Autore |
Khimani Bina
|
Edizione | [1st ed.] |
Pubbl/distr/stampa |
Research Triangle Park, N.C., : IBM Corp., International Technical Support Organization, c2005
|
Descrizione fisica |
1 online resource (134 p.)
|
Disciplina |
005.3/76
|
Collana |
Redbooks
|
Soggetto topico |
Web servers - Programming
Application software
|
Formato |
Materiale a stampa |
Livello bibliografico |
Monografia |
Lingua di pubblicazione |
eng
|
Nota di contenuto |
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. What is WebSphere Studio Application Monitor? -- 1.1 What's new in WSAM V3.1 -- 1.2 Composite request monitoring -- 1.2.1 Application analysis features -- 1.3 Architecture and design -- 1.3.1 The Managing Server -- 1.3.2 The Data Collectors -- 1.4 The three monitoring levels -- 1.5 Monitoring methodologies -- 1.5.1 In-flight request monitoring -- 1.5.2 Historical workload reporting -- 1.6 Request composite monitoring -- 1.6.1 Composite monitoring scope -- 1.6.2 Enterprise Application Integration -- 1.6.3 CICS and IMS transactions in composite requests -- 1.6.4 Multiple hops -- 1.7 The install process in a nutshell -- 1.7.1 Install and start the Managing Server -- 1.7.2 Install the Data Collectors -- 1.7.3 Start the monitored servers -- 1.7.4 Configure the Data Collectors -- 1.7.5 Verify the installation -- 1.7.6 Activate composite request monitoring -- 1.7.7 Post installation -- Chapter 2. Pre-installation planning -- 2.1 Hardware and software prerequisites -- 2.1.1 Managing Server hardware -- 2.1.2 Managing Server software -- 2.1.3 Data Collector hardware -- 2.1.4 Data Collector software -- 2.2 Managing Server configuration options -- 2.2.1 How many? -- 2.2.2 Managing Server topologies -- 2.3 Data Collector considerations -- 2.4 Network and protocol considerations -- 2.5 Firewalls -- 2.6 Repository database sizing -- 2.7 DB2 drivers -- 2.8 Legacy systems for composite request monitoring -- 2.8.1 CICS -- 2.8.2 IMS -- 2.9 Middleware for composite request monitoring -- 2.9.1 CICS Transaction Gateway -- 2.9.2 IMSConnect -- 2.9.3 WebSphere MQ -- 2.10 Composite request monitoring requirements tables -- Chapter 3. Care and feeding of WSAM -- 3.1 Repository maintenance -- 3.2 High-volume tuning.
3.3 Operator procedures and commands -- 3.3.1 Starting and stopping the Managing Server's major pieces -- 3.3.2 General commands for the Cyanea components -- Chapter 4. WSAM V3.1 installation rollout planning -- 4.1 Strategic or tactical -- 4.2 Planning the rollout -- 4.2.1 Identify an enterprise business sponsor and the stakeholders -- 4.2.2 Define ownership -- 4.2.3 Choose the project manager -- 4.2.4 Educate the user community and gain stakeholder support -- 4.2.5 Identify and document business needs for monitoring -- 4.2.6 Identify applications and JVMs to monitor -- 4.2.7 Define appropriate levels of access to the user groups -- 4.2.8 Define appropriate views to the user groups -- 4.2.9 Plan time frame to implement -- 4.3 Rollout -- 4.3.1 Develop WSAM enterprise architecture -- 4.4 Establish a training plan -- 4.5 Identify reporting requirements -- 4.6 Identify implementation team -- 4.7 Identify initial deployment benefits -- 4.8 Installation -- 4.8.1 Before you start -- 4.8.2 Planning the installation -- 4.8.3 Installing WSAM -- 4.8.4 Major Tasks performed by the installer -- 4.8.5 Installation scripts -- 4.8.6 Common mistakes -- 4.8.7 Resolving installation issues -- 4.8.8 Installation log files -- 4.9 Platform specific issues -- 4.9.1 Customized startup and shutdown instructions -- 4.9.2 Common error messages and solutions -- 4.10 Maintenance -- 4.10.1 Assign responsibilities -- 4.10.2 Training -- 4.11 Database maintenance -- 4.12 Monitoring -- 4.13 Upgrade maintenance strategy -- 4.13.1 Pre-production testing -- 4.13.2 Software upgrades -- 4.13.3 Updating a large number of servers (Data Collectors) -- Chapter 5. Troubleshooting -- 5.1 General Instructions -- 5.2 The Managing Server -- 5.2.1 Managing Server self-diagnosis -- 5.2.2 Managing Server recovery procedures -- 5.2.3 Managing Server logs -- 5.3 The Data Collectors -- 5.3.1 WSAM logs.
5.3.2 CSAM logs -- 5.3.3 ISAM logs -- 5.3.4 Debug mode -- 5.4 Gathering up WSAM logs and other data -- 5.5 Tools and utilities -- 5.6 Assorted tips and techniques -- Chapter 6. Firewalls and ports -- 6.1 Firewalls and Native Address Translation -- 6.2 Changes on the Data Collector machine -- Part 1 Appendixes -- Appendix A. Database setting information -- Appendix B. Security: Node authentication -- Overview -- Design description -- Other design considerations -- Implementation details -- Management Server component communication -- Node authentication configuration -- Data Collector-related configuration -- Keystore management and populating certificates -- Appendix C. Multi-Box Managing Server installation -- Example for a multi-box MS installation -- Appendix D. WSAM sample installation project plan -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover.
|
Record Nr. | UNINA-9910815977303321 |