu usage
Statistic.RAM: 1234.56
Message.RAM: svchost.exe ram usage
For information on creating a Nagios Script Monitor, see " Creating a Nagios
Script Monitor" on page 387.
Creating a Windows Script Monitor
This component monitor runs a Windows script on the SolarWinds SAM server
and then processes the script's exit code and text output. This monitor has the
ability to return up to ten pairs, i.e.: 10 statistic values + 10 [optional] messages.
This is best used in conjunction with the "Multiple Statistic Chart."
Note: A maximum of 10 output pairs can be returned. If you exceed the maximum
allowed, remove the excess output pairs or they will simply be ignored.
Statistic
The statistic for this component monitor is the value returned by the script.
Script Monitor Formatting:
380
Chapter 13: Building Component Monitors and Templates
At least one message and statistic is required. The statistic must be a
valid integer and be able to be converted to double, otherwise it is
handled as Not as Number (NaN)There is no maximum length for the
message; however, only alphanumeric characters and the underscore
are allowed.
Field Descriptions
Description
This field provides a default description of the monitor. You have the ability
to override the default description by adding to or replacing the text, which
will then be automatically saved. The variable to access this field is
${UserDescription}. For more information, see “Configuring SolarWinds
SAM Alerts"
Component Type
This describes the type of monitor you are using.
Enable Component
This option determines whether or not the component is enabled. Disabling
this component leaves it in the application as deactivated and does not
influence application availability or status.
Credential for Monitoring
Select a Windows credential that is both a user who can log on to the
SolarWinds SAM server, and has sufficient rights on the target node (which
may be the SAM server itself, depending upon your application) to do
whatever the script needs to do. For example, if the script does something
with WMI, the credentials also need WMI rights on the target node. If the
credential you need is not already present in the credentials list, use the
Quick Credentials section to add a new credential.
Script Engine
This field allows you to specify the scripting language to be used. The
default value is vbscript. Below is a list of scripting engines that the
Windows Script Host supports:
Name
File Extensions Availability
VBScript
.vbs
Installed by default
381
Field Descriptions
JScript
.js
Installed by default
PerlScript
.pls
Freeware
ooRexxScript
.rxs
Freeware
PythonScript
.pys
Freeware
TclScript
.tcls
Freeware
ActivePHPScript
.phps
Freeware
RubyScript
.rbs
Freeware
Object Rexx engine
Commercial
Delphi scripting engine
Commercial
Note: VBscript runs locally on the SAM server only. PowerShell uses
WINRM that runs over TCP ports 5985 and 5986. All Linux, Unix, and
Nagios script monitors use SSH over TCP Port 22.
Roll-Up
This option allows you to choose how you would like the monitor to report
the returned results based on the output provided by the script. With the
ability to have multiple values returned, selecting how your scripts report
back to you offers more flexibility. The default selection is “Show worst
status.” For more information, see Managing the Display of Group Status” on
page 292.
Script
This field allows you to enter the script you want to run on the target node.
To enter your script, click the Edit button that reveals the script editing
window.
Script Arguments
This field is in the script editing window and allows you to specify
arguments to pass to the script. You may include the variables ${IP},
${USER}, and ${PASSWORD}, which are replaced respectively by the IP
address of the target node, the credential user name, and the credential
password.
Body
382
Chapter 13: Building Component Monitors and Templates
This field is in the script editing window and allows you to enter your script
via typing or pasting.
User Notes
This field allows you to add notes for easy reference. You can access this
field by using the variable, ${UserNotes}. For more information, see
“Configuring SolarWinds SAM Alerts"
Creating a Windows Script Monitor
You can create a Windows Script monitor to have SolarWinds SAM run a script
using Windows Script Host. Windows Script Host comes with VBScript and
Jscript, but can be extended with other scripting languages.
Scripts run on the SolarWinds SAM server and use the credentials you specify.
The script must both return an exit code and output a text string containing a
statistic value conforming to the specifications described later in this section.
Note: Format the Statistic value to use the same decimal separator as the
SolarWinds SAM server. The SolarWinds SAM server uses the decimal separator
set by its Microsoft Windows regional settings.
To adapt an existing Visual Basic script to a Windows Script Monitor in a
new template:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a New Template underneath Application Monitor Templates.
Type a name for your template in the Template Name field.
If you want to turn on extended debug information to assist Customer
Support, expand Advanced and then set Debug loggingOn and specify
the Number of log files to keep. Here you can also select either 32bit or
64bit from the drop down list entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer
Support.
7. Click Add Component Monitor.
8. Expand the Custom Component Monitors group, and then check WindowsScript Monitor.
9. Click Submit.
383
Macros for Script Arguments
10. Select credentials with the appropriate permissions to run the script on the
SolarWinds SAM server, and that also has appropriate permissions to do
whatever else the script requires.
11. Copy the Visual Basic script into the Script Body field.
12. Type any script arguments into the Script Arguments field.
13. Specify the critical and warning thresholds.
14. Click Submit.
Macros for Script Arguments
Specify script arguments in the Script Arguments field if needed. You can use the
following variables as script arguments:
${IP}
This is replaced with the target node’s IP Address.
${USER}
This is replaced with the user name from the credential set.
${PASSWORD}
This is replaced with the password from the credential set.
Scripts Must Report Status Through Exit Codes
Scripts must report their status by exiting with the appropriate exit code:
Exit Code
Meaning
0
Up
1
Down
2
Warning
3
Critical
Any other value Unknown
For example, if you want to inform SolarWinds SAM that a VBScript reports Up
status, you would exit the script using code similar to the following, where 0
reports Up:
Wscript.quit(0)
384
Chapter 13: Building Component Monitors and Templates
Scripts with Text Output
Scripts report additional details by sending text to the script’s standard output.
SAM supports multiple values returned by a script using the following format.
Statistic.Name1: xMessage.Name1: abc
Statistic.Name2: yMessage.Name2: abc
Detail
Type
Required Meaning
Statistic
Yes
Message No
A numeric value used to determine how the monitor
compares to its set thresholds. This must be an integer
value, (negative numbers are supported).
Statistic.Name1: 123Statistic.Name2: 456
An error or information message to be displayed in the
monitor status details. Note: Multi-line messages are
supported. To use this functionality print each line using
a separate command. For example:
Message.Name1: abc
Message.Name2: def
There is a limit of ten Statistic and Message pairs for the script. These can be
placed anywhere in the script output. The Statistic and Message names you give
must contain valid letters and/or numbers.
Sample output:
# Script comment: This shows two pairs. Ten pairs are possible.
Statistic.CPU: 31.08Message.CPU: svchost.exe cpu usage
Statistic.RAM: 1234.56Message.RAM: svchost.exe ram usage
Example Scripts
Below is a sample vbscript that returns two values; the total number of files in a
folder, and twice the total number of files in the same folder. The code that
represents these two values are bold, To use this script, copy and paste the
385
Example Scripts
following code into the Script Body field. In the Scripts Arguments field, type in
C:\Windows, or any other folder you want to monitor.
Option Explicit
On Error Resume Next
Dim lstArgs, path, fso, objDir, objFiles, objFiles2
Set lstArgs = WScript.Arguments
If lstArgs.Count = 1 Then
path
= Trim( lstArgs( 0 ))
Else
WScript.Echo "Message: Usage: wscript.exe filelist.vbs [pathToFiles]"
&vbCRLF &"[pathToFiles] Local or UNC Path"
WScript.Echo "Statistic: 0"
WScript.Echo "Message: Usage: wscript.exe filelist.vbs [pathToFiles]"
&vbCRLF &"[pathToFiles] Local or UNC Path"
WScript.Echo "Statistic: 0"
WScript.Quit( 1 )
End If
Set fso = Wscript.CreateObject( "Scripting.FileSystemObject" )
If fso.FolderExists( path ) Then
Set objDir = fso.GetFolder( path )
If( IsEmpty( objDir ) = True ) Then
WScript.Echo "Message: Object Not Initialized"
WScript.Echo "Statistic: 0"
WScript.Quit( 1 )
End If
Set objFiles = objDir.Files
If( IsEmpty( objFiles ) = true) Then
WScript.Echo "Message: Object Not Initialized"
WScript.Echo "Statistic: 0"
WScript.Quit( 1 )
End If
386
Chapter 13: Building Component Monitors and Templates
WScript.Echo "Message.Total: " & CInt( objFiles.Count ) & " files in this
folder."
WScript.Echo "Statistic.Total: " & CInt( objFiles.Count )
WScript.Echo "Message.Twice: " & CInt( objFiles.Count*2 ) & " = twice the
number of files in this folder."
WScript.Echo "Statistic.Twice: " & CInt( objFiles.Count*2 )
WScript.Quit( 0 )
Else
WScript.Echo( "Message: Folder Not Found" )
WScript.Echo "Statistic: 0"
WScript.Quit( 1 )
End If
There are several examples of Windows Script component monitors included in
templates. These include: File Count, File Modified, LDAP Connection Monitor,
Run 3rd Party Application, and Windows Event Log Count.
Sample scripts are installed on your SolarWinds SAM server, in the folder:
C:\Program Files\
SolarWinds\Orion\APM\SampleScriptMonitors\WindowsScripts
For another example of a Windows Script component monitor, see “Monitoring
Large Directories” on page 162.
Creating a Nagios Script Monitor
This component uses SSH to upload a Nagios script to a Linux/Unix server, runs
the Nagios script on the server and then processes the script's exit code and text
output. This monitor has the ability to return multiple values.
Note: A maximum of 10 output pairs can be returned. If you exceed the maximum
allowed, remove the excess output pairs or they will simply be ignored.
Return Codes
Nagios determines the status of a host or service by evaluating the return code.
The following table shows a list of valid return codes, along with their
corresponding service or host states.
387
Field Descriptions
Return Code Service State Host State
0
OK
Up
1
Warning
Up or Down/Unreachable†
2
Critical
Down/Unreachable
3
Unknown
Down/Unreachable
___________________
† If the Use Aggressive Host Checking option is enabled, return codes of 1 will result in a host
state of DOWN, otherwise return codes of 1 will result in a host state of UP.
Your Nagios script must exit with a valid return code and a line of text output. The
exit code determines the status of the component. If the exit code is 0 (OK), the
component status may be further modified by thresholds from the optional
statistics. To return up to ten optional statistics, separate the statistics from the
status message with the pipe (|) symbol using the following syntax:
statusMessage [|'statisticName'=value]
Below is an example of valid output with a status message and two statistics:
The script ran. | 'CPU%'=75.2 'MemoryRemainingInKB'=600784
Statistic
The statistic for this component monitor is the value returned by the script. For
more information, see http://nagios.sourceforge.net/docs/3_0/pluginapi.html.
Field Descriptions
Description
This field provides a default description of the monitor. You have the ability
to override the default description by adding to or replacing the text, which
will then be automatically saved. The variable to access this field is
${UserDescription}. For more information, see “Configuring SolarWinds
SAM Alerts"
Component Type
This describes the type of monitor you are using.
Enable Component
388
Chapter 13: Building Component Monitors and Templates
This option determines whether or not the component is enabled. Disabling
this component leaves it in the application as deactivated and does not
influence application availability or status.
Authentication Type
Select Username and Password or Username and Private Key. For more
information, see "Certificate Credentials Library" on page 340.
Credential for Monitoring
Select a credential that can access the Linux or Unix server over SSH and that
has sufficient rights to run scripts. If the credential you need is not already present
in the credentials list, use the Quick Credentials section to add a new credential.
Certificates are also supported. For more information, see "Certificate Credentials
Library" on page 340.
Port Number
This field allows you to specify the port number used for the SSH
connection. The default value is 22.
Script Working Directory
This field allows you to specify the working directory of the script process.
Check Type
This determines how the return code is evaluated.
Status Roll-Up
This option allows you to choose how you would like the monitor to report
based on the output provided by the script. The default selection is “Show
worst status.” For more information, see “Managing the Display of Group
Status" on page 292.
Command Line
This field is in the script editing window and allows you to specify the shell
command run after the SSH connection is established. The default
command line value perl ${SCRIPT} arg1 arg2 attempts to run in a Perl
interpreter the script defined in the Body field using the parameters arg1
arg2.
Note: The length of the Command Line field is limited to 266 characters for
Solaris systems, minus the length of the ${SCRIPT} variable after being
resolved to a file name such as the following: APM_937467589.pl. Since
the length of the file name will typically be around 16 characters, this means
389
Creating a Windows PowerShell Monitor
that the actual user Command Line input cannot be longer than 266 – 16, or
250 characters (not including the length of the 9 characters for the
“${SCRIPT}” variable itself). If you need to pass a longer command line to
the target node, you can create a shell script on the target node (for
example: myscript.sh) that contains the long command line and place the
call to this script in the Command Line field, for example: /opt/sw/myscript.sh
Body
This field is in the script editing window and allows you to enter your script
via typing or pasting.
User Notes
This field allows you to add notes for easy reference. You can access this
field by using the variable, ${UserNotes}. For more information, see
“Configuring SolarWinds SAM Alerts"
Creating a Windows PowerShell Monitor
With this, you can create a monitor that runs a Windows PowerShell script to
monitor specific performance information for troubleshooting a Windows process
that may be having issues.
Note: A maximum of 10 output pairs can be returned. If you exceed the maximum
allowed, remove the excess output pairs or they will simply be ignored.
What needs to be monitored:
The process you want to monitor is lsass.exe, which enforces security on the
system for users who are logging on, changing passwords, and so forth. In
particular, you want to monitor the average number of read operations performed
to check for spikes.
You decide to use the Windows PowerShell monitor to run a PowerShell script
that uses the Get-WmiObject call to measure the average ReadOperationCount
for the lsass.exe process and monitor its value.
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a New Template underneath Application Monitor Templates.
Type a name for your template in the Template Name field, for example
Lsass.exe PowerShell Monitor.
6. If you want to turn on extended debug information to assist Customer
Support, expand Advanced and then set Debug logging On and specify
390
Chapter 13: Building Component Monitors and Templates
7.
8.
9.
10.
11.
12.
the Number of log files to keep.
Here you can also select either 32bit or 64bit from the drop down list
entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer Support.
Click Add Component Monitor.
Expand the Custom Component Monitors group, and then check Windows PowerShell Monitor.
Click Add..
Select the Credential for Monitoring with appropriate permissions to run
the script on the SolarWinds SAM server, and that also has appropriate permissions to do whatever else the script requires (in our case, to get the
average number of read operations performed on the target node).
Select the Execution Mode to use:
l Local Host can run scripts only locally, that is, on the SolarWinds
SAM server.
l Remote Host can execute scripts remotely (on the remote target
node to which the Windows PowerShell monitor is assigned) using
the Windows Remote Management (WRM) system component. WRM
should be configured separately to get it working with the Windows
PowerShell monitor.
Copy the following PowerShell script, which uses the Get-WmiObject call
to measure the average ReadOperationCount for the lsass.exe process,
into the Script Body field:
$avg = Get-WmiObject win32_process -ComputerName '${IP}' Credential '${CREDENTIAL}' | Where-Object {$_.Name -eq
"lsass.exe" } | Measure-Object -property ReadOperationCount Average;
Write-Host 'Statistic: ' $avg.Averageexit(0)
The PowerShell code does the following:
a. Reads the average ReadOperationCount information for the process
lsass.exe from the computer whose IP address is specified by the variable ${IP}using the credential specified by the variable
${CREDENTIAL}.
Note: The user name from the Credential for Monitoring that is
specified is stored automatically in the ${CREDENTIAL} variable by
the monitor. Therefore the ${CREDENTIAL} variable should not be
391
What needs to be monitored:
placed in the Script Arguments field, since it is set automatically.
When the script is run by powershell, since no password has been
provided, it prompts for a password and the password from the
Credential for Monitoring that is specified is provided automatically by
the Windows Powershell monitor.
b. Writes the statistic information gathered by the script.
c. Exits the script.
Note: The script does no error checking.
13. Enter the following Script Arguments:
Use the token ${IP}and the IP address will be filled in with the IP address
of the target node. You can then access the value in the script body using
the variable ${IP}.
For example, if you type the following for Script Arguments:
${IP}
the PowerShell script will be able to access the IP address for the target
node using the variable ${IP} in the script body.
14. Select Run the script under specified account to enable impersonation
with the component's credentials. (This works only in local script execution
mode.)
15. Select Count Statistic as Difference to change the statistic to be the difference in query values between polling cycles.
16. Change the Statistic Warning Threshold to greater than 800.
17. Change the Statistic Critical Threshold to greater than 1000.
18. Click Set test node.
19. Browse the tree view, select the desired target node for the PowerShell
script, and then click Select.
20. Click Test.
21. If the test fails, see “Troubleshooting the Lsass.exe PowerShell Monitor.”
22. If the test passes, click Submit.
23. Click All in the Select tag to filter by list.
24. Locate the Lsass.exe PowerShell Monitor. Beneath the listed templates,
locate the Page control. Click the right arrow twice to scroll to page 3.
25. Click the check box next to Lsass.exe PowerShell Monitor.
26. Click Assign to Node.
27. Expand the tree view and select the target node which you tested the script
with in step 18.
28. Click Next.
392
Chapter 13: Building Component Monitors and Templates
29. Since you already assigned credentials and tested them in the template,
check the check box next to Inherit credentials from template.
30. Click Test to confirm the credentials and component monitor against the
test node.
31. Click Assign Application Monitors.
32. Click Done.
Troubleshooting the Lsass.exe PowerShell Monitor
Verify that you are entering the user name and password of an administrator-level
account. If you think you have entered an incorrect credential, correct the mistake
and then retest.
Make sure that the RPC server is available and that the Windows PowerShell
execution policy is not set to Restricted (the default setting). You can check the
execution policy by entering the following command at the PowerShell command
prompt:
Get-ExecutionPolicy
If you are having trouble using the Windows PowerShell Monitor, see the
following KB article for some useful tips:
http://knowledgebase.solarwinds.com/kb/questions/2203
Using Application Monitor Templates
This section discusses the many operations you can perform in SolarWinds SAM
regarding the use and management of Application Monitor templates. The topics
include:
l
l
l
l
l
l
l
l
Scanning Nodes for Applications
Manually Assign Application Monitors
Creating New Templates
Copying Templates
Exporting and Importing Templates Locally or Using Thwack
Deleting Templates
Managing Component Monitors within Templates
Tagging Templates
Scanning Nodes for Applications
SolarWinds SAM can scan nodes for you and automatically assign the
Application Monitors it deems suitable for each scanned node. You control the
393
To use the application discovery:
nodes to be scanned, the application templates used in the scan, and the
scanning parameters that determine a match.
To use the application discovery:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Scan Nodes for Applications.
Follow the instructions in the Select Nodes Wizard.
Follow the instructions in the Select Applications Wizard.
Follow the instructions in the Enter Credentials Wizard.
Follow the instructions in the Review & Start Scan Wizard.
Follow the instructions in the Add UX Monitors Wizard.
Select Nodes
Click [+] in the list to expand the node groups and to select the nodes you want to
scan.
Select Applications
To keep the time it takes to scan to a minimum, we recommend you initially scan
for only a limited number of application templates. To see more application
templates, select a different template group from the Show Only list.
To adjust the template assignment criteria, expand Advanced Scan Settings
and move the slider to the desired setting:
Exact Match
All the components must match to assign the template.
Strong Match
Most of the components must match to assign the template.
Partial Match
Some of the components must match to assign the template.
Minimal Match
At least one component must match to assign the template.
394
Chapter 13: Building Component Monitors and Templates
Enter Credentials
Some application templates require credentials either to access restricted
resources, or to run within the context of a specific user. To scan for these
templates, add the necessary credentials to the list. If a template you are scanning
for requires credentials, the credentials in this list are tried in the order in which
they appear.
Warning: Credentials are tried several times over the course of a scan, so an
incorrect password is likely to lock out an account. To avoid potential account
lockouts that affect actual users, we recommend you create and use service
accounts. A service account is an account that is created specifically for the
purpose of providing credentials to use for SolarWinds monitoring. With service
accounts, no actual user is affected by an account lockout if a password should
be entered incorrectly.
If you have domains sharing user names with different passwords, we
recommend you run separate application discoveries for each domain.
Review & Start Scan
Review the summary for the scan. If the automatic discovery matches templates
that are already assigned to the node, by default the template is not assigned a
second time. If you want to assign duplicate templates, select Yes, Assign
Anyway from the Do you want to assign duplicates list.
Click Start Scan to begin the scan. The scan runs in the background. You are
notified by a message near the top of the window when scanning is completed.
Click View results to see the results of the scan.
Add UX Monitors
You cannot scan for user experience (UX) monitors, but you can assign them to
nodes manually. Adding monitors from this page does not affect your scan.
Manually Assign Application Monitors
The quickest way to assign Application Monitors to nodes is through the Add
New Application Monitors Wizard, but you can also assign them through the
Manage Templates page.
To assign a template using the wizard:
1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click the Applications tab.
395
To assign a template through the Manage Application Monitor Templates page:
3. Click SAM Settings.
4. Click Manually Assign Application Monitors.
5. Select the Application Monitor template you want to apply, and then click
Next.
6. Select the server node or nodes to which you want to apply the Application
Monitor template, and then click Next.
7. If suitable credentials already exist, choose the credential from the
Choose Credential list.
8. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
9. Click Test to test the credentials and component monitors against the test
node.
10. If the test fails, troubleshoot the problem based on the error messages, and
then retest the node.
11. If the test passes, click Assign Application Monitors.
To assign a template through the Manage Application Monitor Templates
page:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Select the tag by which to filter the templates.
Check the check box next to the template you want to assign.
Click Assign to Node.
Select the server node or nodes to which you want to apply the Application
Monitor template, and then click Next.
If suitable credentials already exist, choose the credential from the
Choose Credential list.
If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
Click Test to test the credentials and component monitors against the test
node.
If the test fails, troubleshoot the problem based on the error messages, and
then retest the node.
If the test passes, click Assign Application Monitors.
Review the information for the assigned Application Monitor and then click
Done.
396
Chapter 13: Building Component Monitors and Templates
Creating New Templates
SolarWinds SAM allows you to create new templates by bundling component
monitors together. There are two ways of creating a template from scratch. The
traditional method allows you to create any kind of template. The browsing
method only creates templates monitoring services, processes, and performance
counters.
Creating New Templates Using the Traditional Method:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a new template.
Type a name for your template in the Template Name field.
Specify the values for the Polling Frequency and Polling Timeout fields.
Note: Setting a polling frequency below 30 seconds can result in erratic
monitor behavior.
7. If you want to turn on extended debug information to assist Customer
Support, expand Advanced and then turn Debug logging On and specify
the Number of log files to keep. Here you can also select either 32bit or
64bit from the drop down list entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer
Support.
8. Click Add Component Monitor.
9. Expand the component groups and check all the component monitors you
want to add.
Note: You can select multiple component monitors of the same type to be
added by entering a number in the field next to the check box for the
component monitor and then checking the check box.
10. Click Submit.
11. Configure the component monitor settings, and then click Submit.
Creating New Templates Using the Browsing Method:
1.
2.
3.
4.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Component Monitor Wizard.
397
Managing Templates
5. Select the component monitor type that you want to browse, then click
Next.
6. Type the IP address of the node you want to browse, or click Browse and
select the node from the list.
7. If suitable credentials already exist, choose the credential from the
Choose Credential list.
8. If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
9. Click Next.
10. If you selected a performance counter monitor type, select a performance object from Performance Object to populate the list.
11. Check the check boxes next to one or more found items to add as a component monitor.
12. Click Next.
13. Configure the component monitor properties, and then click Next.
Note: You can specify the name of a specific process to monitor by
entering the name in the Process Name field.
14. Select New Application Monitor Template.
15. Type a name for your template in the Application Monitor Template
Name field.
16. Click Next.
17. If you want to assign the template to nodes, select the nodes.
18. If you only want to create the template, do not select any nodes.
19. Click Next, and then click OK, Create.
Managing Templates
You can create a new template or manage existing templates by using the
commands on the SAM Settings page:
l
l
l
l
l
l
l
Creating Templates
Assign to Node
Editing Templates
Copying Views
Exporting and Importing Templates Locally or Using Thwack
Deleting Templates
Tagging Templates
398
Chapter 13: Building Component Monitors and Templates
Creating Templates
You can create a new template by specifying the name of the template and then
adding the desired component monitors.
To create an application template:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Create New Template.
See “Creating New Templates Using the Traditional Method” for information on
completing the new template.
Assign to Node
You can create an assigned Application Monitor by assigning template(s) to
nodes.
To create an assigned Application Monitor by assigning template(s) to
nodes:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Check the check box for the template(s) you want to assign.
Click Assign to Node.
Specify the node(s) to monitor and then click Next.
If suitable credentials already exist, choose the credential from the
Choose Credential list.
If suitable credentials do not exist, choose <New Credential> from the
Choose Credential list, and then add the new credential by filling out the
credential details.
Click Test to test the credentials and component monitors against the test
node.
If the test fails, troubleshoot the problem based on the error messages, and
then retest the node.
If the test passes, click Assign Application Monitors.
399
Editing Templates
Editing Templates
You can modify an existing template by adding or removing its component
monitors. You can then save it to a new template by changing the template name
if desired.
To edit an application template:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Check the application template you want to edit, and then click Edit.
If you are creating a new template by modifying an existing template,
specify the name for your new template in the Template Name field.
7. Specify the values for the Polling Frequency and Polling Timeout fields.
Note: Setting a polling frequency below 30 seconds can result in erratic
monitor behavior.
8. To turn on extended debug information to assist Customer Support,
expand Advanced and then set Debug logging On and specify the Number of log files to keep. Here you can also select either 32bit or 64bit from
the drop down list entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer
Support.
9. Click Add Component Monitor.
10. Expand the component groups and check all the component monitors you
want to add.
Note: You can select multiple component monitors of the same type to be
added by entering a number in the field next to the check box for the
component monitor and then checking the check box.
11. Click Submit.
12. Remove component monitors if desired by clicking Delete.
13. Configure the component monitor settings, and then click Submit.
Multi-Edit Templates
Multiple component monitors within a template can be edited simultaneously. As
indicated by the toolbar, multiple monitors can be selected to: Assign
Credentials, Test, Set Test Node, Disable, and Delete. The monitors selected
400
Chapter 13: Building Component Monitors and Templates
do not to be of the same type when performing a multiple monitor edit. When
performing a multiple monitor edit, the correct buttons will become enabled and/or
disabled based on your selection.
The Multi-Edit button allows you to change the options of two or more monitors of
the same type, simultaneously. To enable the Multi-Edit button, two or more
monitors of the same type must be selected. Once multiple monitors of the same
type are selected, the Multi-Edit button becomes enabled. In the illustration
below, three monitors (Services) are checked and the Multi-Edit button is
enabled:
Once the Multi-Edit button is pressed, a pop-up window is dispalyed with editing
options specific to the type of monitor selected. For example, the Fetching Method
for the three Services selected can be changed from RPC to WMI, as shown
below:
Note: Different types of monitors will have different options available for editing.
Ordering Components
Beginning in SAM 5.5, you now have the ability to re-order the components within
a template. When editing a template, the green arrows to the right of each
component monitor, highlighted below, will allow you to change the order of each
monitor. This new order is respected only on the All Applications resource and
the Application Details resource.
401
Copying Templates
Copying Templates
After successfully creating a complicated template, instead of having to recreate it
over for a similar application, consider copying the template. This will allow you to
only modify those properties that differ.
To copy an application template:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Check the application template you want to copy, and then click Copy.
Exporting and Importing Templates Locally or Using Thwack
You can export and import templates to and from your file system for your own
use, or to the SolarWinds community site (thwack.com) where templates can be
shared with the network engineering community.
Note: thwack.com import and export operations require Internet connectivity to
thwack.com and thwack.api.solarwinds.com. In addition, thwack export
operations require a valid thwack.com user account.
To export a template:
1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click the Applications tab.
3. Click SAM Settings.
402
Chapter 13: Building Component Monitors and Templates
4. Click Manage Templates.
5. If you want to export a template to a file, complete the following procedure:
a. Check the application template you want to export, and then click
Import/Export > Export as File.
b. Confirm that you want to save the file by clicking Save.
c. If you are prompted for a path, specify or browse to one and then click
Save.
6. If you want to export the template to thwack.com, complete the following procedure:
a. Click Share Now to open a browser to the Application Monitor Templates area of thwack, where you can upload your newly exported
application template.
b. Click Sign in and then type your thwack.com user name and password.
c. Click Upload a File and then specify the file pathname to your newly
exported application template.
To import a template from a file:
1.
2.
3.
4.
5.
6.
7.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Click Import/Export > Import.
Click Browse and select the template file, then click Open.
Click Submit.
Note: If you import a template with the same name as one of your existing
templates, the name of the imported template is modified by appending (n)
to the name, where n is an integer. For example, assume you save the template named Tomcat Server Template (shipped with SAM) to a file. If you
then import the saved template Tomcat Server Template from the file, the
imported template is renamed as Tomcat Server Template (1). If you
import the same template again, the next imported template is named Tomcat Server Template (2), and so on. This renaming protects you from accidentally overwriting an existing template.
To import a template from thwack:
1.
2.
3.
4.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Shared thwack templates.
403
Deleting Templates
5. Check the template(s) you want to import, and then click Import. Then enter
your thwack User Name and Password and click Log In.
6. A dialog is displayed informing you that the import operation was successful. Click Close to close the dialog or click View Imported Templates
to view the results.
Note: If you import a template with the same name as one of your existing
templates, the name of the imported template is modified by appending (n)
to the name, where n is an integer. For example, assume you save the template named Tomcat Server Template (shipped with SAM) to a file. If you
then import the saved template Tomcat Server Template from the file, the
imported template is renamed as Tomcat Server Template (1). If you
import the same template again, the next imported template is named Tomcat Server Template (2), and so on. This renaming protects you from accidentally overwriting an existing template.
Deleting Templates
If you no longer need a template, you can delete it. Deleting a template also
deletes all the data associated with it, so ensure you no longer need either the
template or the associated data before deleting the template.
Notes:
l Deleting a template also deletes all of its assigned applications, both modified and unmodified.
l To speed user interface interaction, data is not immediately removed from
the database, but systematically updated every few minutes in the background.
To delete a template:
1.
2.
3.
4.
5.
6.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Check the template(s) you want to delete, and then click Delete.
Confirm you want to delete the template(s) by clicking Yes.
Tagging Templates
Tags are descriptive labels that help you classify and sort your application
templates on the Manage Application Monitor Templates page. The application
templates included in SolarWinds SAM have already been tagged with several
descriptive labels you can modify as you see fit.
404
Chapter 13: Building Component Monitors and Templates
To add tags:
1.
2.
3.
4.
5.
6.
7.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Select the templates you want to tag.
Click Tags.
If you want to add existing tags, follow these instructions:
d. Click Add existing tag(s).
e. Select the tags from the list.
8. If you want to add new tags, follow these instructions:
a. Click Add new tag(s).
b. Type the tags in the Add new tag(s) field, separating multiple tag
entries with commas.
9. Click Submit.
To remove tags:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Manage Templates.
Select the templates you want to tag.
Click Tags.
Click Remove tag(s).
Select the tags from the list.
Click Submit.
Understanding Component Monitors and Application Monitor Templates
The following terms are used throughout this guide to describe the SolarWinds
SAM concepts that allow you to monitor your applications.
Component Monitors
Component monitors are the building blocks of SolarWinds SAM. Each
monitors the status and performance of a different aspect of an application.
There are several different types of component monitors, each containing
settings that define what is monitored and how to monitor it.
405
Understanding Component Monitors and Application Monitor Templates
Some types of component monitors allow you to set threshold conditions on
the monitored parameters. You can set separate thresholds to indicate
warning and critical conditions. For example, if you are monitoring the
percentage of free space remaining on a volume, you can set a warning
threshold at 15%, and a critical condition at 5%.
As an analogy, pretend SolarWinds SAM is monitoring a car. You would
have component monitors to check tire pressure, engine RPM, water
temperature, battery voltage, and other important subsystems of that vehicle.
You can set alerts to give notification if the water gets too hot, or if the
battery voltage drops too low.
Application Monitor Templates
A template is a group of component monitors modeling the total availability
and performance level of an application. A complicated application such as
Windows Server may require dozens of component monitors to accurately
assess its current status and performance.
Instead of creating component monitors one-by-one for every application
server, you can assign a pre-made template. The template can either be
one included with SolarWinds SAM, or a custom template you make
yourself. For example, you can assign the included Microsoft Windows
Server 2003-2008 template to your Windows 2003 and Windows 2008
computers and obtain vital statistics on all of them.
A template is only a blueprint and does not perform any monitoring on its
own. Only after assigning the template to a server node are active assigned
component monitors created.
To continue the car analogy, pretend you want to monitor a fleet of 50, 2010,
blue Dodge Charger automobiles. Instead of defining the component
monitors for 50 cars, you can define all the component monitors in a Dodge
Charger template.
Assigned Component Monitors
Assigned component monitors are created by assigning Application Monitor
templates to server nodes. Each actively monitors its assigned node
according to its settings. Component monitors inherit these initial settings
from the template. If you make a change to a template, that same change is
rolled out to all assigned Application Monitors based on the template.
You can override the template settings at any time, breaking the inheritance
relationship between the component monitor and its template. For example,
406
Chapter 13: Building Component Monitors and Templates
the user name and password usually differ for each node, and you would
select a different credential for each assigned Application Monitor, thus
overriding the template setting for the Credentials field.
To restore the inheritance relationship between a component monitor and
its template, click Inherit From Template next to the setting.
Continuing the car analogy, when you assign the Dodge Charger template
to a Dodge Charger vehicle, you now have a set of assigned component
monitors for monitoring the vehicle’s tire pressures, engine RPM, and so
forth.
Assigned Application Monitors
An assigned Application Monitor runs its assigned component monitors at
regular intervals, and then uses the status results from the component
monitors to determine an overall status for the application.
If some of the component monitors are up and others are down, the
Application Monitor follows the Status Rollup Mode setting in the
SolarWinds Web Console Settings to show either the worst status of the
group or a warning status.
The difference between an assigned Application Monitor and a template is
that the template is only a blueprint and does not perform any monitoring on
its own. Only after assigning the template to a server node does SolarWinds
SAM conduct any actual monitoring on the node.
To complete the car example, you assign the Dodge Charger template to all
the Dodge Charger vehicles to create the assigned Application Monitor for
determining the overall status for your Dodge Charger fleet. For example,
the fleet may be 95% available at a given time due to warnings for some of
the cars.
Requirements for Component Monitors and Templates that use WMI
Microsoft Windows by default uses a random port between 1024 and 65535 for
WMI communications. You must create firewall exceptions to allow TCP/UDP
traffic on ports 1024 - 65535 or the component monitors and templates that use
WMI will not work.
The following component monitors use WMI:
407
Requirements for Component Monitors and Templates that use WMI
l
l
l
l
l
l
Performance Counter Monitor
Process Monitor – WMI (if script uses WMI access)
Windows Event Log Monitor
Windows PowerShell Monitor (if script uses WMI access)
Windows Script Monitor
Windows Service Monitor (if script uses WMI access)
The following templates use WMI:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Active Directory 2003-2008 Services and Counters
Active Directory 2008 R2 - 2012 Services and Counters
Apache (Windows)
APC PowerChute Agent (Windows)
AppInsight for Exchange
AppInsight for IIS
AppInsight for SQL
BizTalk Server 2010-2013 Adapters Performance Counters
BizTalk Server 2010-2013 Host Throttling Performance Counters
BizTalk Server 2010-2013 Message Box and Orchestrations Performance
Counters
BlackBerry Delivery Confirmation
Blackberry Enterprise Server
BlackBerry Enterprise Server 10 Services (Windows)
CiscoWorks LAN Management Solution
Citrix XenApp 5.0 Core WMI counters
Citrix XenApp 5.0 ICA Session WMI counters
Citrix XenApp 5.0 Presentation Server WMI counters
Citrix XenApp 5.0 Services
Citrix XenApp 6.0 Core counters
Citrix XenApp 6.0 ICA Session
Citrix XenApp 6.0 Presentation Server
Citrix XenApp 6.0 Services
Distributed File System (DFS)
Errors in Application Event Log
Exchange 2007 Client Access Role Counters (Advanced)
Exchange 2007 Edge Transport Role Counters (Advanced)
Exchange 2007 Hub Transport Role Counters (Advanced)
Exchange 2007 Mailbox Role Counters (Advanced)
Exchange 2007 Unified Messaging Role Counters (Advanced)
Exchange 2007-2010 Client Access Role Services and Counters (Basic)
Exchange 2007-2010 Common Performance Counters
Exchange 2007-2010 Edge Transport Role Service and Counters (Basic)
408
Chapter 13: Building Component Monitors and Templates
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Exchange 2007-2010 Hub Transport Role Service and Counters (Basic)
Exchange 2007-2010 Unified Messaging Role Service and Counters
(Basic)
Exchange 2010 Client Access Role Counters (Advanced)
Exchange 2010 Edge Transport Role Counters (Advanced)
Exchange 2010 Hub Transport Role Counters (Advanced)
Exchange 2010 OWA Form Login (PowerShell)
Exchange 2010 Unified Messaging Role Counters (Advanced)
Exchange 2013 Client Access Role Counters (Advanced)
Exchange 2013 Client Access Role Services and Counters (Basic)
Exchange Active Sync Connectivity
Exchange Server 2000 and 2003
File Count Script
GoodLink Server for Microsoft Exchange
Group Policy Object (System and Application Logs)
Helix Universal Media Server (Windows)
Internet Information Service (IIS) 6
JD Edwards EnterpriseOne Server Manager (Windows)
Kaspersky Security Center Antivirus
Kiwi Syslog Server
Log Parser (PowerShell)
Microsoft DirectAccess 2008 R2
Microsoft DirectAccess 2012
Microsoft DirectAccess 2012 R2
Microsoft DirectAccess 2012-2012 R2 (Health with PowerShell)
Microsoft Dynamics CRM 4.0 Events
Microsoft Dynamics CRM 4.0 Statistics
Microsoft Dynamics CRM 2011 Events
Microsoft Dynamics CRM 2011 Statistics
Microsoft Forefront Endpoint Protection 2010 Client
Microsoft Forefront Endpoint Protection 2010 Server
Microsoft Forefront Threat Management Gateway 2010
Microsoft IIS SMTP Server
Microsoft Lync Server 2013 (Edge Role)
Microsoft Lync Server 2013 (Front-End Role)
Microsoft Lync Server 2013 (Mediation Role)
Microsoft Lync Server (Edge Role)
Microsoft Lync Server (Front-End Role)
Microsoft Lync Server (Mediation Role)
Microsoft Message Queuing Events
Microsoft Message Queuing Performance
409
Requirements for Component Monitors and Templates that use WMI
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Microsoft Network Policy Server Events
Microsoft Network Policy Server RADIUS Proxy
Microsoft Network Policy Server RADIUS Server
Microsoft Routing and Remote Access 2008-2012 R2
Microsoft Routing and Remote Access 2008-2012 R2 (Events)
Microsoft System Center Configuration Manager 2012
Microsoft System Center Operations Manager 2012 (Agent)
Microsoft System Center Operations Manager 2012 (Management Server)
Microsoft Windows Internet Name Service (WINS) Events
Microsoft Windows Internet Name Service (WINS) Statistic
Microsoft Windows Server 2003 Failover Cluster
Microsoft Windows Server 2008 Failover Cluster
Microsoft Windows Server 2008 R2-2012 R2 Failover Cluster (Advanced)
Microsoft Windows Server 2012 Failover Cluster
Microsoft Windows Server 2012-2012 R2 Failover Cluster
MongoDB (Windows)
Novell GroupWise Message Transfer Agent (Windows)
Novell GroupWise Post Office Agent (Windows)
Office 365 User Statistics with PowerShell
Orion Server
Remote Desktop Services Licensing
Server Clock Drift (PowerShell)
SharePoint Server 2010
SharePoint Server 2013
SharePoint Server (MOSS) 2007
SharePoint Services (WSS) 3.0
SolarWinds Failover Engine
SolarWinds NetFlow Traffic Analyzer
SolarWinds Web Performance Monitor (WPM) Player
SQL Server 2005 Analysis Services
SQL Server 2008 Analysis Services
SQL Server 2008 R2 Reporting Services
SQL Server 2008 Reporting Services
SQL Server 2008-2012 Reporting Services (Events)
SQL Server 2012 Analysis Services
SQL Server 2012 Reporting Services
Squid (Windows)
Streaming Media Services 2008
Symantec Backup Exec Remote Agent
Symantec Backup Exec Server
Symantec Endpoint Protection Client
410
Chapter 13: Building Component Monitors and Templates
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Symantec Endpoint Protection Server
Symantec NetBackup Client
Symantec NetBackup Server
Terminal Licensing Server
Trend Micro OfficeScan Client
Trend Micro OfficeScan Server
Trend Micro Server Protect (Windows)
UniData Database (Windows)
Veeam Backup and Replication Server
VMware vCenter Server 5.5
Websense Web Security
Windows 2003-2008 FTP Service
Windows 2008 R2 - 2012 FTP Service
Windows DHCP Server
Windows DNS Server
Windows Network Load Balancing
Windows Print Services
Windows Remote Desktop Services (Session Host Role)
Windows Server 2003 Domain Controller Security
Windows Server 2003-2012 Services and Counters
Windows Server 2008-2012 Domain Controller Security
Windows Update Monitoring
Monitoring External Nodes
To monitor services and applications on a server you do not directly manage, add
the server to the Orion database as an external node. External nodes skip all
network performance data collection and polling tasks, but allow you to assign
applications to them.
For example, you could add www.google.com as an external node, and then
assign several HTTP monitors to monitor Google search results.
For more information, see “" on page 176.
Custom Application Monitor Template Example:
Creating a SolarWinds SAM Template
The following procedure creates a SolarWinds SAM Application Monitor template
that monitors a locally installed SQL Server instance. The template is simplified
by using the Windows Service component monitors, a TCP port monitor for your
411
To create a SolarWinds SAM application template:
SQL Server, and an HTTP monitor for the local Web Console. You do not need to
know the specific names of the processes, and you are not limited to a single
process per application. With Server & Application Monitor you can group
multiple component monitors into a single application and monitor these
groupings as one mission critical application.
While completing this procedure, you will create an application template with the
following component monitors:
l
l
TCP port component monitor to monitor port 1433, the port through which
SolarWinds communicates with the SQL Server.
Service component monitors for the following windows services:
l SolarWinds Alerting Engine
l SolarWinds Network Performance Monitor
l SolarWinds Job Engine
l SolarWinds Job Scheduler
l SolarWinds Module Engine
l SolarWinds Syslog Service
l SolarWinds Trap Service
HTTP component monitor to monitor port 80, the port through which you access
the SolarWinds Web Console.
To create a SolarWinds SAM application template:
1.
2.
3.
4.
5.
Log on to your SolarWinds Web Console with an Administrator account.
Click the Applications tab.
Click SAM Settings.
Click Create a new template underneath Application Monitor Templates.
Type a name for your template in the Template Name field. For example,
type SolarWinds SAM.
6. If you want to turn on extended debug information to assist Customer
Support, expand Advanced, set Debug logging On, and specify the Number of log files to keep.
Here you can also select either 32bit or 64bit from the drop down list
entitled, Platform to run polling job on.
Note: Do not turn on Debug logging unless directed by Customer
Support.
7. Click Add Component Monitor.
8. Expand the Network Protocol Component Monitors list, and then check
TCP Port Monitor.
412
Chapter 13: Building Component Monitors and Templates
9. Click Submit.
10. Click Rename and then type a name for the TCP port monitor. For
example, type SolarWinds SAM SQL Server Port. Then click OK.
11. Ensure the Port Number field corresponds to the port used to communicate with the SolarWinds SAM SQL Server instance. By default, this
is port 1433.
12. Click Add Component Monitor.
13. Expand the Process and Service Component Monitors, and then check
Windows Service Monitor and click Submit.
14. Click Rename and then type a name for the SolarWinds Alerting Engine
monitor. For example, type SW Alerting Engine. Then click OK.
15. Select the credential set you want to use when accessing the Windows service information. For more information about creating a credential set, see
“Understanding the Credentials Library” on page 341.
16. Type the name of the SolarWinds Alerting Engine service in the Net
Service Name field.
Note: This field is the Service name of the service to monitor. You can find
the Service name on Windows systems by clicking Start > Administrative
Tools > Services and then locating the desired service. Right-click the
service and select Properties from the context menu. The Service name is
the value of the Service name field in the Properties dialog. For the
SolarWinds Alerting Engine, this is typically SolarWindsAlertingEngine.
17. Repeat Steps 12 through 16 for the following SolarWinds SAM Windows
services:
l SolarWinds Network Performance Monitor
l SolarWinds Job Engine v2
l SolarWinds Job Scheduler
l SolarWinds Module Engine
l SolarWinds Syslog Service
l SolarWinds Trap Service
18. Click Add Component Monitor.
19. Expand the User Experience Component Monitors list, and then check
HTTP Monitor.
20. Click Rename and then type a name for the HTTP port monitor. For
example, type SolarWinds Web Console. Then click OK.
21. Ensure the Port Number field corresponds to the port you use for the
SolarWinds Web Console port.
22. Click Submit.
413
Web Service Monitoring
Web Service Monitoring
For custom web services that need to be monitored, SAM offers the ability to
utilize the following technologies:
l
l
JSON: JavaScript Object Notation (JSON) is an open standard format that
uses human-readable text to transmit data objects consisting of attribute–
value pairs. It is used primarily to transmit data between a server and web
application, as an alternative to XML.
Note: Inserted JSON content cannot exceed 1MB in size.
SOAP: Simple Object Access Protocol (SOAP) is a protocol used for
exchanging information in the implementation of web services in computer
networks. It relies on XML for its message format, and usually relies on other
application layer protocols. The SOAP monitor is useful if you have custom
web services that need to be monitored.
Note: Currently, the SOAP monitor within SAM can return a status of either
Up or Down, or return a status of Warning or Critical based on response
time thresholds. This monitor also has the ability to search for the presence
of a string.
For more information, see:
l
l
l
l
l
Component Monitor Types
SOAP Monitor
HTTP Monitor
HTTPS Monitor
JSON
JMX Component Monitor Wizard
Creating a standard template for this monitor is not practical because of the
amount of variables in any one specific environment. However, adding this
monitor to your environment has been made simple with the use of a wizard
driven interface.
Note: Only values that return numerical data can be monitored. String data is not
supported at this time. Non-numerical data will be shown without a check box.
To add a JMX component monitor, perform the following steps:
1. Log on to your SolarWinds Web Console with an Administrator account.
2. Click Settings in the upper right hand corner of the web page.
414
Chapter 13: Building Component Monitors and Templates
3.
4.
5.
6.
Click SAM Settings.
Click Component Monitor Wizard underneath Getting Started with SAM.
Select JMX Monitor from the drop down list then click Next.
For Server IP Address, click Browse, then select the node you want to
monitor.
7. Add the Port number, Protocol type, URL path, and Credentials for the
remaining fields.
8. Click Next. The following MBean selection screen appears:
9. Expand the folders by clicking the arrows (or [+]) to expand the tree view
folder structure. From here you can drill down to select the attributes you
want by checking them.
10. Click Next.
Now you are able to edit the JMX Component Monitor properties.
l
l
For more information, see JMX Monitor
For more information, see JMX
Available Data Transformations
SolarWinds SAM provides a number of predefined transformation functions that
may be applied to one or more monitors to generate mathematically manipulated
results. The following table lists transformation functions that are currently
available in SolarWinds SAM:
415
Available Data Transformations
Data
Transformation
Syntax
Definition
Euler’s Number
E()
Euler’s number, commonly called
the number e, is defined as the
base of the natural logarithm as the
limit of a certain sequence, or as the
sum of a certain series.
Pi
Pi()
Pi is the mathematical constant
whose value is the ratio of any
circle's circumference to its
diameter.
Rounding
Round({value},
{number of
decimal places})
Provides a number that is rounded
to the specified number of digits.
Truncate
Truncate({value},
{number of
decimal places})
Truncates a monitored value to a
designated number of decimal
places.
Square Root
Sqrt({value})
Provides the square root of a given
number.
Exponentiation
Pow({base
Provides the result from repeated
value}, {exponent multiplication of the base number.
value})
Temperature:
Celsius to
Fahrenheit
CToF({value})
Provides the Fahrenheit result
originally presented in Celsius
Temperature:
Fahrenheit to
Celsius
FToC({value})
Provides the Celsius result
originally presented in Fahrenheit
X to Kilobyte
XToKilo({value})
Provides the number of Kilobytes
originally presented in Bytes
416
Chapter 13: Building Component Monitors and Templates
X to Megabyte
XToMega
({value})
Provides the number of Megabytes
originally presented in Bytes
X to Gigabyte
XToGiga({value})
Provides the number of Gigabytes,
originally presented in Bytes
X to Terabyte
XToTera({value})
Provides the number of Terabytes,
originally presented in Bytes
Kilobyte to
Megabyte
KiloToMega
({value})
Provides the number of Megabytes,
originally presented in Kilobytes
Kilobyte to
Gigabyte
KiloToGiga
({value})
Provides the number of Gigabytes,
originally presented in Kilobytes
Kilobyte to
Terabyte
KiloToTera
({value})
Provides the number of Terabytes,
originally presented in Kilobytes
Megabyte to
Gigabyte
MegaToGiga
({value})
Provides the number of Gigabytes,
originally presented in Megabytes
Megabyte to
Terabyte
MegaToTera
({value})
Provides the number of Terabytes,
originally presented in Megabytes
Gigabyte to
Terabyte
GigaToTera
({value})
Provides the number of Terabytes,
originally presented in Gigabytes
Terabyte to
Kilobyte
TeraToKilo
({value})
Provides the number of Kilobytes,
originally presented in Terabytes
Terabyte to
Megabyte
TeraToMega
({value})
Provides the number of Megabytes,
originally presented in Terabytes
Terabyte to
Gigabyte
TeraToGiga
({value})
Provides the number of Gigabytes,
originally presented in Terabytes
Conversion Value
Some monitors now offer the option to mathematically convert returned values
through the use of Data Transformations.
417
Conversion Value
Checking the Convert Value check box opens the Formula box that enables you
to perform various mathematical functions. You can choose common functions
from the drop down lists to manipulate the returned value, or you can select the
Custom Conversion option.
The Custom Conversion option offers more flexibility when manipulating
returned values. This option allows you to use the basic arithmetic operators; +, -,
*, /, along with built-in functions for more advanced conversions.
For a list of these functions, see “Available Data Transformations" on page 415.
Following is a real world example for converting bytes into megabytes using a
predefined formula, or data transformation. In this case, XtoMega, was used to
convert bytes to megabytes.
With the XtoMega formula applied, the data transforms from 318767104 bytes to
304 megabytes, which is much easier to read.
Note: The Retrieve Current Value button tests the application and does not
apply the data transformation. Instead, the original statistic value will be returned.
418
Chapter 14:
Asset Inventory
The Asset Inventory dashboard allows you to maintain a current and detailed
inventory of your environment's hardware and software. Automatic inventory data
collection will benefit those interested in tracking asset depreciation, gathering
information for insurance purposes, or managing and maintaining your
infrastructure.
The following resources are available for the Asset Inventory dashboard:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Custom Asset Information
Drivers
Firmware
Graphics and Audio
Hard Drives
Hosted Virtual Machines
Logical Volumes
Memory
Network Interfaces
Operating System Updates Applied
Out of Band Management
Peripherals
Ports and USB Controllers
Processors
Removable Media
Software Inventory
Storage Controllers
System Information
Windows Update Information
Note: Certain information may not be available for certain nodes. This may be
due to the polling method used or a lack of data provided by the manufacturer.
For additional information on Asset Inventory, see:
l
l
Asset Inventory Requirements
Third Party Software Required for Asset Inventory Information
419
Chapter 14: Asset Inventory
l
l
l
Asset Inventory Data Collection
Enabling the Asset Inventory Dashboard
Viewing the Asset Inventory Dashboard
Asset Inventory Requirements
Asset inventory data collection can be enabled for both physical and virtual
assets and functions independently of hardware health monitoring. This means
you do not need to have hardware health monitoring enabled to have inventory
data collected and displayed.
The following hardware supports Asset Inventory data collection:
l
l
l
l
Dell servers with OpenManage Server Administrator Managed Node v7.2 or
later
HP servers with HP System Insight Manager v6.2 or later
IBM server with IBM Director (Common Agent, v6.3 or later)
Additional hardware not listed here may be supported with a limited amount
of information returned from the polling process.
The Asset Inventory feature supports the following operating systems and
protocols and does not count against your SAM component monitor license.
Additionally, these nodes must be managed by SAM to enable collection of Asset
Inventory data:
Operating System
Protocol
Windows
SNMP, WMI
Linux
SNMP
AIX (v7 and higher)
SNMP
VMware ESX/ESXi v4.x and v5.x
l
l
l
VMware API for ESX/ESXi hosts
polled via vCenter.
CIM
VMware API
SNMP for VMware nodes not polled
via CIM or the VMware API
HTTPS
420
Third Party Software Required for Asset Inventory Information
Third Party Software Required for Asset Inventory
Information
HP
l
l
l
HP ESXi Offline Bundle
HP Management Agents for VMware ESX 4.x Only (Not for ESXi 4.x)
HP ESXi Offline Bundle for VMware ESXi 5.0
HP/VMWare
l
l
l
HP Management Agents for VMware ESX 4.x Only (Not for ESXi 4.x)
HP Insight Management WBEM Providers for ESXi 5.0
HP ESXi Offline Bundle for VMware ESXi 5.0
Dell/VMWare
l
OpenManage Support for VMware ESXi 5.x
IBM
l
IBM Director v6.2x
VMWare
l
l
l
l
HP Management Agents for VMware ESX 4.x Only (Not for ESXi 4.x)
HP Insight Management WBEM Providers for ESXi 5.0
HP ESXi Offline Bundle for VMware ESXi 5.0
Dell OpenManage Support for VMware ESXi 5.x
Asset Inventory Data Collection
Asset Inventory data collection is automatically enabled during the Network
Sonar Discovery and/or the upgrade process.
Data collected for Asset Inventory purposes uses less than 100KB of database
space per node. For a larger environment consisting of roughly 1,000 servers, the
total Asset Inventory data should total just under 100MB.
Note: Required sub-views are enabled by default for nodes with Asset Inventory
enabled. For more information, see "Customized SAM Tabbed Sub-Views" on
page 170.
Inventory data does not need to be collected with the same degree of regularity as
status information, therefore, the impact on your polling engine will be minimal.
421
Chapter 14: Asset Inventory
Asset Inventory data collection occurs once daily. This data collection interval
can be configured to suit your needs.
To Change the Default Asset Inventory Collection Period:
1. From the web console, navigate to Settings > Orion Polling Settings.
2. Adjust the number of days for the Default Asset Inventory Poll Interval field.
Note: 1 is the minimum allowable value for this field.
3. Click Submit.
Enabling the Asset Inventory Dashboard
The Asset Inventory sub-view is automatically displayed for each node supported.
You can enable Asset Inventory data collection for an individual node via the Add
Node Wizard or by navigating through the Management resource.
Note: The Asset Inventory option is available only if the node supports Asset
Inventory polling.
To Enable Asset Inventory data collection via the Add Node Wizard:
1. Navigate to Settings > Add Node.
2. From the Add Node wizard, the option to display Asset Inventory is available after a node has been defined. Check the Asset Inventory box to
enable Asset Inventory data collection.
To Enable Asset Inventory data collection via the Management Resource:
1. Navigate to the Node Details view by clicking any node.
2. From the Management resource, click List Resources.
3. Check the Asset Inventory box to enable Asset Inventory data collection.
422
Viewing the Asset Inventory Dashboard
Note: The option to display Asset Inventory information may not be available if the node does not have a supported operating system.
To Disable Asset Inventory Data Collection:
l
For existing nodes, you can disable Asset Inventory data collection by
executing the following SQL command:
UPDATE [SolarWindsOrion].[dbo].[AssetInventory_Polling] set Enabled
= 0;
l
To disable this for future nodes added, rename the following file:
C:\Program Files (x86)
\SolarWinds\Orion\Discovery\Plugins\SolarWinds.AssetInventory.Disc
overy.plugin
For example: SolarWinds.AssetInventory.Discovery.plugin-Disabled
Viewing the Asset Inventory Dashboard
The Asset Inventory Dashboard is comprised of various resource modules and
provides detailed insight about the selected asset. The dashboard information
can be found on a separate sub-view tab, as shown:
423
Chapter 14: Asset Inventory
Navigating to the Asset Inventory page:
1. Click any node to be taken to the Node Details page.
2. With sub-views enabled, click the Asset Inventory tab.
For more information, see Customized SAM Tabbed Sub-Views
All Asset Inventory resources contain a blue icon in the upper left-hand corner of
the resource. This will allow you to better identify this as an Asset Inventory
resource should you decide to place individual resources on different views.
Both the titles and subtitles of each resource can be changed by clicking Edit in
the upper right-hand corner of any resource.
Resources for the Asset Inventory dashboard can be added and deleted by
clicking Customize Page in the upper right-hand corner of the web console.
Notes:
l
l
If no information can be collected for a particular resource, that resource will
become hidden for that node.
Clicking the title of any resource will open that resource in a new window.
Custom Asset Information
This resource allows you display custom properties you have created relating to
Asset Information.
Following is an example of how this can be used:
424
Drivers
l
l
l
l
InServiceDate: Displays the first day of service for the asset
PONumber: Displays the Purchase Order number for the asset.
PurchaseDate: Displays the purchase date of the asset.
PurchasePrice: Displays the purchase price of the asset.
To add custom properties and have them displayed in this resource:
1. In the Custom Asset Information resource, click Edit.
2. Click Use the Custom Property Editor.
3. Follow the steps of the Wizard.
4. If available, check Asset Inventory to have the item displayed in the Custom Asset Information resource.
Drivers
This resource displays driver software currently installed on the current node
while providing a search window. The data can be sorted by clicking the headers
of each column.
425
Chapter 14: Asset Inventory
l
l
l
l
l
Device: Displays the device that relies on the driver listed.
Name: Displays the name of the driver listed.
Publisher: Displays the publisher of the driver listed.
Version: Displays the version of the driver listed.
Driver Date: Displays the date that the listed driver was created.
Firmware
This resource displays the firmware currently installed on the current node while
providing a search window. The data can be sorted by clicking the headers of
each column.
l
l
l
l
Name: Displays the name of the firmware listed.
Publisher: Displays the publisher of the firmware listed.
Version: Displays the version number of the firmware listed.
Release Date: Displays the release date of the version of the firmware listed.
Graphics and Audio
This resource provides detailed information about the current graphics and audio
devices associated with the node.
Note: In systems that contain multiple video cards or monitors, only the first of
each will be displayed in the Graphics and Audio resource for that node.
426
Hard Drives
l
l
Name: Displays field information about the listed graphics/audio device.
l Monitor Manufacturer – Displays the manufacturer of the current monitor.
l Monitor Model Number – Displays the model number of the current
monitor.
l Monitor Resolution – Displays the current resolution of the current
monitor.
l Video Card – Displays details about the listed video card.
l Video Chipset – Displays the current video chipset information for the
listed device.
l Video Memory - Displays the amount of memory currently installed on
the listed video card.
l Sound Card – Displays details about the installed sound card.
Details: Displays details about the current device.
Hard Drives
This resource provides information about the current hard drives associated with
the node.
l
l
l
Model: Displays the model of the listed hard drive
Serial Number: Displays the serial number of the listed hard drive.
Capacity: Displays the total storage space of the current hard drive in gigabytes.
427
Chapter 14: Asset Inventory
Hosted Virtual Machines
This resource details the amount of resources allocated to each virtual machine.
Both VMware and Hyper-V hosts can be displayed in this resource.
Note: Only VMware 4.0 and higher is supported.
l
l
l
l
l
l
l
VM Name: Displays the name of the virtual machine listed.
Operating System: Displays the operating system of the virtual machine listed.
State: Displays the on/off status of the virtual machine listed.
Memory Size: Displays the memory allocated to the virtual machine listed.
CPU Count: Displays the number of CPUs associated with the virtual
machine listed.
CPU Shares: Displays the percentage of CPU resources being used by the
listed virtual machine.
IP Address: Displays the IP address of the virtual machine listed.
For more information, see "Hardware Monitoring and VMware" on page 1086.
Logical Volumes
This resource provides detailed information about the current logical volumes
associated with the node. Volumes call be polled via all protocols except VMware
CIM for ESX hosts. Any logical volume that can be monitored by SolarWinds will
appear in this resource.
428
Memory
l
l
l
l
l
l
l
l
Name: Displays the name of the volume listed.
Type: Displays the type of volume listed.
File System: Displays the file system employed on the volume listed.
Serial Number: Displays the serial number of the volume listed.
Size: Displays the total size of the volume listed.
Space Used: Displays the amount of space used on the volume listed.
Available Space: Displays the free space on the listed volume as a number
of bytes.
% Available Space: Displays the amount of free space on the volume listed
as a percentage and a bar chart.
Memory
This resource provides detailed information about the memory associated with
the node.
Memory Summary
l
l
l
l
Total RAM: Displays the total amount of RAM on the current node.
Free RAM: Displays the total amount of free RAM on the current node.
Total Virtual Memory: Displays the total amount of virtual RAM on the current node.
Free Virtual Memory: Displays the total amount of free virtual RAM on the
current node.
429
Chapter 14: Asset Inventory
Memory Modules
l
l
l
l
Slot: Displays the slot number in the server where memory is installed.
SAM also shows empty slots that could be populated with additional
memory modules to increase the server's RAM.
Capacity: Displays the maximum available RAM installed in the current
memory slot, in megabytes.
Model: Displays the model part number which can be used for purchasing a
replacement part.
Speed: Displays the frequency on which the memory module runs, in megahertz.
Network Interfaces
This resource provides detailed information about current network interfaces
associated with the node.
l
l
l
l
Name: Displays the name and model of the listed interface. For more information about a network interface, click [+] to the left of the interface name to
expand the tree view and reveal the following information:
l NetMask: Displays the configured netmask.
l Gateway: Displays the address of the gateway.
l DHCP Server: Displays the address of the DHCP server.
l DNS Server: Displays the address of the DNS server.
Manufacturer: Displays the manufacturer of the listed interface.
MAC Address: Displays the MAC address of the listed interface.
IP Address: Displays the IP address of the listed interface.
Operating System Updates Applied
This resource displays operating system updates that have been applied on the
current node while providing a search window. The data can be sorted by clicking
the headers of each column.
Note: This resource is only visible for Windows Nodes polled via WMI
430
Out of Band Management
l
l
l
l
Name: Displays the name of the listed update. Clicking the name in this
field may take you to the website with information concerning the listed
update.
Type: Displays the type of update installed.
Install Date: Displays the date that the listed update was installed.
Installed By: Displays the user responsible for installing the listed update.
Out of Band Management
This resource provides details about out of band management controllers
installed on the node.
l
l
l
l
l
Management Card: Displays the current management card.
Type: Displays the type of the current management card.
Firmware Version: Displays the current firmware version for the listed management card.
IP Address: Displays the current IP address of the listed management card.
MAC Address: Displays the current MAC address of the listed management card.
Peripherals
This resource provides information about the current peripherals associated with
the node.
431
Chapter 14: Asset Inventory
l
l
Type: Displays the type of peripheral listed
Details: Displays details about the peripheral listed.
Ports and USB Controllers
This resource provides detailed information about the current ports and USB
controllers associated with the node.
Ports
l
l
Ports: Displays the type of port.
Number: Displays the number of ports.
USB Controllers
l
USB Controllers: Displays detailed information about the listed USB controller.
Processors
This resource provides detailed information about the processors associated with
the node.
Notes:
l
l
Some IBM nodes may not provide processor information which will result in
missing information from this resource.
If a monitored computer is running the Solaris operating system, processor
information will not be available in this resource.
432
Removable Media
Important: Data for the number of cores will not be available for computers
running Windows Server 2003 unless the following Microsoft hotfix is applied:
http://support.microsoft.com/kb/932370.
l
l
l
l
l
l
l
Processor: Lists the processors associated with the selected node.
Manufacturer: Displays the manufacturer of the listed processor.
Speed: Displays the current speed of the listed processor in gigahertz.
Cores: Displays the number of cores (CPUs) within the listed processor.
Threads: Displays the number of threads (concurrent processes) per core.
Model: Displays the processor manufacturing technology and design generation for the listed processor.
Stepping: Displays the revision number of the listed processor.
Removable Media
This resource provides information about the current removable media associated
with the node.
l
l
l
Name: Displays the name of the media listed.
Type: Displays the technology of the media listed.
Manufacturer: Displays the manufacturer of the media listed.
Software Inventory
This resource displays software currently installed on the current node while
providing a search window.
433
Chapter 14: Asset Inventory
l
l
l
l
Name: Displays the name of the software listed.
Publisher: Displays the publisher of the software listed.
Version: Displays the version of the software listed.
Install Date: Displays the date that the listed software was installed.
Storage Controllers
This resource provides detailed information about the current storage controllers
associated with the node. The data can be sorted by clicking the headers of each
column.
l
l
l
l
l
Name: Displays the name of the listed storage controller.
Model Number: Displays the model number of the listed storage controller.
Serial Number: Displays the serial number of the listed storage controller.
Firmware Version: Displays the firmware version of the listed storage controller.
Driver Version: Displays the driver version of the listed storage controller.
System Information
This resource provides a general overview of the selected node. To update the
details of this resource, click Poll Now, which forces all Asset Inventory
information to be polled immediately. To navigate to the Node Details page of the
current node, click the name of the node in the System Name field.
434
General
Note: When the listed machine is on Microsoft Hyper-V virtual hardware, certain
fields are populated with virtual machine related information. Because SAM
collects physical enclosure information from this class when using WMI, the
following fields may read as follows:
l
l
l
Manufacturer will read, "Microsoft."
Model will read, “Virtual Machine.”
Serial Number will read a GUID string.
The fields for this resource are defined as follows:
General
l
l
l
l
l
l
l
l
Last Inventory Collection: The date when SAM last collected inventory
data on the selected node.
System Name: Name of the current node.
Host Name: Name of the current host. This only applies to Windows hosts
polled via WMI
Domain/Workgroup Name: Name of the domain or workgroup this node
belongs to.
DNS: This is the DNS name of the current node. The IP address of the node
can change while the DNS name remains the same.
Domain Role: Shows the role of the current node. This only applies to Windows hosts polled via WMI
IP Address: Shows the IP address of the current node.
Dynamic IP: Shows if the current IP address is dynamic or static.
Hardware
l
l
l
l
Asset Type: Defines the current node as a specific type of hardware.
Hardware: Shows the hardware status as being either physical or virtual.
Manufacturer: Shows the company that produced this hardware.
Model: Shows the model number of the hardware as defined by the manufacturer. This only applies to physical nodes.
435
Chapter 14: Asset Inventory
l
l
l
l
Serial Number/Service Tag: Shows the serial number of the current node.
This only applies to physical nodes.
Warranty Status: Shows the warranty information about the current node
with a link to that vendor's site. This only applies to physical servers that are
Dell, HP, or IBM.
Note: One alert is included for Warranty Status:
l Alert me when a node warranty expires in 30 days - Disabled by
default.
Location: Displays the geographical location of the current node.
Device Time Zone: Shows the time zone set in the system. This only
applies to Windows nodes polled via WMI.
Operating System
l
l
l
l
l
l
l
l
l
Operating System: Shows the operating system of the current node.
OS Version: Shows the current version of the operating system.
OS Architecture: Shows the design (32-bit or 64-bit) of the operating system.
OS Language: Shows the language the current operating system is using
on the current node.
Service Pack: Displays the current service pack installed on the operating
system. This only applies to Windows nodes polled via WMI.
Last Boot: Shows the date of the last boot for the current node.
Last Logged in User: Displays the last user to log in on the current node.
This only applies to Windows nodes polled via WMI.
Firewall Status: Displays whether or not the built-in Windows firewall is currently enabled on the node. This only applies to Windows nodes polled via
WMI.
Hardware Agent: Displays the Hardware Monitoring Agent Software currently installed on the node.
Windows Update Information
This resource provides information about the current Windows update status
associated with the node. This only applies to Windows nodes polled via WMI.
436
Windows Update Information
l
l
l
l
Windows Update Status: Displays whether or not Windows Update is
enabled.
Most Recent Check for Updates: Displays the time and date of the last
successful check for updates.
Updates Last Installed: Displays the time and date of the last successful
installation of updates.
Update Method: Displays how updates are managed on the host. This
value can be Automatically Applied, Download And Notify, or Notify Only.
437
Chapter 15:
AppInsight Applications
AppInsight applications provide a level of detail and expert knowledge far beyond
what a simple template can provide, allowing you to monitor virtually every aspect
of the assigned application.
Like any unassigned application in SAM, AppInsight applications are considered
templates until applied. Therefore, it is a member of the Application Monitor
Templates collection.
Once applied to a node, AppInsight applications are considered applications.
Like any SAM application, AppInsight applications are comprised of multiple
component monitors, also known as performance counters.
Currently, SAM offers two different AppInsight Applications:
l
l
l
AppInsight for SQL
AppInsight for Exchange
AppInsight for IIS
Template/Application Relationship
The following illustration explains the Template and Application relationship and
is true for all templates, including all AppInsight applications.
Here you can see that if you change something at the template level, the
applications based on that template will be affected. Conversely, if you change
something on the application level, only the individual application will be affected.
This inheritance relationship is beneficial if you need to make a great deal of
changes quickly. For example, rather than change one item on 100 applications
that are based on a single template (which requires 100 changes), you can more
easily change the one item on the template. That one change in the template will
trickle down to all 100 applications that are based on the template.
438
Chapter 15: AppInsight Applications
Changing between 32-bit and 64-bit polling methods:
Using AppInsight applications with 32-bit polling on 64-bit computers via an agent
may prevent certain performance counters from collecting information and should
be changed to 64-bit polling.
To make this change at the application level, take the following steps:
1. From the web console, navigate to Home > Applications > Select an
AppInsight Application.
2. Click Edit Application Monitor.
3. Expand Advanced, and then click Override Template.
4. In the Platform to run polling job field, change the value to x64.
5. When done, click Submit.
439
AppInsight for SQL
To make this change at the template level, take the following steps:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Select an AppInsight application and click Edit.
3. Expand Advanced, and in the Platform to run polling job field, change
the value to x64.
Note: Applications assigned to 32-bit hosts with the x64bit option will continue to poll using 32-bit, regardless of this setting.
4. When done, click Submit.
AppInsight for SQL
SAM offers a detailed view of your SQL databases' performance without the use
of agents or templates by using the AppInsight for SQL embedded application.
AppInsight for SQL provides a level of detail and expert knowledge† far beyond
what a SQL template can provide, allowing you to monitor virtually every aspect
of your SQL instances and databases.
440
Chapter 15: AppInsight Applications
Like any unassigned application in SAM, AppInsight for SQL is considered a
template until it is applied. Therefore, it is a member of the Application Monitor
Templates collection.
Once applied to a node, AppInsight for SQL is considered an application. Like
any SAM application, AppInsight for SQL is comprised of multiple component
monitors.
AppInsight for SQL general information:
l
l
l
l
l
l
l
AppInsight for SQL Requirements and Permissions
AppInsight for SQL Licensing
Template/Application Relationship
Adding AppInsight for SQL to a Node
Editing the AppInsight for SQL Template
Understanding the AppInsight for SQL Details View
Navigating the AppInsight for SQL Details View
Information about individual AppInsight for SQL resources can be found at
the following locations:
l
l
AppInsight for SQL Details view, which is comprised of the following subviews:
l AppInsight for SQL Details View (Summary Tab)
l AppInsight for SQL Details View (Queries Tab)
l Database Details View
Performance Counter Details View
_________________
† Portions of the performance counter information used in the AppInsight for SQL application are provided courtesy of
multiple sources listed in the copyright and attribution section at the beginning of this document.
AppInsight for SQL Requirements and Permissions
AppInsight for SQL data is collected at the same default five minute polling
interval as traditional application templates. Following are the requirements and
permissions needed for AppInsight for SQL:
Important: AppInsight for SQL does not require named-pipes; however, it does
require TCP. For example, SAM uses TCP detection during discovery. You may
receive an error message pertaining to "named-pipes.“ This is the result of the the
last client protocol that is tried during connection to the SQL server.
AppInsight for SQL Requirements
AppInsight for SQL supports the following versions of Microsoft SQL Server:
441
AppInsight for SQL Permissions
Microsoft SQL Server Version Versions Supported
Microsoft SQL Server 2008
Without SP
SP1
SP2
SP3
Microsoft SQL Server 2008 R2
Without SP
SP1
SP2
Microsoft SQL Server 2012
Without SP
SP1
Microsoft SQL Server 2014
AppInsight for SQL Permissions
The minimum SQL permissions required to use AppInsight for SQL are as
follows:
l
l
l
l
l
l
l
l
Must be a member of the db_datareader role on the msdb system database.
Must have VIEW SERVER STATE permissions.
View any definition.
Connect permission to Master database.
Execute permission on the Xp_readerrorlog stored procedure.
Connect permission to the Msdb database.
Must be member of db_datareader role in the MSDB database.
Connect permission to all databases.
Notes:
l
l
AppInsight for SQL supports both the SNMP and WMI protocols and uses
SQL to gather information about the application. Additional information is
available for nodes managed via WMI.
Agents do not work with AppInsight for SQL when the SQL server being
monitored is in a cluster.
Important: This following scripts make changes directly to the database. You
should create a database backup before running either of these scripts.
442
Chapter 15: AppInsight Applications
The following script will configure permissions for a SQL account:
USE master
GRANT VIEW SERVER STATE TO AppInsightUser
GRANT VIEW ANY DEFINITION TO AppInsightUser
GRANT VIEW ANY DATABASE TO AppInsightUser
EXEC sp_adduser @loginame = 'AppInsightUser' ,@name_in_db =
'AppInsightUser'
GRANT EXECUTE ON xp_readerrorlog TO AppInsightUser
USE msdb
EXEC sp_adduser @loginame = 'AppInsightUser' ,@name_in_db =
'AppInsightUser'
EXEC sp_addrolemember N'db_datareader', N'AppInsightUser'
The following script will configure permissions for a SQL account with
Windows Authentication:
USE master
GRANT VIEW SERVER STATE TO "Domain\AppInsightUser"
GRANT VIEW ANY DEFINITION TO "Domain\AppInsightUser"
EXEC sp_adduser @loginame = 'Domain\AppInsightUser' ,@name_in_
db = 'Domain\AppInsightUser'
GRANT EXECUTE ON xp_readerrorlog TO "Domain\AppInsightUser"
USE msdb
EXEC sp_adduser @loginame = 'Domain\AppInsightUser' ,@name_in_
db = 'Domain\AppInsightUser'
EXEC sp_addrolemember N'db_datareader',
N'Domain\AppInsightUser'
EXECUTE sp_MSforeachdb 'USE [?]; EXEC sp_adduser @loginame =
''Domain\AppInsightUser'', @name_in_db =
''Domain\AppInsightUser'''
AppInsight for SQL Licensing
When using AppInsight for SQL, 50 component monitors will count against your
licensed number of component monitors per SQL instance.
For example, if you have an active license for 1,500 component monitors and
use AppInsight for SQL to monitor 88 databases over ten instances of SQL, 500
component monitors will count against your total license. The number of
databases you have on these instances is irrelevant.
(50 component monitors X 10 SQL Server instances = 500 component
monitors used.)
This will leave you with 1,000 component monitors available for use elsewhere.
443
Adding AppInsight for SQL to a Node
(1,500 component monitors – 500 component monitors used for
AppInsight for SQL = 1,000 component monitors remaining).
There is no restriction on the number of databases you can have monitored. Also
note that if you choose not to use this application, you will not be penalized any
number of component monitors.
Important: The example below illustrates a situation where you would have 40
available component monitors available, but have surpassed your allowed
number of 300 monitors by 60. The discrepancy is caused by AppInsight
application implementations. AppInsight applications are licensed as 50 monitors
per application and cannot be partially licensed, as is the case with typical
applications.
For more information, see "Licensing"
Adding AppInsight for SQL to a Node
There are multiple ways to add AppInsight for SQL to a node, via Node
Discovery, manually adding it via the Manage Application Monitor Templates
screen, adding it via the Management resource, adding it via Network Sonar
Discovery, or adding it via a Scheduled Discovery.
To Add AppInsight for SQL to a Node via Discovery:
1. From the web console, navigate to Settings > Add a Node in the Getting
Started with Orion section.
444
Chapter 15: AppInsight Applications
2. Fill out the information on the Define Node step, and then click Next.
3. On the Choose Resources step, check the AppInsight for SQL applications you want. AppInsight applications have a unique blue and white
icon, as shown. when done, click Submit:
4. Click Next and complete the wizard as instructed.
To Add AppInsight for SQL to a Node via Manage Application Templates:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
445
To Add AppInsight for SQL via the Management Resource:
2. Select AppInsight for SQL by checking its box and click Assign to Node.
3. Complete the required fields in the wizard and click Assign Application
Monitor.
To Add AppInsight for SQL via the Management Resource:
1. Navigate to the Node Details view by clicking any node.
2. From the Management resource, click List Resources.
3. Check the AppInsight for SQL box to enable AppInsight for SQL data
collection.
For information on Network Sonar Discovery, see Network Sonar Discovery.
For information on Scheduled Discovery, see Managing Scheduled Discovery
Results.
Adding a Named Instance
Tip: If you have additional pollers and want to use them to poll AppInsight for
SQL, ensure you install the additional poller software on the poller(s) that will be
used. Not doing this will take you to the List Resources page and you will not
see AppInsight for SQL.
AppInsight for SQL – Default Instances
1. Open a command prompt and ping the server, as shown below:
446
Chapter 15: AppInsight Applications
Add a Node
Next, add the node to your SolarWinds implementation. You will need the proper
permissions. To do this, take the following steps:
1. From the web console, navigate to Settings > Manage Nodes.
2. Click Add Node, as shown below:
3. Enter the IP Address (VIP of the SQL instance gathered earlier.)
4. Select a polling method.
447
Choose your Applications
5. Next, select the polling engine for that node.
Choose your Applications
1. Choose the AppInsight for SQL application, as shown:
448
Chapter 15: AppInsight Applications
Setting Properties
At this point, you can begin editing the properties of the node being added.
To change the name:
1. At the top of the form, change the name to the instance you are going to be
monitoring, as shown:
2. Additional information can be changed as desired.
3. Click OK, Add Node.
4. To view your progress, click the Applications tab from the web console
Note: This instance will be grayed until the poller has polled this node.
Once polled, it will change color.
Troubleshooting
If you are having trouble and the nodes are not being reached, check the account
used and check that it has the correct access to the server.
449
Editing the AppInsight for SQL Template
Additional Troubleshooting Resources:
l
l
l
WMI: http://www.solarwinds.com/documentation/apm/docs/APMWMITroubleshooting.pdf
SNMP: http://knowledgebase.solarwinds.com/kb/questions/314/Troubleshooting+SNMP+connectivity
Troubleshooting
Editing the AppInsight for SQL Template
The AppInsight for SQL application behaves like any other application in SAM.
And like other applications, AppInsight for SQL's template can be edited.
Note: Some limitations may apply.
Editing the AppInsight for SQL Template:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Check the AppInsight for SQL template in the list and then click Edit.
3. From here, you can edit certain component monitors within the template;
including threshold values, number of records to retrieve, component monitor description, and so on.
450
Chapter 15: AppInsight Applications
4. When done editing, click Submit at the bottom of the screen.
Understanding the AppInsight for SQL Details View
The AppInsight for SQL Details view is the equivalent of the Application Details
view of a traditional SAM application; however, there are some notable
differences:
l
Details View - Unlike a traditional Application Details view, the AppInsight
for SQL Details view is comprised of two tabs, or sub-views, that host a variety of resources and information:
o Summary Tab – This view displays an informative summary about
the current SQL instance.
o Queries Tab – This view displays details about the most expensive
queries running across all databases on the current SQL instance.
451
Editing Resources
l
l
Database Details View - This view displays details about the selected database.
Performance Counter Details View - This view displays details about the
selected performance counter.
From here, you can select from the drop down menu and choose to display
different amounts of data based on a time range, as shown below:
Editing Resources
Both the titles and subtitles of each resource can be changed by clicking Edit in
the upper right-hand corner of any resource, and then clicking Submit.
The time and date displayed at the top of each resource (where applicable)
shows the range of data currently loaded into the resource. This, along with the
Sample Interval Range, can be changed by clicking Edit from within the resource.
Additionally, certain resources will allow you to add and remove component
monitors from the resource. You can do this by clicking the Edit button, and then
checking the component monitors you want to keep.
452
Chapter 15: AppInsight Applications
Note: Pertinent data for each resource is grouped together by default.
Navigating the AppInsight for SQL Details View
AppInsight for SQL acts like any other application and can therefore be found in
the All Applications resource on the Application Summary view. By default, subviews are turned on once you navigate to the AppInsight for SQL Details page.
Below is the AppInsight for SQL application with the All Applications resource
detailed:
453
Navigating the AppInsight for SQL Details View
Navigating to the AppInsight for SQL Details View:
1. From the web console, locate the All Applications resource by clicking
either the Home or Applications tab.
2. Expand the AppInsight for SQL tree by clicking [+].
454
Chapter 15: AppInsight Applications
3. Select a SQL instance to view by clicking it.
Navigating to the Database Details view:
1. From the AppInsight for SQL Details view, click a database in the All Databases resource.
Navigating to the Performance Counter Details view:
1. From the AppInsight for SQL Details view, click a performance counter in
any resource.
455
Monitoring Clusters with AppInsight for SQL
Monitoring Clusters with AppInsight for SQL
To start monitoring a SQL server instance which is clustered, take the
following steps:
1. Connect to the instance that you want monitor using SQL Management Studio
2. Execute the following query to make sure you have the proper target node
and instance name:
SELECT SERVERPROPERTY('ServerName')
456
Chapter 15: AppInsight Applications
3. Determine the IP address of the target node (e.g. “ping P111SQLV23”)
457
Monitoring Clusters with AppInsight for SQL
4. Make sure that the node with this address is being monitored by SAM. If it is
not, add it.
Note: If the IP address represents a cluster, the node name of the active
cluster member will be populated. It is recommended that you change the
node name to something more easily understood, for example: “P111SQLV23
458
Chapter 15: AppInsight Applications
(cluster)” during
the final step of the Add Node Wizard.
5. Enter the proper information and manually assign the Appinsight for SQL
template to the node with the appropriate IP address.
6. The application should begin polling.
For more information, see How to Handle Microsoft Server Clusters in AppInsight
for SQL
AppInsight for SQL Alerts
AppInsight for SQL comes with two pre-defined alerts:
l
Alert me when my database file disk I/O latency is high
l
Alert me when my database file is running low on space
To View Alerts:
459
AppInsight for SQL Details View (Summary Tab)
1. From the web console, navigate to Home > Alerts > Manage Alerts.
2. Select the alerts you want to view from the list, or type a keyword in the text
box and click the Search button:
For more information, see:
SolarWinds SAM Alerts
Creating Alerts
Predefined Server & Application Monitor Web Console Based Reports
Adding Alerts
l
l
l
l
AppInsight for SQL Details View (Summary Tab)
The Summary tab provides a great deal of information about the current SQL
instance. The available resources unique to this view include:
l
l
l
l
l
All Databases
Application Availability
Application Details
Buffer Manager
Cache
460
Chapter 15: AppInsight Applications
l
l
l
l
l
l
l
l
l
l
l
l
Connections
Disk
Latches and Locks
Memory
Pages
Sessions
SQL Agent Job Status
SQL Errors
SQL Event Log Message Details
SQL Server
Top 10 Databases by Active User Connections
Top 10 Most Expensive Queries by CPU Time
Note: Chart resources require several values for lines on charts to be visible.
All Databases
This resource shows the status of all monitored databases on the current SQL
instance. The data can be sorted by clicking the headers of each column.
l
l
l
l
Name: Displays the name of the listed database, in addition to the current
performance status as indicated by the icon. Clicking the name of the database will take you to the Database Details page.
Status: Displays the Online or Offline status of the listed database.
Database Size: Displays the current size of the listed database.
Transaction Log Size: Displays the size of the transaction log associated
with the listed database.
Active Alerts
This resource lists details about all unacknowledged active alerts.
461
Application Availability
The following defines the three columns of this resource:
l
l
l
Time of Alert: Displays the time and date the listed alert was triggered.
Object Name: Displays the object that triggered the alert. Clicking the
object will take you to the details page for that object.
Message: Displays the message of the listed alert.
Application Availability
This resource graphically shows the various states of an application in a
percentage format and is made up of three sections: the legend, the main chart,
and the lower chart. The colors of the main chart correspond to the labels in the
legend.
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
462
Chapter 15: AppInsight Applications
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
Application Details
This resource provides tools and details concerning the current application.
l
l
l
l
l
l
l
Management: This provides tools allowing you to more easily manage and
troubleshoot the current application.
Instance Name: Displays the name of the current SQL instance.
Status: Displays the status of the current SQL instance.
SQL Server Version: Displays the version of the current SQL server.
SQL Server Product Level: Displays the maturity level of the current SQL
version.
SQL Server Edition: Displays the edition of the current SQL Server.
Clustered with: If the listed SQL Server is in a cluster, this field will show a
listing of the servers that make up the cluster. If the cluster is managed by
SAM, a status icon will become visible. If the cluster is not managed in
SAM, no status icon will be visible.
463
Buffer Manager
Buffer Manager
This resource contains performance counters specific to the current status of
buffers. The icons of the listed performance counters in the Statistic Name column
will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Total
pages
Definition:
This performance counter returns the number of pages in the
buffer pool
Information:
The returned value includes database, free, and stolen pages.
Note: This counter is not available in SQL 2012.
464
Chapter 15: AppInsight Applications
Buffer
Cache Hit
Ratio
Definition:
Indicates the percentage of pages found in the buffer cache
without having to read from disk. The ratio is the total number of
cache hits divided by the total number of cache lookups over the
last few thousand page accesses.
Information:
After a long period of time, the ratio moves very little. Because
reading from the cache is much less expensive than reading from
disk, you want this ratio to be high. Generally, you can increase
the buffer cache hit ratio by increasing the amount of memory
available to SQL Server. The higher this ratio, the less often SQL
Server has to go to the hard disk to fetch data, and performance is
boosted overall. This counter averages the Buffer Cache Hit Ratio
from the time the last instance of SQL Server was restarted. This
counter is not a real-time measurement, but an average of all the
days since SQL Server was last restarted. In OLAP applications,
the ratio could be much lower because of the nature of how OLAP
works.
Possible problems:
If the returned value is low, this could indicate that your SQL
server may not have enough memory to function at peak
performance.
Remediation:
Check your SQL server and verify its memory is being used
efficiently. Applications other than SQL may be using a great deal
of memory. Try and recover memory by closing unnecessary
applications. Installing additional memory may also help.
Lazy
Definition:
Writes/sec The lazy writer is a system process that flushes out buffers that
contain changes that must be written back to disk before the
buffer can be reused for a different page and makes them
available to user processes.
Information:
465
Buffer Manager
This counter tracks how many times per second that the Lazy
Writer process is moving dirty pages from the buffer to disk in
order to free up buffer space. The Lazy Writer eliminates the need
to perform frequent checkpoints in order to create available
buffers.
Generally speaking, this should not be a high value, say more
than 20 per second. Ideally, it should be close to zero. If it is zero,
this indicates that your SQL Server's buffer cache is large and
your SQL Server does not need to free up dirty pages.
Possible problems:
If the returned value is high, this can indicate that your SQL
Server's buffer cache is small and that your SQL Server needs to
free up dirty pages.
Remediation:
Check your SQL server and verify its memory is being used
efficiently. Applications other than SQL may be using a great deal
of memory. Try and recover memory by closing unnecessary
applications. Installing additional memory may also help.
Free List
Stalls/sec
Definition:
Indicates the number of requests per second that had to wait for a
free page.
Information:
This displays the frequency with which requests for available
database pages are suspended because no buffers are available.
Possible problems:
If the returned value is high, this indicates that not enough
memory is available for the SQL Server.
Remediation:
Check your SQL server and verify its memory is being used
efficiently. Applications other than SQL may be using a great deal
of memory. Try and recover memory by closing unnecessary
applications. Installing additional memory may also help.
466
Chapter 15: AppInsight Applications
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Cache
This resource contains monitors specific to the current status of the cache. The
icons of the listed performance counters in the Statistic Name column will change
color to reflect the listed counter's current state. Clicking any performance counter
in the Statistic Name column will take you to the Performance Counter Details
page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
467
Cache
Counter
Expert Knowledge
Cache
Definition:
Used/min This displays the number of times the cache object has been
looked up.
Information:
This is not incremented when parameterized queries find a plan in
the cache. However, this can be incremented multiple times when
using Showplan. Good plan reuse is one sign of a healthy system.
Compiling a query plan can be a CPU-intensive operation,
especially with complex queries, so reuse is encouraged.
Possible problems:
If the returned value is low, this can indicate ineffective reusing of
plan cache which could cause a CPU spike. Conversely, if the
returned value is high for a large number of plans, this could
indicate that your cache space is being taken up with plans that
were compiled and used once to execute an ad hoc query, then
never used again.
Remediation:
A database setting that can be helpful to plan reuse is forced
parameterizaton. (You can set this using the following command:
ALTER DATABASE <databaseName> SET
PARAMETERIZATION FORCED). Normally, the query optimizer
is very conservative when deciding what queries can be
parameterized, but this setting makes the optimizer be more liberal
in choosing parameters.
Cache
Object
Counts
Definition:
This performance counter returns the number of cache objects in
the cache.
Information:
The Plan Cache object provides counters to monitor how SQL
Server uses memory to store objects such as stored procedures,
ad hoc and prepared Transact-SQL statements, and triggers.
Multiple instances of the Plan Cache object can be monitored at
468
Chapter 15: AppInsight Applications
the same time, with each instance representing a different type of
plan to monitor.
Possible problems:
High numbers of total cached objects use portions of the physical
memory available to a SQL instance on a per database basis. This
can result in one database cache impacting the performance of
other local databases due to memory contention.
Remediation:
Increase the memory available to SQL services, reduce the
number of databases on this instance of SQL, or examine the
volume of ad hoc queries running against the server.
Cache
Objects
in Use
Definition:
This performance counter returns number of cache objects in use.
Information:
The Plan Cache object provides counters to monitor how SQL
Server uses memory to store objects such as stored procedures,
ad hoc and prepared Transact-SQL statements, and triggers.
Multiple instances of the Plan Cache object can be monitored at
the same time, with each instance representing a different type of
plan to monitor.
Possible problems:
High numbers of cached objects in use consume the memory
available to a SQL server at a higher rate than non-active objects
on a per database basis. This can result in one database cache
impacting the performance of other local databases due to memory
contention.
Remediation:
Increase the memory available to SQL server, reduce the number
of active objects, consolidate stored procedures, consolidate and
convert ad hoc queries to stored procedures where possible, or
reduce the number of databases on the server.
Zooming
469
Connections
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Connections
This resource contains monitors specific to the current status of the active
connections. The icons of the listed performance counters in the Statistic Name
column will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
470
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
User
Definition:
Connections The User Connections performance counter identifies the
number of different users that are connected to your SQL
Server at the time the sample was taken.
Information:
You need to watch this counter over time to understand your
baseline user connection numbers. Since each user
connection consumes some memory space, a high number of
user connections can impact throughput and cause a
performance slow-down. Once you have an idea of your high
and low thresholds during normal usage of your system, you
can then look for times when this counter exceeds these high
and low marks.
Possible problems:
If the returned value of this counter goes down and the load on
the system remains stable, you might have a bottleneck that is
not allowing your server to handle the normal load. Keep in
mind that this counter value might go down just because less
people are using your SQL Server instance. If you see this
number jump by 500% from your baseline, you may be seeing
a slowdown of your server activity.
Remediation:
You may want to boost the SQL Server configuration setting,
Maximum Worker Threads to a figure higher than the default
setting of 255. The setting for Maximum Worker Threads
should be higher than the maximum number of user
connections your server ever reaches.
Logins/sec
Definition:
This performance counter returns the total number of logins
started, per second, and does not include pooled connections.
Information:
Opening and closing connections is an expensive process. A
471
Connections
pooled connection is one which is kept open by an application
for other requests to re-use.
Possible problems:
If the returned value is high, this can indicate that the
application is not correctly using connection pooling.
Remediation:
Review the Connection Polling configuration.
Logout/sec
Definition:
This performance counter returns the total number of logout
operations started, per second.
Information:
Opening and closing connections is an expensive process.
When applications do not use a connection pool, each request
needs to establish its own connection before the query can be
executed. It then has to close it. A pooled connection is one
which is kept open by an application for other requests to reuse.
Possible problems:
If the returned value is high, this can indicate that the
application is not correctly using connection pooling.
Remediation:
Review the Connection Polling configuration.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
472
Chapter 15: AppInsight Applications
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Disk
This resource contains monitors specific to the current status of the disk. The
icons of the listed performance counters in the Statistic Name column will change
color to reflect the listed counter's current state. Clicking any performance counter
in the Statistic Name column will take you to the Performance Counter Details
page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Average Disk
sec/Read
Definition:
This performance counter shows the average time, in
seconds, of a read of data from the disk.
473
Disk
Information:
The returned value indicates the average time of read data
from the disk. 4-8ms is ideal. The returned value is
considered acceptable up to 20ms. Any higher value needs
further investigation.
Possible problems:
If a value greater than 15-20ms is reported, this may indicate
disk bottlenecks.
Remediation:
Increase the number of hard disks.
Average Disk
sec/Write
Definition:
This performance counter shows the average time, in
seconds, of a write of data to the disk.
Information:
The returned value indicates the average time of write data
from the disk. 4-8ms is ideal. The returned value is
considered acceptable up to 20ms. Any higher value needs
further investigation.
Possible problems:
Values greater than 15-20ms nay indicate disk bottlenecks.
Remediation:
Increase the number of hard disks.
Forwarded
Definition:
Records/Batch This performance counter identifies the use of a pointer
Requests
which has been created when variable length columns have
caused a row to move to a new page in a heap.
Possible problems:
Rows with Varchar columns can experience expansion
when Varchar values are updated with a longer string. In the
case where the row cannot fit in the existing page, the row
migrates and access to the row will traverse a pointer. This
474
Chapter 15: AppInsight Applications
only happens on heaps (tables without clustered indexes).
Remediation:
Evaluate clustered indexes for heap tables. In cases where
clustered indexes cannot be used, drop non-clustered
indexes, build a clustered index to Reorg pages and rows,
drop the clustered index, then recreate non-clustered
indexes.
Forwarded
Records/sec
Definition:
This performance counter returns the number of records
fetched through forwarded record pointers.
Information:
Tables without a clustered index. If you start with a short row,
and update the row creating a wider row, the row might not fit
on the data page. A pointer is put in its location and the row
is forwarded to another page.
Possible problems:
Look at the code to determine where the short row is inserted
followed by an update.
Remediation:
Can be avoided by:
1. Using default values so that an update does not result
in a longer row that is the root cause of forwarded
records.
2. Use Char instead of Varchar. This fixes the length so
that an update does not result in a longer row.
Physical Disk
Time
Definition:
This performance counter returns the ratio of elapsed time
when the disk drive was busy with read or write requests.
Information:
This performance counter is deceptive because it makes no
accommodation for multiple spindles. Thus, the more
spindles (i.e. physical hard disks) you have, the higher the
475
Latches and Locks
percentile values can go. Conversely, if these spindles are
shared across LUNs or other services, you may have high
numbers on this counter without any correlation to SQL
Server activity. The value for this counter should be below
50%.
Possible problems:
If this performance counter sustains an average above 70%,
you may have contention with your drive or RAM.
Remediation:
You should increase number of hard drives used by SQL
server.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Latches and Locks
This resource measures the time it takes for latches and locks to perform various
operations.
Latches perform the task of thread synchronization. For example, if a thread is
reading a page from disk and creating a memory structure to contain it, it will
create one or more Latches to prevent corruption of these structures. Once the
operation is complete, the Latches will be released and other threads will be able
to access that page and memory structure again. For the most part, latches are
transient, taking a few milliseconds to complete.
A Lock prevents different users from overwriting each other's changes. Generally
speaking, a lock will last for the duration of the transaction.
476
Chapter 15: AppInsight Applications
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Latch
Waits/sec
Definition:
This performance counter displays the number of latch
requests that could not be granted immediately.
Total Latch
Wait
Time/Latch
Waits
Definition:
This performance counter returns the ratio of Total Latch Wait
Time, in milliseconds, for latch requests in the last second to
amount of latches, in a one second period that had to wait.
Latches are lightweight means of holding a very transient
server resource, such as an address in memory.
477
Latches and Locks
Information:
This ratio should be less than 10. Monitoring the latches to
determine user activity and resource usage can help you to
identify performance bottlenecks.
Possible problems:
If the returned value is high, it is likely there is an I/O or
memory bottleneck.
Remediation:
Check your SQL server and verify its memory is being used
efficiently. Applications other than SQL may be using a great
deal of memory. Try and recover memory by closing
unnecessary applications. Installing additional memory may
also help.
Lock
Definition:
Requests/sec This performance counter returns the number of requests for a
type of lock, per second.
Possible problems:
If the returned value is high, this can indicate that the queries
are accessing large numbers of rows. If you notice a high
Average Wait time, then this could be an indication of
blocking.
Information:
Blocking is an unavoidable characteristic of any relational
database management system (RDBMS) with lock-based
concurrency. On SQL Server, blocking occurs when one
Server Process ID (SPID) holds a lock on a specific resource
and a second SPID attempts to acquire a conflicting lock type
on the same resource. Typically, the time frame for which the
first SPID locks the resource is very small. When it releases
the lock, the second connection is free to acquire its own lock
on the resource and continue processing. This is normal
behavior and may happen many times throughout the course
of a day with no noticeable effect on system performance.
478
Chapter 15: AppInsight Applications
Remediation:
High Read queries should be reviewed. The simple way to fix
locking is just kill the connection that is causing the lock.
Fixing locking, blocking, and deadlocking issues is often a
matter of redesign. You should examine either the schema of
your database and/or the way the application is designed.
One of the most efficient ways to deal with locking is to ensure
that the design of your system does not have to deal with
excessive locks. The best way to do this is to normalize your
tables, using more atomic structures that allow the query to get
in and get out faster. Another method is to code with the locks
in mind. If the design requires less normalization, you will
have to evaluate the programs to ensure that they have the
right isolation levels.
Lock
Waits/sec
Definition:
This performance counter reports the number of times users
waited to acquire a lock over the past second.
Information:
Note that this counter only gets incremented only when you
“wake up” after waiting on the lock.
Possible problems:
Non-zero values indicate that there is at least some level of
blocking occurring. If you combine this with the Lock Wait
Time counter, you can get some idea of how long the blocking
lasted. A zero value for this counter can definitively rule out
blocking as a potential cause.
Remediation:
High Read queries should be reviewed.
Lock
Timeouts/sec
Definition:
This performance counter returns the number of lock requests
per second that have timed out, including internal requests for
NoWait locks.
479
Latches and Locks
Information (timeout_period):
This is the number of milliseconds that will pass before
Microsoft SQL Server returns a locking error. A value of -1
(default) indicates no time-out period (that is, wait forever).
When a wait for a lock exceeds the time-out value, an error is
returned. A value of 0 means to not wait at all and return a
message as soon as a lock is encountered.
Possible problems:
If you see a value above 0 for this counter, your users will
experience problems as their queries are not completing.
Remediation:
You should review your queries to determine which queries
are causing this situation.
Lock Wait
Time
Definition:
This performance counter displays the total time spent waiting
across all transactions, in milliseconds, to acquire a lock in the
last second.
Information:
Though this counts how many milliseconds SQL Server is
waiting on locks during the last second, this counter actually
starts recording at the end of locking event. Peaks most likely
represent one large locking event.
Possible problems:
If the returned value is greater than 60 seconds (60,000ms)
then there may be extended blocking which could be an
issue.
Remediation:
Thoroughly analyze the blocking script output. Some
applications are written for timing out after 60 seconds.
Because SQL Server records a lock at the end of a locking
event, remember that an application with large transactions
may have inflated lock wait times while still performing as
480
Chapter 15: AppInsight Applications
expected. For example, an application that issues multimillion record updates might have very long lock wait times
while performing exactly as it was designed.
Average
Latch
Wait Time
Definition:
This performance counter reports the average latch wait time,
in milliseconds, for latch requests that had to wait.
Information:
SQL Server two lightweight mutual exclusion solutions—
Latches and Spinlocks—which are less robust than locks but
are less resource intensive. The value of this counter should
generally correlate to Latch Waits/sec and move up or down
with it accordingly.
Possible problems:
If you see this number jump above 300, you may have
contention for your server's resources. High values for this
counter could potentially block other users.
Remediation:
You should examine tasks currently waiting using the
following command: sys.dm_os_waiting_tasks DMV.
Average
Lock Wait
Time
Definition:
This performance counter reports the average amount of Wait
time, in milliseconds, for each lock request that resulted in a
wait.
Information:
Generally speaking, the lower the value, the better. This value
should correlate to the Lock Waits/sec counter and move up or
down with it accordingly.
Possible problems:
An average wait time longer than 500ms may indicate
excessive blocking.
Remediation:
You should determine which queries are generating locks to
481
Memory
identify where the blocking is originating.
Total Latch
Wait Time
Definition:
Total latch wait time (in milliseconds) for latch requests in the
last second.
Information:
Short term light weight synchronization object. Latches are not
held for the duration of a transaction. Typical latching
operations during row transfers to memory, controlling
modifications to row offset table, and so on.
Possible problems:
If high, check Perfmon Disk and Memory objects for:
l
l
I/O bottlenecks
Memory pressure
Remediation:
This can be mitigated by adding more memory or I/O capacity.
Zooming:
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Memory
This resource displays the current status of SQL Server memory. The icons of the
listed performance counters in the Statistic Name column will change color to
reflect the listed counter's current state. Clicking any performance counter in the
Statistic Name column will take you to the Performance Counter Details page for
that counter.
482
Chapter 15: AppInsight Applications
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Total Server
Memory
Definition:
This performance counter measures the current amount of
memory that SQL Server is using.
Information:
If the value of this counter continues to grow larger, the server
has not yet reached its steady state and is still trying to populate
the cache and get pages loaded into memory. Performance will
likely be somewhat slower if this value continually grows larger
since more disk I/O is required. This behavior is normal.
Eventually Total Server Memory should approximate Target
Server Memory.
Possible problems:
483
Memory
If the Total Server Memory counter is greater than or equal to
the Target Server Memory counter, this can indicate that your
SQL Server may be under memory pressure.
Remediation:
Installing additional memory into your SQL server should
resolve the problem.
Target
Server
Memory
Definition:
This monitor measures the total amount of dynamic memory the
server can consume.
Information:
This performance counter tells you how much memory SQL
Server would like to use to operate efficiently. Compare with
Total Server Memory.
Possible problems:
If the Total Server Memory counter is greater than or equal to
the Target Server Memory counter, this could indicate that your
SQL Server may be under memory pressure.
Remediation:
Installing additional memory into your SQL server should
resolve the problem.
Target Total Server
Memory
Definition:
This performance counter shows the difference between the
total amount of dynamic memory the server can consume and
the current amount of memory that SQL Server is using.
Possible problems:
If this performance counter is greater than or equal to the Target
Server Memory performance counter, this indicates that SQL
Server may be under memory pressure.
Remediation:
Installing additional memory into SQL server should resolve the
problem.
484
Chapter 15: AppInsight Applications
SQL Cache
Memory
(KB)
Definition:
This performance counter measures the total amount of
dynamic memory the server is using for the Dynamic SQL
cache.
Information:
Most memory used by SQL Server is allocated to the Buffer
Pool, which is used to store data pages. SQL Server steals a
proportion of this memory for use in caching query plans. The
overall amount of memory available to SQL Server depends
upon the amount of memory installed on the server, the
architecture of the server, the version and edition of SQL Server
and the amount of memory pressure being experienced by SQL
Server. This pressure can be internal (SQL Server resources
need memory) or external (operating system needs memory).
SQL Server is designed to respond to memory pressure when
necessary.
Possible problems:
Memory contention with the buffer pool.
Remediation:
Increase memory available to SQL server.
Lock
Memory
Definition:
This performance counter returns the total amount of dynamic
memory the server is using for locks.
Information:
Lock pages in memory is used to prevent older versions of
Windows and SQL from allowing Windows operating
system page out of the buffer pool.
Possible problems:
Lock pages in memory determines which accounts can use a
process to keep data in physical memory, which prevents the
system from paging the data to virtual memory on disk.
Exercising this privilege could significantly affect system
performance by decreasing the amount of available random
485
Memory
access memory (RAM).
Remediation:
Upgrade to Windows 2008 R2 or greater and SQL 2008 or
greater.
Granted
Workspace
Memory
Definition:
This performance counter returns the total amount of memory
currently granted to executing processes, such as Hash, Sort,
Bulk Copy, and Index creation operations.
Information:
This performance counter tells you how much memory has
currently been granted to running queries. If there is memory
pressure because of workspace memory, this value should be
at least 25% of the virtual memory available to SQL Server.
Possible problems:
If the memory pressure is severe, the server might return errors
such as 701 or 8645.
Remediation:
If this is the case, this might be a good reason to consider using
SQL Server 64-bit.
Optimizer
Memory
Definition:
This performance counter returns the total amount of dynamic
memory the server is using for query optimization.
Information:
There are no thresholds associated with this performance
counter.
Connection
Memory
Definition:
This monitor returns the total amount of dynamic memory the
server is using for maintaining connections.
Information:
486
Chapter 15: AppInsight Applications
SQL Server sets aside three packet buffers for every connection
made from a client. Each buffer is sized according to the default
network packet size specified by the sp_configure stored
procedure. If the default network packet size is less than 8KB,
the memory for these packets comes from SQL Server's buffer
pool. If it is 8KB or larger, the memory is allocated from SQL
Server's MemToLeave region. It is worth noting that the default
network packet size for the .NET Framework Data Provider for
SQL Server is 8KB, so the buffers associated with managed
code client connections typically come from SQL Server's
MemToLeave region. This contrasts with classic ADO
applications, where the default packet size is 4KB, and the
buffers are allocated form the SQL Server buffer pool.
Memory
Grants
Pending
Definition:
This monitor returns the total number of processes waiting for a
workspace memory grant.
Information:
Memory resources are required for each user request. If
sufficient memory is not available, the user waits until there is
adequate memory for the query to run.
Possible problems:
Returned values greater than zero for a sustained period of time
is a very strong indicator of memory pressure.
Remediation:
You should first examine the database design, queries, and
indexes to ensure the system is properly tuned before installing
additional RAM. There may be query inefficiencies in the
instance that is causing excessive memory grant requirements.
For example, large Sorts or Hashes that can be resolved by
tuning the indexing or queries being executed.
Compare with Memory Grants Outstanding. If the number of
pending grants increases, try the following:
l
l
Add more memory to SQL Server
Add more physical memory to the server.
487
Memory
l
Check for memory pressure. See and correct indexing if
you experience “Out of memory” conditions.
Memory
Definition:
Grants
This performance counter returns the total number of processes
Outstanding that have successfully acquired a workspace memory grant.
Information:
Look at Memory Grants Outstanding and Memory Grants
Pending. If you see a long queue of pending grants as
compared to outstanding grants, there is likely memory
pressure because of query workspace memory. You can
confirm this by checking the Granted Workspace Memory (KB)
performance counter that tells you how much memory has
currently been granted to running queries.
Possible problems:
A returned value that is high can indicate peak user activity. If
there is memory pressure because of workspace memory, this
value should be at least 25% of the virtual memory available to
SQL Server. If the memory pressure is severe, the server might
even return errors such as 701 or 8645.
Remediation:
If severe, and using 32-bit, consider using SQL Server 64-bit.
See Memory Grants Pending.
Pages/sec
Definition:
This performance counter displays the rate at which pages are
read from or written to disk to resolve hard page faults.
Information:
This is a primary indicator of the kinds of faults that cause
system-wide delays. This should be close to zero on a
dedicated SQL Server. You will see spikes during backups and
restores, but this is normal.
Possible problems:
High values causes hard page faults, which can cause SQL
488
Chapter 15: AppInsight Applications
Server to use the page, as opposed to RAM.
Remediation:
You may want to add additional RAM to stop the paging.
Cache Hit
Ratio
Definition:
This metric is the ratio between Cache Hits and Lookups.
Cache Hit Ratio measures how much the plan cache is being
used.
Information:
A high percentage here means that your SQL Server is not
building a new plan for every query it is executing and is
working effectively and efficiently. A low percentage here
means that, for some reason, the SQL Server is doing more
work than it needs to. This metric needs to be considered
alongside the plan cache reuse metric which looks at the
spread of plan reuse through your cache.
Plan cache is memory used to store objects such as stored
procedures, ad hoc and prepared Transact-SQL statements,
and triggers. The plan cache is the component of SQL memory
that stores query plans for re-use. When a query is issued
against SQL, the optimizer will attempt to re-use a cached plan
if the traits of the query permit - but can only do so if that plan
resides in cache, otherwise it needs to compile a new plan.
This is not to say that every plan that is cached is re-used.
Changes in schema, a query running parallel that may have run
serially before, or changes in parameters may require a new
plan to be compiled even if a similar plan exists in cache. Plan
compilations are expensive though. Ideally this counter should
be near 100%.
Possible problems:
The value of this counter should never fall below 90%. Low
cache hit ratio (<20%) along with a sustained query execution
rate (Batch Requests/sec) indicates that compiled plans are not
being re-used. It should be noted that the hit ratio counter may
be skewed by internal lookups performed.
489
Memory
Remediation:
The amount of caching should be reduced by examining the
workload to see if queries have been parameterized, or can be
rewritten with stored procedures.
Available
MBytes
Definition:
This is the amount of available physical memory on the server.
Information:
An acceptable output for this may vary widely based on how
much physical memory is in the machine. If you have 2GB of
RAM installed on the machine, it is common to see SQL Server
use 1.7GB of RAM. If no other processes are running on your
SQL Server, ensure you have at least 80MB available for
Windows at any given time.
Possible problems:
Low values show that SQL server has lack of memory.
Remediation:
Install additional memory.
Page Usage
Definition:
This shows the percentage of the page file that is being utilized.
Information:
A Page File is simply a file on the hard drive that handles
situations where the system wants to move or “page out”
sections of memory. There are several situations that cause
this, but the one you should be most concerned about is when
the system is out of physical memory.
Possible problems:
Values greater than 70 percent indicate paging and lack of
memory. If the system runs out of memory it can “borrow” some
storage from the hard drive to release some memory until it
needs that data again. The reason that this is bad is because
hard drives are amazingly slow in comparison with solid-state
memory access. Using the page file slows SQL Server a great
490
Chapter 15: AppInsight Applications
deal.
Remediation:
Install additional memory.
Workfiles
Created/sec
Definition:
This is the number of work files created per second.
Information:
For example, work files could be used to store temporary
results for hash joins and hash aggregates. The returned value
should be less than 20. Tempdb work files are used in
processing hash operations when the amount of data being
processed is too large to fit into the available memory.
Possible problems:
High values can indicate thrash in the tempdb file as well as
poorly coded queries.
Remediation:
It is possible to reduce the value this monitor returns by making
queries more efficient by adding/changing indexes. Adding
additional memory will also help.
Worktables
Created/sec
Definition:
This performance counter displays the number of work tables
created per second.
Information:
For example, work tables could be used to store temporary
results for query spool, lob variables, XML variables, and
cursors. The returned value should be less than 20. Worktables
are used for queries that use various spools (table spool, index
spool, and so on).
Possible problems:
High values could cause general slowdown.
Remediation:
Remediation requires rewriting your procedures.
491
Pages
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Pages
This resource shows page status of the SQL server.
In SQL Server, the page size is 8 KB. Therefore, SQL Server databases have 128
pages per MB. Each page starts with a 96 byte header that stores information
about the page. This information includes the page number, page type, the
amount of free space on the page, and the allocation unit ID of the object that
owns the page.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
492
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Page
Definition:
Lookups/sec: This performance counter returns the number of requests to
find a page in the buffer pool.
Information:
(Page lookups/sec) / (Batch Requests/sec) > 100.
Possible problems:
When the ratio of page lookups to batch requests is much
greater than 100, this is an indication that while query plans
are looking up data in the buffer pool, these plans are
inefficient.
Remediation:
Identify queries with the highest amount of logical I/O's and
tune them.
Page
Reads/sec
Definition:
This performance counter returns the number of physical
database page reads issued.
Information:
80 – 90 physical database page reads per second is normal.
Possible problems:
Returned values that are high could indicate indexing or
memory constraint.
493
Pages
Remediation:
Attempt to tune the application so that fewer I/O operations are
required. For example, perhaps I/O operations would be
reduced if there were the appropriate indexes, or if the
database design were de-normalized. If the applications
cannot be tuned, you will need to acquire disk devices with
more capacity. Because physical I/O operations are
expensive, you may be able to minimize the cost either by
using a larger data cache, intelligent indexes, more efficient
queries, or by changing the database design.
Page
Lookups/
Batch
Request
Definition:
This performance counter displays the number of page splits
per second that occur as the result of overflowing index
pages.
Information:
(Page lookups/sec) / (Batch Requests/sec) > 100.
Possible problems:
When the ratio of page lookups to batch requests is much
greater than 100, this is an indication that while query plans
are looking up data in the buffer pool, these plans are
inefficient.
Remediation:
Identify queries with the highest amount of logical I/O's and
tune them.
Page
Writes/sec
Definition:
This performance counter returns the number of physical
database page writes issued.
Information:
80 – 90 physical database page writes per second is normal.
Possible problems:
If the returned values are high, you should check the Lazy
Writer/sec monitor.
494
Chapter 15: AppInsight Applications
Page
Faults/sec
Definition:
This performance counter returns the average number
of pages faulted per second.
Information:
This performance counter gives an idea of how many times
information being requested is not where the application
expects it to be. The information must either be retrieved from
another location in memory or from the pagefile. While a
sustained value may indicate trouble, you should be more
concerned with hard page faults that represent actual reads or
writes to the disk. Disk access is much slower than RAM.
Possible problems:
Any measurement higher than zero delays response time and
probably indicates that more RAM is needed.
Remediation:
Add additional memory to your SQL server.
Page
Splits/Batch
Request
Definition:
This performance counter displays the number of page splits
per second that occur as the result of overflowing index
pages.
Information:
The returned value needs to be low as possible.
Possible problems:
High values could mean poor table or index design.
Remediation:
If the number of page splits is high, consider increasing the
Fill Factor of your indexes. An increased Fill Factor helps to
reduce page splits because there is more room in data pages
before it fills up and a page split has to occur. Note that this
counter also includes the new page allocations as well and
does not necessarily pose a problem. The other place we can
confirm the page splits that involve data or index rows moves
are the fragmented indexes on page splits.
495
Pages
Page
Splits/sec
Definition:
This performance counter returns the number of page splits
per second.
Information:
The returned value for this monitor should be as low as
possible.
Possible problems:
Returned values that are high can indicate the overflowing of
index pages. A high value for this counter is not bad in
situations where many new pages are being created, since it
includes new page allocations.
Remediation:
To avoid Page Splits, review the table and index design so as
to reduce non-sequential inserts. You can also implement
Fillfactor and Pad_Index to leave more empty space per page.
Page Life
Expectancy
Definition:
This performance counter returns the number of seconds a
page will stay in the buffer pool without references.
Information:
This performance monitor reports, on average, how long data
pages are staying in the buffer.
Possible problems:
If this value gets below 300 seconds, this is a potential
indication that your SQL Server could use more memory in
order to boost performance. Consistently having pages that
stay in memory for less than that amount of time may indicate
the need for more memory.
Remediation:
Add additional memory to your SQL server.
Database
Pages
Definition: This metric tells you the number of database
pages that are currently being occupied in the data cache.
496
Chapter 15: AppInsight Applications
Information:
The higher the buffer manager Database Pages is, the less
room there is for SQL Server to cache more data pages. This
means that SQL Server may have to free up data cache pages
order to make room for pages being moved in from disk to the
data cache, which can increase disk IO and hurt performance.
There are no specific thresholds for this counter as each
server is different. Instead, watch baseline values and look for
sudden changes in the baseline value.
Possible problems:
If the value for this performance counter increases above its
typical baseline value, this may indicate memory pressure for
the SQL Server instance.
Remediation:
Investigate buffer management and disk I/O.
Free Memory
Note: This
performance
counter is only
available in
SQL Server
2012.
Definition:
The amount of memory available for SQL Server to use.
Information:
When SQL Server is using memory dynamically, it queries the
system periodically to determine the amount of free memory.
Maintaining this free memory prevents the operating system
(OS) from paging. If less memory is free, SQL Server releases
memory to the OS. If more memory is free, SQL Server may
allocate more memory. SQL Server adds memory only when
its workload requires more memory; a server at rest does not
increase the size of its virtual address space. The returned
value should be as high as possible.
Possible problems:
If Resource Semaphore does not find enough free memory,
then it puts the current query into the waiting queue.
Remediation:
l
l
Increase RAM
Increase SQL Server’s Max Server Memory
497
Processes and Services
l
Free Pages
Consider OS requirements and other instances
Definition:
This performance counter displays the total number of pages
on all free lists.
Information:
This is not main indicator of memory problems and could only
used as signal of possible memory pressure.
Possible problems:
If this performance counter is critical and other memory
counters are good, it is possible that there are no problems
with memory.
Remediation:
Check other memory counters. If they have critical values, you
may try to install additional memory into SQL server.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Processes and Services
This resource provides detailed information about the active processes and
services associated with the database selected. Hovering over a component will
give you detailed information about that component.
498
Chapter 15: AppInsight Applications
l
l
l
l
l
Component Name: Name of the listed component.
Process Name: Name of the listed process and its ID value.
CPU Load: Percentage of the CPU that the listed process/service is currently using.
Memory Used: Memory currently being used by the listed process/service.
l Physical: RAM currently being used by the listed process/service.
l Virtual: Virtual memory currently being used by the listed process/service.
IOPS: Current amount of Input/Output data being processed per second.
Sessions
This resource displays the current number of sessions.
Sessions include both connections and internal background processes like ghost
cleanup , checkpoint, and so on. There is a close correlation between
connections and sessions, but they are not necessarily the same.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
499
Sessions
Counter
Expert Knowledge
Active
Definition:
Sessions A current connection that is actively processing.
Information:
To find information about an active session, Use Sp_Who2 Active
or Sys.Dm_Exec_Sessions (Available in SQL 2005 or greater).
Possible problems:
Blocking session.
Remediation:
Wait until blocking clears or kill the session. If killed, the process
would roll back changes. If there are many changes, it could take a
while to roll-back.
Inactive
Definition:
Sessions A current connection that is not currently processing.
Information:
To find information about an inactive sessions, use Sp_Who2.
Possible problems:
Blocking session.
500
Chapter 15: AppInsight Applications
Remediation:
Kill the session if blocking a process needs to finish. If killed, the
process would roll back changes. If there are many changes, it
could take a while to roll-back.
System
Definition:
Sessions A System initiated connection.
Information:
Normally these numbers are less than 50.
Possible problems:
Blocking session.
Remediation:
Do not kill system sessions.
User
Definition:
Sessions A user initiated connection.
Information:
Normally these numbers are greater than 50.
Possible problems:
Blocking session.
Remediation:
Kill the session if blocking a process needs to finish. If killed, the
process will roll back changes. If there are many changes, it could
take a while to roll-back.
Zooming:
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
501
SQL Agent Job Status
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
SQL Agent Job Status
The SQL Agent is a Microsoft Windows service that executes scheduled
administrative tasks known as "jobs" in SQL Server. This resource shows the
status and details of these jobs.
The data can be sorted by clicking the headers of each column.
l
l
l
l
Job Name: Displays the name of the listed job.
Last Run: Displays the date and time the listed job was last run.
Duration: Displays the amount of time the listed job took to complete.
Outcome: Displays the result from having run the listed job.
SQL Agent Job information is used to provide metrics for this resource and cannot
be edited.
SQL Errors
This resource displays SQL events that have occurred on the current SQL
instance. The data can be sorted by clicking the headers of each column.
502
Chapter 15: AppInsight Applications
l
l
Date/Time: Displays the date and time that the error occurred.
Error Message: Displays the error message that occurred at the listed date
and time.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
SQL Event Log Message Details
This resource displays the SQL event log messages while providing a search
window and a filter. The filter allows you to choose which types of log messages
you want to display. The data can be sorted by clicking the headers of each
column. This resource shows only Error and Warning events specific to the
monitored SQL instance.
Note: The filter, Information, will not list any events. This is by design and is an
accidental by-product of an earlier resource that was implemented.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, and Last Page.
Clicking any event message in the list will open a new window, displaying the
entire message, as shown below:
503
SQL Server
SQL Server
This resource shows the status of SQL server counters that warrant a view
independent of grouped resources.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
504
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Batch
Requests/sec
Definition:
This performance counter returns the number of Batch
Requests that SQL Server receives per second.
Information:
The values this monitor returns generally follows in step
as to how busy your server's CPUs are. From a network
bottleneck approach, a typical 100Mbs network card is
only able to handle about 3,000 batch requests per
second.
Possible problems:
Generally speaking, over 1,000 batch requests per
second indicates a very busy SQL Server. If this is the
case, you may soon experience a CPU bottleneck, if
you are not already. Of course, this is a relative number,
and the more powerful your hardware, the more batch
requests per second your SQL Server can handle.
Sometimes low Batch Requests/Sec can be
misleading. If there were a SQL Statements/sec
counter, this would be a more accurate measure of the
amount of SQL Server activity. For example, an
application may call only a few stored procedures, yet
each stored procedure does a great deal of work. In this
case, we will see a low number for Batch Requests/sec,
but each stored procedure (one batch) will execute
many SQL statements that drive up CPU and other
resources. As a result, many counter thresholds based
on the number of Batch Requests/sec will seem to
identify issues because the batch requests on such a
server are unusually low for the level of activity on the
server.
Remediation:
Check your SQL server and verify system resources are
being used efficiently. Applications other than SQL may
505
SQL Server
be using unnecessary system resources. Try and
recover memory by closing unnecessary applications.
Installing additional memory and upgrading your
hardware should solve this problem.
SQL
Compilations/sec
Definition:
This performance counter returns the number of times
per second that SQL Server compilations have
occurred.
Information:
This value should be as low as possible.
Possible problems:
If you see a high value, say above 100, then this can be
an indication that there are a great deal of ad hoc
queries that are running which may cause increased
CPU usage.
Remediation:
Re-write the running ad hoc queries as stored
procedures or use the following command: sp_
executeSQL.
SQL
Definition:
Recompilations/sec This performance counter returns the number of SQL
statement recompiles that are triggered per second.
Information:
When an execution plan is invalidated due to some
significant event, SQL Server will re-compile it. Recompiles, like compiles, are expensive operations so
you want to minimize the number of re-compiles. Ideally
you want to keep this counter less than 10% of the
number of Compilations/Sec. In other words, keep this
value as low a possible.
In SQL Server 2000, when SQL Server recompiles a
stored procedure, the entire stored procedure is
506
Chapter 15: AppInsight Applications
recompiled, not just the statement that triggered the
recompilation. In SQL Server 2008 and SQL Server
2005 SP3, the behavior is changed to statement-level
recompilation of stored procedures. When SQL Server
2008 or SQL Server 2005 SP3 recompiles stored
procedures, only the statement that caused the
recompilation is compiled, not the entire procedure.
This uses less CPU bandwidth and results in less
contention on lock resources such as Compile locks.
Possible problems:
Returned values that are high can indicate deadlocks
and compile locks that are not compatible with any
locking type.
Remediation:
Recompilation can happen for various reasons, such
as: Schema changed; Statistics changed; Deferred
compile; Set option changed; Temporary table
changed; Stored procedure created with the
Recompile query hint or using the Option (Recompile).
l
l
If the recompile occurred because a Set option
changed, use SQL Server Profiler to determine
which Set option changed. Avoid
changing Set options within stored procedures. It
is better to set them at the connection level.
Ensure that Set options are not changed during
the lifetime of the connection.
Recompilation thresholds for temporary tables are
lower than for normal tables. If the recompiles on
a temporary table are due to statistics changes,
you can change the temporary tables to table variables. A change in the cardinality of a table variable does not cause a recompilation. The
drawback of this approach is that the query optimizer does not keep track of a table variable’s cardinality because statistics are not created or
maintained on table variables. This can result in
507
SQL Server
l
l
l
l
l
non-optimal query plans. Test the different options
and choose the best one.
Another option is to use the Keep Plan query hint.
This sets the threshold of temporary tables to be
the same as that of permanent tables.
The EventSubclass column indicates that “Statistics Changed” for an operation on a temporary
table.
To avoid recompilations that are due to changes
in statistics (for example, when the plan becomes
suboptimal due to change in the data statistics),
specify the KeepFixed Plan query hint. With this
option in effect, recompilations can only happen
because of correctness-related reasons (for
example, when the underlying table structure has
changed and the plan no longer applies) and not
due to statistics. An example might be when a
recompilation occurs if the schema of a table that
is referenced by a statement changes, or if a table
is marked with the sp_recompile stored procedure.
Turning off the automatic updates of statistics for
indexes and statistics that are defined on a table
or indexed view prevents recompiles that are due
to statistics changes on that object. Note, however, that turning off the Auto-Stats feature by
using this method is usually not a good idea. This
is because the query optimizer is no longer sensitive to data changes in those objects and suboptimal query plans might result. Use this method
only as a last resort after exhausting all other
alternatives.
Batches should have qualified object names (for
example, dbo.Table1) to avoid recompilation and
to avoid ambiguity between objects.
To avoid recompiles that are due to deferred compiles, do not interleave DML and DDL or create
the DDL from conditional constructs such
508
Chapter 15: AppInsight Applications
l
l
Auto-Param
Attempts/sec:
as If statements.
Run Database Engine Tuning Advisor (DTA) to
see if any indexing changes improve the compile
time and the execution time of the query.
Check to see if the stored procedure was created
with the With Recompile option or if
the Recompile query hint was used. If a procedure was created with the With
Recompile option, in SQL Server 2005 SP3, you
may be able to take advantage of the statement
level Recompile hint if a particular statement
within that procedure needs to be recompiled.
This would avoid the necessity of recompiling the
whole procedure each time it executes, while at
the same time allowing the individual statement to
be compiled.
Definition:
This monitor returns the number of autoparameterization attempts per second.
Information:
The total for this monitor should be the sum of the
failed, safe, and unsafe auto-parameterizations. Autoparameterization occurs when an instance of SQL
Server tries to parameterize a Transact-SQL request by
replacing some literals with parameters so that reuse of
the resulting cached execution plan across multiple
similar-looking requests is possible. Note that autoparameterizations are also known as simple
parameterizations in newer versions of SQL Server.
This counter does not include forced parameterizations.
Possible problems:
Bad T-SQL coding practices can increase
recompilation frequency and adversely affect SQL
Server's performance. Such situations can be
debugged and corrected in many cases.
509
SQL Server
Longest
Transaction
Running Time
Definition:
The performance counter displays the length of time, in
seconds, the transaction that has been running the
longest, has been active.
Information:
Transactions that run longer than others use more
resources. They can be used to track down procedures
and calls that are taking longer than expected by
identifying the specific transaction(s).
Possible problems:
Long running transactions can prevent truncation of
transaction logs. This can cause the transaction log
files to grow until they consume all available physical
disk space shutting down access to the database.
Remediation:
Check the functionality of the query and/or redesign the
long running transaction.
Failed AutoParams/sec
Definition:
This monitor returns the number of failed autoparameterization attempts per second.
Information:
The value returned by this monitor should be low. Note
that auto-parameterizations are also known as simple
parameterizations in later versions of SQL Server.
Preferred values should be near zero.
Possible problems:
Bad T-SQL coding practices can increase
recompilation frequency and adversely affect SQL
Server's performance. Such situations can be
debugged and corrected in many cases.
Full Scans/sec
Definition:
This performance counter returns the number of Full
Scans on base tables or indexes.
510
Chapter 15: AppInsight Applications
Information:
This is the number of unrestricted full scans per second.
These can be either base-table or full-index scans.
Possible problems:
Values greater than 1 or 2 indicate table/Index page
scans are occurring. If the CPU is running high, you
should investigate the cause as related to this counter
measurement. You can rule this out as a problem if the
full scans are on small tables.
Remediation:
Following are a few of the main causes of high Full
Scans/sec:
l
l
l
Range Scans/sec
Missing indexes
Too many rows requested; Queries with missing
indexes or too many rows requested will have a
large number of logical reads and an increased
CPU time.
Scans are IO-intensive and should run within your
databases minimally. Identify the tables that have
a large number of scans against them. Review the
fill factor you have set up on your indexes and minimize it where appropriate.
Definition:
This performance counter returns the number of
Qualified Range Scans through indexes per second.
Information:
This monitor returns the number of qualified range
scans through indexes per second.
Plan Re-Use
Definition:
A query plan is used to execute a query.
Information:
Plan re-use is desirable for OLTP workloads because
re-creating the same plan (for similar or identical
511
SQL Server
transactions) is a waste of CPU resources.
Possible problems:
Zero cost plans will not be cached (not re-used) in SQL
2005 SP2. Applications that use zero cost plans will
have a lower plan re-use but this is not a performance
issue.
Remediation:
Review your plan re-use design. Tune your plan re-use
design as it is described in the following
article: http://sqlmag.com/sql-server/fine-tuning-planreuse.
Probe Scans/sec
Definition:
This performance counter returns the number of Probe
Scans, per second, that are used to find at most, one
single qualified row in an index or base table directly.
Information:
There are no thresholds associated with this
performance counter.
Recompilations/
Compilations
Definition:
This performance counter shows the ratio of SQL
Recompilations to SQL Compilations.
Information:
SQL Recompilations should be less than 10% of SQL
Compilations.
Possible problems:
Returned values that are high can indicate more
temporary tables in use.
Remediation:
Change stored procedures to not change schemas,
Use table variables instead of temporary tables
Compilations/
Definition:
Recompilations/sec Monitoring the number of query compilations and
512
Chapter 15: AppInsight Applications
recompilations and the number of batches received by
an instance of SQL Server gives you an indication of
how quickly SQL Server is processing user queries and
how effectively the query optimizer is processing the
queries.
Information:
Compilation is a significant part of a query's turnaround
time. In order to save the compilation cost, the
Database Engine saves the compiled query plan in a
query cache. The objective of the cache is to reduce
compilation by storing compiled queries for later reuse,
therefore ending the requirement to recompile queries
when later executed. However, each unique query must
be compiled at least one time.
Compilations/sec divided by 10 minus
recompilations/sec.
Possible problems:
Query recompilations can be caused by the following
factors:
l
l
Schema changes, including base schema
changes such as adding columns or indexes to a
table, or statistics schema changes such as inserting or deleting a significant number of rows from a
table.
Environment (Set statement) changes. Changes
in session settings such as Ansi_Padding or
Ansi_Nulls can cause a query to be recompiled.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
513
Top 10 Databases by Active User Connections
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Top 10 Databases by Active User Connections
This resource graphically shows the number of users per database for the top 10
most active databases. The colors of the chart correspond to the labels in the
legend, which indicate the most active databases.
The performance counter, Top Active Sessions with Statistics, is used to
provide metrics for this resource and cannot be edited.
Expanding the tree by clicking [+] will provide details about the users, host, length
of connection and idle time, as well as the number of bytes transferred during that
time.
514
Chapter 15: AppInsight Applications
Top 10 Most Expensive Queries by CPU Time
This resource displays the top 10 most expensive queries sorted by the length of
time the CPU spent processing the listed query.
When viewing this resource from the Summary tab on the Application Details
page, queries are listed for the entire SQL Server instance. Conversely, when this
same resource appears on the Database Details view, queries are only listed for
that specific database.
The data can be sorted by clicking the headers of each column. Additionally, this
resource can optionally show Top Queries by I/O by clicking Edit in this resource
and making the necessary adjustments.
Note: The resource is filtered based on the settings found on the Queries tab in
Details view in the Most Expensive Queries resource.
l
Query Text: The text shown is a preview of the full query. To view an entire
query in the list, click [+] next to the query listed to expand and view the
query.
Note: Clicking any listed query will take you to the Most Expensive Queries
resource on the Queries tab, providing greater detail about the query.
515
AppInsight for SQL Details View (Queries Tab)
l
l
CPU Time: Display the time, in milliseconds, the listed query took to complete.
Database: Displays the database with which the listed query is associated.
The icon in this column shows the current state of the listed database.
The performance counter, Top Expensive Queries, is used to provide metrics for
this resource and cannot be edited.
AppInsight for SQL Details View (Queries Tab)
The Queries tab provides detailed insight into the most expensive queries
running on your SQL instance.
The performance counter, Top Expensive Queries, is used to provide metrics for
this resource and cannot be edited.
Most Expensive Queries
This resource provides detailed insight into the most expensive queries running
on your SQL database. Queries for this view can be filtered by Time, Host,
Database, and Login using the filter drop down menus at the top of the window.
Note: The filters used here will also be applied to the Top 10 Most Expensive
Queries by CPU Time resource found on the Summary tab in the Details view.
To view an entire query in the list, hover the mouse over a query, or click [+] next
to the query listed to expand and view the query.
The data can be sorted by clicking the headers of each column.
Note: This resource will be empty when polling of queries is disabled.
516
Chapter 15: AppInsight Applications
l
l
l
l
l
l
l
l
l
l
l
l
l
Query Text: The text shown is a preview of the full query. To view an entire
query in the list, click [+] next to the query listed to expand and view the
query.
SPID: Server Process ID of the listed query.
Plan Count: Displays the number of cached query plans for the listed
query. A large number might indicate a need for explicit query parameterization.
Executions: Displays the number of times the listed query was executed.
CPU Time: Displays the amount of time, in milliseconds, that the listed
query took to complete.
Phys. Read: This field returns the number of physical reads. Physical reads
are reads that require reading directly from disk. Physical reads are substantially slower than reading from the cache or from RAM.
Logical Reads: Displays the number of times data was read from the
cache.
Logical Writes: Displays the number of times data was written to the cache.
Average Duration: This displays the length of time it took, in milliseconds,
to execute the listed query averaged by the number of executions.
Bytes Transferred: Number of bytes transferred during the query.
Login: Displays the current login information for the listed database.
Host: Displays the host for the listed database.
Database: Displays the current name for the listed database. Clicking any
database in the list will take you to the Database Details page.
Database Details View
The Database Details view provides a great deal of information about the current
database and can be accessed by clicking any listed database.
Important: A high number of databases monitored on a single SQL instance
using AppInsight for SQL can cause job timeout issues. To alleviate this problem,
try increasing the timeout value. If this does not resolve the issue, reduce the
number of visible databases by granting view permissions to the user account
used for polling only for the databases you want to see.
To navigate to the Database Details view:
1. From the web console, navigate to the AppInsight for SQL Details view.
2. From the All Databases resource, click any database in the list.
The available resources unique to this view include:
517
Active User Connections
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Active User Connections
Connections
Database Availability
Database Details
Database Disk I/O
Database Size by File
Log Flushes
Processes and Services
Storage
Top 10 Clustered Indexes by Fragmentation
Top 10 Most Expensive Queries by CPU Time
Top 10 Nonclustered Indexes by Fragmentation
Top 10 Tables by Size
Transaction Log Disk I/O
Transaction Log Size by File
Active User Connections
This resource provides detailed information about the active user connections
associated with the database selected. Data can be sorted by clicking the
headers of each column.
l
l
l
l
l
Login: This displays the login information for the listed user connection.
Host: This displays the type of host associated with the listed user connection.
Connection Duration: This displays the length of time the listed user connection has been connected.
Idle Time: This displays the length of time the listed user connection has
been idle.
Bytes Transferred: This displays the number of bytes transferred for the listed user connection.
The performance counter, Top Active Sessions with Statistics, is used to
provide metrics for this resource and cannot be edited.
518
Chapter 15: AppInsight Applications
Connections
This resource shows the status of your current database connections. The icons
of the listed performance counters in the Statistic Name column will change color
to reflect the listed counter's current state. Clicking any performance counter in the
Statistic Name column will take you to the Performance Counter Details page for
that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
User
Definition:
Connections The User Connections performance counter identifies the
number of different users that are connected to your SQL
Server at the time the sample was taken.
Information:
You need to watch this performance counter over time to
519
Connections
understand your baseline user connection numbers. Since
each user connection consumes some memory space, a high
number of user connections can impact throughput and cause
a performance slow-down. Once you have an idea of your high
and low thresholds during normal usage of your system, you
can then look for times when this counter exceeds these high
and low marks.
Possible problems:
If the returned value of this performance counter goes down
and the load on the system remains stable, you might have a
bottleneck that is not allowing your server to handle the normal
load. Keep in mind that this counter value might go down just
because less people are using your SQL Server instance. If
you see this number jump by 500% from your baseline, you
may be seeing a slowdown of your server activity.
Remediation:
You may want to boost the SQL Server configuration setting,
Maximum Worker Threads to a figure higher than the default
setting of 255. The setting for Maximum Worker Threads
should be higher than the maximum number of user
connections your server ever reaches.
Logins/sec
Definition:
This performance counter returns the total number of logins
started, per second, and does not include pooled connections.
Information:
Opening and closing connections is an expensive process. A
pooled connection is one which is kept open by an application
for other requests to re-use.
Possible problems:
If the returned value is high, this can indicate that the
application is not correctly using connection pooling.
Remediation:
520
Chapter 15: AppInsight Applications
Review the Connection Polling configuration.
Logout/sec
Definition:
This performance counter returns the total number of logout
operations started, per second.
Information:
Opening and closing connections is an expensive process.
When applications do not use a connection pool, each request
needs to establish its own connection before the query can be
executed. It then has to close it. A pooled connection is one
which is kept open by an application for other requests to reuse.
Possible problems:
If the returned value is high, this can indicate that the
application is not correctly using connection pooling.
Remediation:
Review the Connection Polling configuration.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Database Availability
This resource graphically shows the various states of availability for the current
database in a percentage format. This chart is made up of three sections: the
legend, the main chart, and the lower chart. The colors of the main chart
correspond to the labels in the legend.
521
Zooming
Clicking the Edit button will allow you to change the default zoom range, the
amount of historical data loaded, and set the sample interval time period, as well
as reveal the Advanced section. Expanding the Advanced section will allow you
to change the defaults of the titles from macros to anything you want.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over.
522
Chapter 15: AppInsight Applications
Database Details
This resource provides tools and details concerning the current database.
l
l
l
l
l
l
l
l
Management: This provides tools allowing you to more easily manage
and troubleshoot the current application.
Database Name: Displays the name of the current database.
Performance Status: Displays the status of the current database.
Operational State: Displays whether or not the database is currently
online.
Recovery Model: Will display the type of recovery model employed on the
listed database. This can be either, Simple, Full, or Bulk-Logged. For more
information, refer to the following MSDN article: http://msdn.microsoft.com/en-us/library/ms175987(v=sql.105).aspx
Collation: Displays the method of sorting used by the database. (In the
above image, Latin1 means the server treats strings using Charset Latin 1,
i.e. ASCII. CI means Case Insensitive. AS means Accent Sensitive ('ü'
does not equal 'u')).
Compatibility Level: Displays the compatibility level of the current database. The value displayed in this field correlates to the bulleted table
below:
o 60 = SQL Server 6.0
o 65 = SQL Server 6.5
o 70 = SQL Server 7.0
o 80 = SQL Server 2000
o 90 = SQL Server 2005
o 100 = SQL Server 2008
o 110 = SQL Server 2012
Last Backup: Displays the date and time of the last successful backup for
the current database.
523
Database Disk I/O
l
High Availability Group: Displays the database mirroring status and
details of the mirrored database, if available.
Database Disk I/O
This resource displays the status, as well as I/O metrics, for your current database
file. The icons of the listed performance counters in the Statistic Name column will
change to reflect the listed counter's current state. Clicking any volume in the
Volume column will take you to the Volume Details page for that counter.
The data can be sorted by clicking the headers of each column.
l
l
l
l
l
File Path: Displays the full path of the listed database.
Volume: Displays the name of the volume of the current database. Clicking
a listed volume will take you to the Volume Details page.
Disk Queue Length: This is the number of both read and write requests
that were queued for the selected disk during the sample interval.
Total IOPS: Displays the current total read and write I/O operations occurring for the database logical volume. High I/O may be normal for some databases, but excessively high I/O will lead to higher queue lengths, meaning
there are more requests for disk reads or writes than the storage subsystem
can handle simultaneously.
Latency: Displays a measurement of disk latency occurring on the disk
where the database resides. High latency values indicate sluggish database performance
The performance counter, Database Files, is used to provide metrics for this
resource. It is used in combination with volume polling. This counter is not listed
in the resource; however, the thresholds can be changed.
To change the thresholds for the Database Files performance counter:
1. From the Database Details view, locate the Database Files resource and
click Edit in the Management field.
524
Chapter 15: AppInsight Applications
2. Locate the Database Files performance counter and click [+] to expand the
counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
Database Size by File
This resource lists the current databases sorted by file size. Moving the mouse
over the Database Usage percent value will reveal a tooltip with more detailed
information about that database. Clicking the value will take you to the Custom
Chart resource page. If the Warning or Critical thresholds is breached, the color of
the bar chart will change from green to yellow or red, respectively.
l
l
File Path: Displays the full path of the listed database.
Auto-Growth: Displays the Auto-growth status of the listed database.
525
Log Flushes
l
l
l
File Size: Displays the size of the listed database in megabytes.
Database Usage: Depending on how your database is configured, this
value is showing you how close you are to running out of space. If your database is configured as a fixed size, auto-grow, or a restricted auto-grow, the
percentages relate to what is going to cause your database to run out of
space.
Volume Usage: The value returned is the database file usage in relation to
the space remaining on the volume.
Database Files, is used to provide metrics for this resource. This counter is not
listed in the resource; however, the thresholds can be changed.
To change the thresholds for the Database Files performance counter:
1. From the Database Details view, locate the Database Files resource and
click Edit in the Management field.
2. Locate the Database Files performance counter and click [+] to expand the
counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
Log Flushes
This resource contains monitors specific to the current status of log flushes for the
current database. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
526
Chapter 15: AppInsight Applications
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Log Bytes
Definition:
Flushed/sec This performance counter shows the average log bytes flushed
per second for the current database since the last data point.
Information:
The value returned helps identify trends of the transaction log. A
log flush happens when data is written from the log cache to the
transaction log on disk, each time a transaction happens.
Note: This is not available in SQL 2012.
Possible problems:
The rate at which log records are written to the disk. This is the
527
Log Flushes
log generation rate of the application. It plays a very important
role in determining database mirroring performance. This
counter is in the Databases performance object.
Log Bytes Flushed/sec can indicate many small transactions
leading to high mechanical disk activity.
Remediation:
Look at the statements associated with the log flush and
determine if the number of log flushes can be reduced. When a
single transaction is used, the log records for the transaction
can be bundled and a single, larger write can be used to flush
the gathered log records. The mechanical intervention is
significantly reduced. It is not recommended that you increase
your transaction scope. Long-running transactions can lead to
excessive and unwanted blocking as well as increased
overhead.
Log
Flushes/sec
Definition:
This performance counter returns the number of log flushes per
second, averaged since the last collection time.
Information:
A log flush happens when a transaction is committed and data
is written from the log cache to the transaction log file. The log
cache is a location in memory where SQL Server stores data to
be written to the log file. This is used to roll back a transaction
before it is committed. Once complete, the log cache is flushed
to the physical log file on the disk. Generally speaking, log
flushes per second should parallel the number of transactions
per second.
Possible problems:
If the returned value is higher than expected, check your use of
explicit transactions in your queries.
Remediation:
Explicitly define the start and end of your transactions. This
should reduce the number of log flushes, and reduce the impact
on I/O. Also check the Log Bytes Flushed/Sec monitor.
528
Chapter 15: AppInsight Applications
Log Flush
Waits/sec
Definition:
This performance counter returns the number of commits, per
second, waiting for the log flush.
Information:
This value should be as low as possible.
Possible problems:
A high number of Log Flush Waits can indicate that it is taking
longer than normal to flush the transaction log cache. This will
slow the performance of your SQL Server.
Remediation:
Check the value of the Disk avg. Write time monitor. If the
returned value is greater than 5ms, then this can indicate that
there is an I/O bottleneck. Move your transaction log file to a
disk drive separate from your data files. This should increase
performance since there is no access competition on the same
disk. Consider upgrading to RAID 10 for transaction log
storage. Also, adding spindles to your RAID array should
increase performance.
Log Flush
Wait Time
Definition:
This performance counter returns the total wait time (in
milliseconds) to flush the log to the transaction log file.
Information:
On an AlwaysOn secondary database, this value indicates the
wait time for log records to be hardened to disk.
Percent Log Definition:
Used
This performance counter returns the percentage of space in
the log that is in use.
Information:
This is the size of the transaction log that actively contains data
in relation to the total physical size on disk of the log file.
Possible problems:
If the log file is 100% used, it will attempt to increase its size. If
529
Storage
there is not sufficient disk space to accommodate the growth,
the database will stop functioning.
Remediation:
Perform a transaction log backup to truncate the log.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Storage
This resource contains monitors specific to the current storage status of the
current database. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
530
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Backup/
Definition:
Restore
This performance counter shows the Read/Write throughput
Throughput/sec for backup and restore operations of a database per
second.
Information:
You can measure how the performance of the database
backup operation changes when more backup devices are
used in parallel, or when faster devices are used.
Throughput of a database backup or restore operation
allows you to determine the progress and performance of
your backup and restore operations. There are no
thresholds associated with this performance counter.
Log Cache
Reads/sec
Definition:
This performance counter returns the amount of Reads
performed per second through the Log Manager cache.
Total Size
Definition:
This performance counter returns the total size of the
database including white space.
Possible problems:
Running out of storage space.
531
Storage
Remediation:
Shrink the database if free space is running low.
Log File(s) Size
Definition:
This performance counter shows the cumulative size (in
kilobytes) of all the transaction log files in the database.
Information:
Every transaction in the database is logged to the
Transaction log. This is useful during recovery in the event
of data loss. Information about the log file is shown under
the Files section of the Database Overview page in SQL
Server Management Studio.
The size of this file is based on the logging level set for the
database. By default, a new database uses Full Recovery
Mode or the recovery mode that the model database is set
up as. Transactions in the log file are only removed when a
complete backup or transaction log backup is initiated. This
enables pinpoint recovery for critical applications. Be aware
that if the transaction log is not backed up on a regular
basis, the log will grow until your disk is completely full. The
transaction log should be adjusted to a reasonable size.
This will depend on the number of transactions you expect,
and how often you perform backups.
Set the correct Autogrowth properties: The default of 10%
Autogrowth for data and log files should be enough for low
use databases. Conversely, a 500 MB Autogrowth rate may
be better suited for a busy database, preventing a large I/O
impact caused by normal Autogrowth operations.
Possible problems:
If the returned value occasionally drops to zero, this can
indicate a problem with the following file: sys.master_files.
This file is what the SQL Monitor uses to collect data.
Note: With Simple Recovery Model, fast writing to the
transaction log will trigger Autogrowth.
Remediation:
532
Chapter 15: AppInsight Applications
If you are performing a insert operation, you should
consider switching the recovery model to Bulk Logged for
the insert.
l
l
If you do not need pinpoint recovery, it is recommended you switch to Simple Recovery model.
If your database is configured with the Full or Bulk
Logged recovery model, back up the log on a regular
basis so it can be truncated to free up log space.
Note: This action removes inactive virtual log files, but
does not reduce the file size.
Data File(s) Size
Definition:
This performance counter shows the cumulative size (in
kilobytes) of all the data files in the database including any
automatic growth.
Information:
Monitoring this counter is useful for determining the correct
size of tempdb. The value returned from this monitor reports
the size of your database (not including the Transaction
log). Information about distinct primary data files and
secondary data files is shown under the Files section of the
Database Overview page in SQL Server Management
Studio.
Having a file size increase on demand is expensive and
will degrade performance significantly. Autogrowth should
only be used to let a database increase in size if you are
running out of disk space. Autogrowth should not be used
to manage your MDF size increases. Data files should be
sized properly when they are initially created to meet the
expected growth. This also helps avoid fragmentation,
which leads to better database performance.
Possible problems:
Be wary of large and unusual increases to the size of your
data files. Generally speaking, your database should be
sized to minimize Autogrowth. An increase in size is
expensive concerning I/O. Additionally, this will fragment
533
Storage
your data and log files. If the returned value occasionally
drops to zero, this can indicate a problem with the following
file: sys.master_files. This file is what the SQL Monitor uses
to collect data.
Remediation:
l
l
Shrink Space
Ensure that Full Recovery Mode is used for your databases and that you regularly backup everything,
including the transaction log.
Manually add space as data increases in size. It is
recommended that you have approximately one year
of space available for data growth. If this is not possible, move the database to a higher capacity drive or
simply upgrade the drive.
Note: Compressing files causes fragmentation and is
therefore not recommended.
Definition:
This is essentially the white space in the database that can
be reclaimed by compacting/shrinking the database.
Information:
Shrinking data files recovers space by moving pages of
data from the end of the file to unoccupied space closer to
the front of the file. When enough free space is created at
the end of the file, data pages at end of the file can deallocated and returned to the file system.
Possible problems:
Data that is moved to shrink a file can be scattered to any
available location in the file. This causes index
fragmentation and can slow the performance of queries that
search a range of the index.
Remediation:
To eliminate the fragmentation, consider rebuilding the
indexes on the file after shrinking.
Average
Bytes/Read
Definition:
Perfmon captures the total number of bytes sent to the disk
534
Chapter 15: AppInsight Applications
(write) and retrieved from the disk (read) over a period of
one second.
Information:
The Disk Read Bytes/sec and the Disk Write Bytes/sec
performance counters break down the results displaying
only read bytes or only write bytes, respectively.
Average
Bytes/Write
Definition:
Perfmon captures the total number of bytes sent to the disk
(write) and retrieved from the disk (read) over a period of
one second.
Information:
The Disk Read Bytes/sec and the Disk Write Bytes/sec
performance counters break down the results displaying
only read bytes or only write bytes, respectively.
Average Read
Latency
Definition:
This performance counter indicates the response time of
the disk – how long it takes for a read request to get
acknowledged by the disk.
Information:
The average read latency should be less than 20ms for
database files.
Average Write
Latency
Definition:
Avg. Disk sec/Write is the average time, in seconds, to write
data to the disk.
Information:
This analysis determines if any of the physical disks are
responding slowly.
Possible problems:
If the response times are greater than .015 (15
milliseconds), then the disk subsystem is keeping up with
demand, but does not have much overhead left.
If the response times are greater than .025 (25
milliseconds), then noticeable slow-downs and
535
Storage
performance issues affecting users may be occurring.
Forwarded
Records/sec
Definition:
This performance counter returns the number of records per
second fetched through forwarded record pointers.
Information:
Heaps have one interesting feature - forwarded records. If a
record needs to be updated and the updated record size is
greater than the current record size, and there is no space
on the page to fit the new record in, then we have two
options:
1. Move the record to a new page and change all the
non-clustered index records that point to it to point to
the new location of the record.
2. Move the record to a new page and leave a forwarding record in the original location to point to the
new location.
Possible problems:
This is one drawback of using heaps - all the extra space
that is wasted with the Forwarding/Forwarded Records.
Another drawback is that when scanning through the heap,
forwarding records have to be followed immediately (as
opposed to ignoring them and just reading the forwarded
records when they are encountered). This is to vastly
reduce the possibility of read anomalies such as nonrepeatable reads or missed rows if a row moves before the
scan point during a scan.
Remediation:
Once a data table (heap) includes forward pointers, there is
only one way to get rid of them : Table Reorg. There are a
few options to do this:
l
l
The simplest one would be to create a clustered index
on the data table and drop it again.
To avoid forward pointers entirely, create a clustered
index from the beginning. A clustered index keeps the
536
Chapter 15: AppInsight Applications
data rows in its leaf node level. Therefore the data is
always sorted according to the index keys and forward pointers will not be used. This is like a continuous online Reorg in this regard.
Log Cache
Reads/sec
Definition:
This performance counter displays the number of Reads
performed per second through the Log Manager cache.
Information:
There are no thresholds associated with this performance
counter.
Log Cache Hit
Ratio
Definition:
This performance counter returns the percentage of Log
cache reads satisfied from the Log cache.
Information:
The log cache is used to hold information that will be
written to the transaction log. There are no thresholds
associated with this performance counter.
Number of
Reads/sec
Definition:
This performance counter returns the number of physical
database page reads issued per second.
Information:
This statistic displays the total number of physical page
reads across all databases. 80 to 90 per second is normal.
Anything that is above 90 indicates indexing or memory
constraint.
Possible problems:
Because physical I/O is expensive, you may be able to
minimize the cost, either by using a larger data cache,
intelligent indexes, and more efficient queries, or by
changing the database design.
Remediation:
Attempt to tune the application so that fewer I/O operations
537
Storage
are required. For example, perhaps I/O would be reduced if
there were appropriate indexes or if the database design
were de-normalized. If the applications cannot be tuned,
you will need to acquire disk devices with more capacity.
Compare to the Memory: Pages/sec performance counter to
see if there is paging while the SQL Server:Buffer
Manager\Page reads/sec is high. Note: Before adjusting the
fill factor, at a database level, compare the SQL
Server:Buffer Manager\Page reads/sec performance
counter to the SQL Server:Buffer Manager\Page writes/sec
counter, and use the fill factor option only if writes are a
substantial fraction of reads (greater than 30 percent).
Number of
Writes/sec
Definition:
This performance counter returns the number of data pages
written per second.
Information:
Page writes per second are the total number of physical
writes, including checkpoint writes, lazy writer writes, and
large block writes done during index creation or bulk copy
operations.
Possible problems:
If Page Writes/sec is high, this might indicate a SQL Server
performance issue.
Remediation:
If these values are high, you can try to reduce the values by
tuning your application or database to reduce I/O
operations such as index coverage, better indexes,
normalization, increasing the I/O capacity of the hardware,
or by adding memory.
Total Size:
Percent
Change 24 Hrs
Definition:
This value is the same as the value returned by the
performance counter, Total Size but calculated as a
percentage of change over the last 24 hours.
Information:
538
Chapter 15: AppInsight Applications
This metric allows users to be alerted when the database
experiences sudden growth.
Possible problems:
A database that suddenly changes in size by a high
percentage could be indicative of a problem that should be
investigated.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Top 10 Clustered Indexes by Fragmentation
A clustered index determines the physical order of data in a table. This resource
displays the clustered indexes with the highest level of fragmentation. If the
Warning or Critical threshold is breached, the color of the bar chart will change
from green to yellow or red, respectively.
l
l
l
Table Name: Displays the name of the listed table.
Index Name: Displays the name listed index.
Fragmentation: Numerically and graphically displays the percentage of
fragmentation of the listed index.
539
To change the thresholds for the Top Indexes for Database performance counter:
The performance counter, Top Indexes for Database, is used to provide metrics
for this resource. This counter is not listed in the resource; however, the
thresholds can be changed.
To change the thresholds for the Top Indexes for Database performance
counter:
1. From the Database Details view, locate the Database Details resource
and click Edit in the Management field.
2. Locate the Top Indexes for Database performance counter and click [+]
to expand the counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
To change the number of tables displayed in this resource, values must be
changed in two locations:
1. In the resource, click Edit.
2. Change the value for the field: Maximum Number of Records to Display,
and then click Submit.
3. Edit the application or the template that the application is based on. To edit
the template which will affect applications based on it:
540
Chapter 15: AppInsight Applications
a. From the web console, navigate to Settings > SAM Settings > Manage Templates.
b. Check the AppInsight for SQL application and click
in the toolbar.
c. Expand the Top Indexes for Database component monitor by clicking [+].
d. Change the value for the field, Number of Records to Retrieve
and then click Submit.
4. To edit the individual application:
a. From the web console, click the Applications tab.
b. From the All Applications resource, click an AppInsight for SQL
application to select it.
.
c. From the Application Details resource, click
d. Expand the Top Indexes for Database component monitor by clicking [+].
e. Click Override Template corresponding to the row, Number of
Records to Retrieve.
f. Change the value for the field, Number of Records to Retrieve
and then click Submit.
541
Top 10 Most Expensive Queries by CPU Time
Top 10 Most Expensive Queries by CPU Time
This resource displays the top 10 most expensive queries sorted by the length of
time the CPU spent processing the listed query.
When viewing this resource from the Summary tab on the Application Details
page, queries are listed for the entire SQL Server instance. Conversely, when this
same resource appears on the Database Details view, queries are only listed for
that specific database.
The data can be sorted by clicking the headers of each column. Additionally, this
resource can optionally show Top Queries by I/O by clicking Edit in this resource
and making the necessary adjustments.
Note: The resource is filtered based on the settings found on the Queries tab in
Details view in the Most Expensive Queries resource.
l
Query Text: The text shown is a preview of the full query. To view an entire
query in the list, click [+] next to the query listed to expand and view the
query.
Note: Clicking any listed query will take you to the Most Expensive Queries
resource on the Queries tab, providing greater detail about the query.
542
Chapter 15: AppInsight Applications
l
l
CPU Time: Display the time, in milliseconds, the listed query took to complete.
Database: Displays the database with which the listed query is associated.
The icon in this column shows the current state of the listed database.
The performance counter, Top Expensive Queries, is used to provide metrics for
this resource and cannot be edited.
Top 10 Nonclustered Indexes by Fragmentation
A non-clustered index is one in which the data rows are not sorted and stored in
order based on their non-clustered keys. This resource displays the non-clustered
indexes with the highest level of fragmentation. If the Warning or Critical
thresholds is breached, the color of the bar chart will change from green to yellow
or red, respectively.
l
l
l
Table Name: Displays the name of the listed table.
Index Name: Displays the name listed index.
Fragmentation: Numerically and graphically displays the percentage of
fragmentation of the listed index.
The performance counter, Top Indexes for Database, is used to provide metrics
for this resource. This counter is not listed in the resource; however, the
thresholds can be changed.
To change the thresholds for the Top Indexes for Database performance
counter:
1. From the Database Details view, locate the Database Details resource
and click Edit in the Management field.
543
Top 10 Nonclustered Indexes by Fragmentation
2. Locate the Top Indexes for Database performance counter and click [+]
to expand the counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
To change the number of tables displayed in this resource, values must be
changed in two locations:
1. In the resource, click Edit.
2. Change the value for the field: Maximum Number of Records to Display,
and then click Submit.
3. Edit the application or the template that the application is based on. To edit
the template which will affect applications based on it:
a. From the web console, navigate to Settings > SAM Settings > Manage Templates.
b. Check the AppInsight for SQL application and click
in the toolbar.
c. Expand the Top Indexes for Database component monitor by clicking [+].
544
Chapter 15: AppInsight Applications
d. Change the value for the field, Number of Records to Retrieve
and then click Submit.
4. To edit the individual application:
a. From the web console, click the Applications tab.
b. From the All Applications resource, click an AppInsight for SQL
application to select it.
.
c. From the Application Details resource, click
d. Expand the Top Indexes for Database component monitor by clicking [+].
e. Click Override Template corresponding to the row, Number of
Records to Retrieve.
f. Change the value for the field, Number of Records to Retrieve
and then click Submit.
Top 10 Tables by Size
This resource displays the current database tables in order based on size. If the
Warning or Critical thresholds is breached, the color of the bar chart will change
from green to yellow or red, respectively.
545
Top 10 Tables by Size
l
l
l
l
Name: Displays the name of the listed table of the current database.
Size: Displays the size of the listed table of the current database.
% Used by Index: Displays the percentage of the table space used by the
index.
Total Row Count: Displays the total number of rows in the listed table of
the current database.
The performance counter, Top Tables for Database, is used to provide metrics
for this resource. This counter is not listed in the resource; however, the
thresholds can be changed.
To change the thresholds for the Top Tables for Database performance
counter:
1. From the Database Details view, locate the Database Details resource
and click Edit in the Management field.
2. Locate the Top Tables for Database performance counter and click [+] to
expand the counter and reveal the counter details.
546
Chapter 15: AppInsight Applications
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
Transaction Log Disk I/O
This resource lists the current status of the transaction log file. The icons of the
Volume column will change to reflect the listed volume's current state. Clicking
the volume will take you to the Volume Details page.
l
l
l
l
File Path: Displays the full path where the transaction log file resides.
Volume: Displays the volume where the transaction log file resides. Clicking on the volume name will take you to the Volume Details View.
Disk Queue Length: Displays the current disk queue length for the listed
volume as seen on the Volume Details view. Queue lengths that are high for
a sustained period of time are indicative of disk I/O performance issues that
can negatively impact the database.
Total IOPS: Displays the current total read and write IO operations occurring on the drive where the database or transaction log file resides. High I/O
may be normal for some databases, but excessively high I/O will lead to
547
Transaction Log Size by File
l
higher queue lengths, meaning there are more requests for disk reads or
writes than the storage subsystem can handle.
Latency: Displays a measurement of disk latency occurring on the disk
where the database or transaction log file resides. High volume latency values indicate sluggish database performance.
The performance counter, Database Files, is used to provide metrics for this
resource. It is used in combination with volume polling. This counter is not listed
in the resource; however, the thresholds can be changed.
To change the thresholds for the Database Files performance counter:
1. From the Database Details view, locate the Database Files resource and
click Edit in the Management field.
2. Locate the Database Files performance counter and click [+] to expand the
counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
Transaction Log Size by File
This resource lists the current status of transaction log files as sorted by size.
Hovering the mouse over a listed percentage will reveal a tooltip with detailed
information about the item listed. Clicking the percentage will take you to the
Database Details page. If the Warning or Critical thresholds is breached, the color
of the bar chart will change from green to yellow or red, respectively.
548
Chapter 15: AppInsight Applications
l
l
l
l
l
File Path: Displays the complete file path of the listed transaction log.
Auto-Growth: Displays the current Auto-growth setting.
File Size: Displays the current size of the listed transaction log.
Database Usage: This resource displays the amount of space consumed
as a percentage of whatever restrictions are in place for the file. For
example:
o If the transaction log is allowed to grow unrestricted, then it is limited
only by the amount of free space on the volume.
o If the transaction log is allowed to grow to a maximum size, the percentage is calculated based on this restricted size limit.
o If the transaction log has a fixed size, the percentage used is calculated based on the total size of the transaction log file and the
amount of remaining white space.
Volume Usage: Displays the amount of space the listed file is consuming
on the volume where it is located.
The performance counter, Database Files, is used to provide metrics for this
resource. This counter is not listed in the resource; however, the thresholds can
be changed.
To change the thresholds for the Database Files performance counter:
1. From the Database Details view, locate the Database Files resource and
click Edit in the Management field.
549
Transactions
2. Locate the Database Files performance counter and click [+] to expand
the counter and reveal the counter details.
3. Click Override Template and adjust the thresholds to suit your needs.
4. When done, click Submit.
Transactions
A transaction is a unit of work that is performed against a database. In other
words, if you are creating a record, for example, then you are performing
transaction on the table. It is important to control transactions to ensure data
integrity and to handle database errors.
This resource contains monitors specific to the current status of transactions. The
icons of the listed performance counters in the Statistic Name column will change
color to reflect the listed counter's current state. Clicking any performance counter
in the Statistic Name column will take you to the Performance Counter Details
page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
550
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Longest
Transaction
Running
Time
Definition:
This performance counter displays the length of time, in
seconds, the transaction that has been running the longest,
has been active.
Information:
Transactions that run longer than others use more resources.
They can be used to track down procedures and calls that are
taking longer than expected by identifying the specific
transaction(s).
Possible problems:
Long running transactions can prevent truncation of
transaction logs. This can cause the transaction log files to
grow until they consume all available physical disk space
shutting down access to the database.
Remediation:
Check the functionality of the query and/or redesign the long
running transaction.
551
Transactions
Transactions/ Definition:
sec
This performance counter returns the number of transactions
started for the database, per second.
Information:
Transaction rate is affected by general system performance
and resource constraints, such as I/O, number of users, cache
size, and the complexity of requests.
Possible problems:
A high rate of transactions can indicate that some transactions
are not completing.
Remediation:
Using stored procedures in transactions speeds transaction
processing because SQL code in stored procedures runs
locally on the server. The transactions can finish much faster
without the network traffic required by the transactions.
Active
Transactions
Definition:
This performance counter returns the number of active
transactions for the database.
Information:
During an active transaction, no other transaction can modify
the data held by the active transaction. While you are
modifying data, an exclusive lock is held on that data.
Conversely, you cannot read data held by another transaction
because another transaction holds an exclusive lock on the
data that prevents it from being read. The returned value for
this monitor should be less than 200.
Possible problems:
A high number of active transactions can indicate that certain
transactions are never completing.
Remediation:
Keeping a low level of active transactions assists in keeping
requested data accessible.
552
Chapter 15: AppInsight Applications
Repl. Trans.
Rate
(Replication
Transactions
Rate)
Definition:
This performance counter returns the number of transactions
read out of the transaction log and sent to the distribution
database
Information:
SQL Server Overall Replication Performance Analysis
provides a graph of several SQL Server overall replication
performance counters for the specified server during the
specified time period. Performance counter data is averaged
by the hour. The graph displays the following replication
performance counters:
l
l
l
Bulk Copy
Rows/sec
SQLServer:Databases / Replication Pending Xacts
(SQL Server; Scale=1\100)
SQLServer:Databases / Replication Transaction Rate
(SQL Server; Scale=1\100)
SQLServer Replication Published DB / Replicated
Transactions Per Second
Definition:
This monitor returns the number of rows bulk copied per
second.
Information:
Measure the number of rows coming into the database.
Optimization yields a higher number. See The Data Loading
Performance Guide http://technet.microsoft.com/enus/library/dd425070(v=SQL.100).aspx
Possible problems:
BCP to bulk load data over the network, having the correct
throughput configured is crucial.
Bulk Copy
Throughput/
Sec
Definition:
This monitor returns the amount of data bulk copied (in
kilobytes) per second.
Possible problems:
Overall throughput will mostly be limited by your I/O
553
AppInsight for Exchange
subsystem.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
AppInsight for Exchange
AppInsight for Exchange was designed exclusively for the mailbox role which
offers a detailed view of your Exchange environment. This application provides
detailed metrics on mailboxes, databases, and a host of performance counters
without the use of agents or templates. AppInsight for Exchange's level of detail
and expert knowledge† goes far beyond what an Exchange template can provide,
allowing you to monitor virtually every aspect of your Exchange environment.
Like any unassigned application in SAM, AppInsight for Exchange is considered
a template until it is applied. Therefore, it is a member of the Application Monitor
Templates collection.
Once applied to a node, AppInsight for Exchange is considered an application.
Like any SAM application, AppInsight for Exchange is comprised of multiple
component monitors.
Note: To optimize your Exchange server performance, see 5 Tips to Optimize
Exchange Server for Improved Performance.
AppInsight for Exchange General Information:
l
l
l
l
l
l
l
AppInsight for Exchange Requirements and Permissions
AppInsight For Exchange Licensing
Template/Application Relationship
Adding AppInsight for Exchange to a Node
Editing the AppInsight for Exchange Template
Understanding the AppInsight for Exchange Details Views
Navigating the AppInsight for Exchange Details View
554
Chapter 15: AppInsight Applications
_________________
† Portions of the performance counter information used in the AppInsight for Exchange application are provided courtesy of
multiple sources listed in the copyright and attribution section at the beginning of this document.
AppInsight For Exchange Licensing
When using AppInsight for Exchange, 50 component monitors will count against
your licensed number of component monitors, per Exchange Server.
For example, if you have an active license for 1,500 component monitors and use
AppInsight for Exchange to monitor 88 mailboxes over ten Exchange servers, 500
component monitors will count against your total license. The number of
mailboxes you have on these servers is irrelevant.
(50 component monitors X 10 Exchange Servers = 500 component
monitors used.)
This will leave you with 1,000 component monitors available for use elsewhere.
(1,500 component monitors – 500 component monitors used for
AppInsight for Exchange = 1,000 component monitors remaining).
There is no restriction on the number of mailboxes you can have monitored. Also
note that if you choose not to use this application, you will not be penalized any
number of component monitors.
Important: The example below illustrates a situation where you would have 40
available component monitors available, but have surpassed your allowed
number of 300 monitors by 60. The discrepancy is caused by AppInsight
application implementations. AppInsight applications are licensed as 50 monitors
per application and cannot be partially licensed, as is the case with typical
applications.
555
AppInsight for Exchange Requirements and Permissions
For more information, see "Licensing."
AppInsight for Exchange Requirements and Permissions
AppInsight for Exchange works only with the Mailbox Role, which is used for
data storage. All other Exchange servers running different roles should use the
Exchange application templates included with SAM if you intend to monitor them.
Data is collected at the same default five minute polling interval as traditional
application templates.
Following are the requirements and permissions needed for AppInsight for
Exchange:
Microsoft Exchange Versions Supported:
l
l
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
AppInsight for Exchange Requirements and Permissions
l
l
Local administrator permissions are needed for automatic configuration, but
they are not needed for monitoring once configuration is complete.
To provide organization-wide capability, the service account (Domain
User) needs to be a member of the View-Only Organization Management
group. Membership to this group gives the user object read-only access to
the entire Exchange environment, without providing any domain or local
access on the Exchange server. It also prevents possible abuse by an unauthorized user accessing the account (e.g. modifying Exchange environment
configuration, creating/deleting users, and so on.)
556
Chapter 15: AppInsight Applications
l
In order to gather information, the user object must be assigned the Mailbox
Search management role within Exchange. In order for the account to be
configured correctly, the account must be a member of the Local Administrators group.
Note: For Exchange access this is not required, but in order to modify
Exchange and WinRM settings on the server, as well as to poll performance
counters, this additional level of permission is required.
PowerShell Requirements
l
l
l
l
Exchange 2010 must have PowerShell 2.0 installed
Exchange 2013 must have PowerShell 3.0 installed
Permissions must be granted for PowerShell to be accessed
PowerShell 2.0 is required for Windows 2012 (regardless of Exchange version)
For information on configuring PowerShell permissions, see PowerShell
Permissions.
Common Configuration Issues
l
l
l
l
l
l
l
l
l
l
l
To add local administrative privileges to an Active Directory account, see
Manually Configuring Exchange Server.
To find Exchange URL settings, see Finding Exchange URL Settings.
To install PowerShell on the Exchange server, see Manually Configuring
Exchange Server
To set the appropriate permissions for PowerShell, see PowerShell Permissions
To create a self-signed certificate, see Manually Configuring Exchange
Server.
To configure WinRM, see Manually Configuring Exchange Server.
To create a firewall rule for WinRM, see Manually Configuring Exchange
Server
To configure IIS, see Manually Configuring Exchange Server
To correct a Non-Domain account configuration error, see Manually Configuring Exchange Server.
To correct an Exchange access configuration error, see Manually Configuring Exchange Server.
To correct a Mailbox Search Access configuration error, see Manually Configuring Exchange Server.
557
Quick Configuration and Navigation
Quick Configuration and Navigation
Configuration of SAM's AppInsight for Exchange is most easily achieved via
Discovery, as shown below.
l
To add AppInsight for Exchange, see Adding AppInsight for Exchange to a
Node
AppInsight for Exchange Requirements and Permissions
l
l
l
Local administrator permissions are needed for automatic configuration, but
they are not needed for monitoring once configuration is complete.
To provide organization-wide capability, the service account (Domain
User) needs to be a member of the View-Only Organization Management
group. Membership to this group gives the user object read-only access to
the entire Exchange environment, without providing any domain or local
access on the Exchange server. It also prevents possible abuse by an unauthorized user accessing the account (e.g. modifying Exchange environment
configuration, creating/deleting users, and so on.)
In order to gather information, the user object must be assigned the Mailbox
Search management role within Exchange. In order for the account to be
configured correctly, the account must be a member of the Local Administrators group.
For more information, see Troubleshooting Permissions.
Adding AppInsight for Exchange to a Node
There are multiple ways to add AppInsight for Exchange to a node. This can be
done via Node Discovery, adding it via the Management resource, adding it via
Network Sonar Discovery, or adding it via a Scheduled Discovery.
It is recommended that you add this application on WMI managed nodes. If you
convert an SNMP managed node to WMI, interface statistics will be lost. To
convert SNMP managed nodes to WMI, see Promoting a Node to WMI Monitoring
Notes:
l
l
Multiple instances of Exchange on the same server is not supported.
Nodes that are not added via WMI will not appear in the List Resources dialog.
558
Chapter 15: AppInsight Applications
l
Monitoring an Exchange Database Access Group (DAG) via a Virtual
IP address (VIP) is not supported. AppInsight for Exchange should only be
applied to the physical IP address of each mailbox server in the DAG individually.
AppInsight for Exchange Requirements and Permissions
l
l
l
Local administrator permissions are needed for automatic configuration, but
they are not needed for monitoring once configuration is complete.
To provide organization-wide capability, the service account (Domain
User) needs to be a member of the View-Only Organization Management
group. Membership to this group gives the user object read-only access to
the entire Exchange environment, without providing any domain or local
access on the Exchange server. It also prevents possible abuse by an unauthorized user accessing the account (e.g. modifying Exchange environment
configuration, creating/deleting users, and so on.)
In order to gather information, the user object must be assigned the Mailbox
Search management role within Exchange. In order for the account to be
configured correctly, the account must be a member of the Local Administrators group.
Note: For Exchange access this is not required, but in order to modify
Exchange and WinRM settings on the server, as well as to poll performance
counters, this additional level of permission is required.
To Add AppInsight for Exchange via the Management Resource:
1. Navigate to the Node Details view by clicking any Windows node.
2. From the Management resource, click List Resources.
3. Check the Microsoft for Exchange Server box to enable AppInsight Applications data collection. When done, click Submit.
559
Adding AppInsight for Exchange to a Node
4. Navigate to the All Applications resource to verify the addition by clicking
the Applications tab in the web console.
5. Click on the newly added AppInsight for Exchange application in this view
and then enter your Exchange credentials when prompted.
560
Chapter 15: AppInsight Applications
6. Once your credentials are entered, click Configure Server.
To Add AppInsight for Exchange to a Node via Discovery:
1. From the web console, navigate to Settings > Add a Node in the Getting
Started with Orion section.
2. Complete the information on the Define Node step, and then click Next.
3. On the Choose Resources step, check the AppInsight for Exchange
applications you want. AppInsight applications have a unique blue and
white icon, as shown:
561
Adding AppInsight for Exchange to a Node
4. Click Next and complete the wizard as instructed.
5. Navigate to the All Applications resource and click your application.
6. Enter your Exchange credentials when prompted, and then click Configure
Server.
562
Chapter 15: AppInsight Applications
For information on Network Sonar Discovery, see:
l
l
Network Sonar Discovery.
Managing Scheduled Discovery Results.
Understanding the AppInsight for Exchange Details Views
AppInsight for Exchange has multiple Details views. These views are the
equivalent of the Application Details view of a traditional SAM application. There
are four main views:
l
l
l
l
The AppInsight for Exchange Details view: This view displays a broad overview of the application.
The Performance Counter Details View: This view displays details about
the selected performance counter.
The Database Details View: This view displays details about the selected
database.
The Mailbox Details View . This view displays details about the selected
mailbox.
From the AppInsight for Exchange Details view, you can select from
the drop down menu and choose to display different amounts of data
563
Navigating the AppInsight for Exchange Details View
based on a time range, as shown below:
Editing Resources
Both the titles and subtitles of each resource can be changed by clicking Edit in
the upper right-hand corner of any resource, and then clicking Submit.
Note: As illustrated above, other options may appear depending upon the
resource being edited.
For more information, see:
l
l
l
l
AppInsight for Exchange Details View
Performance Counter Details View
AppInsight for Exchange Database Details View
AppInsight for Exchange Mailbox Details View
Navigating the AppInsight for Exchange Details View
AppInsight for Exchange acts like any other application and can therefore be
found in the All Applications resource on the Application Summary view.
564
Chapter 15: AppInsight Applications
Below is the AppInsight for Exchange application within the All Applications
resource:
Navigating to the AppInsight for Exchange Details View:
1. From the web console, locate the All Applications resource by clicking
either the Home or Applications tab.
2. Expand the AppInsight for Exchange tree by clicking [+].
3. Expand the node tree by clicking [+].
565
Navigating the AppInsight for Exchange Details View
4. Click the application, as highlighted:
Navigating to the Performance Counter Details view:
1. From the AppInsight for Exchange Details view, click any performance
counter within a resource, as highlighted:
Navigating to the Database Details view:
1. From the AppInsight for Exchange Details view, click any database within a
Database resource, as highlighted:
566
Chapter 15: AppInsight Applications
Navigating to the Mailbox Details view:
1. From the AppInsight for Exchange Details view, click any user name within
a Mailbox resource, as highlighted:
.
Advanced Manual Configuration
AppInsight for Exchange's automated configuration tool makes adding this
application to a node simple. However, there may be times when you want to
manually configure available settings, permissions, and so on. Manual
configuration is only recommended for experienced Exchange administrators.
To Manually Configure Available Settings, refer to the following sections:
l
l
l
Changes that will be made to enable AppInsight for Exchange
Finding Exchange Credentials
Manually Configuring Exchange Server
567
Changes that will be made to enable AppInsight for Exchange
l
l
l
AppInsight for Exchange Requirements and Permissions
Finding Exchange URL Settings
PowerShell Permissions
Changes that will be made to enable AppInsight for Exchange
The target machine must have the following:
l
l
l
WinRM 2.0
PowerShell v2.0
IIS
SAM uses a specially designed configuration tool to make the necessary
changes for enabling AppInsight for Exchange. Once this tool completes remote
configuration, it will automatically remove and unregister itself.
1. The configuration tool first transfers to the Exchange Server by using the
Windows administrative share.
2. Once on the Exchange Server, the tool uses a custom PowerShell script to
make configuration changes.
3. SAM will add the Mailbox Search Role to the Exchange server with the credentials provided.
4. The tool then reports back to SAM with the results.
5. If errors are reported, you will be asked to configure Exchange.
SAM will make the following configuration changes:
l
l
l
Enable WinRM
Enable Windows Authentication for PowerShell's web site.
WinRM and Windows Authentication configurations are performed remotely
from SAM.
For more information, see:
l
l
l
l
l
l
To add local administrative privileges to an Active Directory account, see
Manually Configuring Exchange Server.
To find Exchange URL settings, see Finding Exchange URL Settings.
To install PowerShell on the Exchange server, see Manually Configuring
Exchange Server
To set the appropriate permissions for PowerShell, see PowerShell Permissions
To create a self-signed certificate, see Manually Configuring Exchange
Server.
To configure WinRM, see Manually Configuring Exchange Server.
568
Chapter 15: AppInsight Applications
l
l
l
l
l
To create a firewall rule for WinRM, see Manually Configuring Exchange
Server
To configure IIS, see Manually Configuring Exchange Server
To correct a Non-Domain account configuration error, see Manually Configuring Exchange Server.
To correct a Exchange access configuration error, see Manually Configuring Exchange Server.
To correct a Mailbox Search Access configuration error, see Manually Configuring Exchange Server.
Finding Exchange Credentials
For an account to access Exchange:
l
l
l
The account must be a domain account.
In order to modify IIS and PowerShell settings on the Exchange server, the
account must be a Local Administrator.
The account is recommended to not be a member of the Domain Administrators group. (Typically, this is handled by adding a custom domain
security group which is used to define a specific type of administrator with
specific permissions to the Local Administrators group. In larger, more
mature environments, this is handled using GPOs, whereas smaller organizations may perform this task manually).
The verify you have valid Exchange credentials, run the following cmdlet in the
Exchange Management Shell (EMS):
Get-ManagementRoleAssignment -RoleAssignee “USER_IDENTITY”
569
Finding Exchange Credentials
For more information, see:
l
l
l
l
l
l
l
l
l
l
To add local administrative privileges to an Active Directory account, see
Manually Configuring Exchange Server.
To find Exchange URL settings, see Finding Exchange URL Settings.
To install PowerShell on the Exchange server, see Manually Configuring
Exchange Server
To set the appropriate permissions for PowerShell, see PowerShell Permissions
To create a self-signed certificate, see Manually Configuring Exchange
Server.
To configure WinRM, see Manually Configuring Exchange Server.
To create a firewall rule for WinRM, see Manually Configuring Exchange
Server
To configure IIS, see Manually Configuring Exchange Server
To correct a Non-Domain account configuration error, see Manually Configuring Exchange Server.
To correct a Exchange access configuration error, see Manually Configuring Exchange Server.
570
Chapter 15: AppInsight Applications
l
To correct a Mailbox Search Access configuration error, see Manually Configuring Exchange Server.
Manually Configuring Exchange Server
To manually prepare an Exchange server for AppInsight for Exchange, the
following items must be installed and/or configured on the server. Instructions for
each item are listed on this page below.
l
l
l
l
l
l
l
l
Defining Exchange Credentials
Installing PowerShell 2.0 on Server 2008 R2:
Installing PowerShell 2.0 on Server 2012:
Setup PSLanguageMode for the PowerShell web site.
Create a Self-Signed Certificate:
WinRM 2.0
Create a Firewall Rule
Configuring IIS
For a list of possible configuration errors with solutions, see Troubleshooting
Error Codes in AppInsight for Exchange.
Defining Exchange Credentials
Non-Domain Account
Local accounts (Non-Domain) cannot access Exchange Management interfaces
and therefore are not supported by AppInsight for Exchange. Please select an
Active Directory account or create a new one to use with AppInsight for
Exchange.
Add Local Administrative privileges to an Active Directory Account
1. On the server where you wish to grant local administrative privileges, open
a Computer Management console.
Note: On Windows 2012, add this privilege using the Active Directory console.
2. Navigate to System Tools > Local Users and Groups > Groups and
double click the Administrators group.
3. Click Add and type in the Active Directory username of the account you
want to grant administrative privileges and then press Enter. (Ensure the location is set to either the domain where the account is located or Entire Directory.)
4. Click Apply and then click OK button.
Note: Alternatively, you can add an Active Directory group to the local
571
Installing PowerShell 2.0 on Server 2008 R2:
administrators group and add the Active Directory user accounts to that
group.
Exchange Access
Granting Least Privilege access to the Exchange Organization can be
accomplished using Active Directory Users and Computers (ADUC). To
accomplish this, take the following steps:
1. From the Start Menu, open ADUC and navigate to the Microsoft Exchange
Security Groups OU.
2. Double click on the View-Only Organization Management group.
3. After the window opens, click the Members tab, then click the Add.
4. Type the username of the account you want to grant access to the
Exchange organization and then click OK.
5. Click Apply and then click OK.
6. Close the ADUC window.
Mailbox Search Access
Mailbox Search access is required to determine attachment counts and sizes.
This can be granted using the Exchange Management Shell (EMS).
1. From the Start menu, open the EMS.
2. Type: New-ManagementRoleAssignment -Role "Mailbox Search" -User
<Username of account being granted access> and then press Enter.
3. To verify the management role has been properly assigned, enter the following command:
Get-ManagementRoleAssignment -RoleAssignee <Username of account>
Installing PowerShell 2.0 on Server 2008 R2:
Note: PowerShell 2.0 is automatically installed on Server 2008 R2 and therefore
no additional installation is required.
1. Navigate to Windows Management Framework
(http://go.microsoft.com/fwlink/?LinkId=177670).
2. Review the information on the web page, and then click the link for the
download of the Windows Management Framework Core for your platform
in the Download Information section.
3. On the Update page, click Download.
4. When the download is complete, click Finish.
572
Chapter 15: AppInsight Applications
Installing PowerShell 2.0 on Server 2012:
1. Open Server Manager
2. Click on the Manage menu, and the select Add Roles and Features.
3. After the wizard opens, click Next until you get to the Installation Type page.
4. Select Role-based or feature-based installation.
5. Click Next until you reach the Features page.
6. Scroll down to Windows PowerShell. It will likely show itself as partially
installed (square inside box).
7. Check the box next to Windows PowerShell 2.0 Engine.
8. Click Next and then Install.
573
Create a Self-Signed Certificate:
9. When the installation finishes, click Close.
To Set PSLanguage mode for the PowerShell website:
1.
2.
3.
4.
5.
Open IIS Manager on the Exchange server.
Expand the tree to the Default Web Site/PowerShell virtual directory.
Double click Application Settings.
Change the value for PSLanguageMode to FullLanguage, if not already set.
Recycle the MSExchangePowerShellAppPool application pool
For Exchange 2013, also check the following:
1. Expand the tree to the Exchange Back End/PowerShell virtual directory
2. Double click Application Settings.
3. Change the value for PSLanguageMode to FullLanguage, if not already
set.
4. Recycle the MSExchangePowerShellFrontEndAppPool application pool
Create a Self-Signed Certificate:
SolarWinds has created a PowerShell script to create a self-signed certificate
suitable for AppInsight for Exchange. This can be found at: Self-signed Certificate
PowerShell script for AppInsight for Exchange. If you choose not to download this
script, you can create your own self-signed certificate with the following
instructions and code:
574
Chapter 15: AppInsight Applications
1. To create a self-signed certificate using PowerShell and CertEnroll, open
PowerShell in the Run as Administrator context.
2. Enter the following code:
Note: The CN (Subject) should be in the following format: "<IP Address of
Server>_Solarwinds_Exchange_Zero_Configuration."
For Example: “10.199.15.106_Solarwinds_Exchange_Zero_Configuration”
$name = new-object -com
"X509Enrollment.CX500DistinguishedName.1"
$name.Encode("CN=TestServer", 0)
$key = new-object -com
"X509Enrollment.CX509PrivateKey.1"
$key.ProviderName = "Microsoft RSA SChannel
Cryptographic Provider"
$key.KeySpec = 1
$key.Length = 1024
$key.SecurityDescriptor = "D:PAI(A;;0xd01f01ff;;;SY)
(A;;0xd01f01ff;;;BA)(A;;0x80120089;;;NS)"
$key.MachineContext = 1
$key.Create()
$serverauthoid = new-object -com
"X509Enrollment.CObjectId.1"
$serverauthoid.InitializeFromValue
("1.3.6.1.5.5.7.3.1")
$ekuoids = new-object -com
"X509Enrollment.CObjectIds.1"
$ekuoids.add($serverauthoid)
$ekuext = new-object -com
"X509Enrollment.CX509ExtensionEnhancedKeyUsage.1"
$ekuext.InitializeEncode($ekuoids)
$cert = new-object -com
"X509Enrollment.CX509CertificateRequestCertificate.
1"
$cert.InitializeFromPrivateKey(2, $key, "")
$cert.Subject = $name
$cert.Issuer = $cert.Subject
$cert.NotBefore = get-date
$cert.NotAfter = $cert.NotBefore.AddDays(3650)
$cert.X509Extensions.Add($ekuext)
575
WinRM 2.0
$cert.Encode()
$enrollment = new-object -com
"X509Enrollment.CX509Enrollment.1"
$enrollment.InitializeFromRequest($cert)
$certdata = $enrollment.CreateRequest(0)
$enrollment.InstallResponse(2, $certdata, 0, "")
For more information, see Generating a Certificate.
WinRM 2.0
1. To configure WinRM on an Exchange server, open a command prompt in
the Run as Administrator context.
2. Type: winrm create winrm/config/listener?Address=*+Transport=HTTPS
@{Port="5986";CertificateThumbprint="<Thumbprint value of certificate>";Hostname="<IP Address of Server>_Solarwinds_Exchange_
Zero_Configuration"}
and then press Enter.
3. Verify the configuration by typing the following: winrm get
winrm/config/listener?Address=*+Transport=HTTPS.
Create a Firewall Rule
To create a firewall rule for WinRM, follow the directions outlined below:
1. Open PowerShell in the Run as Administrator context.
2. Create a function for adding firewall rules using the following code:
function Add-FirewallRule {
576
Chapter 15: AppInsight Applications
param(
$name,
$tcpPorts,
$appName = $null,
$serviceName = $null
)
$fw = New-Object -ComObject hnetcfg.fwpolicy2
$rule = New-Object -ComObject HNetCfg.FWRule
$rule.Name = $name
if ($appName -ne $null) { $rule.ApplicationName = $appName }
if ($serviceName -ne $null) { $rule.serviceName = $serviceName }
$rule.Protocol = 6 #NET_FW_IP_PROTOCOL_TCP
$rule.LocalPorts = $tcpPorts
$rule.Enabled = $true
$rule.Grouping = "@firewallapi.dll,-23255"
$rule.Profiles = 7 # all
$rule.Action = 1 # NET_FW_ACTION_ALLOW
$rule.EdgeTraversal = $false
$fw.Rules.Add($rule)
}
3. Run the function to create the firewall exception for WSMAN using the
following command:
Add-FirewallRule "Windows Remote Management" "5986" $null
$null
577
Configuring IIS
4. Verify the rule was created by navigating to Control Panel > Windows
Firewall > Advanced Settings.
Configuring IIS
1. Open a command prompt in the Run as Administrator context.
2. Change the directory to C:\Windows\System32\Inetsrv.
3. Type: appcmd.exe unlock config -section:system.webServer/security/authentication/windowsAuthentication
and then press Enter.
4. Open PowerShell in the Run As Administrator context.
5. Type: Import-Module WebAdministration and then press Enter.
6. Type: (Get-WebConfiguration system.webServer/security/authentication/windowsAuthentication 'IIS:\s-
and then press Enter to
determine if Windows Authentication has been configured.
ites\Default Web Site\PowerShell').enabled
578
Chapter 15: AppInsight Applications
a. If the value returned is True, you do not need to do anything.
b. If the value returned is False, then take the following steps:
i. Type: Set-WebConfiguration system.webServer/security/authentication/windowsAuthentication
'IIS:\sites\Default Web Site\PowerShell' -value True
and
then press Enter.
ii. Type: (Get-WebConfiguration system.webServer/security/authentication/windowsAuthentication
'IIS:\sites\Default Web Site\PowerShell').enabled
to verify
the setting has changed.
iii. Close PowerShell.
iv. In the open command prompt, type: appcmd.exe lock config section:system.webServer/security/authentication/windows
Authentication
and then press Enter.
v. Close the command prompt.
Testing the Application:
1. When you are finished with configuration, navigate to the Application Edit
page and click Test.
579
For more information, see:
2. If successful, your screen should look like the illustration below:
For more information, see:
l
l
l
l
l
l
l
To add local administrative privileges to an Active Directory account, see
To find Exchange URL settings, see Finding Exchange URL Settings.
To install PowerShell on the Exchange server, see Manually Configuring
Exchange Server
To set the appropriate permissions for PowerShell, see PowerShell Permissions
To create a self-signed certificate, see Manually Configuring Exchange
Server.
To configure WinRM, see Manually Configuring Exchange Server.
To create a firewall rule for WinRM, see Manually Configuring Exchange
Server
580
Chapter 15: AppInsight Applications
l
l
l
l
To configure IIS, see Manually Configuring Exchange Server
To correct a Non-Domain account configuration error, see
To correct a Exchange access configuration error, see Manually Configuring Exchange Server.
To correct a Mailbox Search Access configuration error, see
Finding Exchange URL Settings
By default, AppInsight for Exchange uses the following URLs for the Exchange
and WinRM sessions, where ${IP} is the IP address of the server node being
added.
Exchange: https://${IP}/powershell/
WinRM: https://${IP}:5986/wsman/
To verify the PowerShell instance used by Exchange on a server, follow the
steps listed below:
1. Open IIS Manager.
2. Navigate to the default website, and then navigate to the PowerShell virtual
directory.
3. Click on Advanced Settings, and verify the Virtual Path value.
To verify a server's WinRM PowerShell instance, follow the steps listed
below:
1. Open a command prompt in the Run as Administrator context.
2. Type: winrm get winrm/config/listener?Address=*+Transport=HTTPS to
get the current configuration for the HTTPS protocol.
581
To verify the PowerShell instance used by Exchange on a server, follow the steps
Note: The two items of interest for the URL are Port and URLPrefix. If either of
these have been modified and do not match the default values, edit the
AppInsight for Exchange application with the correct values.
Additionally, the value of Hostname must match the CN of the certificate listed in
the Certificate Thumbprint property.
582
Chapter 15: AppInsight Applications
For more information, see:
l
l
l
l
l
l
To add local administrative privileges to an Active Directory account, see
Manually Configuring Exchange Server.
To find Exchange URL settings, see Finding Exchange URL Settings.
To install PowerShell on the Exchange server, see Manually Configuring
Exchange Server
To set the appropriate permissions for PowerShell, see PowerShell Permissions
To create a self-signed certificate, see Manually Configuring Exchange
Server.
To configure WinRM, see Manually Configuring Exchange Server.
583
PowerShell Permissions
l
l
l
l
l
To create a firewall rule for WinRM, see Manually Configuring Exchange
Server
To configure IIS, see Manually Configuring Exchange Server
To correct a Non-Domain account configuration error, see Manually Configuring Exchange Server.
To correct a Exchange access configuration error, see Manually Configuring Exchange Server.
To correct a Mailbox Search Access configuration error, see Manually Configuring Exchange Server.
PowerShell Permissions
To set the appropriate permissions for PowerShell, follow these steps:
1. On the remote computer, open the PowerShell console.
2. Execute Set-PSSessionConfiguration Microsoft.Powershell -ShowSecurityDescriptorUI -Force The permissions dialog should appear.)
3. Uncheck the Deny check box to enable the Full Control option under the
Permissions for Everyone group, then check Allow.
584
Chapter 15: AppInsight Applications
4. Ensure that the group to which the polling user belongs has access to
Microsoft PowerShell.
5. Click OK.
Note: If PowerShell 2.0 was installed on Windows Server 2012 with Exchange
2013 and subsequently uninstalled, a Microsoft error removes the required
registry key for remote PowerShell to work properly. Security patches or updates
may also cause this issue. You can create the required registry key by following
these instructions:
1. Open Notepad.
2. Copy and paste the following text into Notepad:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_
MACHINE\SOFTWARE\Microsoft\PowerShell\1\PowerShellEngine]
"ApplicationBase"="C:\\Windows\\System32\\WindowsPowerShell
\\v1.0"
585
Editing the AppInsight for Exchange Template
"PSCompatibleVersion"="1.0, 2.0"
"RuntimeVersion"="v2.0.50727"
"ConsoleHostAssemblyName"="Microsoft.PowerShell.ConsoleHos
t, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=31bf3856ad364e35,
ProcessorArchitecture=msil"
"ConsoleHostModuleName"="C:\\Windows\\System32\\WindowsPowe
rShell\\v1.0\\Microsoft.PowerShell.ConsoleHost.dll"
"PowerShellVersion"="2.0"
3. Save the file as PowerShellv1.regand then double-click it to add it to the
registry. (A reboot may be required.)
For more information, see: PowerShell.
Editing the AppInsight for Exchange Template
The AppInsight for Exchange application behaves like any other application in
SAM. And like other applications, AppInsight for Exchange's template can be
edited.
Note: Some limitations may apply.
Editing the AppInsight for Exchange Template:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Check the AppInsight for Exchange template in the list and then click Edit.
586
Chapter 15: AppInsight Applications
3. From here, you can edit certain component monitors within the template.
4. When done editing, click Submit at the bottom of the screen.
Attachment Extensions
The following table lists the default attachment extensions that are acknowledged
by AppInsight for Exchange:
.accdb
.doc
.inf
.mmp
.ppt
.swf
.xml
.arj
.dot
.ini
.mobi
.ps1
.tar
.xps
.avi
.eml
.iso
.mov
.pst
.tmp
.zip
.bak
.epub
.jar
.mp3
.pub
.txt
.bat
.flv
.jpg
.mpeg
.psd
.vbs
587
AppInsight for Exchange Alerts
.bin
.gif
.jpeg
.msg
.rar
.wav
.bmp
.gzip
.lnk
.pdf
.reg
.wks
.cab
.hta
.log
.png
.rtf
.wma
.cmd
.htm
.mdb
.pot
.sql
.wmv
.csv
.img
.mid
.pps
.svg
.xls
AppInsight for Exchange Alerts
AppInsight for Exchange comes with following pre-defined alerts:
l
l
l
l
l
l
l
Alert me when a replication status check fails
Alert me when mailbox database file is low on space
Alert me when mailbox database is in warning or critical
state
Alert me when mailbox database is not on preferred server
Alert me when mailbox database transaction log is low on
space
Notify users that their mailbox is exceeding size or quota
Warn me when database failover occurs
To View Alerts:
1. From the web console, navigate to Home > Alerts > Manage Alerts.
2. Select the alerts you want to view from the list, or type a keyword in the text
box and click the Search button:
588
Chapter 15: AppInsight Applications
For more information, see:
l
l
l
l
SolarWinds SAM Alerts
Creating Alerts
Predefined Server & Application Monitor Web Console Based Reports
Adding Alerts
AppInsight for Exchange Details View
The Exchange Details view provides a great deal of information about the current
Exchange Application. The available resources offered in this view include:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Active Alerts
Application Availability
Application Details
Calendar and Resource Booking
Critical Processes and Services
Exchange Event Log Message Details
Exchange Server
Information Store
Mailbox Database Copies
Mailbox Database Size and Space Used
Mailbox Database Status
Mail Database
Management
Replication
Replication Status Checks
Storage
Users By Mailbox Size
589
Active Alerts
l
l
Users By % Mailbox Quota Used
Users By Messages Sent
Note: Chart resources require several values for lines on charts to be visible.
Active Alerts
This resource lists details about all unacknowledged active alerts.
The following defines the three columns of this resource:
l
l
l
Time of Alert: Displays the time and date the listed alert was triggered.
Object Name: Displays the object that triggered the alert. Clicking the
object will take you to the details page for that object.
Message: Displays the message of the listed alert.
Application Availability
This resource graphically shows the various states of an application in a
percentage format and is made up of three sections: the legend, the main chart,
and the lower chart. The colors of the main chart correspond to the labels in the
legend.
590
Chapter 15: AppInsight Applications
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
591
Application Details
Application Details
This resource provides details concerning the current Exchange application.
The following list defines each field of this resource:
l
l
l
l
l
l
Application Name: This provides the name of the current application as
well as the name of the node on which it is active. Hovering over the node
name will reveal a detailed tooltip concerning the health of that node.
Status: Displays the current status of the application.
Exchange Server Version: Displays the current version of Exchange that
is being monitored.
Exchange Server Build Number: This is Microsoft's internal versioning
number system that indicates the version of Exchange installed. For more
information, refer to this article: http://technet.microsoft.com/library/hh135098%28EXCHG.141%29.aspx
Exchange Domain: The domain of the listed Exchange server.
Database Availability Group (DAG): This contains information pertaining
to the DAG of which the local node belongs.
l DAG Name: Name of the listed Database Availability Group.
l Other Exchange Servers in DAG: Lists additional Exchange servers
in the current DAG.
l File Share Witness: The File Share Witness (FSW) is the quorum directory for the DAG Cluster. It is used to provide a majority node set in
a DAG with an even number of members. In a DAG with an odd number of members, the FSW still exists, but is not used to determine a
majority node set. For additional information, see: http://b-
592
Chapter 15: AppInsight Applications
l
l
logs.technet.com/b/askpfeplat/archive/2012/06/27/clustering-whatexactly-is-a-file-share-witness-and-when-should-i-use-one.aspx
Witness Share in use: This is the current witness share in use.
Note: This field may be replaced with the Alternate File Share Witness field.
(Alternate File Share Witness): The Alternate FSW is used when the
primary site with the FSW has failed. To use the Alternate FSW
requires manual intervention from the Exchange administrator.
Note: This field may be replaced with the Witness Share in use field.
Calendar and Resource Booking
This resource contains performance counters specific to the status of calendar
and resource booking. The icons of the listed performance counters in the
Statistic Name column will change color to reflect the listed counter's current
state. Clicking any performance counter in the Statistic Name column will take
you to the Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
Calendaring is method of creating, changing, deleting, accepting, or declining a
meeting via an email message. Resource booking is an automated process of
creating, changing, and deleting calendar requests for resource mailboxes. The
Calendar and Resource Booking Attendant are the processes used by Exchange
to fulfill requests for each. Once a request has been accepted, the free/busy data
for the mailbox is updated.
593
Calendar and Resource Booking
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
Average
Resource
Booking
Processing
Time
Definition:
Shows the average time to process an event in
the Resource Booking Attendant.
> 100
> 100
ms for 5 ms for
polls
15
polls
Information:
Should be a low value at all times.
Possible problems:
High values may indicate a performance
bottleneck.
Remediation:
Check Memory and CPU status for any
bottlenecks.Review event logs for related
events examining log entries for each Assistants
Infrastructure and its corresponding assistant.
Use the Exchange Troubleshooting Assistant
(ExTRA) to obtain Event Tracing for Windows
traces.
Resource
Booking
Definition:
>0
Shows the total number of failures that occurred
594
> 0 for
15
Chapter 15: AppInsight Applications
Requests
Failed
while the Resource Booking Attendant was
processing events.
polls
Information:
Should be 0 at all times.
Possible problems:
Meeting Room bookings or updates may not be
processed for some users.
Remediation:
Review event logs for related events examining
log entries for each Assistants Infrastructure and
its corresponding assistant. Use the Exchange
Troubleshooting Assistant (ExTRA) to obtain
Event Tracing for Windows traces. Verify your
resource mailboxes are properly configured.
Average
Calendar
Attendant
Processing
Time
Definition:
Shows the average time to process an event in
the Calendar Attendant.
Information:
Should be a low value at all times.
> 100
> 100
ms for 5 ms for
polls
15
polls
Possible problems:
High values may indicate a performance
bottleneck.
Remediation:
Check Memory and CPU for any bottlenecks.
Review event logs for related events examining
log entries for each Assistants Infrastructure and
its corresponding assistant. Use the Exchange
Troubleshooting Assistant (ExTRA) to obtain
Event Tracing for Windows traces.
Calendar
Attendant
Requests
Failed
Definition:
>0
Shows the total number of failures that occurred
while the Calendar Attendant was processing
events.
Information:
595
> 0 for
15
polls
Critical Processes and Services
Should be 0 at all times.
Possible problems:
Automated calendaring activities may not
function for some users.
Remediation:
Review event logs for related events examining
log entries for each Assistants Infrastructure and
its corresponding assistant. Use the Exchange
Troubleshooting Assistant (ExTRA) to obtain
Event Tracing for Windows traces. Verify your
resource mailboxes are properly configured.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Critical Processes and Services
This resource numerically and graphically shows metrics concerning the
Exchange's critical processes and services. The icons of the listed component in
the Component Name column will change color to reflect the listed counter's
current state. Clicking any component in the Component Name column will take
you to the Component Details page for that component.
If the value of the listed component crosses the Warning threshold, the icon for the
listed component will become yellow. If the value of the listed component crosses
the Critical threshold, the icon for the listed component will become red.
596
Chapter 15: AppInsight Applications
The following list defines each column of this resource:
l
l
l
l
l
Component Name: Display name of the listed component.
Process Name (ID): Service name of the listed process or service with its
identification number.
CPU Load: This graphically and numerically represents the percentage of
CPU resources currently being used by the listed process.
Memory Used:
l Physical: This graphically and numerically represents the percentage
of physical memory (RAM) currently being used by the listed process.
l Virtual: This graphically and numerically represents the percentage of
virtual memory currently being used by the listed process.
IOPS: Displays the current total read and write I/O (Input/Output) operations
occurring for the current process per second.
The following tables list all possible processes and services:
Exchange 2010 Services/Processes
Display Name Description
Microsoft
Exchange
Active
Directory
Topology
Provides Active Directory topology information to Exchange
services. If this service is stopped, most Exchange services are
unable to start. This service has no dependencies.
Microsoft
Exchange
Information
Store
Manages the Exchange Information Store. This includes
mailbox databases and public folder databases. If this service is
stopped, mailbox databases and public folder databases on this
597
Critical Processes and Services
computer are unavailable. If this service is disabled, any
services that explicitly depend on it will fail to start. This service
is dependent on the RPC, Server, Windows Event Log, and
Workstation services.
Microsoft
Exchange
Mail
Submission
Submits messages from the Mailbox server to Exchange 2010
Hub Transport servers. This service is dependent upon the
Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
Mailbox
Assistant
Performs background processing of mailboxes in the Exchange
store. This service is dependent upon the Microsoft
Exchange Active Directory Topology service.
Microsoft
Exchange
Monitoring
Allows applications to call the Exchange diagnostic cmdlets.
This service has no dependencies.
Microsoft
Exchange
Replication
Provides replication functionality for mailbox databases on
Mailbox servers in a database availability group (DAG) and
database mount functionality for all Mailbox servers. This
service is dependent upon the Microsoft Exchange Active
Directory Topology service.
Microsoft
Exchange
RPC Client
Access
Manages client RPC connections for Exchange. This service is
dependent upon the Microsoft Exchange Active Directory
Topology service.
Microsoft
Exchange
Search
Indexer
Drives indexing of mailbox content, which improves the
performance of content search. This service is dependent upon
the Microsoft Exchange Active Directory Topology and Microsoft
Search (Exchange Server) services.
Microsoft
Enables Windows Server Backup users to back up and recover
Exchange
application data for Microsoft Exchange. This service has no
Server
dependencies.
Extension for
Windows
Server
598
Chapter 15: AppInsight Applications
Backup
Microsoft
Provides a host for several Microsoft Exchange services. On
Exchange
internal server roles, this service is dependent upon the
Service Host Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
System
Attendant
Forwards directory lookups to a global catalog server for legacy
Outlook clients, generates e-mail addresses and OABs, updates
free/busy information for legacy clients, and maintains
permissions and group memberships for the server. If this
service is disabled, any services that explicitly depend on it will
fail to start. This service is dependent on the RPC, Server,
Windows Event Log, and Workstation services.
Microsoft
Exchange
Throttling
Limits the rate of user operations. This service is dependent
upon the Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
Transport
Log Search
Provides remote search capability for Microsoft Exchange
Transport log files. This service is dependent upon the Microsoft
Exchange Active Directory Topology service.
Microsoft
Search
(Exchange)
This is a Microsoft Exchange-customized version of Microsoft
Search. Quickly creates full-text indexes on content and
properties of structured and semi-structured data to allow fast
linguistic searches on this data. This service is dependent on
the RPC service.
Exchange 2013 Services/Processes
Display Name Description
Microsoft
Exchange
Active
Directory
Topology
Provides Active Directory topology information to Exchange
services. If this service is stopped, most Exchange services
are unable to start. This service is dependent on the Net.Tcp
Port Sharing Service.
Microsoft
Exchange
The Microsoft Forefront Protection 2010 for Exchange Server
anti-spam update service. This service is dependent upon the
599
Critical Processes and Services
Anti-spam
Update
Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
Mailbox
Transport
Delivery
This service, running on the Mailbox servers, receives mail
items from the Exchange Transport service, submits them to
extension modules for processing and commits them into
mailbox database. This service is dependent upon the
Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
Diagnostics
Agent that monitors server health. This service has no
dependencies.
Microsoft
Exchange
EdgeSync
Replicates configuration and recipient data from the Hub
Transport servers to the Edge Transport servers. This service
is dependent upon the Microsoft Exchange Active Directory
Topology service.
Exchange
Search
Drives indexing and querying of data for Exchange. This
service is dependent upon the Microsoft Exchange Active
Directory Topology service.
Microsoft
Exchange
Health
Manager
Manages Exchange server health. This service is dependent
on the Windows Event Log service.
Microsoft
Exchange
IMAP4
Backend
Provides Internet Message Access Protocol service to
mailboxes. If this service is stopped, mailboxes on this server
cannot be accessed using the IMAP4 protocol. This service is
dependent upon the Microsoft Exchange Active Directory
Topology service.
Microsoft
Exchange
Information
Store
This process controls all of the Store Worker processes. If a
DB is dismounted, it is responsible for terminating the
associated Store Worker process and if a DB is mounted, it
starts a new Store Worker process. If this service is disabled,
any services that explicitly depend on it will fail to start. This
service is dependent on the Microsoft Exchange Active
600
Chapter 15: AppInsight Applications
Directory Topology, RPC, Server, Windows Event Log, and
Workstation services.
N/A
Each database hosted on a server will create a separate
process for each one. This process performs the same work
as the 'store.exe process did in previous versions, just on an
individual DB basis. This process is dependent on the
Microsoft Exchange Information Store service.
Microsoft
Exchange
Mailbox
Assistant
Performs background processing of mailboxes in the
Exchange store. This service is dependent upon the Microsoft
Exchange Active Directory Topology service.
Microsoft
Exchange
Mailbox
Replication
Processes mailbox move requests. This service is dependent
on the Microsoft Exchange Active Directory Topology and
Net.Tcp Port Sharing services. This service is dependent
upon the Microsoft Exchange Active Directory Topology
service.
Microsoft
Exchange
Monitoring
Allows applications to call the Exchange diagnostic cmdlets.
This service has no dependencies.
Microsoft
Exchange
POP3
Backend
Provides Post Office Protocol version 3 service to mailboxes.
If this service is stopped, mailboxes on this server cannot be
accessed using the POP3 protocol.
Microsoft
Exchange
Replication
Provides replication functionality for mailbox databases on
Mailbox servers in a database availability group (DAG) and
database mount functionality for all Mailbox servers. This
service is dependent upon the Microsoft Exchange Active
Directory Topology service.
Microsoft
Exchange
RPC Client
Access
Manages client RPC connections for Exchange. This service
is dependent upon the Microsoft Exchange Active Directory
Topology service.
601
Critical Processes and Services
Microsoft
Exchange
Server
Extension for
Windows
Server
Backup
Enables Windows Server Backup users to back up and
recover application data for Microsoft Exchange. This service
has no dependencies.
Microsoft
Exchange
Search Host
Controller
This service provides host level deployment and management
services for applications. This service is dependent upon the
HTTP service.
Microsoft
Exchange
Service Host
Provides a host for several Exchange services. On internal
server roles, this service is dependent upon the Microsoft
Exchange Active Directory Topology service.
Microsoft
Exchange
Mailbox
Transport
Submission
This service, running on the Mailbox servers, receives the
Submit events, processes the messages by converting them
from MAPI to MIME and hands them over to the Exchange
Transport service. This service is dependent upon the
Microsoft Exchange Active Directory Topology service.
Microsoft
Exchange
Throttling
Limits the rate of user operations. This service is dependent
upon the Microsoft Exchange Active Directory Topology
service.
Microsoft
Exchange
Transport
Acts as a middle man and routes messages between Mailbox
Transport Submission service and the Front End Transport
service. It is identical to the Hub Transport Server role in
Exchange 2010. Never contacts the mailbox databases
directly. This service is dependent upon the Microsoft
Exchange Active Directory Topology and Microsoft Filtering
Management services.
Microsoft
Exchange
Transport
Log Search
Provides remote search capability for Microsoft Exchange
Transport log files. This service is dependent upon the
Microsoft Exchange Active Directory Topology service.
602
Chapter 15: AppInsight Applications
Microsoft
Exchange
Unified
Messaging
Enables Microsoft Exchange Unified Messaging features.
This allows voice and fax messages to be stored in Microsoft
Exchange and gives users telephone access to e-mail, voice
mail, calendar, contacts, or an auto attendant. If this service is
stopped, Unified Messaging is not available. This service is
dependent upon the Microsoft Exchange Active Directory
Topology service.
Exchange Event Log Message Details
This resource displays the Exchange event log messages while providing a
search window and a filter. The filter allows you to choose which types of log
messages you want to display. The data can be sorted by clicking the headers of
each column. This resource shows Error, Warning, Information, Security Audit
Success, and Security Audit Failure events specific to the monitored Exchange
server.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, and Last Page.
Clicking any event message in the list will open a new window, displaying the
entire message, as shown below:
603
Exchange Server
Exchange Server
This resource contains performance counters specific to the current status of the
Exchange Server. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that counter.
If the value of a listed performance counters crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
counter crosses the Critical threshold, the chart will display a red background.
Hovering over any time period within the chart will display detailed information
about that time period in the tooltip.
604
Chapter 15: AppInsight Applications
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
RPC
Requests
failed (%)
Definition:
>1
Shows the percentage of failed requests in the
total number of RPC requests. Failed means
the sum of failed with error code plus failed
with exception.
> 1 for
15
polls
Information:
Should be less than 1 at all times
Possible problems:
Users may report slow performance,
disconnects, or failures within their client
performing certain activities.
Remediation:
Review the Windows Event logs for any
related events. Use ExBPA to perform a Health
scan of your server and review any issues
reported. In Exchange 2010, verify SP1 or
higher has been installed on your system.
RPC
Definition:
>0
605
> 0 for
Exchange Server
Requests
Shows the current number of outstanding RPC
Outstanding requests.
15
polls
Information:
Should be 0 at all times.
Possible problems:
Server may stop accepting RPC requests.
Remediation:
Review the Windows Event logs for any
related events. Use ExBPA to perform a Health
scan of your server and review any issues
reported. Use Exchange Server User Monitor
application to review user sessions. In
Exchange 2010, verify SP1 or higher has been
installed on your system.
RPC
Latency
Average
(msec)
Definition:
Shows the average latency, in ms, of RPC
requests. The average is calculated over all
RPCs since exrpc32 was loaded.
> 100
ms
> 100
ms for
15
polls
N/A
N/A
Information:
The average is calculated over all RPCs since
exrpc32 was loaded. Should be less than 100
ms at all times.
Possible problems:
Users may report slow performance issues.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
RPC
Requests
sent/sec
Definition:
RPC Requests sent/sec is the current rate of
initiated RPC requests per second.
Information:
Used for determining current load.
606
Chapter 15: AppInsight Applications
RPC Slow
requests
latency
average
(msec)
Definition:
Shows the average latency, in ms, of slow
requests.
N/A
N/A
>1
> 1 for
15
polls
N/A
N/A
Information:
Used for determining the average latencies of
RPC slow requests.
Possible problems:
Client disconnects or slow performance issues.
Remediation:
Review the Windows Event logs for any
related events. Use ExBPA to perform a Health
scan of your server and review any issues
reported. In Exchange 2010, verify SP1 or
higher has been installed on your system.
RPC Slow
Definition:
requests (%) RPC Slow requests (%) is the percent of slow
RPC requests among all RPC requests.
Information:
A slow RPC request is one that has taken
more than 500 ms.Should be less than 1 at all
times.
Possible problems:
Client disconnects or slow performance issues.
Remediation:
Review the Windows Event logs for any
related events. Use ExBPA to perform a Health
scan of your server and review any issues
reported. In Exchange 2010, verify SP 1 or
higher has been installed on your system.
ROP
Definition:
Requests
ROP Requests outstanding shows the total
Outstanding number of outstanding remote operations
requests.
Information:
607
Exchange Server
Used for determining current load.
Hub Servers Definition:
> 0.99
In Retry
Shows the number of Hub Transport servers in
retry mode.
(Only
available in
Exchange
2010)
>1
Information:
Should be 0 at all times.
Possible problems:
Domain where you send large amount of email
is unavailable, infected machine on network
sending messages, DNS resolution issues, or
network connectivity to destination servers or
the internet.
Remediation:
Determine the root cause and verify there
aren't any network connectivity issues.
Average
Document
Processing
Time In
Milliseconds
Definition:
> 30
Shows the average, in ms, of how long it takes
to index documents.
> 30 for
15
polls
Information:
Should be less than 30 seconds at all times.
Possible problems:
Verify content index state of all database
copies.
Remediation:
For any database indexes not "healthy,"
update the content Index on the server using
the following command: UpdateMailboxDatabaseCopy <DBName> -CatalogOnly
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
608
Chapter 15: AppInsight Applications
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Information Store
This resource contains performance counters specific to the status of the current
Information Store. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The Exchange Information Store is a storage platform that is used to manage
numerous types of information within an Exchange server deployment.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
609
Information Store
Connection Definition:
Count
Is the total number of client connections
maintained.
(Only
available in
Exchange
2013)
N/A
N/A
N/A
N/A
> 100
ms
> 100
ms for
15
Information:
This is used to determine current load of the
server's Information Store.
Possible problems:
May cause memory bottlenecks on the server if
the number is excessively high.
Remediation:
Reduce the number of user mailboxes hosted
on the server or increase available resources.
Active User Definition:
Count
Number of user connections that have shown
some activity in the last 2 minutes.
Information:
Used to determine current user load on the
server. Each active user will typically start up to
5 active sessions (connections) on a server, in
order to sync various services.
Possible problems:
May cause memory bottlenecks on the server if
the number is excessively high.
Remediation:
Determine if users are running applications not
required for business use, and request they do
not run these applications which is causing an
increase in server logons. If this does not help,
or is not possible, reduce the number of users
hosted on the server and move any Public
Folders on the server to a different server.
RPC
Averaged
Latency
Definition:
Indicates the RPC latency, in ms, averaged for
all operations in the last 1,024 packets.
610
Chapter 15: AppInsight Applications
Information:
For information about how clients are affected
when overall server RPC averaged latencies
increase, see “Understanding Client Throttling
Policies” at http://technet.microsoft.com/enus/library/dd297964.aspx. Should not be higher
than 100 ms on average.
polls
Possible problems:
To determine if certain protocols are causing
overall RPC latencies, monitor MSExchangeIS
Client (*)\RPC Average Latency to separate
latencies based on client protocol.
Remediation:
Faster disks, more disks, or redesigning
existing disk arrays.
RPC
Requests
Definition:
Indicates the overall RPC requests currently
executing within the information store process.
> 70
> 70 for
15
polls
N/A
N/A
Information:
Should be below 70 at all times.
Possible problems:
When I/O counters fall outside of normal range,
client performance is directly impacted. For
example, Outlook and Outlook Web App (OWA)
users will report “Outlook is slow” when
opening mail or moving between folders.
Remediation:
Faster disks, more disks, or redesigning
existing disk arrays.
Active
Definition:
Connection Number of connections that have shown some
Count
activity in the last 10 minutes.
(Only
available in
Information:
This is used to determine current load of the
611
Information Store
Exchange
2010)
server's Information Store.
Possible problems:
May cause memory bottlenecks on the server if
the number is excessively high.
Remediation:
Reduce the number of user mailboxes hosted
on the server or increase available resources.
Client:
RPCs
Failed:
Server too
busy/sec
(Only
available in
Exchange
2010)
Definition:
Shows the client-reported rate of failed RPCs
(since the store was started) due to the Server
Too Busy ROC error.
> 0 for 5 > 0 for
polls
15
polls
Information:
Should be 0 at all times.
Possible problems:
Higher values may indicate RPC threads are
exhausted or client throttling is occurring for
clients running versions of Outlook earlier than
Microsoft Office Outlook 2007. This can cause
user mail clients experiencing slowness.
Remediation:
Check if RPC latencies are high and determine
the cause of the performance issue (e.g. poorly
performing disk I/O, excessive load, insufficient
memory, high number of users).
RPC Client Definition:
Backoff/sec The rate at which the server notifies a client to
withdraw (backoff).
(Only
available in
Exchange
2010)
Information:
Indicates the rate at which client backoffs are
occurring.
Possible problems:
Higher values may indicate that the server may
be incurring a higher load resulting in an
increase in overall averaged RPC latencies,
612
N/A
N/A
Chapter 15: AppInsight Applications
causing client throttling to occur. This can also
occur when certain client user actions are being
performed. Depending on what the client is
doing and the rate at which RPC operations are
occurring, it may be normal to see backoffs
occurring.
Remediation:
Check if RPC latencies are high and determine
the cause of the performance issue (e.g. poorly
performing disk I/O, excessive load, insufficient
memory, high number of users).
Active
Client
Logons
(Only
available in
Exchange
2010)
Definition:
N/A
Number of logons that have been active (issued
any MAPI requests) within the last 10 minute
time interval.
N/A
Information:
Active client logons can be high if users are
logging on and logging off frequently.
Possible problems:
May cause memory bottlenecks on the server if
the number is excessively high.
Remediation:
Determine if users are running applications not
required for business use, and request they do
not run these applications which is causing an
increase in server logons. If this does not help,
or is not possible, reduce the number of server
hosted on the server and move any Public
Folders on the server to a different server.
Messages Definition:
Queued for Shows the current number of submitted
Submission messages not yet processed by the transport
layer.
(Only
available in
Exchange
Information:
The queues should remain below 50 at any
613
> 50
> 50 for
15
polls
Information Store
2010)
given time. Anything above this amount should
be cleared within 15 minutes.
Possible problems:
Mailbox server is not communicating properly
with the transport server.
Remediation:
Verify network connectivity and transport server
functionality.
Slow
FindRow
Rate
Definition:
Shows the rate at which the slower FindRow
needs to be used in the mailbox store.
(Only
available in
Exchange
2010)
Information:
Should be no more than 10 for any specific
mailbox store.
Possible problems:
Higher values indicate applications are
crawling or searching mailboxes, which is
affecting server performance. These include
desktop search engines, customer relationship
management (CRM), or other third-party
applications.
Remediation:
Run the ResetSearchIndex.ps1 script which is
located in the scripts directory at the root of the
Exchange installation. Alternatively, you can
perform the process manually:
1. Rebuild the index catalog using: UpdateMailboxDatabaseCopy <DBName> -CatalogOnly
command.
2. Stop the Microsoft Exchange Search Service.
3. Delete old catalog files.
4. Restart Microsoft Exchange Search Service.
Zooming
614
N/A
N/A
Chapter 15: AppInsight Applications
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Mailbox Database Copies
This resource shows the status of the Exchange mailbox database copies. The
data can be sorted by clicking the headers of each column.
Hovering over any Database Name in the list will display detailed information
about that database in the tooltip. Hovering over the node will provide a tooltip
with information about that node.
The following list defines each column of this resource:
l
l
l
l
Database Name: Name of the listed database copy.
Copy Status: Displays the status of the listed database copy. (See Table 1
below for possible statuses.)
Content Index State: See the following table for returned status descriptions. (See Table 2 below for possible statuses.)
Exchange Server: Name of the Exchange application and the node it is on.
Table 1.
Mounted
The active copy is online and accepting client connections. Only
the active copy of the mailbox database copy can have a copy
status of Mounted.
615
Mailbox Database Copies
Mounting
The active copy is coming online and not yet accepting client
connections. Only the active copy of the mailbox database copy
can have a copy status of Mounting.
Dismounting
The active copy is going offline and terminating client
connections. Only the active copy of the mailbox database copy
can have a copy status of Dismounting.
Dismounted
The active copy is offline and not accepting client connections.
Only the active copy of the mailbox database copy can have a
copy status of Dismounted.
Seeding
The mailbox database copy is being seeded, the content index
for the mailbox database copy is being seeded, or both are being
seeded. Upon successful completion of seeding, the copy status
should change to Initializing.
Seeding
Source
The mailbox database copy is being used as a source for a
database copy seeding operation.
Initializing
The mailbox database copy is in an Initializing state when a
database copy has been created, when the Microsoft Exchange
Replication service is starting or has just been started, and
during transitions from Suspended, Service Down, Failed,
Seeding, or Single Page Restore to another state. While in this
state, the system is verifying that the database and log stream are
in a consistent state. In most cases, the copy status will remain in
the Initializing state for about 15 seconds, but in all cases, it
should generally not be in this state for longer than 30 seconds.
ReThe mailbox database copy and its log files are being compared
synchronizing with the active copy of the database to check for any divergence
between the two copies. The copy status will remain in this state
until any divergence is detected and resolved.
Single Page
Restore
This state indicates that a single page restore operation is
occurring on the mailbox database copy.
Failed
The mailbox database copy is in a Failed state because it is not
suspended, and it is not able to copy or replay log files. While in
a Failed state and not suspended, the system will periodically
616
Chapter 15: AppInsight Applications
check whether the problem that caused the copy status to
change to Failed has been resolved. After the system has
detected that the problem is resolved, and barring no other
issues, the copy status will automatically change to Healthy.
Service
Down
The Microsoft Exchange Replication service is not available or
running on the server that hosts the mailbox database copy.
Suspended
The mailbox database copy is in a Suspended state as a result of
an administrator manually suspending the database copy by
running the Suspend-MailboxDatabaseCopy cmdlet.
Healthy
The mailbox database copy is successfully copying and
replaying log files, or it has successfully copied and replayed all
available log files.
Disconnected The mailbox database copy is no longer connected to the active
and Healthy database copy, and it was in the Healthy state when the loss of
connection occurred. This state represents the database copy
with respect to connectivity to its source database copy. It may be
reported during DAG network failures between the source copy
and the target database copy.
Disconnected The mailbox database copy is no longer connected to the active
and Redatabase copy, and it was in the Re-synchronizing state when
synchronizing the loss of connection occurred. This state represents the
database copy with respect to connectivity to its source database
copy. It may be reported during DAG network failures between
the source copy and the target database copy.
Failed and
Suspended
The Failed and Suspended states have been set simultaneously
by the system because a failure was detected, and because
resolution of the failure explicitly requires administrator
intervention. An example is if the system detects unrecoverable
divergence between the active mailbox database and a database
copy. Unlike the Failed state, the system will not periodically
check whether the problem has been resolved, and automatically
recover. Instead, an administrator must intervene to resolve the
underlying cause of the failure before the database copy can be
transitioned to a healthy state.
617
Mailbox Database Size and Space Used
Table 2.
State
Description
Status
on
Active &
Passive
Copies
Crawling
Database is in the process of indexing database content. Warning
Depending on the size of the database, this process
could take some time to complete.
Disabled
Indexing for the database has been disable by an
administrator.
Offline
(Active)
N/A
(Passive)
Failed
An error has occurred causing the content index to fail.
Critical
Failed and The Failed and Suspended states have been set
Suspended simultaneously by the system because a failure was
detected, and because resolution of the failure explicitly
requires administrator intervention.
Critical
Healthy
This indicates the Content Index is up to date and has
Up
not detected any issues. This is the only state in which a
failover (automatic process) to a specific database copy
can occur.
Seeding
A database copy is in the process of updating its Content Up
Index from another database copy.
Suspended The Suspended status occurs if an administrator manually pauses or suspends it from receiving updates from
the active copy. This might be done to update a failed
Content Index or to perform troubleshooting for other
issues.
Warning
Mailbox Database Size and Space Used
This resource numerically and graphically shows metrics concerning the
Exchange mailbox database size. The data can be sorted by clicking the headers
of each column.
618
Chapter 15: AppInsight Applications
Hovering over any Database Name in the list will display detailed information
about that database in the tooltip. Clicking any database in the Database column
will take you to the Database Details page for that database.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
The following list defines each column of this resource:
l
l
l
l
l
l
Database Name: Name of the listed database.
Database Size: Size of the listed database.
White Space: The amount of space available at the root of a database for
new mailboxes before the file size increases.
Space Usage: This graphically represents used data of the database, white
space of the database, and free space on the volume, respectively.
Total Mailboxes: The total number of mailboxes on the listed database.
Average Mailbox Size: The average size of an individual mailbox.
Mailbox Database Status
This resource provides details concerning the status of the current mailbox
database being monitored by the application.
619
Mailbox Database Status
l
l
Database Name: Name of the listed database.
Copy Status: Displays the status of the active database. The table below
provides the possible status with its definition:
Mounted
The active copy is online and accepting client connections.
Only the active copy of the mailbox database copy can
have a copy status of Mounted.
Mounting
The active copy is coming online and not yet accepting
620
Chapter 15: AppInsight Applications
client connections. Only the active copy of the mailbox
database copy can have a copy status of Mounting.
Dismounting
The active copy is going offline and terminating client
connections. Only the active copy of the mailbox database
copy can have a copy status of Dismounting.
Dismounted
The active copy is offline and not accepting client
connections. Only the active copy of the mailbox database
copy can have a copy status of Dismounted.
Seeding
The mailbox database copy is being seeded, the content
index for the mailbox database copy is being seeded, or
both are being seeded. Upon successful completion of
seeding, the copy status should change to Initializing.
Seeding
Source
The mailbox database copy is being used as a source for a
database copy seeding operation.
Initializing
The mailbox database copy is in an Initializing state when
a database copy has been created, when the Microsoft
Exchange Replication service is starting or has just been
started, and during transitions from Suspended,
ServiceDown, Failed, Seeding, or SinglePageRestore to
another state. While in this state, the system is verifying that
the database and log stream are in a consistent state. In
most cases, the copy status will remain in the Initializing
state for about 15 seconds, but in all cases, it should
generally not be in this state for longer than 30 seconds.
ReThe mailbox database copy and its log files are being
synchronizing compared with the active copy of the database to check for
any divergence between the two copies. The copy status
will remain in this state until any divergence is detected and
resolved.
Single Page
Restore
This state indicates that a single page restore operation is
occurring on the mailbox database copy.
Failed
The mailbox database copy is in a Failed state because it
isnot suspended, and it isnot able to copy or replay log
files. While in a Failed state and not suspended, the system
621
Mailbox Database Status
will periodically check whether the problem that caused the
copy status to change to Failed has been resolved. After
the system has detected that the problem is resolved, and
barring no other issues, the copy status will automatically
change to Healthy.
Service
Down
The Microsoft Exchange Replication service isnot available
or running on the server that hosts the mailbox database
copy.
Suspended
The mailbox database copy is in a Suspended state as a
result of an administrator manually suspending the
database copy by running the SuspendMailboxDatabaseCopy cmdlet.
Healthy
The mailbox database copy is successfully copying and
replaying log files, or it has successfully copied and
replayed all available log files.
Disconnected The mailbox database copy is no longer connected to the
and Healthy active database copy, and it was in the Healthy state when
the loss of connection occurred. This state represents the
database copy with respect to connectivity to its source
database copy. It may be reported during DAG network
failures between the source copy and the target database
copy.
Disconnected The mailbox database copy is no longer connected to the
and Reactive database copy, and it was in the Re-synchronizing
synchronizing state when the loss of connection occurred. This state
represents the database copy with respect to connectivity to
its source database copy. It may be reported during DAG
network failures between the source copy and the target
database copy.
Failed and
Suspended
The Failed and Suspended states have been set
simultaneously by the system because a failure was
detected, and because resolution of the failure explicitly
requires administrator intervention. An example is if the
system detects unrecoverable divergence between the
active mailbox database and a database copy. Unlike the
622
Chapter 15: AppInsight Applications
Failed state, the system will not periodically check whether
the problem has been resolved, and automatically recover.
Instead, an administrator must intervene to resolve the
underlying cause of the failure before the database copy
can be transitioned to a healthy state.
l
l
l
l
Copy Queue Length: The copy queue length is an integer indicating number of files. The Copy Queue Length shows the number of transaction log
files waiting to be copied to the passive copy log file folder. A copy is not
considered complete until it has been checked for corruption.
Replay Queue Length: The Replay Queue Length shows the number of
transaction log files waiting to be replayed into the passive copy.
Last Inspected Log Time: This is the date and time when the last log file
was verified (inspected) by the LogInspector for a particular database after
being copied from the active copy. This field is only relevant for passive copies of a database.
Content Index State: See the following table for returned status descriptions.
State
Description
Status
on
Active &
Passive
Copies
Crawling
Database is in the process of indexing database
content. Depending on the size of the database,
this process could take some time to complete.
Warning
Disabled
Indexing for the database has been disable by an
administrator.
Offline
(Active)
N/A
(Passive)
Failed
An error has occurred causing the content index to Critical
fail.
Failed and The Failed and Suspended states have been set
Critical
Suspended simultaneously by the system because a failure
was detected, and because resolution of the failure
explicitly requires administrator intervention.
623
Mail Database
Healthy
This indicates the Content Index is up to date and Up
has not detected any issues. This is the only state
in which a failover (automatic process) to a specific
database copy can occur.
Seeding
A database copy is in the process of updating its
Content Index from another database copy.
Up
Suspended The Suspended status occurs if an administrator
Warning
manually pauses or suspends it from receiving
updates from the active copy. This might be done to
update a failed Content Index or to perform
troubleshooting for other issues.
l
Activation Preference: Indicates which database copy has preference over
another copy. It is used as part of the formula to determine which database
copy will become active during a failover. The value can range from 1 to 16
depending on the number of servers in the DAG. The lower the number, the
higher the preference.
Mail Database
This resource contains performance counters specific to the status of the current
Mail Database. The icons of the listed performance counters in the Statistic Name
column will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
624
Chapter 15: AppInsight Applications
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
Database Definition:
N/A
Cache
Shows the amount of system memory, used by the
Size (MB) database cache manager to hold commonly used
information from the database files to prevent file
operations.
Information:
This and Database Cache Hit % are useful
counters for gauging whether a server's
performance problems might be resolved by
adding more physical memory. Use this counter
along with store private bytes to determine if there
are store memory leaks.
Possible problems:
Situation when the database cache size seems
too small for optimal performance and there is little
available memory on the system (check the value
of Memory/Available Bytes) could negatively
impact on performance. If there is ample memory
625
N/A
Mail Database
on the system and the database cache size is not
growing beyond a certain point, the database
cache size may be capped at an artificially low
limit. Increasing this limit may increase
performance.
Remediation:
Adding more memory to the system and/or
increasing database cache size may increase
performance.
Database
Page
Fault
Stalls/sec
Definition:
>0
Shows the rate that database file page requests
require of the database cache manager to allocate
a new page from the database cache.
> 0 for
15
polls
Information:
Should be 0 at all times.
Possible problems:
If this value is nonzero, this indicates that the
database is not able to flush dirty pages to the
database file fast enough to make pages free for
new page allocations.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
Version Definition:
Buckets Shows the total number of version buckets
Allocated allocated.
Information:
Should be less than 12,000 at all times. The
maximum default version is 16,384. If version
buckets reach 70% of maximum, the server is at
risk of running out of the version store.
Possible problems:
626
> 11500 >
12000
Chapter 15: AppInsight Applications
Typically indicates a database transaction which
is taking a long time to save to disk. During Online
DB defrags, the version buckets may increase.
Remediation:
Verify if the server has any applications running
that have a long running transaction which has not
been saved to disk, causing the version store
memory resource to be exhausted.
Log
Definition:
Record
Shows the number of log records that can't be
Stalls/sec added to the log buffers per second because the
log buffers are full. If this counter is nonzero for a
long period of time, the log buffer size may be a
bottleneck.
> 10 for > 10 for
15 polls 60
polls
Information:
The average value should be below 10 per
second. Spikes (maximum values) should not be
higher than 100 per second.
Possible problems:
If I/O log write latencies are high, check for RAID5
or synchronize replication on log devices.
Remediation:
You can also use the MSExchange Database
Instances (Information store/<Database Name>)
\log record stalls/sec counter to determine which
database(s) may be having issues. This will assist
you in determining which drive(s) to focus on. This
counter is an extended Exchange counter in
Performance Monitor. The solution can include
additional disks, reconfigured RAID configuration,
adding new database(s), or re-balancing
mailboxes across databases or servers.
Log
Threads
Waiting
Definition:
> 10 for > 10 for
Shows the number of threads waiting for their data 15 polls 60
to be written to the log to complete an update of
polls
627
Management
the database. If this number is too high, the log
may be a bottleneck.
Information:
Should be less than 10 on average.
Possible problems:
If this number is too high, the log may be a
bottleneck. Regular spikes concurrent with log
record stall spikes indicate that the transaction log
disks are a bottleneck. If the value for log threads
waiting is more than the spindles available for the
logs, there is a bottleneck on the log disks.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Management
This resource contains controls that are actionable for both the application and
the node. The controls in the following illustration are SAM-specific.
628
Chapter 15: AppInsight Applications
Application:
l
Edit Application Monitor: This allows you to edit the current application by
changing the settings specifically related to this application. This includes,
but is not limited to: changing the polling frequency, changing the Windows
and PowerShell URLs, changing the Exchange Server credentials, and
adjusting threshold settings for component monitors that have thresholds.
Changing some settings may require you to override the template that this
application is based upon. To do this, simply click Override Template.
629
Replication
l
l
Unmanage: Allows you to stop the polling and collecting of statistics of the
current application for a user-defined period of time.
Poll Now: Allows the application to retrieve the most current statistics when
clicked.
Note: By default, mailbox statistics are not polled when Poll Now is clicked.
Node:
l
l
l
Real-Time Process Explorer: Opens the RTPE in a new window. For
more information, see Real Time Process Explorer.
Service Control Manager: Opens the SCM in a new window. For more
information, see Service Control Manager.
Real-Time Event Viewer: Opens the RTEV in a new window. For more
information, see Real Time Event Viewer.
Replication
This resource contains performance counters specific to the status of the current
replication process. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
630
Chapter 15: AppInsight Applications
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The purpose of using data replication is to maintain current replicas of the data.
Exchange servers can use the replicas to provide continuity of email service in
the event of a storage or site outage in the primary location.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
CopyQueueLength
Definition:
Shows the number of transaction log
files waiting to be copied to the
passive copy log file folder. A copy
isn't considered complete until it has
been checked for corruption.
>1
Information:
All nodes in a Database Availability
Group (DAG) should be monitored for
this counter depending on the passive
node. Should be less than 1 at all
631
> 1 for
5 polls
Replication
times for continuous replication.
Possible problems:
Server recently rebooted or services
restarted, network connectivity issues,
or multiple mailbox moves are in
process.
Remediation:
Verify network connectivity between
the various nodes in the DAG. Verify
Replication Service is running on all
DAG members.
ReplayQueueLength Definition:
Shows the number of transaction log
files waiting to be replayed into the
passive copy.
> 50 for
5 polls
> 100
for 5
polls
N/A
N/A
Information:
With DAG replication, transaction logs
are shipped to the other DAG
members. They then replay the log
file. (Thresholds should be manually
removed for DAG members
configured to be 'lagged copies.')
Possible problems:
The replay queue length should be as
low as possible, otherwise this could
indicate a (performance) issue with
the DAG member containing the Copy
database. A high number could also
negatively affect failover with some
loss of data as a possibility.
Remediation:
Check Memory, CPU, and Disk I/O for
any bottlenecks. Review the Windows
Event logs for any related events.
Avg Log Copy
Definition:
632
Chapter 15: AppInsight Applications
Latency (msec)
(Only available in
Exchange 2010)
Log Copy KB/sec
Average number of milliseconds
observed by the log copier when
sending messages over the network.
Definition:
The size of the log files (in KB) that
are copied per second.
N/A
N/A
Definition:
N/A
The number of log files that have been
replayed per second.
N/A
Information:
Shows the size in KB/sec of the
transaction logs being copied to
passive copies.
Log Replay Rate
(generations/sec)
Information:
Shows you the number of Transaction
Logs being replayed on the passive
copies of a database.
Log Replay is Not
Keeping Up
Definition:
LogReplayNotKeepingUp is 1 when
log replay is falling behind and not
able to keep up with log copying and
inspection.
Information:
Exchange 2010/2013 uses
continuous replication to create and
maintain database copies. To
maintain a synchronized copy of a
mailbox database, transaction log files
from the active mailbox server are
replayed into the passive database of
another server in the DAG. This
provides high availability and
resiliency in the Exchange
environment.
633
>= 1
>= 1
for 60
polls
Replication Status Checks
Possible problems:
Indicates a replication issue may exist
with the mailbox database copies in
the DAG. If Transaction Log replay is
not able to keep up with the active
copy, passive copies will not be up of
date.
Remediation:
Review the Windows Event logs for
any related events. Examine network
topology between DAG members and
verify connectivity and network
latency is below 250 ms. Examine
CPU utilization by the Information
Store service on passive copies.
Examine the replication status for
each replica database using the GetMailboxDatabaseCopyStatus cmdlet.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Replication Status Checks
This resource will perform up to 16 checks in Exchange 2010 and up to 18
checks in Exchange 2013 (divided into two columns. This resource will only show
test results which apply to the server it is being run against, whether the server
contains only active databases, passive databases, or a combination of the two.
634
Chapter 15: AppInsight Applications
The fewest checks are performed when run against a server with only active
databases (Seven checks for 2010, 12 checks for 2013). This is because check
for databases replication status is not necessary because they are all on the local
server.
The status for each Health Check Test can be one of the following: Passed,
Failed, or Warning.
The table below provides a list of all possible tests for this resource along with
their definitions.
Health Check Test
Name
Description
TcpListener
Verifies that the TCP log copy listener is running and
reachable on the specified DAG member, or if no
DAG member is specified, on the local server.
TasksRpcListener
Verifies that the tasks remote procedure call (RPC)
server is running and reachable on the specified
DAG member, or if no DAG member is specified, on
the local server.
ServerLocatorService
Verifies the Active Manager client/server processes
on DAG members and on the Client Access Server
635
Replication Status Checks
that perform lookups in Active Directory and Active
Manager to determine where a user’s mailbox
database is active.
ReplayService
Verifies that the Microsoft Exchange Replication
service is running and reachable on the specified
DAG member, or if no DAG member is specified, on
the local server.
QuorumGroup
Verifies that the default cluster group (quorum group)
is in a healthy and online state.
FileShareQuorum
Verifies that the witness server and witness directory
and share configured for the DAG are reachable.
DBLogReplayKeepingUp Verifies that replay activity for the passive copies of
databases on the specified DAG member, or if no
DAG member is specified, on the local server, is able
to keep up with log copying and inspection activity.
DBLogCopyKeepingUp
Verifies that log copying and inspection by the
passive copies of databases on the specified DAG
member, or if no DAG member is specified, on the
local server, are able to keep up with log generation
activity on the active copy.
DBInitializing
Checks whether any mailbox database copies are in
a state of Initializing on the specified DAG member,
or if no DAG member is specified, on the local server.
DBDisconnected
Checks whether any mailbox database copies are in
a state of Disconnected on the specified DAG
member, or if no DAG member is specified, on the
local server.
DBCopySuspended
Checks whether any mailbox database copies are in
a state of Suspended on the specified DAG member,
or if no DAG member is specified, on the local server.
DBCopyFailed
Checks whether any mailbox database copies are in
a state of Failed on the specified DAG member, or if
no DAG member is specified, on the local server.
636
Chapter 15: AppInsight Applications
DatabaseRedundancy
(Only 2013)
Verifies that there is at least one healthy copy
available of the databases on the specified DAG
member, or if no DAG member is specified, on the
local server.
DatabaseAvailability
(Only 2013)
Verifies that the databases have sufficient availability
on the specified DAG member, or if no DAG member
is specified, on the local server.
DagMembersUp
Verifies that all DAG members are available, running,
and reachable.
ClusterService
Verifies that the Cluster service is running and
reachable on the specified DAG member, or if no
DAG member is specified, on the local server.
ClusterNetwork
Verifies that all cluster-managed networks on the
specified DAG member, or if no DAG member is
specified, the local server, are available.
ActiveManager
Verifies that the instance of Active Manager running
on the specified DAG member, or if no DAG member
is specified, the local server, is in a valid role
(primary, secondary, or stand-alone).
Storage
This resource contains performance counters specific to the status of storage. The
icons of the listed performance counters in the Statistic Name column will change
color to reflect the listed counter's current state. Clicking any performance counter
in the Statistic Name column will take you to the Performance Counter Details
page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
637
Storage
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
I/O Database
Reads
Average
Latency
Definition:
Shows the average length of time, in ms, per
database read operation.
> 50 ms > 50
ms for
15
polls
Information:
Should be 20 ms on average. Spikes should
not exceed 50 ms.
Possible problems:
Users may report sluggish responsiveness
within their email client.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
I/O Database Definition:
Writes
Shows the average length of time, in ms, per
638
> 100
ms
> 100
ms for
Chapter 15: AppInsight Applications
Average
Latency
database write operation.
15
polls
Information:
Should be 50 ms on average. Spikes of up to
100 ms are acceptable if not accompanied by
database page fault stalls.
Possible problems:
Users may report sluggish responsiveness
within their email client.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
I/O Log
Reads
Average
Latency
Definition:
Indicates the average time, in ms, to read data
from a log file. Specific to log replay and
database recovery operations.
> 200
ms
> 200
ms
for 15
polls
Information:
Average should be less than 200 ms with
spikes up to 1000 ms
Possible problems:
Users may report sluggish responsiveness
within their email client.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
I/O Log
Writes
Average
Latency
Definition:
> 10 ms > 10
Indicates the average time, in ms, to write a log
ms for
buffer to the active log file.
15
polls
Information:
This count should be 10 ms or less on
production servers.
639
Users By Mailbox Size
Possible problems:
Indication that the MS Exchange Database\I/O
Database Writes Average Latency is too high
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Users By Mailbox Size
This resource numerically and graphically shows metrics concerning mailbox
size per user. The data can be sorted by clicking the headers of each column.
Hovering over any user in the User Name list will display detailed information
about that user's mailbox in the tooltip. Clicking any database in the Database
column will take you to the Database Details page for that database.
Notes:
l
l
If there are no user mailboxes on a given database, this resources will disappear from the Mailbox Database Details page.
If there are no user mailboxes in any of the active databases on an
Exchange server, this resource will disappear from the Application Details
page.
640
Chapter 15: AppInsight Applications
l
User mailbox information is collected only once a day after midnight, local
time.
The following list defines each column of this resource:
l
l
l
l
l
l
l
User Name: Name of the listed user.
Mailbox Size: Total size of the listed mailbox that is currently being used by
the user.
% Quote Used: Graphically and numerically shows the percentage used of
the listed mailbox.
Attachment Size: This is the total size of all emails that have an attachment. This includes the body of the email as well as any attachments.
Attachment Count: Shows the number of email messages that contain
attachments, as opposed to the actual number of attachments contained in
each email.
Note: The maximum number of email messages with attachments that can
be reported is 10,000.
Last Accessed: Displays the time and date the listed mailbox was last
accessed by the user.
Database: This is the database that contains the listed user's mailbox.
For more information, see Attachment Extensions.
641
Users By % Mailbox Quota Used
Users By % Mailbox Quota Used
This resource shows metrics based on the percentage of a user's mailbox quota
used. The data can be sorted by clicking the headers of each column.
Hovering over any user in the User Name list will display detailed information
about that user's mailbox in the tooltip. Clicking any database in the Database
column will take you to the Database Details page for that database.
Notes:
l
l
l
If there are no user mailboxes or mailbox quotas are not in use on a given
database, this resources will disappear from the Mailbox Database Details
page.
If there are no user mailboxes or mailbox quotas are not in use in any of the
active databases on an Exchange server, this resource will disappear from
the Application Details page.
User mailbox information is collected only once a day after midnight, local
time.
642
Chapter 15: AppInsight Applications
The following list defines each column of this resource:
l
l
l
l
l
l
l
User Name: Name of the listed user.
% Quota Used: Graphically and numerically shows the percentage used of
the listed mailbox.
Mailbox Size: Total size of the listed mailbox that is currently being used by
the user.
Attachment Size: This is the total size of all emails that have an attachment. This includes the body of the email as well as any attachments.
Attachment Count: This is the number of emails that have at least one
attachment.
Last Accessed: Displays the time and date the listed mailbox was last
accessed by the user.
Database: This is the database that contains the listed user's mailbox.
643
Users By Messages Sent
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
For more information, see Attachment Extensions .
Users By Messages Sent
This resource shows metrics based on messages sent. The data can be sorted by
clicking the headers of each column.
Hovering over any user in the User Name list will display detailed information
about that user's mailbox in the tooltip. Clicking any database in the Database
column will take you to the Database Details page for that database.
Notes:
l
l
l
l
If there are no user mailboxes on a given database, this resources will disappear from the Mailbox Database Details page.
If there are no user mailboxes in any of the active databases on an
Exchange server, this resource will disappear from the Application Details
page.
User mailbox information is collected only once a day after midnight, local
time.
If Server Mailbox Accounts Statistics is disabled, this resource, as well as
the Messages Sent and Messages Received charts on the Mailbox Details
view, will disappear.
644
Chapter 15: AppInsight Applications
The following list defines each column of this resource:
l
l
l
l
l
l
User Name: Name of the listed user.
Sent Yesterday: Current number of messages sent yesterday for the listed
user.
Sent Last 7 Days: This is the total number of emails that have been sent in
the last seven days.
Sent Last 30 Days: This is the total number of emails that have been sent
in the last 30 days.
Last Accessed: Displays the date the listed mailbox was last accessed by
the user
Database: This is the database that contains the listed user's mailbox.
645
AppInsight for Exchange Database Details View
AppInsight for Exchange Database Details View
The Database Details view provides a great deal of information about the current
database and can be accessed by clicking any listed database.
To navigate to the Database Details view:
1. From the web console, navigate to the AppInsight for Exchange Details
view.
2. From a Database resource, click any database in the list.
The available resources unique to this view include:
l
l
l
l
l
l
l
l
l
l
l
Active/Mounted Database Availability
Database Copies
Database Details
Database Disk I/O
Database File Size
Database I/O
Database Metrics
Events
Messages
Transaction Log File Size
Transaction Log Disk I/O
Notes:
l
l
If the name of a database is extremely long, certain performance counters
may not be visible on the Database Details page.
If databases are grouped by a status of Unknown in Network Atlas,
AppInsight for Exchange databases will be displayed.
Active/Mounted Database Availability
This resource graphically shows the various states of database availability in a
percentage format and is made up of three sections: the legend, the main chart,
and the lower chart. The colors of the main chart correspond to the labels in the
legend.
646
Chapter 15: AppInsight Applications
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
647
Database Copies
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
Database Copies
This resource provides details concerning the status of the current Exchange
server being monitored by the application.
l
l
Exchange Server: Name of the listed Exchange Server.
Copy Status: Displays the status of the active database. The table below
provides the possible status with its definition:
Mounted
The active copy is online and accepting client connections.
Only the active copy of the mailbox database copy can
have a copy status of Mounted.
Mounting
The active copy is coming online and not yet accepting
client connections. Only the active copy of the mailbox
database copy can have a copy status of Mounting.
Dismounting
The active copy is going offline and terminating client
connections. Only the active copy of the mailbox database
copy can have a copy status of Dismounting.
Dismounted
The active copy is offline and not accepting client
connections. Only the active copy of the mailbox database
copy can have a copy status of Dismounted.
Seeding
The mailbox database copy is being seeded, the content
index for the mailbox database copy is being seeded, or
both are being seeded. Upon successful completion of
seeding, the copy status should change to Initializing.
Seeding
Source
The mailbox database copy is being used as a source for a
database copy seeding operation.
648
Chapter 15: AppInsight Applications
Initializing
The mailbox database copy is in an Initializing state when
a database copy has been created, when the Microsoft
Exchange Replication service is starting or has just been
started, and during transitions from Suspended,
ServiceDown, Failed, Seeding, or SinglePageRestore to
another state. While in this state, the system is verifying that
the database and log stream are in a consistent state. In
most cases, the copy status will remain in the Initializing
state for about 15 seconds, but in all cases, it should
generally not be in this state for longer than 30 seconds.
ReThe mailbox database copy and its log files are being
synchronizing compared with the active copy of the database to check for
any divergence between the two copies. The copy status
will remain in this state until any divergence is detected and
resolved.
Single Page
Restore
This state indicates that a single page restore operation is
occurring on the mailbox database copy.
Failed
The mailbox database copy is in a Failed state because it
isnot suspended, and it isnot able to copy or replay log
files. While in a Failed state and not suspended, the system
will periodically check whether the problem that caused the
copy status to change to Failed has been resolved. After
the system has detected that the problem is resolved, and
barring no other issues, the copy status will automatically
change to Healthy.
Service
Down
The Microsoft Exchange Replication service isnot available
or running on the server that hosts the mailbox database
copy.
Suspended
The mailbox database copy is in a Suspended state as a
result of an administrator manually suspending the
database copy by running the SuspendMailboxDatabaseCopy cmdlet.
Healthy
The mailbox database copy is successfully copying and
replaying log files, or it has successfully copied and
replayed all available log files.
649
Database Copies
Disconnected The mailbox database copy is no longer connected to the
and Healthy active database copy, and it was in the Healthy state when
the loss of connection occurred. This state represents the
database copy with respect to connectivity to its source
database copy. It may be reported during DAG network
failures between the source copy and the target database
copy.
Disconnected The mailbox database copy is no longer connected to the
and Reactive database copy, and it was in the Re-synchronizing
synchronizing state when the loss of connection occurred. This state
represents the database copy with respect to connectivity to
its source database copy. It may be reported during DAG
network failures between the source copy and the target
database copy.
Failed and
Suspended
l
l
l
l
The Failed and Suspended states have been set
simultaneously by the system because a failure was
detected, and because resolution of the failure explicitly
requires administrator intervention. An example is if the
system detects unrecoverable divergence between the
active mailbox database and a database copy. Unlike the
Failed state, the system will not periodically check whether
the problem has been resolved, and automatically recover.
Instead, an administrator must intervene to resolve the
underlying cause of the failure before the database copy
can be transitioned to a healthy state.
Copy Queue: The Copy Queue length is an integer indicating number of
files. The Copy Queue Length shows the number of transaction log files
waiting to be copied to the passive copy log file folder. A copy is not considered complete until it has been checked for corruption.
Replay Queue: The Replay Queue Length shows the number of transaction log files waiting to be replayed into the passive copy.
Inspected Log Time: This is the date and time when the last log file was
verified (inspected) by the LogInspector for a particular database after being
copied from the active copy. This field is only relevant for passive copies of
a database.
Content Index: See the following table for returned status descriptions.
650
Chapter 15: AppInsight Applications
State
Description
Status
on
Active &
Passive
Copies
Crawling
Database is in the process of indexing database
content. Depending on the size of the database,
this process could take some time to complete.
Warning
Disabled
Indexing for the database has been disable by an
administrator.
Offline
(Active)
N/A
(Passive)
Failed
An error has occurred causing the content index to Critical
fail.
Failed and The Failed and Suspended states have been set
Critical
Suspended simultaneously by the system because a failure
was detected, and because resolution of the failure
explicitly requires administrator intervention.
Healthy
This indicates the Content Index is up to date and Up
has not detected any issues. This is the only state
in which a failover (automatic process) to a specific
database copy can occur.
Seeding
A database copy is in the process of updating its
Content Index from another database copy.
Up
Suspended The Suspended status occurs if an administrator
Warning
manually pauses or suspends it from receiving
updates from the active copy. This might be done to
update a failed Content Index or to perform
troubleshooting for other issues.
l
Activation Preference: Indicates which database copy has preference over
another copy. It is used as part of the formula to determine which database
copy will become active during a failover. The value can range from 1 to 16
depending on the number of servers in the DAG. The lower the number, the
higher the preference.
651
Database Details
Database Details
This resource provides details concerning the current database.
The following list defines each field of this resource:
l
l
l
l
l
l
l
l
l
Database Name: This provides the name of the current database.
Summary Status: Displays the current status of the database. (See Table 1
for possible statuses.)
Active Copy Status: Displays the current status of the database of the
Exchange application that is being monitored. (See Table 2 for possible
statuses.)
Preferred Server: The database copy with an activation preference of 1 is
the preferred server.
Master: This refers to the name of the DAG or the name of the Server which
maintains the copy status information.
Total Number of Mailboxes: Displays the total number of mailboxes on the
listed database.
Average Mailbox Size: Displays the average size of user mailboxes.
Last Full Backup: Displays the time and date of the last full backup of the
database.
Last Incremented Backup: Displays the time and date of only those files
that have been altered since the last full backup of the database.
652
Chapter 15: AppInsight Applications
l
l
Circular Logging: Circular logging is a method of conserving disk space by
deleting transaction log files after they have been committed to the database. Circular Logging should only be enabled if the mailbox server is part
of a DAG with a minimum of three database copies and one of those should
be set as a "lagged copy."
Storage Quota Defaults:
l Issue Warning: Displays the minimum size the mailbox must be
before a Warning is issued to the user's mailbox.
l Prohibit Send: Displays the minimum size the mailbox must be
before sending email is prohibited from the user's mailbox.
l Prohibit Send and Receive: Displays the minimum size the mailbox
must be before sending and receiving email is prohibited from the
user's mailbox.
Table 1.
This table shows how the value for the Summary Status field is calculated. If the
conditions in the first four columns are met, the status in the Final SAM Status
column is displayed in the Summary Status field.
DB Copy
DB Copy Status (Passive) DB Content DB Content Final
Status (Active)
Index State Index State SAM
Statu
(Active)
(Passive)
s
Dismounted
Any
Any
Any
Offline
Dismounting
Any
Any
Any
Warni
ng
Failed
Any
Any
Any
Down
Initializing
Any
Any
Any
Warni
ng
Mounted,
DisconnectedAndHealthy
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
DisconnectedAndHealthy
Seeding, or
SeedingSource
Any other
Critica
l
653
Any
Database Details
Mounted,
DisconnectedAndResynchr Healthy,
Any
Seeding, or
onizing
Seeding, or
SeedingSou
SeedingSource
rce
Warni
ng
Mounted,
DisconnectedAndResynchr Any other
Seeding, or
onizing
SeedingSource
Any
Critica
l
Mounted,
Failed
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
Failed
Seeding, or
SeedingSource
Any other
Any
Critica
l
Mounted,
FailedAndSuspended
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
FailedAndSuspended
Seeding, or
SeedingSource
Any other
Any
Critica
l
Mounted,
Healthy
Seeding, or
SeedingSource
Healthy,
Seeding, or
SeedingSou
rce
Healthy,
Up
Seeding, or
SeedingSou
rce
Mounted,
Healthy
Seeding, or
SeedingSource
Healthy,
Any other
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
Healthy
Seeding, or
SeedingSource
Crawling
Any
Warni
ng
Mounted,
Any other
Healthy,
Warni
Healthy
654
Chapter 15: AppInsight Applications
Seeding, or
SeedingSource
Seeding, or ng
SeedingSou
rce
Mounted,
Healthy
Seeding, or
SeedingSource
Any other
Mounted,
Initializing
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Up
Mounted,
Initializing
Seeding, or
SeedingSource
Any other
Any
Warni
ng
Mounted,
Resynchronizing
Seeding, or
SeedingSource
Healthy,
Seeding, or
SeedingSou
rce
Healthy,
Up
Seeding, or
SeedingSou
rce
Mounted,
Resynchronizing
Seeding, or
SeedingSource
Healthy,
Any other
Seeding, or
SeedingSou
rce
Mounted,
Resynchronizing
Seeding, or
SeedingSource
Any other
Healthy,
Warni
Seeding, or ng
SeedingSou
rce
Mounted,
Resynchronizing
Seeding, or
SeedingSource
Any other
Any other
Mounted,
Seeding
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Up
Mounted,
Any other
Warni
Seeding
655
Any other
Any
Critica
l
Warni
ng
Critica
l
Database Details
Seeding, or
SeedingSource
ng
Mounted,
SeedingSource
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Up
Mounted,
SeedingSource
Seeding, or
SeedingSource
Any other
Any
Warni
ng
Mounted,
Service Down
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
Service Down
Seeding, or
SeedingSource
Any other
Any
Critica
l
Mounted,
SinglePageRestore
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
SinglePageRestore
Seeding, or
SeedingSource
Any other
Any
Critica
l
Mounted,
Suspended
Seeding, or
SeedingSource
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
Mounted,
Suspended
Seeding, or
SeedingSource
Any other
Any
Critica
l
Mounting
Any
Any
Warni
ng
Any
656
Chapter 15: AppInsight Applications
Service Down
Any
Any
Any
Down
SinglePageRe DisconnectedAndHealthy
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe DisconnectedAndHealthy
store
Any other
Any
Critica
l
SinglePageRe DisconnectedAndResynchr Healthy,
Any
store
onizing
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe DisconnectedAndResynchr Any other
store
onizing
Any
Critica
l
SinglePageRe Failed
store
Any
Any
Critica
l
SinglePageRe FailedAndSuspended
store
Any
Any
Critica
l
SinglePageRe Healthy
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe Healthy
store
Crawling
Any
Critica
l
SinglePageRe Healthy
store
Any other
Any
Critica
l
SinglePageRe Initializing
store
Any
Any
Critica
l
SinglePageRe Resynchronizing
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe Resynchronizing
Any other
Critica
657
Any
Database Details
store
l
SinglePageRe Seeding
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe Seeding
store
Any other
Any
Critica
l
SinglePageRe SeedingSource
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe SeedingSource
store
Any other
Any
Critica
l
SinglePageRe Service Down
store
Any
Any
Critica
l
SinglePageRe SinglePageRestore
store
Any
Any
Critica
l
SinglePageRe Suspended
store
Healthy,
Any
Seeding, or
SeedingSou
rce
Warni
ng
SinglePageRe Suspended
store
Any other
Critica
l
Any
Table 2.
Mounted
The active copy is online and accepting client connections. Only
the active copy of the mailbox database copy can have a copy
status of Mounted.
Mounting
The active copy is coming online and not yet accepting client
connections. Only the active copy of the mailbox database copy
can have a copy status of Mounting.
Dismounting
The active copy is going offline and terminating client
658
Chapter 15: AppInsight Applications
connections. Only the active copy of the mailbox database copy
can have a copy status of Dismounting.
Dismounted
The active copy is offline and not accepting client connections.
Only the active copy of the mailbox database copy can have a
copy status of Dismounted.
Seeding
The mailbox database copy is being seeded, the content index
for the mailbox database copy is being seeded, or both are being
seeded. Upon successful completion of seeding, the copy status
should change to Initializing.
Seeding
Source
The mailbox database copy is being used as a source for a
database copy seeding operation.
Initializing
The mailbox database copy is in an Initializing state when a
database copy has been created, when the Microsoft Exchange
Replication service is starting or has just been started, and
during transitions from Suspended, Service Down, Failed,
Seeding, or Single Page Restore to another state. While in this
state, the system is verifying that the database and log stream are
in a consistent state. In most cases, the copy status will remain in
the Initializing state for about 15 seconds, but in all cases, it
should generally not be in this state for longer than 30 seconds.
ReThe mailbox database copy and its log files are being compared
synchronizing with the active copy of the database to check for any divergence
between the two copies. The copy status will remain in this state
until any divergence is detected and resolved.
Single Page
Restore
This state indicates that a single page restore operation is
occurring on the mailbox database copy.
Failed
The mailbox database copy is in a Failed state because it is not
suspended, and it is not able to copy or replay log files. While in
a Failed state and not suspended, the system will periodically
check whether the problem that caused the copy status to
change to Failed has been resolved. After the system has
detected that the problem is resolved, and barring no other
issues, the copy status will automatically change to Healthy.
659
Database Disk I/O
Service
Down
The Microsoft Exchange Replication service is not available or
running on the server that hosts the mailbox database copy.
Suspended
The mailbox database copy is in a Suspended state as a result of
an administrator manually suspending the database copy by
running the Suspend-MailboxDatabaseCopy cmdlet.
Healthy
The mailbox database copy is successfully copying and
replaying log files, or it has successfully copied and replayed all
available log files.
Disconnected The mailbox database copy is no longer connected to the active
and Healthy database copy, and it was in the Healthy state when the loss of
connection occurred. This state represents the database copy
with respect to connectivity to its source database copy. It may be
reported during DAG network failures between the source copy
and the target database copy.
Disconnected The mailbox database copy is no longer connected to the active
and Redatabase copy, and it was in the Re-synchronizing state when
synchronizing the loss of connection occurred. This state represents the
database copy with respect to connectivity to its source database
copy. It may be reported during DAG network failures between
the source copy and the target database copy.
Failed and
Suspended
The Failed and Suspended states have been set simultaneously
by the system because a failure was detected, and because
resolution of the failure explicitly requires administrator
intervention. An example is if the system detects unrecoverable
divergence between the active mailbox database and a database
copy. Unlike the Failed state, the system will not periodically
check whether the problem has been resolved, and automatically
recover. Instead, an administrator must intervene to resolve the
underlying cause of the failure before the database copy can be
transitioned to a healthy state.
Database Disk I/O
This resource provides details concerning the database disk I/O being monitored
by the application.
660
Chapter 15: AppInsight Applications
l
l
l
l
l
l
File Path: Path of the listed database.
Volume: Displays the name of the listed volume.
Disk Queue Length: Displays the length of the disk queue of the listed
volume.
Total IOPS: Displays the total number of Input/Output operations per
second of the listed volume.
Latency: Numerically displays the average time the disk transfers took to
complete, in seconds.
Exchange Server: Displays the name of the listed Exchange Server.
Database File Size
This resource provides details concerning the size of the listed database copies
being monitored by the application.
l
l
l
l
l
File Path: Path of the listed database.
Total File Size: Displays the size of the listed database file.
Database Usage: Depending on how your database is configured, this
value is showing you how close you are to running out of space. If your database is configured as a fixed size, auto-grow, or a restricted auto-grow, the
percentages relate to what is going to cause your database to run out of
space.
Volume Usage: Numerically and graphically displays the volume usage as
a percentage.
Exchange Server: Displays the name of the listed Exchange server.
661
Database I/O
Database I/O
This resource contains performance counters specific to the status of database
I/O. The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
I/O
Definition:
Database Shows the average length of time, in ms, per
Reads
database read operation.
Average
662
> 50 ms > 50
ms for
5 polls
Chapter 15: AppInsight Applications
Latency
Information:
Should be 20 ms on average. Spikes should not
exceed 50 ms.
Possible problems:
Users may experience decreased performance,
including delayed message deliveries.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration. Review the event logs for related
events. Verify network topology between mailbox
servers and storage resources. Examine CPU &
Memory usage to determine possible bottlenecks.
Examine replication status for replica database.
I/O
Database
Writes
Average
Latency
Definition:
Shows the average length of time, in ms, per
database write operation.
> 100
ms
> 100
ms for
5 polls
> 200
> 200
Information:
Should be 50 ms on average. Spikes of up to 100
ms are acceptable if not accompanied by
database page fault stalls.
Possible problems:
Users may experience decreased performance,
including delayed message deliveries.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration. Review the event logs for related
events. Verify network topology between mailbox
servers & storage resources. Examine CPU and
Memory usage to determine possible bottlenecks.
Examine replication status for replica database.
I/O Log
Definition:
663
Database I/O
Reads
Indicates the average time, in ms, to read data
ms
Average from a log file. Specific to log replay and database
Latency recovery operations.
ms
for 5
polls
Information:
Average should be less than 200 ms with spikes
up to 1,000 ms
Possible problems:
Users may experience decreased performance,
including delayed message deliveries.
Remediation: If the disk subsystem is not meeting
demand, correcting the problem may require
additional disks, faster disks, or modifying the disk
configuration. Review the event logs for related
events. Verify network topology between mailbox
servers & storage resources. Examine CPU and
Memory usage to determine possible bottlenecks.
Examine replication status for replica database.
I/O Log
Writes
Average
Latency
Definition:
Indicates the average time, in ms, to write a log
buffer to the active log file.
Information:
This count should be 10 ms or less on production
servers.
Possible problems:
Indication that the Exchange Database\I/O
Database Writes Average Latency is too high
Remediation: If the disk subsystem is not meeting
demand, correcting the problem may require
additional disks, faster disks, or modifying the disk
configuration. Review the event logs for related
events. Verify network topology between mailbox
servers & storage resources. Examine CPU and
Memory usage to determine possible bottlenecks.
Examine replication status for replica database.
664
> 10 ms > 10
ms for
5 polls
Chapter 15: AppInsight Applications
Log
Threads
Waiting
Definition:
> 10 for
Shows the number of threads waiting for their data 5 polls
to be written to the log to complete an update of
the database. If this number is too high, the log
may be in a bottleneck situation.
> 10
for 15
polls
Information:
Should be less than 10 on average.
Possible problems:
If this number is too high, the log may be a
bottleneck. Regular spikes concurrent with log
record stall spikes indicate that the transaction log
disks are in a bottleneck situation. If the value for
log threads waiting is more than the spindles
available for the logs, there is a bottleneck on the
log disks.
Remediation:
If the disk subsystem is not meeting demand,
correcting the problem may require additional
disks, faster disks, or modifying the disk
configuration. Review the event logs for related
events. Verify network topology between mailbox
servers and storage resources. Examine CPU and
Memory usage to determine possible bottlenecks.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
665
Database Metrics
Database Metrics
This resource contains performance counters specific to the status of database
metrics. The icons of the listed performance counters in the Statistic Name
column will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
Active Client
Logons
Definition:
The number of clients that performed
any action within the last 10 minute
interval.
N/A
(Only available in
Exchange 2010)
Information:
666
N/A
Chapter 15: AppInsight Applications
Active client logons can be high if users
are logging on and logging off
frequently.
Possible problems:
May cause memory bottlenecks on the
server if the number is excessively high.
Remediation:
Determine if users are running
applications not required for business
use and request they do not run these
applications which is causing an
increase in server logons. If this does not
help, or is not possible, reduce the
number of server hosted on the server
and move any public folders on the
server to a different server.
Slow Findrow
Rate
(Only available in
Exchange 2010)
Definition:
Shows the rate at which the slower
FindRow needs to be used in the
mailbox store.
Information:
Should be no more than 10 for any
specific mailbox store.
Possible problems:
Higher values indicate applications are
crawling or searching mailboxes, which
is affecting server performance. These
include desktop search engines,
customer relationship management
(CRM), or other third-party applications.
Remediation:
Run the ResetSearchIndex.ps1 script
which is located in the scripts directory
at the root of the Exchange installation.
Alternatively, you can perform the
667
> 10
> 10 for
15
polls
Database Metrics
process manually:
1. Rebuild index catalog using UpdateMailboxDatabaseCopy <DBName> -
command.
2. Stop the Microsoft Exchange Search
Service.
3. Delete old catalog files.
4. Restart the Microsoft Exchange
Search Service.
CatalogOnly
Average
Document
Indexing Time
(At the database
level, this is only
available in
Exchange 2010. At
the application
level, this is
available for both
Exchange 2010
and 2013.)
Mailboxes
processed/sec
(Only available in
Exchange 2013)
Definition: Shows the average, in ms, of > 30
how long it takes to index documents.
Information: Should be less than 30
seconds at all times.
> 30 for
15
polls
Possible problems: Verify content
index state of all database copies.
Remediation: For any database
indexes not "healthy," update the
content index on the server using the
Update-MailboxDatabaseCopy <DBName>
-CatalogOnly
command.
Definition: Shows the rate of mailboxes N/A
processed by time-based assistants per
second.
N/A
Information: Determines current load
statistics for this counter.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
668
Chapter 15: AppInsight Applications
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Events
This resource contains performance counters specific to the status of database
events. The icons of the listed performance counters in the Statistic Name column
will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
Counter
Expert Knowledge
Warning Critical
Average
Definition:
Event
Shows the average processing time of the
Processing events chosen.
669
>2
> 2 for
15
polls
Events
Time In
Seconds
Information:
Should be less than 2 at all times.
Possible problems:
Indicates the Mail Submission Assistant is not
able to handle the number of submission
requests being made to the database. May
occur when server is experiencing a heavy load
which can cause messages to queue on the
server.
Remediation:
Review event logs for related events examining
log entries for each Assistant's infrastructure
and its corresponding assistant.
Events in
Queue
Definition:
Shows the number of events in the in-memory
queue waiting to be processed by the
assistants.
> 20
> 50
Events
Definition:
N/A
Polled/sec Shows the number of events polled per second.
N/A
Information:
Should be a low value at all times.
Possible problems:
High values may indicate a performance
bottleneck.
Remediation:
Review event logs for related events. Monitor
CPU and memory for bottlenecks.
Information:
Determines current load statistics for this
counter.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
670
Chapter 15: AppInsight Applications
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Messages
This resource contains performance counters specific to the status of messages.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that counter.
If the value of a listed counter crosses the Warning threshold, the chart for the
listed monitor will display a yellow background. If the value of a listed
performance counter crosses the Critical threshold, the chart will display a red
background. Hovering over any time period within the chart will display detailed
information about that time period in the tooltip.
The following table lists the default performance counters for this resource along
with their respective definitions and troubleshooting information, including default
Warning and Critical thresholds:
671
Messages
Counter
Expert Knowledge
Warning Critical
Messages
Queued For
Submission
Definition:
Shows the current number of submitted
messages not yet processed by the transport
layer.
> 30
> 50
N/A
N/A
N/A
N/A
(Only
available in
Exchange
2010)
Information:
The queues should remain below 50 at any
given time. Anything above this amount
should be cleared within 15 minutes.
Possible problems:
Mailbox server is not communicating properly
with the transport server.
Remediation:
Verify network connectivity and transport
server functionality. Additional bottlenecks
may include disk reads or writes, processor
time, available memory, and network
configuration.
Messages
Sent/sec
(Only
available in
Exchange
2010)
Definition:
Shows the rate that messages are sent to
transport.
Information:
Used to determine current messages sent to
transport.
Messages
Definition:
Delivered/sec Shows the rate that messages are delivered
to all recipients.
(Only
available in
Exchange
2010)
Information:
Indicates current message delivery rate to the
store.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
672
Chapter 15: AppInsight Applications
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Notes:
l
l
Additional components on certain resources may be available for addition
and/or deletion on the Edit page.
The Value from Last Poll column shows the most recent data available for
the listed statistic.
Transaction Log Disk I/O
This resource provides details concerning the status of the current transaction log
disk I/O of database copies being monitored by the application.
l
l
l
l
l
l
File Path: Path to the transaction log directory.
Volume: Displays the name of the listed volume.
Disk Queue Length: Displays the length of the disk queue of the listed
volume.
Total IOPS: Displays the total number of Input/Output operations per
second of the listed volume.
Latency: Numerically displays the average time the disk transfers took to
complete, in seconds.
Exchange Server: Displays the name of the listed Exchange Server.
Transaction Log File Size
This resource provides details concerning the status of the current transaction log
file size of database copies being monitored by the application.
673
AppInsight for Exchange Mailbox Details View
l
l
l
l
l
File Path: Path to the transaction log directory.
Number of Files: Lists the total number of log files associated with the database.
Total File Size: Displays the total file size of all the transaction log files.
Volume Usage: Numerically and graphically displays the current volume
usage as a percent of the total size of the transaction log files.
Exchange Server: Displays the name of the listed Exchange Server.
AppInsight for Exchange Mailbox Details View
The Mailbox Details view provides information about the selected Exchange
mailbox. The available resources offered in this view include:
l
l
l
l
l
Mailbox Details
Mailbox Synced Devices
Received Mail
Sent Mail
Total Mailbox and Attachments Sizes
Note: Chart resources require several values for lines on charts to be visible.
Mailbox Details
This resource provides details about the current user's mailbox.
674
Chapter 15: AppInsight Applications
The following list defines each field of this resource:
l
l
l
l
l
l
l
l
User Logon Name: User's domain account name.
Display Name: Name of the listed user as it is displayed as a mailbox.
Mailbox Database: Displays the database that contains the listed mailbox
as well as the server that contains the database. The colors of the displayed
icons display the status of the object the icon represents.
Type: Lists the role of the listed mailbox.
Organizational Unit: This is the location of the User’s Active Directory
account within the Active Directory tree.
Primary SMTP Address: This is the primary email address for a user. A
user can have secondary email addresses which will route mail to the same
mailbox.
Mailbox Size:
l Total Size: Current size of all mailbox items shown numerically and
as a percentage with a bar graph.
l Total Items: Total number of mailbox items in the listed mailbox.
l Attachment Size: Shows the total size of those email messages that
include attachments, including the email message body.
l Attachment Count: Shows the number of email messages that contain attachments, as opposed to the actual number of attachments contained in each email.
Last Polled: The time and date the listed mailbox was polled for information.
675
Mailbox Synced Devices
l
l
l
l
Last Logged On: The time and date the listed user logged in to the mailbox.
Mailbox Last Modified: The time and date the listed mailbox was last modified.
Alias: The legible name for the listed user's email address.
Mailbox Limits:
l Issue Warning: Displays the size limit of the mailbox before it issues
a usage warning.
l Prohibit Send: Displays the size limit of the mailbox when it is no
longer able to send emails.
l Prohibit Send and Receive: Displays the size limit of the mailbox
when it is no longer able to send or receive emails.
For more information, see Attachment Extensions .
Mailbox Synced Devices
This resource provides details about the current user's synced mailbox status.
The following list defines each field of this resource:
l
l
l
Device Type: Lists the device the mailbox is being synced with.
Device User Agent: Displays the operating system and build of the listed
device.
Last Successful Sync: Displays the last time the listed device was successfully synced with the current mailbox.
Received Mail
This resource graphically details the value history of the current performance
counter, in this case, the total amount of received mail for the selected mailbox.
Hovering over any time period within the chart will display detailed information
about that time period in the tooltip.
The colors of the main chart correspond to the labels in the legend. You can
choose which data to display by using the check boxes in the legend.
676
Chapter 15: AppInsight Applications
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart or manipulating the sliders of the lower chart.
Sent Mail
This resource graphically details the value history of the current performance
counter, in this case, the number of messages sent for the selected mailbox.
Hovering over any time period within the chart will display detailed information
about that time period in the tooltip.
677
Total Mailbox and Attachments Sizes
The colors of the main chart correspond to the labels in the legend. You can
choose which data to display by using the check boxes in the legend.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart or manipulating the sliders of the lower chart.
Total Mailbox and Attachments Sizes
This resource graphically details the value history of the current performance
counter, in this case, the total size of the selected mailbox and its attachments.
678
Chapter 15: AppInsight Applications
Hovering over any time period within the chart will display detailed information
about that time period in the tooltip.
The colors of the main chart correspond to the labels in the legend. You can
choose which data to display by using the check boxes in the legend.
Note: Attachment Size shows the total size of those email messages that
include attachments, including the email message body.
For more information, see Mailbox Details.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart or manipulating the sliders of the lower chart.
679
Troubleshooting AppInsight for Exchange
Troubleshooting AppInsight for Exchange
The following sections will help you identify and correct AppInsight for Exchange
errors concerning configuration and performance counters:
l
l
l
l
Troubleshooting Error Codes in AppInsight for Exchange
Troubleshooting Exchange Performance Counters
Troubleshooting Permissions
Changing between 32-bit and 64-bit polling methods:
Important: The following log file contains all the information and errors related to
the WinRM configuration process:
C:\ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log
Troubleshooting Permissions
The following information will help you troubleshoot issues with the following:
l
l
l
l
Non-Domain Accounts
Adding Local Administrative privileges to Active Directory Account
Exchange Access
Mailbox Exchange Access
Note: Mailboxes with an empty primary SMTP address can be polled; however,
their Sent and Received statistics will not be not available.
Non-Domain Account
Local accounts (Non-Domain) cannot access Exchange Management interfaces
and therefore are not supported by AppInsight for Exchange. Please select an
Active Directory account or create a new one to use with AppInsight for
Exchange.
Add Local Administrative privileges to Active Directory Account
1. On the server where you want to grant local administrative privileges, open
a Computer Management console.
2. Navigate to System Tools > Local Users and Groups > Groups and then
double click the Administrators group.
3. Click Add and type in the Active Directory username of the account you
want to grant administrative privileges to, and then press Enter. (Ensure the
location is set to either the domain where the account is located or Entire
Directory.)
4. Click Apply and then click OK.
5. Alternatively, you can add an Active Directory group to the Local Administrators group and then add the AD user accounts to that group.
680
Chapter 15: AppInsight Applications
6. To verify the account and local group membership has been configured
properly, run the following in a PowerShell session:
$Recurse = $true
$GroupName = 'Administrators'
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
$ct = [System.DirectoryServices.AccountManagement.ContextType]::Machine
$group = [System.DirectoryServices.AccountManagement.GroupPrincipal]::FindByIdentity
($ct,$GroupName)
$LocalAdmin = $group.GetMembers($Recurse) | select @{N='Domain'; E=
{$_.Context.Name}}, samaccountName, @{N='ObjectType'; E={$_.StructuralObjectClass}} -Unique
$LocalAdmin = $LocalAdmin | Where-Object {$_.ObjectType -eq "user"}
Exchange Access
681
Troubleshooting Permissions
Granting Least Privilege access to the Exchange Organization can be
accomplished using Active Directory Users and Computers (ADUC)
1. From the Start Menu open ADUC and navigate to the Microsoft Exchange
Security Groups OU.
2. Double click on the View-Only Organization Management group.
3. After the window opens, click the Members tab and then click Add.
4. Type the username of the account you want to grant access to the
Exchange organization, and then click OK.
5. Click Apply and then click OK .
6. Close the ADUC window.
Access can also be granted using the Exchange Management
Shell with the following command:
Note: Replace the word "user" with the correct user name of the
service account.
Add-RoleGroupMember -Identity "View-Only Organization
Management" -Member "USER"
To verify the management role is properly assigned, use the
following commands:
Get-RoleGroupMember -Identity "View-Only Organization
Management" | Where-Object {$_.SamAccountName -eq
"USER"}
Get-RoleGroupMember -Identity "Organization Management"
| Where-Object {$_.SamAccountName -eq "USER"}
or
Get-ManagementRoleAssignment -RoleAssignee “USER” |
Where-Object {$_.RoleAssigneeName -eq "View-Only
Organization Management" -or $_.RoleAssigneeName -eq
"Organization Management"}
Mailbox Search Access
Mailbox Search access is required to determine attachment counts and sizes. It
can be granted using the Exchange Management Shell (EMS).
1. From the Start Menu, open the EMS.
2. Type: New-ManagementRoleAssignment -Role "Mailbox Search" -User
"USER" and press Enter.
682
Chapter 15: AppInsight Applications
To verify the management role has been properly assigned, use
the following command:
Get-ManagementRoleAssignment -RoleAssignee “USER” -Role
"Mailbox Search" | Where-Object {$_.RoleAssignmentDelegationType -eq "Regular"}
Note: Exchange Management Roles can be assigned to role
assignees using either regular or delegating role assignments.
l
l
Regular role assignments enable the role assignee to access
the permissions provided by the management role entries on this
role.
Delegating role assignments give the role assignee the ability to
assign this role to Role Groups, Users, or Universal Security
Groups.
For more information, see:
l
l
http://technet.microsoft.com/en-us/library/dd876958(v=exchg.150).aspx
http://www.powershellmagazine.com/2013/05/23/pstip-retrieve-group-membership-of-an-active-directory-group-recursively/
Troubleshooting Exchange Performance Counters
Occasionally, you may encounter an Exchange server which is missing some of
the expected performance counters. If this happens, you need to verify whether
the counters are simply disabled or if they are completely missing. The simplest
way to do this is through the registry.
1. Navigate to the service with the missing performance counters.
Note: Individual services are listed under HKLM\SYSTEM\CurrentControlSet\Services.
2. Expand the service and click on the Performance key. The important values we want to ensure exist are listed below and displayed in Figure 1.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<ServiceName>\Performance]
Example: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ESE\Performance]
"Close"="ClosePerformanceData"
"Collect"="CollectPerformanceData"
683
Troubleshooting Exchange Performance Counters
"Library"="<Path to performance counter DLL file>"
Example: "Library"="C:\\Program Files\\Microsoft\\Exchange
Server\\V15\bin\\perf\\%PROCESSOR_ARCHITECTURE%\\eseperf.dll"
"Open"="OpenPerformanceData"
"PerfIniFile"="<Name of performance counter INI file>"
Example: "PerfIniFile"="eseperf.ini"
The "Library" file path is typically "C:\Program
Files\Microsoft\Exchange
Server\%ExchangeVersion%\Bin\perf\%Processor_
Architecture%\%DLLFileName%"
Figure 1.
3. Verify the counters have not been disabled by expand the service and then
clicking on the "Performance" key.
4. Check for the value Disable Performance Counters (See Figure 2.) If this
value exists, ensure the data value is 0. Any other value will disable the
counters.
5. Once the value is confirmed to be set to 0, close all PerfMon windows and
then reopen them.
Note: The performance counters should be visible at this time. If the performance counters are not visible, proceed to the next step.
Figure 2.
684
Chapter 15: AppInsight Applications
6. If the values First Counter, First Help, Last Counter, and Last Help are listed (See Figure 3), it is highly recommended to unload the performance
counters prior to reloading them.
Figure 3.
To Unload Performance Counters: (See Figure 4)
1. Close all PerfMon windows and stop any services which may be using
these counters.
2. Open the Exchange Management Shell (EMS) in the Run as Administrator
context.
3. Type: Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Setup
and then press Enter.
4. Type: Remove-PerfCounters -DefinitionFileName "<Path to counter
definition XML file> and then press Enter.
685
Troubleshooting Error Codes in AppInsight for Exchange
a. The default location for Exchange counter definition files is: C:\Program Files\Microsoft\Exchange Server\%ExchangeVersion%\Setup\perf\%XMLFileName%
To Reload Performance Counters: (See Figure 4)
1. Close all PerfMon windows and stop any services which may be using
these counters.
2. Open the Exchange Management Shell (EMS) in the Run As Administrator
context.
3. Type: Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Setup
and then press Enter.
4. Type: New-PerfCounters -DefinitionFileName "<Path to counter definition XML file> and then press Enter.
a. The default location for Exchange counter definition files is: C:\Program Files\Microsoft\Exchange Server\%ExchangeVersion%\Setup\perf\%XMLFileName%
5. Check the application log to verify the counters were properly loaded and
no PerfLib errors exist. Reopen PerfMon to ensure the counters are available.
Figure 4.
Troubleshooting Error Codes in AppInsight for Exchange
Following are the possible error messages associated with AppInsight for
Exchange. Included are possible causes and solutions.
Important: The following log file contains all the information and errors related to
the WinRM configuration process:
C:\ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log
Configuration Errors
Error Message, Information, and Remediation
Error message: Remote configuration was unsuccessful due to the following:
"The deployment service executable was not found on the Orion server." For
details, see the log on the Orion server: ([ALLUSERSPROFILE]
686
Chapter 15: AppInsight Applications
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: Internal error. The Remote Installation Service.exe file was not
found. (Default file location: C:\Program Files (x86)\SolarWinds\Orion\APM).
This can be caused by an incorrect SAM installation or Remote Installation
Service.exe was deleted or modified.
Remediation: Add the Remote Installation Service.exe file to the following
folder: C:\Program Files (x86)\SolarWinds\Orion\APM.
Error message: Remote configuration was
unsuccessful due to the following: "Failed to start
Windows Remote Management" For details, see
the log on the Orion server: ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecu
tableStarter.log).
Remediation:
687
Troubleshooting Error Codes in AppInsight for Exchange
1. On the target Exchange server, navigate to
the Windows Services console and find the
Windows Remote Management (WS-Management) service.
2. Set Startup type to Automatic.
3. Start the Windows Remote Management
(WS-Management) service.
Error: Unable to access remote administrator
share.
Cause: The remote administrator share cannot be
accessed.
Resolution: Try enabling this feature manually by
taking the following steps:
1. Ensure that both computers belong to the
same Workgroup.
688
Chapter 15: AppInsight Applications
2. Specify which user(s) can access the Administrator Shares (Disk Volumes).
3. Enable File and print sharing through the
Windows firewall.
4. Check to see if you can access the Administrator share from another computer.
5. When complete, rerun the AppInsight for
Exchange Automatic Configuration Wizard.
Error message: Remote configuration was unsuccessful due to the following:
"The configurator executable was not found on the Orion server." For details,
see the log on the Orion server: ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: Internal error. SolarWinds.APM.RemoteWinRmConfiguratorFull.exe
file was not found (Default file location: C:\Program Files (x86)
\SolarWinds\Orion\APM). This can be caused by an incorrect SAM installation or
689
Troubleshooting Error Codes in AppInsight for Exchange
SolarWinds.APM.RemoteWinRmConfiguratorFull.exe
was deleted or modified..
Remediation: Add SolarWinds.APM.RemoteWinRmConfiguratorFull.exe to the
following folder: C:\Program Files (x86)\SolarWinds\Orion\APM.
Error message: Remote configuration was unsuccessful due to the following:
"Access denied." For details, see the log on the Orion server:
([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: The provided user account does not have access to the
Administrator share on the remote Exchange server.
Remediation: Connect to the Administrator share with
\\ExchangeComputerName\<drive letter>$\ from the Orion server.
690
Chapter 15: AppInsight Applications
Error message: Remote configuration was unsuccessful due to the following:
"The configurator executable has an invalid signature." For details, see the log
on the Orion server: ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: The configuration executable cannot be started on the remote
Exchange server due to any of the following:
l
l
l
The high level of User Account Control settings
The provided user account does not have privileges high enough to run
*.exe files
SolarWinds.APM.RemoteWinRmConfiguratorFull.exe is not signed with a
Solarwinds certificate.
Remediation:
l
l
Reduce User Account Control settings on the remote Exchange server;
Ensure the user's account has privileges to run *.exe files
691
Troubleshooting Error Codes in AppInsight for Exchange
Error message: Remote configuration was unsuccessful due to the following:
"The network path was not found." For details, see the log on the Orion server:
([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: This is a Windows error indicating that a networking component is
malfunctioning.
Remediation:
l
l
l
Ensure you have access to the Shared Storage drive.
1. In Windows Explorer, navigate to My Network Places > Entire Network > Microsoft Windows Network > (workgroup name) >
(Shared Storage drive name).
Firewalls can block traffic to the network which could generate this message. Try temporarily disabling any software or hardware firewalls to isolate the problem.
Anti-spyware tools can block network traffic. Try temporarily disabling any
692
Chapter 15: AppInsight Applications
anti-spyware programs and restart the computer to isolate the problem.
Error message: Remote configuration was unsuccessful due to the following:
"Executable configuration file was not found on the Orion server." For details,
see the log on the Orion server: ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log).
Description: Internal error.
was not found
(Default file location: C:\Program Files (x86)\SolarWinds\Orion\APM.) This
can be caused by an incorrect SAM installation or
SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config was deleted or
modified.
SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config
Remediation: Add SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config
to the following location: C:\Program Files (x86)\SolarWinds\Orion\APM.
693
Troubleshooting Error Codes in AppInsight for Exchange
For information about Microsoft error codes, see: http://msdn.microsoft.com/enus/library/cc231199.aspx
694
Chapter 15: AppInsight Applications
Error message: Remote configuration was unsuccessful due to the following:
"PowerShell 2.0 was not detected on the Exchange server." Learn how to
correct this. For details, see the log on the remote computer. ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log).
Description: PowerShell 2.0 is not installed on the remote Exchange server.
Remediation: PowerShell 2.0 should be installed on Exchange server.
Installing PowerShell 2.0 on Server 2008:
For Server 2008, download the installation file for PowerShell 2.0 at
http://support.microsoft.com/kb/968929/en-us and install it on the
server.
Note: PowerShell 2.0 is automatically installed on Server 2008 R2
and therefore no additional installation is required.
Installing PowerShell 2.0 on Server 2012:
1. Open Server Manager.
695
Troubleshooting Error Codes in AppInsight for Exchange
2. Click on the Manage menu, and the select Add Roles and
Features.
3. After the wizard opens, click Next until you get to the Installation Type page.
4. Select Role-based or feature-based installation.
5. Click Next until you reach the Features page.
6. Scroll down to Windows PowerShell. It will likely show itself
as partially installed (square inside box).
7. Check the box next to Windows PowerShell 2.0 Engine.
8. Click Next and then Install.
9. When the installation finishes, click Close.
Error message: Remote configuration was unsuccessful due to the following:
"This account must be an Active Directory account with local administrative
696
Chapter 15: AppInsight Applications
privileges." Learn how to correct this. For details, see the log on the remote
computer. ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log).
Description: The provided user account does not have Local Administrative
privileges.
Remediation:
Add Local Administrative privileges to Active Directory Account:
1. On the server where you wish to grant local administrative privileges, open
a Computer Management console.
Note: On Windows 2012, add this privilege using the Active Directory console.
2. Navigate to System Tools > Local Users and Groups > Groups and
double click the Administrators group.
3. Click Add and type in the Active Directory username of the account you
want to grant administrative privileges, and then press Enter. (Ensure the
location is set to either the domain where the account is located or Entire
Directory.)
4. Click Apply and then click OK.
Note: Alternatively, you can add an Active Directory group to the local
administrators group and add the Active Directory user accounts to that
group.
Error message: Remote configuration was unsuccessful due to the following:
"This account must be an Active Directory account with organization wide
Exchange access (View-Only-Organization Management and Mailbox Search
Management Role)." Learn how to correct this. For details, see the log on the
remote computer. ([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log).
Description: The provided user account does not have View-Only-Organization
Management or Mailbox Search Management privileges.
Remediation:
Grant View-Only-Organization Management privileges:
Granting Least Privilege access to the Exchange Organization can be
accomplished using Active Directory Users and Computers (ADUC). To
accomplish this, take the following steps:
697
Troubleshooting Error Codes in AppInsight for Exchange
1. From the Start Menu, open ADUC and navigate to the Microsoft Exchange
Security Groups OU.
2. Double click on the View-Only Organization Management group.
3. After the window opens, click the Members tab and then click Add.
4. Type the username of the account you want to grant access to the
Exchange organization, and then click OK.
5. Click Apply, and then click OK.
6. Close the ADUC window.
Grant Mailbox Search Access:
Mailbox Search access is required to determine attachment counts and sizes.
This can be granted using the Exchange Management Shell (EMS).
1. From the Start Menu, open the EMS.
2. Type: New-ManagementRoleAssignment -Role "Mailbox Search" -User
<Username of account being granted access> and then press Enter.
3. To verify the management role has been properly assigned, enter the following command:
Get-ManagementRoleAssignment -RoleAssignee <Username of account>
698
Chapter 15: AppInsight Applications
Error message:Remote configuration was unsuccessful due to the following:
"An error occurred during Exchange Server Confiduration. Multiple connections
to a server or shared resource by the same user, using more than one user
name, are not allowed."
Cause: This is a Windows Limitation when trying to map multiple drives to the
same computer using different user accounts.
Resolution:
1.
2.
3.
4.
Open the Computer Manager on the Exchange server
Expand Shared Folders and select Sessions.
Right-click on the users in the list and click Close Session.
Once the session list is empty, retry the Configure Server button in
AppInsight for Exchange.
For more information, see SWKB5583.
699
Troubleshooting Error Codes in AppInsight for Exchange
Error message: Remote configuration was
unsuccessful due to the following: "WinRM test
was successful. PowerShell Exchange web site
testing failed with the following error: Connecting
to remote server..."
Description: There are no default HTTPS
bindings for all unassigned ports, (i.e. “HTTPS
443 *”.)
Remediation: Establish the missing default
HTTPS binding with an Exchange certificate.
700
Chapter 15: AppInsight Applications
Changing between 32-bit and 64-bit polling methods:
Using AppInsight applications with 32-bit polling on 64-bit computers via an agent
may prevent certain performance counters from collecting information and should
be changed to 64-bit polling.
To make this change at the application level, take the following steps:
1. From the web console, navigate to Home > Applications > Select an
AppInsight Application.
2. Click Edit Application Monitor.
3. Expand Advanced, and then click Override Template.
4. In the Platform to run polling job field, change the value to x64.
5. When done, click Submit.
To make this change at the template level, take the following steps:
701
AppInsight for IIS
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Select an AppInsight application and click Edit.
3. Expand Advanced, and in the Platform to run polling job field, change
the value to x64.
Note: Applications assigned to 32-bit hosts with the x64bit option will continue to poll using 32-bit, regardless of this setting.
4. When done, click Submit.
AppInsight for IIS
SAM offers a detailed view of your IIS servers' performance by using the
AppInsight for IIS embedded application. AppInsight for IIS provides a level of
detail and expert knowledge far beyond what an IIS template can provide,
allowing you to monitor virtually every aspect of all of your IIS servers.
Like any unassigned application in SAM, AppInsight for IIS is considered a
template until it is applied. Therefore, it is a member of the Application Monitor
Templates collection. Once applied to a node, AppInsight for IIS is considered an
702
Chapter 15: AppInsight Applications
application. Like any SAM application, AppInsight for IIS is comprised of multiple
component monitors.
AppInsight for IIS General Information:
l
l
l
l
AppInsight for IIS Requirements and Permissions
Quick Configuration and Navigation
Manually Configuring AppInsight for IIS
Troubleshooting AppInsight for IIS
The following reports are installed for use with AppInsight for IIS:
l
l
l
l
IIS SSL Certificate Expiration Report
Site Connections Report
Site Log Size by File
Site Size by File
For more information, see Predefined Server & Application Monitor Web Console
Based Reports
AppInsight for IIS Requirements and Permissions
AppInsight for IIS data is collected at the same default five minute polling interval
as traditional application templates. Following are the requirements needed for
AppInsight for IIS:
AppInsight for IIS Requirements and Permissions
l
l
l
l
PowerShell 2.0 or higher must be installed on the IIS server.
Administrator rights or equivalent credentials to the IIS server bring monitored is needed for configuration. Non-administrative permissions for
polling and monitoring is only achievable using the optional Orion Agent.
For more information, see Agents.
IIS 7.0 or higher must be installed.
AppInsight for IIS supports the following versions of Microsoft operating systems and their respective IIS versions:
Microsoft OS Version
IIS Version Supported
Microsoft Windows
2008
IIS 7.0
Microsoft Windows
2008 R2
IIS 7.5
703
AppInsight For IIS Licensing
Microsoft Windows
2012
IIS 8.0
Microsoft Windows
2012 R2
IIS 8.5
Notes:
l
l
If any prerequisite is missing, the application will go into an Unknown state.
Some resources may not function properly in Internet Explorer 8 or earlier.
Consider upgrading Internet Explorer or using an alternate web browser
such as Firefox or Chrome.
AppInsight For IIS Licensing
When using AppInsight for IIS, 30 component monitors will count against your
licensed number of component monitors, per monitored IIS server.
For example, if you have an active license for 1,500 component monitors and use
AppInsight for IIS to monitor 10 IIS servers, 300 component monitors will count
against your total license. The number of sites and application pools you have on
these servers is irrelevant.
(30 component monitors X 10 IIS servers = 300 component monitors
used.)
This will leave you with 1,200 component monitors available for use elsewhere.
(1,500 component monitors – 300 component monitors used for
AppInsight for IIS = 1,200 component monitors remaining).
Important: The example below illustrates a situation where you would have 40
available component monitors available, but have surpassed your allowed
number of 300 monitors by 60. The discrepancy is caused by AppInsight
application implementations. AppInsight applications cannot be partially licensed,
as is the case with typical applications.
704
Chapter 15: AppInsight Applications
For more information, see "Licensing."
Understanding the AppInsight for IIS Details View
The AppInsight for IIS Details view is the equivalent of the Application Details
view of a traditional SAM application; however, there are some notable
differences:
l
l
Site Details View: This view displays an overview of a particular site being
monitored.
Application Pool Details View: This view displays details about the selected
application pool.
From the AppInsight for IIS Details view, you can select from the drop down menu
and choose to display different amounts of data based on a time range, as shown:
705
Editing Resources
Editing Resources
Both the titles and subtitles of each resource can be changed by clicking Edit in
the upper right-hand corner of any resource, and then clicking Submit.
The time and date displayed at the top of each resource (where applicable)
shows the range of data currently loaded into the resource. This, along with the
Sample Interval Range, can be changed by clicking Edit from within the resource.
Additionally, certain resources will allow you to add and remove component
monitors from the resource. You can do this by clicking the Edit button, and then
checking the component monitors you want to keep.
Note: Pertinent data for each resource is grouped together by default.
706
Chapter 15: AppInsight Applications
Note: As illustrated, other options may appear depending upon the resource
being edited.
AppInsight for IIS Alerts
The following three alerts and their macros/variables are included with AppInsight
for IIS:
1. Alert Name
Restart Failed IIS Application Pool
State
Alert disabled by default.
Alert Description
This alert will restart any failed IIS application pool
that is configured to be "AlwaysRunning." As configured, this alert will not trigger for application pools
that are configured to start "OnDemand," as these
application pools stop normally when not in use, or
when the site that is configured to use the Application
Pool has no activity and is dormant.
Alert Trigger
IIS application pool = Stopped and application pool
startup mode is configured for "AlwaysRunning" and
Application Pool is not equal to Unmanaged.
Trigger Action
Start application pool (Note: Application Pool trigger
actions should include stop, start, and restart, no differently than the actions available through the Orion
web interface for AppInsight for IIS application pools.)
Trigger Action 2 Email Notification:
Subject: Application Pool ${N=SwisEntity;M=Name}
on ${N=SwisEntity;M=Application.Node.Caption} is
${N=SwisEntity;M=DisplayState}.
Message Body: The IIS Application Pool
${N=SwisEntity;M=Name} on
${N=SwisEntity;M=Application.Node.Caption}
is
currently ${N=SwisEntity;M=DisplayState}.
Attempting to restart Application Pool
${N=SwisEntity;M=Name} now. For more information
click the URL below.
707
AppInsight for IIS Alerts
<br/>
<br/>
${N=SwisEntity;M=DetailsUrl}
Trigger Reset
Action
Email Notification:
Subject: Application Pool ${N=SwisEntity;M=Name}
on ${N=SwisEntity;M=Application.Node.Caption} is
${N=SwisEntity;M=DisplayState}
Message Body: The IIS Application Pool
${N=SwisEntity;M=Name} on
is
now ${N=SwisEntity;M=DisplayState}. For more
information click the URL below.
${N=SwisEntity;M=Application.Node.Caption}
<br/>
<br/>
${N=SwisEntity;M=DetailsUrl}
2. Alert Name
Restart Failed IIS Site
State
Alert disabled by default.
Alert Description
This alert will attempt to restart any site that is monitored by AppInsight for IIS that is found to be in a
Stopped state.
Alert Trigger
IIS site = Stopped and not equal to Unmanaged.
Trigger Action
Start IIS site (Note: IIS site trigger actions should
include stop, start, and restart, no differently than
the actions available through the Orion web interface
for AppInsight for IIS sites.
Trigger Action 2 Email Notification:
Subject: IIS Site ${N=SwisEntity;M=Name} on
${N=SwisEntity;M=Application.Node.Caption}
${N=SwisEntity;M=DisplayState}.
708
is
Chapter 15: AppInsight Applications
Message Body: The IIS Site
${N=SwisEntity;M=Name} on
${N=SwisEntity;M=Application.Node.Caption}
is
currently ${N=SwisEntity;M=DisplayState}.
Attempting to restart Site ${N=SwisEntity;M=Name}
now. For more information click the URL below.
<br/>
<br/>
${N=SwisEntity;M=DetailsUrl}
Trigger Reset
Action
Email Notification:
Subject: IIS Site ${N=SwisEntity;M=Name} on
${N=SwisEntity;M=Application.Node.Caption}
${N=SwisEntity;M=DisplayState}.
is
Message Body: The IIS Site
${N=SwisEntity;M=Name} on
is
now ${N=SwisEntity;M=DisplayState}. For more
information click the URL below.
${N=SwisEntity;M=Application.Node.Caption}
<br/>
<br/>
${N=SwisEntity;M=DetailsUrl}.
3. Alert Name
Alert me when the Average Server Execution Time
for any URL exceeds an acceptable limit.
State
Alert disabled by default
Alert Description
This alert will notify you when the execution time of
any URL monitored by AppInsight for IIS exceeds a
predefined acceptable limit.
Alert Trigger
Average URL Server Execution Time is greater than
5 minutes.
Trigger Action
Email Notification:
709
AppInsight for IIS Alerts
Subject: IIS Site Server Execution Time exceeded on
${N=SwisEntity;M=Site.Name}.
Message Body: The Server Average Execution time
for ${N=SwisEntity;M=Site.Name} on
${N=SwisEntity;M=Site.Application.Node.Caption}
has been exceeded. Details for the URL being
accessed are listed below.
Recent Request Date:
${N=SwisEntity;M=RecentRequestDate}
URL: ${N=SwisEntity;M=URLStem}
Average Server Execution Time:
${N=SwisEntity;M=AverageElapsedTime}
ms
Viewing Alerts:
1. From the web console, navigate to Home > Alerts.
2. Select the alerts you want to view by checking its box and clicking View
Alert Details.
For more information, see:
710
Chapter 15: AppInsight Applications
l
l
Creating Alerts
Predefined Server & Application Monitor Web Console Based Reports
Quick Configuration and Navigation
Configuration of SAM's AppInsight for IIS is most easily achieved via Discovery,
as shown below.
l
To add AppInsight for IIS, see Adding AppInsight for IIS to a Node
For more information, see:
l
l
l
l
AppInsight for IIS Requirements and Permissions
Adding AppInsight for IIS to a Node
Editing the AppInsight for IIS Template
Navigating the AppInsight for IIS Details View
Adding AppInsight for IIS to a Node
There are multiple ways to add AppInsight for IIS to a node. AppInsight for IIS can
be added via the Management resource, via Node Discovery, by manually
adding it via the Manage Application Monitor Templates screen, adding it via
Network Sonar Discovery, or adding it via a Scheduled Discovery.
Adding AppInsight for IIS via the Management Resource:
1. Navigate to the Node Details view by clicking any node.
2. From the Management resource, click List Resources.
711
Adding AppInsight for IIS via the Management Resource:
3. Check the Microsoft IIS box to enable AppInsight for IIS data collection.
When done, click Submit.
4. Navigate to the All Applications resource to verify the addition by clicking
the Applications tab in the web console.
5. Click on the newly added AppInsight for IIS application in this view and then
enter your IIS credentials when prompted.
712
Chapter 15: AppInsight Applications
6. Once your credentials are entered, click Configure Server.
Adding AppInsight for IIS to a Node via Discovery:
1. From the web console, navigate to Settings > Add a Node in the Getting
Started with Orion section.
2. Fill out the information on the Define Node step, and then click Next.
713
Adding AppInsight for IIS via the Management Resource:
3. On the Choose Resources step, check the Microsoft IIS you want.
AppInsight applications have a unique blue and white icon, as shown:
4. Click Next and complete the wizard as instructed.
5. Navigate to the All Applications resource to verify the addition by clicking
the Applications tab in the web console.
6. Click on the newly added AppInsight for IIS application in this view and then
enter your IIS credentials when prompted.
714
Chapter 15: AppInsight Applications
7. Once your credentials are entered, click Configure Server.
Adding AppInsight for IIS to a Node via Manage Application Templates:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Select AppInsight for IIS by checking its box and click Assign to Node.
3. Complete the required fields in the wizard and click Assign Application
Monitor.
For information, see:
l
l
Network Sonar Discovery.
Managing Scheduled Discovery Results.
Editing the AppInsight for IIS Template
The AppInsight for IIS application behaves like any other application in SAM. And
like other applications, the AppInsight for IIS template can be edited.
Note: Some limitations may apply.
715
Editing the AppInsight for IISTemplate:
Editing the AppInsight for IISTemplate:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Check the AppInsight for IIS template in the list and then click Edit.
3. From here, you can edit certain component monitors within the template;
including threshold values, number of records to retrieve, component monitor description, and so on.
4. When done editing, click Submit at the bottom of the screen.
Navigating the AppInsight for IIS Details View
AppInsight for IIS acts like any other application and can therefore be found in the
All Applications resource on the Application Summary view.
Below is the AppInsight for IIS application with the All Applications resource
detailed:
Note: The default IIS Application name is Microsoft IIS.
716
Chapter 15: AppInsight Applications
Navigating to the AppInsight for IIS Details View:
1. From the web console, locate the All Applications resource by clicking
either the Home or Applications tab.
2. Expand the AppInsight for IIS tree by clicking [+].
3. Select an IIS application to view by clicking it.
717
Navigating to the Website Details view:
Navigating to the Website Details view:
1. From the AppInsight for IIS Details view, click a website in the Sites
resource.
Navigating to the Application Pools Details view:
1. From the AppInsight for IIS Details view, click an Application Pool in the
Application Pool resource.
Navigating to the Performance Counter Details view:
1. From the AppInsight for IIS Details view, click a performance counter in any
resource.
Manually Configuring AppInsight for IIS
In the event automatic configuration of AppInsight for IIS failed, visit the sections
below in order and take the steps outlined to manually configure the remote
computer:
Note: For automatic AppInsight for IIS configuration see, Quick Configuration and
Navigation.
Important: Ensure that Windows Remote Management (WS-Management) is
running and that this service's Startup Type property is set to Automatic. Once
this is verified, continue manual configuration in the order listed below:
1.
2.
3.
4.
Installing PowerShell 2.0 and the WebAdministration Snapin
Set Execution Policy
Creating a Self-Signed Certificate
Creating a Firewall Rule
718
Chapter 15: AppInsight Applications
5. Updating WsMan Limits
6. Creating a WinRM Listener:
Installing PowerShell 2.0 and the WebAdministration Snapin
The following procedures outline the installation of PowerShell and the required
snapins.
Downloading and Installing PowerShell 2.0 on Windows Server 2008:
Note: The following steps are not necessary for Windows Server 2008 R2 and
Windows Server 2012.
Downloading PowerShell 2.0
1. Navigate to Windows Management Framework
(http://go.microsoft.com/fwlink/?LinkId=177670).
2. Review the information on the web page, and then click the link for the
download of the Windows Management Framework Core for your platform
in the Download Information section.
3. On the Update page, click Download.
4. When the download is complete, click Finish.
Installing PowerShell 2.0 on Windows Server 2008
1. Open Server Manager
2. Click on the Manage menu, and the select Add Roles and Features.
3. After the wizard opens, click Next until you get to the Installation Type page.
4. Select Role-based or feature-based installation.
5. Click Next until you reach the Features page.
6. Scroll down to Windows PowerShell. It will likely show itself as partially
installed (square inside box).
7. Check the box next to Windows PowerShell 2.0 Engine.
8. Click Next and then Install.
9. When the installation finishes, click Close.
Installing PowerShell 2.0 on Windows Server 2008 R2
1. Open Server Manager
2. In the left pane, click Features.
3. In the right pane, click Add Features.
719
Installing PowerShell 2.0 on Windows Server 2008 R2
4. Scroll down the list and check the Windows PowerShell Integrated Scripted Environment checkbox.
5. Click Next, then click Install.
6. When the installation is complete, Windows will display that the installation
succeeded..
7. Click Close, then close the Server Manager.
Installing the WebAdministration Snapins:
For Managed Nodes with IIS 7.0, download and install the PowerShell
WebAdministration snapins found at the following link:
http://www.iis.net/learn/manage/powershell/installing-the-iis-powershell-snap-in.
The IIS PowerShell Snap-in requires the following prerequisites:
l
l
l
Windows Server 2008 or higher
Microsoft PowerShell 2.0
IIS 7.0
To install the IIS PowerShell snap-in:
1. The IIS PowerShell Snap-in is available as x86 and x64 version.
Download the 32-Bit version or 64-Bit version.
2. Run the MSI file to install the IIS PowerShell Snap-in.
To use the PowerShell snap-in:
720
Chapter 15: AppInsight Applications
PowerShell snap-ins like the IIS PowerShell Snap-in have to be
registered with PowerShell. There are two ways to do this:
1. Automatic Registration by using the IIS PowerShell Management Console
The IIS PowerShell snap-in setup will create a new program
menu shortcut. By starting this shortcut, the IIS PowerShell snapin will be registered automatically. Navigate to Start > All Programs > IIS 7.0 Extensions > IIS PowerShell Management
Console. The prompt of the new PowerShell command window
is set to "IIS:\" - the root of the IIS snap-in namespace.
2. Manual Registration
If you want to use the IIS PowerShell snap-in from an existing
PowerShell command window, you have to register the IIS snapin manually. You can do this by simply executing the IISConsole.PSC1 file located in the $env:programfiles\IIS\PowerShellProvider directory:
PS C:\> & "$env:programfiles\IIS\PowerShellSnapin\iisConsole.psc1"
Set Execution Policy
For AppInsight for IIS, the Execution Policy needs to be set to RemoteSigned.
To set the Execution Policy on the target computer, take the following steps:
1. Open a PowerShell session in the Administrator context (Right-click and
select Run as Administrator).
2. Enter the following command: Set-ExecutionPolicy RemoteSigned
Creating a Self-Signed Certificate
SolarWinds has created a PowerShell script to create a self-signed certificate
suitable for AppInsight for IIS. This can be found at:
http://knowledgebase.solarwinds.com/kb/questions/6016/AppInsight+for+IIS%3A
+Certificate
Once downloaded, execute the script by right-clicking it and selecting, Run with
PowerShell. The following parameters apply:
721
Creating a Firewall Rule
l
l
IP address: Mandatory
Certificate lifetime in days: Optional
You can run this script with the default arguments from the PowerShell console or
specify each one.
For example:
& '.\Create self-signed certificate script.ps1' 192.168.2.69 3650
where 192.168.2.69 is the IP address of the node to be monitored by AppInsight
for IIS and 3650 is 3,650 days (10 years).
Creating a Firewall Rule
SolarWinds has created a PowerShell script to create a firewall rule. This can be
found at:
http://knowledgebase.solarwinds.com/kb/questions/6017/AppInsight+for+IIS%3A
+Firewall+Rule
Once downloaded, execute the script by right-clicking it and selecting, Run with
PowerShell. The following parameters apply:
l
l
l
Without parameters: The rule will be created with the default name, "Windows Remote Management HTTP/SSL" for port 5986.
With one parameter: Non-default custom port.
With two parameters: Non-default custom port and rule name
You can run this script with the default arguments from the PowerShell console or
specify each one.
For example:
& '.\Add firewall rule.ps1' 5988 "My custom firewall rule name"
Updating WsMan Limits
WsMan provides methods and properties used to create a session. SolarWinds
has created a PowerShell script to update the WsMan limits suitable for
AppInsight for IIS. This can be found at:
http://knowledgebase.solarwinds.com/kb/questions/6018/AppInsight+for+IIS%3A
+Updating+WsMan+Limits
Once downloaded, execute the script by right-clicking it and selecting, Run with
PowerShell. The following parameters apply:
l
l
maxConcurrentUsersDefaultValue - Default value is 5
maxShellsPerUserDefaultValue - Default value is 5
722
Chapter 15: AppInsight Applications
l
l
maxMemoryPerShellMBDefaultValue - Default value
serviceRestartRequired - Default value is $false
is 150
You can run this script with the default arguments from the PowerShell console or
specify each one.
For example:
& '.\Update WsMan Limits.ps1'
Creating a WinRM Listener:
Important: If you received the following error: An HTTPS listener currently exists
on port 5986, use the following steps to configure the listener on an available port
by changing "5986" to an available port number throughout these steps.
1. To configure WinRM on an IIS server, open a command prompt in the Run
as Administrator context.
2. Type: winrm create winrm/config/listener?Address=*+Transport=HTTPS
@{Port="5986";CertificateThumbprint="<Thumbprint value of certificate>";​Hostname="<IP Address of Server>_Solarwinds_Zero_Configuration"}
and then press Enter.
3. Verify the configuration by typing the following: winrm get
winrm/config/listener?Address=*+Transport=HTTPS.
Finding IIS URL Settings
By default, AppInsight for IIS uses the following URL for the IIS and WinRM
sessions, where ${IP} is the IP address of the server node being added.
WinRM: https://${IP}:5986/wsman/
723
Finding IIS URL Settings
To verify a server's WinRM PowerShell instance, follow the steps listed
below:
1. Open a command prompt in the Run as Administrator context.
2. Type: winrm get winrm/config/listener?Address=*+Transport=HTTPS to
get the current configuration for the HTTPS protocol.
Additionally, the value of Hostname must match the CN of the certificate listed in
the Certificate Thumbprint property.
724
Chapter 15: AppInsight Applications
AppInsight for IIS Application Details View
The IIS Details view provides a great deal of information about the current IIS
Application. The available resources offered in this view include:
l
l
l
l
l
l
l
l
l
Active Alerts
Application Availability
Application Details
Application Pools
Cache
Connections
IIS Average CPU and Memory Usage
IIS Average Network Traffic
Event Log Message Details
725
Active Alerts
l
l
l
l
Management
Processes and Services
Sites
Top Page Requests by Average Server Execution Time
Note: Chart resources may not display data until multiple successful polls have
completed.
Active Alerts
This resource lists details about all unacknowledged active alerts.
The following defines the four columns of this resource:
l
l
l
l
Alert Name: Displays the name of the listed alert.
Message: Displays the message of the listed alert.
Triggering Object: Displays the object that triggered the alert. Clicking the
object will take you to the details page for that object.
Active Time: Displays the time the alert was active.
Application Availability
This resource graphically shows the various states of an application's availability
in a percentage format and is made up of three sections: the legend, the main
chart, and the lower chart. The colors of the main chart correspond to the labels in
the legend.
726
Chapter 15: AppInsight Applications
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
727
Application Details
Application Details
This resource provides details concerning the current application. You can click
on both the application and the node to be taken to their respective details page.
l
l
l
Application Name: Displays the name of the listed application, in addition
to the node on which it resides.
Status: Displays the current status of the listed application. Possible
statuses include: Up, Down, Warning, Critical, Unknown, Unreachable, and
Unmanaged.
IIS Version: Displays the current version information of IIS currently being
monitored.
Note: The following three fields are tied together as components with
polling issues and are displayed in the Application Details resource.
l
l
l
Component Name: Displays the component name along with its current status as indicated by the icon.
Component Type: Displays the information about the current component.
Component Status: Displays the current status of the listed component.
Application Pools
This resource shows the status of all monitored application pools for the current
IIS application. The data can be sorted by clicking the headers of each column.
728
Chapter 15: AppInsight Applications
l
l
l
l
l
l
Name: Displays the name of the listed application pool, in addition to the
current performance status as indicated by the icon. Clicking the name of
the application pool will take you to the Application Pool Details page.
State: Displays the current state of the listed application pool. Possible
states include: Stopped, Started, Stopping, and Starting.
Worker Processes: Displays the current number of worker processes the
listed application pool is using.
CPU: Displays the percentage of CPU currently being used for the listed
application pool.
Physical Memory: Displays the amount of physical RAM the listed application pool is currently using.
Virtual Memory: Displays the amount of virtual RAM the listed application
pool is currently using.
Note: You can search for an application pool by entering text in the Search field
and clicking
.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Items on
Page, as shown:
729
Cache
Cache
This resource contains monitors specific to the current status of the IIS application
cache. The icons of the listed performance counters in the Statistic Name column
will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that performance counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
Counter
Expert Knowledge
Current File Cache
Memory Usage
Definition:
This performance counter returns
730
Warning Critical
Chapter 15: AppInsight Applications
the current number of bytes used
for the user-mode file cache.
Output Cache
Current Memory
Usage
Definition:
This performance counter returns
the current memory usage by
output cache.
File Cache Hits %
Definition:
This performance counter returns
the ratio of user-mode file cache
hits to the total number of cache
requests since the service started.
Information:
This counter reflects how well the
settings for the IIS file cache are
working. A site with mostly static
files should have a very high
cache hit percentage (70%–85%).
If the Kernel: Cache Hits %
counter is low, this value should
be high. Note that this counter
does not include dynamic content,
only static files. If your static files
are not being cached, you might
want to lengthen the activity period
for this cache.
Possible problems:
The value returned from Kernel:
Cache Hits % is low.
Remediation:
If the value returned from Kernel:
Cache Hits % is low, examine
your file set and determine why
your files are not being cached.
Kernel URI Cache
Hits %
Definition:
This performance counter returns
731
< 90
< 70
Cache
the ratio of kernel URI cache hits
to the total number of cache
requests since the service started.
Metadata Cache
Hits %
Definition:
This performance counter returns
the ratio of user-mode metadata
cache hits to total number of cache
request since the service started.
Output Cache Current Hits %
Definition:
This performance counter returns
the output cache current hit ratio.
The ratio is calculated as (H)/
(H+M), where H and M represent
Hits and Misses in previous
sample intervals, respectively.
URI Cache Hits %
Definition:
This performance counter returns
the ratio of user-mode URI Cache
Hits to the total number of cache
requests since the service started.
Information:
If content cannot be cached in the
HTTP.sys response cache, the
value of this counter should be as
high as possible. If your content
can be stored in the HTTP.sys
response cache, the value of this
counter should be low.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
732
Chapter 15: AppInsight Applications
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Connections
This resource contains monitors specific to the current status of the active
connections for the current IIS application. The icons of the listed performance
counters in the Statistic Name column will change color to reflect the listed
counter's current state. Clicking any performance counter in the Statistic Name
column will take you to the Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
733
Connections
Counter
Expert Knowledge
Total
Connection
Attempts
Description:
This displays the total number of connections to the Web or
FTP service that have been attempted since service startup.
The count is the total for all web sites or FTP sites combined,
regardless of the instance selected.
Information:
This number does not include connection attempts that failed
at the TCP (transport) or IP (network) layer.
Total Logon
Attempts
Definition:
This displays the total number of successful logons to the Web
or FTP service since the service started.
Information:
This number does not include failed logon attempts.
Current
Description:
Connections This displays the current number of connections established
with the Web service.
Information:
This is the sum of both non-anonymous (authenticated) and
anonymous (unauthenticated) users.
Possible problems:
If this number is at or near the maximum connections allowed,
the Web service is near or at full capacity.
Remediation:
If the value is too high for a particular IIS server, then load
balancing or clustering technologies can be applied to lower
the burden of the server in question. Also check the Web Site
property page for maximum connection limit.
Current
Anonymous
Users
Description:
This displays the number of Current Anonymous Users who
currently have an anonymous connection using the Web
service.
734
Chapter 15: AppInsight Applications
Information:
If anonymous connections are not permitted on the server, the
value of all anonymous user counters is always zero.
Current
NonAnonymous
Users
Description:
This displays the number of Current Non-Anonymous Users
who currently have a non-anonymous connection using the
Web service.
Information:
If authentication is not enabled on the server, and none of the
applications that run on the server request or require
authentication, then the value of all non-anonymous user
counters is always zero.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
IIS Average CPU and Memory Usage
This resource graphically and numerically details the consumption of IIS as it
relates to the overall resource utilization of the server itself. This allows you to
determine if performance issues are caused by IIS, or if IIS performance is
impacted by other applications, processes, or services running on the server.
This resource has three tabs, allowing you to see the charts for CPU usage,
Physical Memory Usage, and Virtual Memory Usage. Hovering over any time
period within the chart will display detailed information about that time period in
the tooltip. The colors of the main chart correspond to the labels in the legend.
You can choose which data to display by using the check boxes in the legend, as
well as cycling through the three different tabs.
735
IIS Average CPU and Memory Usage
The three columns to the right in the lower portion of the chart report the most
recent percentage of CPU Load, Physical Memory Usage, and Virtual Memory
Usage, respectively, for each available worker process.
Note: CPU and Memory need to be enabled via List Resources in order for this
to function properly. If CPU and Memory are not enabled, N/A will be reported for
other values when they are unselected.
The columns for this resource are defined as follows:
736
Chapter 15: AppInsight Applications
l
l
l
l
Application Pool (Worker Process): Lists the processes being monitored
and displayed in the chart. Non-IIS Processes and Services are those
resources consumed by other applications running on the server that are not
associated with IIS.
Latest CPU Load: Displays the percentage of CPU usage for the listed process.
Latest Physical Memory Usage: Displays the percentage of physical
memory in use for the listed process.
Latest Virtual Memory Usage: Displays the percentage of virtual memory
in use for the listed process.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons. Alternatively, you can have the chart show a
specific date range by dragging the mouse over an area of the chart or
manipulating the sliders of the lower chart.
IIS Average Network Traffic
This resource graphically details the history of IIS network traffic. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. The colors of the main chart correspond to the labels in the
legend. You can choose which data to display by using the check boxes in the
legend.
737
IIS Average Network Traffic
The columns for this resource are defined as follows:
l
l
Traffic Source: Lists the sources of network traffic that is displayed in the
chart. Non-IIS Processes and Services are those resources consumed by
other applications running on the server that are not associated with IIS.
Latest Network Traffic: Displays the network traffic rate for the listed
source in kilobytes per second.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
738
Chapter 15: AppInsight Applications
you can have the chart show a specific date range by dragging the mouse over an
area of the chart or manipulating the sliders of the lower chart.
Event Log Message Details
This resource displays the IIS event log messages while providing a search
window and a filter. The filter allows you to choose which types of log messages
you want to display. The data can be sorted by clicking the headers of each
column. This resource shows Error, Warning, Information events specific to the
monitored IIS server. For a complete list of Event IDs, see Event IDs
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, and Last Page.
Clicking any event message in the list will open a new window, displaying the
entire message, as shown below:
For more information, see Event IDs
Management
This resource contains controls that are actionable for both the application and
the node. The controls in the following illustration are SAM-specific.
739
Management
Application:
l
l
Edit Application Monitor: This allows you to edit the current application by
changing the settings specifically related to this application. This includes,
but is not limited to: changing the polling frequency, changing the Windows
and PowerShell URLs, changing the IIS Server credentials, and adjusting
threshold settings for component monitors that have thresholds.
Note: Changing some settings may require you to override the template that
this application is based upon. To do this, click Override Template.
Unmanage: Allows you to stop the polling and collecting of statistics of the
current application for a user-defined period of time.
740
Chapter 15: AppInsight Applications
l
Poll Now: Allows the application to retrieve the most current statistics when
clicked.
Note: By default, statistics are not polled when Poll Now is clicked.
Node:
l
l
l
Real-Time Process Explorer: Opens the Real-Time Process Explorer in a
new window. For more information, see Real Time Process Explorer.
Service Control Manager: Opens the Service Control Manager in a new
window. For more information, see Service Control Manager.
Real-Time Event Viewer: Opens the Real-Time Event Viewer in a new window. For more information, see Real Time Event Viewer.
Processes and Services
This resource provides detailed information about the active processes and
services associated with the database selected. Hovering over a component will
give you detailed information about that application.
l
l
l
l
l
Component Name: Name of the listed component.
Process Name: Name of the listed process and its ID value.
CPU Load: Percentage of the CPU that the listed process/service is currently using.
Memory Used: Memory currently being used by the listed process/service.
l Physical: RAM currently being used by the listed process/service.
l Virtual: Virtual memory currently being used by the listed process/service.
IOPS: Current amount of Input/Output data being processed per second.
741
Sites
Sites
This resource shows the status of all monitored sites of the current IIS application.
l
l
l
l
l
Name: Displays the name of the listed site in addition to the current performance status as indicated by the icon. Clicking the name of the site will
take you to the Site Details page.
State: Displays the current state of the listed site. Possible states include:
Stopped, Started, Stopping, and Starting.
Connections: Displays the current number of connections for the listed
sites.
Response Time (Avg): Displays the average response time of the listed
site in milliseconds.
Start Mode: Displays how the listed site begins running. The ServerAutoStart property indicates if the server instance should start automatically
when the server is powered on. This property is reset automatically when a
server instance is stopped or restarted to maintain the state across service
restarts.
Note: You can search for a site by entering text in the Search field and clicking
.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
742
Chapter 15: AppInsight Applications
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
Top Page Requests by Average Server Execution Time
This resource displays the top 20 page requests by average server execution
time. The Average Server Execution Time is the average time of all page
requests of the same type based on the URL stem. (Note: The URL stem is part
of a dynamic URL that separates the URL request from the query parameters.
This is typically located before the question mark.)
By clicking Edit, you can change the number of URLs this resource displays. The
data can be sorted by clicking the headers of each column.
Important: This resource is only shown when AppInsight for IIS is being polled
via an Agent. It will not appear if the node is being polled via SNMP or WMI.
Additionally, when the IIS log format is missing the required fields, this resource
will appear to be missing information. If this is the case, either enable the
following fields through the IIS manager, or disable this component entirely. The
fields that need to be enabled are: Date, Time, URI Query, Client IP Address,
and Method in the WCW3 format. For more information, see Agents. Logging
must be enabled. The W3C or IIS log format should be configured on the IIS
server.
Notes:
l
l
This resource is specific to the IIS site. Another instance of this resource is
available at the application level for all sites.
IIS logging must be enabled. The W3C or IIS log format should be configured on the IIS server.
743
Top Page Requests by Average Server Execution Time
l
l
l
Site: Displays the site name with which the URL is associated. Clicking the
arrow to the left of the site name will bring up detailed information about the
listed web request (URL), including the following:
l Verb: Displays the web request action performed. Example verbs
shown in this column are GET, POST, PUT, DELETE, HEAD,
DELETE, OPTIONS, and CONNECT.
l Request Date: Displays the date and time of the client web request.
l Elapsed Time: Displays the amount of server time that was needed to
fulfill the listed request.
l Client IP: Displays the IP address of the client computer for the listed
request.
l URL Query: Displays the query parameters associated with client's
web request. If no query parameters were specified in the request, this
field will be blank.
URL: Displays the URL stem of the listed request.
Average Server Execution Time: Displays the average time of all page
requests of the same type based on the URL stem.
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
744
Chapter 15: AppInsight Applications
AppInsight for IIS Website Details View
The IIS Website Details view provides a great deal of information about the
current IIS website. The available resources offered in this view include:
l
l
l
l
l
l
l
l
l
l
l
l
l
Bindings
Connections
Files
Log Size by File
Management
Network I/O
Requests
Site Availability
Site Details
Site Size by Directory
SSL Certificate Expiration
Top Page Requests by Average Server Execution Time
Web Server Response Time
Note: Chart resources may not display data until multiple successful polls have
completed.
Bindings
This resource monitors binding information for the current site.
Following are the column heads with their respective definitions:
l
Type: This resource will identify and report the following types:
l Http
l Https
l Net.TCP
l Net.Pipe
745
Connections
Net.MSMQ
l MSMQ.FormatName
Binding Information: The asterisk (*) is the server's IP address that the site
is bound to and refers to all of the IP addresses on the server. This is directly followed by the port number (eg: *.80:). The hexadecimal number is the
IPv6 address.
Browse...: Clicking Browse... on the selected binding will take you to the
HTTP or HTTPS binding and port for the current site that is being monitored
by AppInsight for IIS.
l
l
l
Connections
This resource contains monitors specific to the current status of the active
connections for the current IIS website. The icons of the listed performance
counters in the Statistic Name column will change color to reflect the listed
counter's current state. Clicking any performance counter in the Statistic Name
column will take you to the Performance Counter Details page for that counter.
If the value of a listed performance counter approaches or crosses the Warning
threshold, a yellow band will appear for the listed counter allowing plotted values
that cross the threshold to easily be visualized against the yellow band. If the
value of a listed performance counter approaches or crosses the Critical
threshold, a red band will appear for the listed counter allowing plotted values that
cross the threshold to easily be visualized against the red band. Hovering over
any time period within the chart will display detailed information about that time
period in the tooltip. Hovering over a counter will give you detailed information
about that performance counter.
746
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Total
Description:
Connections This displays the total number of connections to the Web or
Attempts
FTP service that have been attempted since service startup.
The count is the total for all Web sites or FTP sites combined,
regardless of what you choose for the instance.
Information:
This number does not include connection attempts that failed
at the TCP (transport) or IP (network) layer.
Total Logon
Attempts
Description:
This displays the total number of successful logons to the Web
or FTP service since the service started.
Information:
This does not include failed logon attempts.
Current
Description:
Connections This displays the current number of connections established
747
Connections
with the Web service.
Information:
This is the sum of both nonanonymous (authenticated) and
anonymous (unauthenticated) users.
Possible problems:
If this number is at or near the maximum allowable
connections, the Web service is at full capacity.
Remediation:
If the value is too high for a particular IIS server, then load
balancing or clustering technologies can be applied to lower
the burden of the server in question. Also, check the Web Site
property page for the maximum connection limit.
Current
Anonymous
Users
Description:
This displays the number of users who currently have an
anonymous connection using the Web service.
Information:
If anonymous connections are not permitted on the server, the
value of all anonymous user counters is always zero.
Current
NonAnonymous
Users
Description:
This displays the number of users who currently have a nonanonymous connection using the Web service.
Information:
If authentication is not enabled on the server, and none of the
applications that run on the server request or require
authentication, then the value of all nonanonymous user
counters is always zero.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
748
Chapter 15: AppInsight Applications
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Files
This resource contains monitors specific to file traffic across the current website.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
Counter
Expert Knowledge
Critical
Files
Received
Description:
The displays the number of files that have been
received by the WWW service since the service
749
Files
started.
Files Sent
Description:
The displays the number of files that have been
sent by the WWW service since the service started.
Information:
This value does not include cache hits. Note that
this counter does not increment when files are
being served from the kernel-mode cache.
Files Trans- Description:
ferred
The displays the sum of Files Sent and Files
Received by the WWW service since the service
started.
Information:
Note that this counter does not increment when files
are being served from the kernel-mode cache.
Locked
Errors
Description:
The displays the number of requests that have been
made since the service started and could not be
satisfied by the server because the requested
document was locked.
Information:
This is usually reported as HTTP error 423.
Note: A baseline is required.
Not Found
Errors
Description:
The displays the number of requests that have been
made since the service started and were not
satisfied by the server because the requested
document was not found.
Information:
This is usually reported as HTTP error 404.
Zooming
750
>0
Sustained
Status:
3 out of 5
polls
Chapter 15: AppInsight Applications
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Log Size by File
This resource lists the current quantity and size of log files as sorted by size. If the
Warning or Critical thresholds is breached, the color of the bar chart will change
from green to yellow or red, respectively.
l
l
l
l
Folder Path: Displays the path to the directory where log files are stored.
The path displayed is linked to the Custom Chart page and can be
accessed by clicking the displayed path.
Number of Files: Displays the total number of log files in the listed directory.
Total File Size: Displays, in bytes, the amount of disk space being used to
store the total number of log files in the listed directory.
Volume Usage: Numerically and graphically displays the percentage of
volume space used by the listed log files.
Management
This resource contains controls that are actionable for the current site. The
controls in the following illustration are SAM-specific.
751
Network I/O
l
l
l
Restart: This stops the site from running and then restarts it.
Start/Stop: Allows you to start or stop the site.
Unmanage Web Site: Allows you to stop the polling and collecting of statistics of the current web site.
Network I/O
This resource contains monitors specific to byte traffic across the current website.
The icons of the listed performance counters in the Statistic Name column will
change color to reflect the listed counter's current state. Clicking any performance
counter in the Statistic Name column will take you to the Performance Counter
Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
Counter
Expert Knowledge
Total Bytes
Received
Description:
This displays the total number of bytes received by the Web
service since the service started.
Information:
This information can be used to determine network load on a
752
Chapter 15: AppInsight Applications
specific Web site.
Total Bytes
Sent
Description:
This displays the total number of bytes sent by the Web
service since the service started.
Information:
This information can be used to determine network load on a
specific Web site.
Total Bytes
Transferred
Description:
This displays the total number of bytes sent and received by
the Web service since the service started.
Information:
This information can be used to determine network load on a
specific Web site.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Requests
This resource contains monitors specific to the current status of the IIS site
requests. The icons of the listed performance counters in the Statistic Name
column will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
753
Requests
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
Counter
Expert Knowledge
Total
Method
Requests
Description:
This displays the number of HTTP requests that have been made
since the WWW service started.
Delete
Requests
Description:
This displays the number of HTTP requests that have used the
DELETE method since the WWW service started.
Get
Requests
Description:
This displays the number of HTTP requests that have used the
GET method since the WWW service started.
754
Chapter 15: AppInsight Applications
Information:
GET requests are generally used for basic file retrievals or image
maps, though they can be used with forms.
Head
Requests
Description:
This displays the number of HTTP requests that have used the
HEAD method since the WWW service started.
Information:
HEAD requests typically indicate that a client is querying the state
of a document they already have to see if it needs to be refreshed.
CGI
Requests
Description:
This displays the number of all CGI requests that have been made
since the WWW service started.
Information:
CGI requests are custom gateway executable (.exe) files the
administrator can install to add forms processing or other dynamic
data sources. CGI requests spawn a process on the server which
can be a large drain on server resources.
ISAPI
Description:
Extension This displays the number extension of ISAPI requests that have
Requests been made since the WWW service started.
Information:
ISAPI Extension Requests are custom gateway DLLs which the
administrator can install to add forms processing or other dynamic
data sources.
Put
Requests
Description:
This displays the number of HTTP requests using the PUT
method since the WWW service started.
Post
Requests
Description:
This displays the number of HTTP requests that have used the
POST method since the WWW service started.
Information:
Post requests are generally used for forms or gateway requests.
755
Site Availability
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Site Availability
This resource graphically shows the various states of a website's availability in a
percentage format and is made up of three sections: the legend, the main chart,
and the lower chart. The colors of the main chart correspond to the labels in the
legend.
756
Chapter 15: AppInsight Applications
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
Site Details
This resource provides details concerning the current site.
l
l
l
l
Site Name: Displays the name of the current site.
Site State: Displays the current state of the listed site. States reported
are: Stopped, Started, Stopping, and Starting.
Start Automatically: This indicates whether or not the server instance
should start automatically when the service is started.
URL: These are the URLs that can access the current site (e.g.:
http://www.solarwinds.com, http://www.solarwinds.net).
757
Site Size by Directory
l
l
l
l
Application Pool: Displays the name of the current application pool.
Physical Path: Displays the folder location of the associated site.
Log file Path: Displays the folder location of the log file for the current site.
Limits:
l Limit Bandwidth Usage: Displays the maximum network bandwidth
to which the web site traffic is throttled.
l Connection Time-Out: Displays, in seconds, the elapsed time
needed for a timeout to occur of the current site.
l Limit Number of Connections: Displays the number of connections
this site is limited to.
Site Size by Directory
This resource lists and details site size by directory for the current site.
The following defines the four columns of this resource:
l
l
l
l
Folder Path: Displays the folder path for the current site.
Number of Files: Displays the total number of files located in the folder
path for the current site.
Total File Size: Displays the total size, in MB, for all of the files located in
the folder path for the current site.
Volume Usage: Numerically and graphically displays the total percentage
of volume space consumed by the current site.
SSL Certificate Expiration
This resource provides graphical and numerical information pertaining to the valid
dates of your SSL certificates as well as the number of days remaining before the
listed certificates expire.
Note: This resource will only appear if the site is configured for HTTPS.
758
Chapter 15: AppInsight Applications
SSL Certificate Expiration Fields:
l
CN (Common Name): An SSL certificate is required to be associated with
one or more hostnames, called Common Name. In this resource, CN is followed by the hostname with which it is associated.
l Days Remaining: The number of days remaining until the listed certificate expires is represented both graphically and numerically.
l Valid Between: Displays the date range when the listed certificate is
valid.
l Port: Displays the port to which the listed certificate is bound.
Top Page Requests by Average Server Execution Time
This resource displays the top 20 page requests by average server execution
time. The Average Server Execution Time is the average time of all page
requests of the same type based on the URL stem. (Note: The URL stem is part
of a dynamic URL that separates the URL request from the query parameters.
This is typically located before the question mark.)
By clicking Edit, you can change the number of URLs this resource displays. The
data can be sorted by clicking the headers of each column.
Important: This resource is only shown when AppInsight for IIS is being polled
via an Agent. It will not appear if the node is being polled via SNMP or WMI.
Additionally, when the IIS log format is missing the required fields, this resource
will appear to be missing information. If this is the case, either enable the
following fields through the IIS manager, or disable this component entirely. The
fields that need to be enabled are: Date, Time, URI Query, Client IP Address,
and Method in the WCW3 format. For more information, see Agents. Logging
must be enabled. The W3C or IIS log format should be configured on the IIS
server.
Notes:
759
Top Page Requests by Average Server Execution Time
l
l
l
l
l
This resource is specific to the IIS site. Another instance of this resource is
available at the application level for all sites.
IIS logging must be enabled. The W3C or IIS log format should be configured on the IIS server.
Site: Displays the site name with which the URL is associated. Clicking the
arrow to the left of the site name will bring up detailed information about the
listed web request (URL), including the following:
l Verb: Displays the web request action performed. Example verbs
shown in this column are GET, POST, PUT, DELETE, HEAD,
DELETE, OPTIONS, and CONNECT.
l Request Date: Displays the date and time of the client web request.
l Elapsed Time: Displays the amount of server time that was needed to
fulfill the listed request.
l Client IP: Displays the IP address of the client computer for the listed
request.
l URL Query: Displays the query parameters associated with client's
web request. If no query parameters were specified in the request, this
field will be blank.
URL: Displays the URL stem of the listed request.
Average Server Execution Time: Displays the average time of all page
requests of the same type based on the URL stem.
760
Chapter 15: AppInsight Applications
Paging controls are located at the bottom of the resource, allowing you to
navigate through all data available for this resource. Respectively, the controls
are: Fist Page, Previous Page, Page Number, Next Page, Last Page, Number
of Items to Display on the Current Page, as shown:
Web Server Response Time
This resource contains monitors specific to the response time of the current web
server. The icons of the listed performance counters in the Statistic Name column
will change color to reflect the listed counter's current state. Clicking any
performance counter in the Statistic Name column will take you to the
Performance Counter Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
Counter
Expert Knowledge
HTTP Monitor
Definition:
This performance counter returns
the amount of time the listed web
server spends accepting incoming
sessions and transmitting the
requested page, in milliseconds,
761
AppInsight for IIS Application Pool Details View
for the HTTP protocol.
HTTPS Monitor
Definition:
This performance counter returns
the amount of time the listed web
server spends accepting incoming
sessions and transmitting the
requested page, in milliseconds,
for the HTTPS protocol.
Note: The HTTPS monitor will not appear if the site is not configured for HTTPS.
Similarly, if the Orion server is unable access an HTTP site via its configured
URL, this resource will not appear because these components will automatically
be disabled. You can re-enable and configure these monitors via the application
editor.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
AppInsight for IIS Application Pool Details View
The IIS Application Pools Details view provides a great deal of information about
the current IIS application pool. The available resources offered in this view
include:
l
l
l
l
l
l
l
Application Pool Availability
Application Pool Details
Management
Worker Process Activation Service
Worker Process Cache
Worker Process Details
Worker Process Requests and Threads
762
Chapter 15: AppInsight Applications
Note: Chart resources may not display data until multiple successful polls have
completed.
Application Pool Availability
This resource graphically shows the various states of an application pool's
availability in a percentage format and is made up of three sections: the legend,
the main chart, and the lower chart. The colors of the main chart correspond to the
labels in the legend.
Note: This resource will not be available when using Internet Explorer 7.
Consider upgrading Internet Explorer 8 or higher or using FireFox or Chrome as
your web browser.
Zooming
You can have the chart show a predetermined, hourly time period of data by
clicking on any one of the three Zoom buttons; 1h, 12h, or 24h. Alternatively, you
763
Application Pool Details
can have the chart show a specific time range by dragging the mouse over a
small area of the chart.
Once you have a time period selected, the lower chart will zoom to the starting
and ending values of the selected time period. With the lower chart you can zoom
in further by fine tuning the view with the sliders. The main view of the chart will
display the selected time period between the two sliders of the lower chart.
Moving the mouse over the main chart will reveal a tooltip with more detailed
information about the specific time period the mouse is hovering over. By default,
all statistics are shown in the main chart.
Application Pool Details
This resource provides details concerning the current application pool.
l
l
l
l
l
l
Application Pool Name: Displays the name of the listed application pool.
Application Pool State: Displays the current state of the listed application
pool. Possible states include Started, Stopped, and Unknown.
Worker Process Status: Displays the current status of the listed worker processes. Possible statuses include Up, Down, Not Running, Warning, Critical, and Unknown.
Start Automatically: Displays how the listed application pool is started.
Possible values include Yes and No.
Start Mode: Displays the current configuration mode. The Application Pool
can be set to run in On Demand Mode or Always Running Mode.
. Net Framework Version: Displays the version of Microsoft's .Net framework currently utilized by the application pool.
764
Chapter 15: AppInsight Applications
l
l
l
Manage Pipeline Mode: Displays how ASP.Net is configured. Classic
Mode is an ISAPI extension. Integrated Mode is where managed code is
integrated into the request processing pipeline. Possible values include
Classic Mode and Integrated Mode.
Identity: Displays the configuration of the Application Pool as either a Builtin Account, Network Service, Local System, Local Service, or as a Specific
User Identity.
Applications: Displays the number of applications that rely upon this Application Pool.
Management
This resource contains controls that are actionable for the application pool. The
controls in the following illustration are SAM-specific.
l
l
l
Recycle: Allows the worker process that handles requests for that application pool to be terminated and a new one started.
Start/Stop: Allows you to start and stop the worker processes of the application pool.
Unmanage Application Pool: Allows you to stop the polling and collecting
of statistics of the current application pool.
Worker Process Activation Service
This resource contains monitors specific to the worker process activation service
for the current application pool. The icons of the listed performance counters in
the Statistic Name column will change color to reflect the listed counter's current
state. Clicking any performance counter in the Statistic Name column will take
you to the Performance Counter Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
765
Worker Process Activation Service
Counter
Expert Knowledge
Warning
Current
Worker
Processes
Description:
This displays the current number of worker
processes that are running in the application pool.
Recent
Worker
Process
Failures
Description:
This displays the number of times that the worker
process for the application pool failed during the
rapid-fail protection interval.
> 0 (CaD
enabled)
Information:
This counter should be counted as difference with
a threshold greater than 0.
Total
Application
Pool
Description:
This displays the number of times that the
application pool has been recycled since Windows
766
> 0 (CaD
enabled)
Chapter 15: AppInsight Applications
Recycles
Process Activation Service (WAS) started.
Information:
This counter should be counted as difference with
a threshold greater than 0.
Total Worker
Process Failures
Description:
This displays the number of times that worker
processes have crashed since the application pool
was started.
> 0 (CaD
enabled)
Information:
This counter should be counted as difference with
a threshold greater than 0.
Total Worker
Process Ping
Failures
Description:
This displays the number of times that Windows
Process Activation Service (WAS) did not receive
a response to ping messages sent to a worker
process.
> 0 (CaD
enabled)
Information:
This counter should be counted as difference with
a threshold greater than 0.
Total Worker
Process Shutdown Failures
Description:
This displays the number of times that Windows
Process Activation Service (WAS) failed to shut
down a worker process.
> 0 (CaD
enabled)
Information:
This counter should be counted as difference with
a threshold greater than 0.
Total Worker Description:
Process Star- This displays the number of times that Windows
tup Failures
Process Activation Service (WAS) failed to start a
worker process.
Information:
This counter should be counted as difference with
a threshold greater than 0.
767
> 0 (CaD
enabled)
Worker Process Cache
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Worker Process Cache
This resource contains monitors specific to worker process cache for the current
application pool. The icons of the listed performance counters in the Statistic
Name column will change color to reflect the listed counter's current state.
Clicking any performance counter in the Statistic Name column will take you to
the Performance Counter Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
768
Chapter 15: AppInsight Applications
Counter
Expert Knowledge
Current
File
Cache
Memory
Usage
Description:
This displays the current number of bytes used by the user-mode
file cache.
Information:
The value of this counter and the value of Web Service Cache
and Maximum File Cache Memory Usage should be the same.
769
Worker Process Cache
Possible problems:
If the values are different, this means the cache was flushed.
Remediation:
If this counter is significantly lower than Web Service Cache and
Maximum File Cache Memory Usage, consider recycling the
worker process because the application might have a memory
leak.
Maximum
File
Cache
Memory
Usage
Description:
This displays the maximum number of bytes used by the usermode file cache since service startup.
Information:
The value of this counter and the value of Web Service Cache
and Current File Cache Memory Usage should be the same.
Possible problems:
If the values are different, this means the cache was flushed.
Remediation:
If this counter is significantly higher than Web Service Cache and
Current File Cache Memory Usage, consider recycling the
worker process because the application might have a memory
leak.
Output
Cache
Current
Memory
Usage
Description:
This displays the current number of bytes used by the output
cache.
File
Cache
Hits
Description:
This displays the total number of successful lookups in the usermode file cache since service startup.
Information:
Understanding this output depends on the content. For example, if
the content files cannot be cached by HTTP.sys, a high value is
good
770
Chapter 15: AppInsight Applications
File
Cache
Misses
Description:
This displays the total number of unsuccessful lookups in the usermode file cache since service startup.
Information:
A file cache miss means the request for the file must go to the hard
disk.
Possible problems:
File cache misses negatively impact performance and scalability.
This value should be as low as possible. Also note that kernel
cache hits will cause this value to be low.
Metadata
Cache
Hits
Description:
This displays the total number of successful lookups in the usermode metadata cache since service startup.
Metadata
Cache
Misses
Description:
This displays the total number of unsuccessful lookups in the usermode metadata cache since service startup.
Information:
This value should be as low as possible.
Output
Cache
Total Hits
Description:
This displays the total number of successful lookups in the output
cache since service startup.
Output
Cache
Total
Misses
Description:
This displays the total number of unsuccessful lookups in the output cache since service startup.
URI
Cache
Hits
Description:
This displays the total number of successful lookups in the usermode URI cache since service startup.
Information:
Understanding this output depends on the content. For example, if
771
Worker Process Details
the content cannot be cached in the HTTP.sys response cache, the
value of this counter should be as high as possible. If your content
can be stored in the HTTP.sys response cache, the value of this
counter should be low.
URI
Cache
Misses
Description:
This displays the total number of unsuccessful lookups in the usermode URI cache since service startup.
Information: A low value is preferable. The value of this counter
increases when IIS cannot locate the requested content in either
the HTTP.sys response cache or the IIS file cache, and must locate
the requested content on the hard disk.
Possible problems:
If the value of this counter is high, IIS locates the requested content
on the hard disk which could slow overall performance.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Worker Process Details
This resource provides details concerning the listed worker process. Clicking
>> View Details will take you to Worker Process Statistic Monitor Details page for
additional information.
772
Chapter 15: AppInsight Applications
l
l
l
l
l
l
l
l
l
Monitored Process: Lists the process that is currently being monitored.
Status: Displays the current status of the listed process. Possible statuses
include Up, Down, Warning, Critical, Not Running, and Unknown.
Running Copies: Displays the current number of worker processes associated with this Application Pool.
Maximum Worker Processes: Displays the maximum number of allowed
worker processes for this Application Pool.
Process ID(s): Displays the process ID number for the processes associated with this Application Pool.
CPU Load: Percentage of the CPU that the listed process is currently
using.
Physical Memory Load: RAM currently being used by the listed process.
Virtual Memory Load: Virtual memory currently being used by the listed
process.
IOPS: Current amount of Input/Output data being processed per second.
Worker Process Requests and Threads
This resource contains monitors specific to worker process requests and threads
for the current application pool. The icons of the listed performance counters in
the Statistic Name column will change color to reflect the listed counter's current
state. Clicking any performance counter in the Statistic Name column will take
you to the Performance Counter Details page for that performance counter.
If the value of a listed performance counter crosses the Warning threshold, the
chart for the listed counter will display a yellow background. If the value of a listed
773
Worker Process Requests and Threads
monitor crosses the Critical threshold, the chart for the listed counter will display a
red background. Hovering over any time period within the chart will display
detailed information about that time period in the tooltip. Hovering over a counter
will give you detailed information about that performance counter.
Counter
Expert Knowledge
Active Requests
Description:
Current number of requests being processed by the worker
process.
Requests/sec
Description:
HTTP requests/sec being processed by the worker
process.
Active Thread
Count
Description:
Number of threads actively processing requests in the
worker process.
Zooming
You can have the chart show a predetermined time period of data by clicking on
any one of the three Zoom buttons in the head of the Zoom column. Alternatively,
you can have the chart show a specific date range by dragging the mouse over an
area of the chart. The time and date displayed at the top of the resource shows
774
Chapter 15: AppInsight Applications
the amount of data currently loaded into the chart. This can be changed by
clicking Edit from within the resource.
Note: The Value from Last Poll column shows the most recent data available for
the listed statistic.
Troubleshooting AppInsight for IIS
The following sections will help you identify and correct AppInsight for IIS errors
concerning configuration and performance counters. For example, you may see
an error similar to the following:
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Changing between 32-bit and 64-bit polling methods:
Credentials Test Failed
Polling fails due to a missing certificate.
IIS Polling Failed
Node Unreachable.
IIS Version Failed
WinRM Testing Failed
Error Code 1367
Error Code 1726
Error Code 16004
Error Code 16005
Error Code 16006
Error Code 16007
Error Code 16008
Error Code 16009
775
Access is denied when configuring AppInsight for IIS
l
l
l
l
l
l
l
l
l
l
Error Code 16013
Error Code 16022
Error Code 16023
Error Code 16024
Error Code 16029
Error Code 16049
Error code 16090
Other Errors
An HTTPS listener currently exists on port 5986:
Event IDs
Access is denied when configuring AppInsight for IIS
Issue: You may encounter access denied errors when you choose not to use the
built-in administrator account for IIS polling. This can occur if you create a new
user and then add this user to the Administrator's group.
Cause: If the group policy or the local policy has Administrator Approval Mode
set to Enable, the polling will fail with an error. This is usually because the
administrator account does not have enough permissions.
Resolution:
1. In your local security policy, navigate to Local Policies > Security Options
> User Account Control: Run all administrators in Admin Approval
Mode.
Note: This should be set to Disabled to let administrators poll properly.
2. Navigate to Local Policies > Security Options > User Account Control:
Admin Approval Mode for the Built-in Administrator Account.
Note: This should be Disabled for the built-in administrator to poll properly.
3. When complete, rerun the AppInsight for IIS Automatic Configuration Wizard.
Changing between 32-bit and 64-bit polling methods:
Using AppInsight applications with 32-bit polling on 64-bit computers via an agent
may prevent certain performance counters from collecting information and should
be changed to 64-bit polling.
To make this change at the application level, take the following steps:
1. From the web console, navigate to Home > Applications > Select an
AppInsight Application.
2. Click Edit Application Monitor.
776
Chapter 15: AppInsight Applications
3. Expand Advanced, and then click Override Template.
4. In the Platform to run polling job field, change the value to x64.
5. When done, click Submit.
To make this change at the template level, take the following steps:
1. From the web console, navigate to Settings > SAM Settings > Manage
Templates.
2. Select an AppInsight application and click Edit.
3. Expand Advanced, and in the Platform to run polling job field, change
the value to x64.
Note: Applications assigned to 32-bit hosts with the x64bit option will continue to poll using 32-bit, regardless of this setting.
4. When done, click Submit.
Credentials Test Failed
Error: The credentials given are not valid. Please provide the correct credentials
for an account with WMI permissions.
Resolution: Enter valid credentials.
777
Polling fails due to a missing certificate.
For more information, see Inherit Credentials from Node.
Polling fails due to a missing certificate.
Issue: You receive an error similar to the following: The SSL connection cannot
be established. Verify that the service on the remote host is properly configured to
listen for HTTPS requests...
Cause: A PowerShell listener was created but its certificate is missing.
Resolution: Manually remove the existing PowerShell listener and re-run the IIS
configuration wizard. This process will create a new listener along with the
appropriate certificate needed.
778
Chapter 15: AppInsight Applications
IIS Polling Failed
Error: Application polling failed because IIS information is currently unavailable.
Cause: This is a general error message returned by Windows when a networking
component is malfunctioning.
Resolution: For details, see the log on the Orion server located at:
([ALLUSERSPROFILE]
\ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Following