Components of Monitor Solution
|Article:HOWTO63999|||||Created: 2011-12-20|||||Updated: 2011-12-20|||||Article URL http://www.symantec.com/docs/HOWTO63999|
Monitor Solution lets you monitor different aspects of servers and applications. This monitoring is done through multiple monitoring solutions that work together using a common set of Monitor Solution components that are called the core components. Each monitoring solution uses the core components and includes a set of monitoring components specific to the purpose of the monitoring solution. Each solution also includes numerous reports to help analyze data. This separation of core functionality provides flexibility to comprehensively monitor aspects of computer resources and network devices.
The core components of Monitor Solution are as follows:
The Monitor Plug-in performs the monitoring work on computers. The Monitor Plug-in is a plug-in to the Symantec Management Agent, which is installed on monitored computers. The Monitor Plug-in receives configuration data from the Notification Server computer specifying what aspects of the computer are to be monitored.
Monitor packs include the necessary monitor policies, metrics, rules, and tasks for monitoring an operating system or application. Monitor packs also contain preconfigured monitor policies with preset thresholds and severities.
See About monitor packs.
A monitor policy is group of monitoring rules. You apply monitor policies to the groups of computers and devices that you want to monitor. Monitor policies inform the Monitor Plug-in or the Remote Monitoring Server of what data you want monitored and how that data should be analyzed. The data is evaluated against the conditions of rules. Based on these rules the Monitor Plug-in can run automated actions in response to data that reaches an undesired state or range. The Monitor Plug-in returns the monitored data to the Notification Server computer. The Notification Server computer uses monitored data to run Task Server tasks for real-time performance monitoring and historical performance reporting.
Rules specify how to analyze the metric data or the event data that the Monitor Plug-in and the Remote Monitoring Server collect. Rules also define under what conditions they are triggered and the actions taken.
See About rules.
You can add actions and tasks to a rule or a policy. Rules are triggered when monitored metric data reaches a determined value or goes beyond an acceptable value range. A triggered rule sends an alert, and any actions or tasks that are specified for that rule or policy are executed. Monitor actions and tasks can also be scheduled or run on demand. You can run tasks from a task server or you can choose from several Monitor Plug-in-specific task types.
Metrics define how a Monitor Plug-in or the Remote Monitoring Server collects data from supported data sources, called metric sources. Each plug-in can use numerous metrics to define all of the data that you want to collect.
See About metrics.
Article URL http://www.symantec.com/docs/HOWTO63999