HP Data Protector A.06.11 Integration Manual page 4

For operations manager for windows
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

SNMP Emanate Agent (required) ............................................................ 25
Server) ...................................................................................................... 26
SNMP service (required) ........................................................................ 26
Disk-space requirements ............................................................................... 26
Memory (RAM) requirements ....................................................................... 27
Installing the Data Protector Integration ................................................................ 27
Installation ................................................................................................. 27
Installation verification ................................................................................. 30
Running the Add Data Protector Cell application ............................................. 31
Agent configuration ..................................................................................... 33
SNMP configuration on UNIX ................................................................ 34
SNMP configuration on Windows .......................................................... 35
Data Protector user configuration ............................................................ 38
Program identification ................................................................................. 39
Uninstalling the Data Protector Integration ............................................................ 39
Uninstalling from managed nodes ................................................................. 40
Uninstalling from HP Operations Manager Server ........................................... 40
Manager Server ................................................................................... 40
Removing the Data Protector integration .................................................. 42
4 Using the Data Protector Integration ................................... 47
In this chapter ................................................................................................... 47
Data Protector SPI policies .................................................................................. 47
Message groups ............................................................................................... 48
Message format .......................................................................................... 49
Node groups .................................................................................................... 50
Tools groups ..................................................................................................... 51
Using tools and reports ................................................................................ 52
Data Protector service tree .................................................................................. 53
Users and user roles .......................................................................................... 55
Data Protector and operating system users ..................................................... 55
Data Protector Integration users ..................................................................... 56
Operations Manager user roles .................................................................... 57
Data Protector Operations Manager user roles ............................................... 57
Data Protector Operations Manager operators ............................................... 59
Monitored objects ............................................................................................ 62
Permanently running processes on the Cell Manager ...................................... 62
4

Advertisement

Table of Contents
loading

Table of Contents