IBM Tivoli手册

合集下载

IBM Tivoli Key Lifecycle Manager 数据表说明书

IBM Tivoli Key Lifecycle Manager 数据表说明书

IBM Tivoli Key Lifecycle ManagerSimplify, centralize and strengthen encryption key management for your enterpriseHighlightsSimplify, centralize and automate the encryption key management processEnhance data security and help facilitate compliance management of regulations and standards such as the Payment Card Industry Data Security Standard (PCI DSS), Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA)Enhance flexibility with support for the new encryption key management—the Key Management Interoperability Protocol V1.0 (KMIP) from the OASIS standards group Business data is growing at exponential rates, and along with that growth comes a demand for securing that data. Enterprises have responded by implementing encryption at various layers—in the hardware, on the network and in various applications. This response has resulted in a series of encryption silos—some of it holding confi-dential customer data—with fragmented approaches to security, keys and coverage.Different applications across the enterprise often employ different methods of encryption. Some departments in the organization may use public-key cryptography while others use secret-key or hashes. Still others don’t encrypt data while it’s at rest (such as when it is stored on a device or in a database) but only when the data is in motion, using virtual private networks (VPNs) to secure the data pipeline.Key management for these encryption approaches is often similarly fragmented. Sometimes key management is carried out by department teams using manual processes or embedded encryption tools. Other times, the key management function is centrally managed and exe-cuted. In some cases, there is no formal key management process in place. This fragmented approach to key management can leave the door open for loss or breach of sensitive data.Deploy a simple solution to a complex problem IBM Tivoli®Key Lifecycle Manager provides a simple solution to the complex problem of key management. T raditionally, the more encryp-tion you deploy, the more keys you have to manage. And these keys have their own life cycles, separate from the data they’re protecting—and that life cycle has to be managed, from initialization and activationthrough expiration and destruction. Tivoli Key Lifecycle Manager can help you better manage the encryption key life cycle, allowing you to simplify, centralize, and strengthen your organization’s key management processes and reduce operational costs.T ogether with IBM’s innovative self-encrypting storage offerings, Tivoli Key Lifecycle Manager offers customers a proven solution that can address their concerns when a tape cartridge or disk drive is removed from the storage system and transported in-house or off-site. Lost storage media is not uncommon these days and brings with it enormous direct and indirect costs for those who lose sensitive information. With IBM System Storage®self-encrypting offerings and Tivoli Key Lifecycle Manager, customers no longer have to worry about losing sensitive information should tapes gets misplaced or stolen. Additionally, support for the new stan-dard KMIP allows IBM Tivoli Key Lifecycle Manager to manage encryption keys for not only IBM self-encrypting storage devices but also a number of non-IBM encryption solutions, hence allowing you to efficiently management encryption keys for your enterprise.Centrally manage encryption keysTivoli Key Lifecycle Manager serves keys at the time of use to allow for centralized storage of key material in a secure location, a unique approach that supports multiple protocols for key serving and manages certificates as well as symmetric and asymmetric keys. Users can also centrally create, import, distribute, back up, archive and manage the life cycle of those keys and certificates using a customizable graphical user interface (GUI).Tivoli Key Lifecycle Manager’s transparent encryption imple-mentation means that keys are generated and served from a centralized location and are never sent or stored “in the clear.” The embedded encryption engine in the IBM self-encrypting tape offerings encrypt and decrypt the data asit enters and leaves the drive at native tape speeds, whichmeans both faster and more secure handling of data.IBM Tivoli Key Lifecycle Manager provides a wizard to guide administra-tors through the keystore configuration process.Tivoli Key Lifecycle Manager enables customers to group devices into separate domains for improved and simplified management. It allows multiple administrators with different roles and permissions to be defined. Also, by default, the groups of devices only have access encryption keys defined within their group. These role-based access control features enable separation of duties, mapping of permissions for what actions against which objects, and enforcement of data isola-tion and security in a multitenancy environment. This also enhances security of sensitive key management operations. Enable strong authentication, strong securityThese rich capabilities are made possible by strong authenti-cation between IBM storage systems and Tivoli Key Lifecycle Manager. The drives are manufactured with a built-in unique certificate. When the drives are mounted, information about the hardware serial number and environment is digitally signed by the drive and then sent to the centralized manager, which in turn validates the signature on the generated key pair through the certificate authority.The final step in the process happens when Tivoli Key Lifecycle Manager checks to make sure the device is valid by verifying that it exists in the drive table. Any unknown device is rejected or placed into a queue to be approved by the administrator. With this strategy, a rogue device cannot be deployed on the network and used to intercept organiza-tional data.In addition to strong authentication, there is also strong security between the storage device and Tivoli Key Lifecycle Manager. The software generates a session key using the generated key pair from the storage device. Using a pre-generated key, the software then sets an encryption key to be used for an individual cartridge on the storage device. Finally, the software wraps the encryption key with the session keyand returns the key to the device.Tivoli Key Lifecycle Manager provides step-by-step screens to help administrators set security options.This approach to encryption can dramatically increase data security while simplifying encryption key management. Users don’t need to know anything about encryption in order to realize the benefits. Administrators can easily man-age a smaller set of more secure keys. And performance isn’t impacted because each storage device has hardware built into it that performs at wire speed without latency. Not having to change other processes, install more hardware, or reconfigure software to support it means that the security is kept simple and straightforward.Leverage flexible implementation options Tivoli Key Lifecycle Manager can be applied at different levels to simplify key management while meeting the unique needs of your organization.For organizations that manage keys within separate silos, Tivoli Key Lifecycle Manager can simplify complex key distribution and management, reducing administrative burdens within each silo.For organizations that want centralized control andpolicy-driven key management, Tivoli Key Lifecycle Manager offers consolidated management of keys across domains, supports standards that extend management to both IBM and non-IBM products, and integrates well into existing security team methodologies.For organizations taking a hybrid approach, such as central-ized management for storage only, Tivoli Key Lifecycle Manager can make compliance reporting much easier, and can enhance key backup and recovery processes in caseof disaster. This approach also enables organizations to establish administrative access based on roles—in this case, storage security.Simplify key configuration and management tasksTivoli Key Lifecycle Manager provides an easy-to-use,web-based GUI that helps simplify key configuration and management tasks. With this GUI, administrators can easily create keystores, assign keys and certificates, and manage the life cycle of both from a centralized console.The software itself is typically installed on your most secure and highly available server or dedicated workstation. Once installed, the GUI allows administrators to perform basic local key life cycle management on the drives, and offers not only configuration and setup tools, but also audit and compliance support. The software provides three ways to add encryption-enabled devices: Auto-discovery of encryp-tion-capable devices, discovery with administrator’s approval or manual addition. Once added, default keys are assigned. The GUI also allows administrators to implement key retention for backed-up data and to address rules for regula-tory compliance and legal discovery. In case of disaster, the administrator can provide a set of keys that can unlock encrypted backups and make them available for use again. The administrator can configure rules for automated rollover of certificates or groups of keys so that new encryption keys are used automatically based on a configurable schedule. In this way, administrators can limit the amount of data which is encrypted with particular keys, minimize exposure when a key is compromised, and facilitate erasure of data by deleting relevant keys when data is set to expire.Achieve quick time to value withwizard-based assistanceTivoli Key Lifecycle Manager uses a wizard-based guide to help administrators through a series of simple, task-based screens. The first task is to create a keystore, which is then used to hold all the keys and certificates managed by Tivoli Key Lifecycle Manager. T o configure a keystore, the adminis-trator enters relevant information about it into the system, such as its name, the keystore type, the path where it will be stored, and its password.Once the keystore is created, the administrator can configure different devices to use certain communication protocols including Key Management Interoperability Protocol. For example, for secure communications between Tivoli Key Lifecycle Manager and a drive, the administrator can create a self-signed SSL certificate, request a certificate from a third-party provider, or use an existing certificate. The ability to use any of these options gives the administrator the power to work within an existing security policy or set of procedures, or respond quickly to local conditions.Administrators also have the option of setting the audit level (from low to high) and setting other key serving parameters, such as TCP port, SSL port and timeouts.Once the SSL configuration is complete, devices can be added to the system. The devices appear in the Tivoli Key Lifecycle Manager Key Administration and are ready for use as a secure storage endpoint. The keys associated with the device can then be managed through the GUI, including making updates, expiring or destroying the keys. The Tivoli Key Lifecycle Manager Key Administration Welcome Page provides critical notices to the administrator including infor-mation about last backups, available protocols, and notices of expiring certificates.Deploy a unified key management strategyTivoli Key Lifecycle Manager enables a unified key manage-ment strategy that can help better secure your data, with performance you need to support your critical business func-tions. Built on open standards, including Key Management Interoperability Protocol, the solution enables flexibility and facilitates vendor interoperability. Its intuitive interface enables quick time to value, while its innovative approach can help dramatically reduce the number of keys administrators have to manage. By enabling centralized management of strong encryption keys throughout the key life cycle, Tivoli Key Lifecycle Manager can help minimize the risk of expo-sure as well as helping to reduce operational costs.For more informationT o learn more about IBM Tivoli Key Lifecycle Manager, contact your IBM representative or IBM Business Partner, or visit: /tivoli/products/key-lifecycle-mgrAbout Tivoli software from IBMTivoli software offers a service management platform for organizations to deliver quality service by providing visibility, control and automation—visibility to see and understand the workings of their business; control to effectively manage their business, help minimize risk and protect their brand; and automation to help optimize their business, reduce the cost of operations and deliver new services more rapidly. Unlike IT-centric service management, Tivoli software delivers a common foundation for managing, integrating and aligning both business and technology requirements. Tivoli software is designed to quickly address an organization’s most pressing service management needs and help proactively respond to changing business demands. The Tivoli portfolio is backed by world-class IBM Services, IBM Support and an active ecosystem of IBM Business Partners. Tivoli clients and Business Partners can also leverage each other’s best practices by participating in independently run IBM Tivoli User Groups around the world—visit ©Copyright IBM Corporation 2010IBM Corporation Software GroupRoute 100Somers, NY 10589U.S.A.Produced in the United States of AmericaSeptember 2010All Rights ReservedIBM, the IBM logo, , and Tivoli are trademarks orregistered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and otherIBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (®or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at thetime this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at /legal/copytrade.shtmlOther product, company or service names may be trademarks or service marks of others.References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates.Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM’s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided.The customer is responsible for ensuring compliance with legal requirements. It is the customer’s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation.Plea s e Recycle。

IBM Tivoli Workload Automation 产品介绍说明书

IBM Tivoli Workload Automation 产品介绍说明书

implement shared services (cut costs down 15%-ganizational structure:
Mainframe-centric Distributed-centric Peer-to-peer
V8.6 Multi-engine view
Customers who want to better scale through multiple engines now synchronize crossengines activities, and achieve aggregated view of workloads
V8.6 Cross dependencies
V8.6 Dyamic Domain Manager
DDM
Distr.
Web Browser
4
zSeries
Distr.
Distr.
zSeries
V8.6 Dist-centric E2E zSeries
Proofpoints – Customer quotes
“A single tool that can accommodate a heterogeneous environment eliminates the need to maintain multiple technologies. This means lower software licensing costs and fewer, more efficient IT administrators” – Belgium bank
Graphical Workload Designer for centralized and intuitive manipulation of scheduling objects

IBM Tivoli 系统管理白皮书

IBM Tivoli 系统管理白皮书

IBM Tivoli软件系统管理白皮书目 录 序 (3)一、企业IT系统管理面临的挑战 (4)二、IBM Tivoli系统管理核心技术 (9)1.系统管理结构 (10)2.面向业务影响的系统管理 (16)3.自主运算——实现自我管理 (20)4.资源管理模型和最佳实践 (28)5.集成的系统管理 (30)6.服务水平管理 (32)7.开放的系统管理 (36)8.快速部署 (37)三、IBM Tivoli系统管理解决方案 (38)1.网络管理解决方案 (38)2.企业系统监控管理解决方案 (43)3.业务影响管理解决方案 (46)4.Web管理解决方案 (48)5.企业资产管理解决方案 (51)四、IBM Tivoli软件产品列表 (55)五、IBM Tivoli系统管理用户实例 (57)1.中国网通 (57)2.美国Prudential保险公司 (61)六、附录:IBM Tivoli软件系统管理产品简介 (64)1.IBM Tivoli Monitoring 简介 (64)2.IBM Tivoli Monitoring for Databases简介 (68)3.IBM Tivoli Monitoring for Business Integration简介 (70)4.IBM Tivoli NetView 简介 (73)5.IBM Tivoli Switch Analyzer简介 (75)6.IBM Tivoli Enterprise Console 简介 (76)7.IBM Tivoli Risk Manager 简介 (79)8.IBM Tivoli Service Level Advisor 简介 (83)9.IBM Tivoli Business Systems Manager简介 (86)10.IBM Tivoli Configuration Manager简介 (88)11.IBM Tivoli Remote Control简介 (92)12.IBM Tivoli Workload Scheduler简介 (96)序今天,信息技术在中国各个行业中的应用都得到了前所未有的重视,“以信息化带动工业化”已为各级决策部门所共识,各个行业在IT行业大量投入,进行了很多的系统建设和应用开发。

tivoli 软件产品操作维护手册

tivoli 软件产品操作维护手册

IBM 软件产品操作手册江西电信当前版本:Version 1.3修改日期:2004-08作者: IBM软件服务部审批本文档需要如下批示。

签名的审批表格由IBM项目组存档。

项目经理签名(Signature) 日期(Date)国际商业机器中国有限公司项目经理签名(Signature) 日期(Date)目录1.监控产品的配置 (4)1.1配置ITM (4)1.1.1DMLinkJre (4)1.1.2ITM资源配置与分发 ................................................................................. 错误!未定义书签。

1.2ITM for WEBLOGIC配置.......................................................................... 错误!未定义书签。

1.2.1配置前准备............................................................................................... 错误!未定义书签。

1.2.2创建WEBlLOGIC对象 .............................................................................. 错误!未定义书签。

1.2.3分发监控profile ......................................................................................... 错误!未定义书签。

1.2.4WEBLOGIC Server所作修改 ................................................................... 错误!未定义书签。

Tivoli Federated Identity Manager 6.2.1 快速入门指南说明书

Tivoli Federated Identity Manager 6.2.1 快速入门指南说明书

Federated Identity ManagerVersion6.2.1Quick Start GuideThis guide gets you started with a base installation for IBM Tivoli Federated Identity Manager.National language version:To obtain the Quick Start Guide in other languages,access the PDF files on the Quick Start CD.Product overviewIBM®Tivoli®Federated Identity Manager provides the necessary framework to support standards-based,federated identity management between enterprises that have established a trust relationship.Tivoli Federated Identity Manager provides capabilities in the areas of federated single sign-on,Web services security management,and identity management forservice-oriented architecture(SOA)components across the enterprise.v WebSphere®Application Server Network Deploymentv Tivoli Access Manager for e-businessv Tivoli Directory IntegratorFor complete documentation,including installation instructions,see the IBM Tivoli Federated Identity ManagerInformation Center at /infocenter/tivihelp/v2r1/index.jsp?toc=/com.ibm.tivoli.fim.doc_6.2.1/ toc.xmlSee information about the system requirements and supported operating systems at the“Hardware and SoftwareRequirements”topic in the Release information section of the Tivoli Federated Identity Manager Information Center at /infocenter/tivihelp/v2r1/index.jsp?toc=/com.ibm.tivoli.fim.doc_6.2.1/toc.xml.The IBM Tivoli Federated Identity Manager installation process involves several products and components as shown in the diagram:Install Tivoli Access Manager for e-business,as required for some scenarios.For assistance,see the IBM Tivoli FederatedIdentity Manager Installation Guide.Install WebSphere Application Server Network Deployment.For assistance,see the IBM Tivoli Federated Identity ManagerInstallation Guide.v Runtime and management servicesv Management consolev Web services security management clientFor information about installing each component,see the IBM Tivoli Federated Identity Manager Installation Guide. More informationFor more information,see the following resources:v Software support is just a click away:/software/sysmgmt/products/support/IBMTivoliFederatedIdentityManager.htmlv WebSphere Application Server Information Center at /software/webservers/appserv/was/library/ index.htmlv Tivoli Access Manager for e-business Information Center at /infocenter/tivihelp/v2r1/topic/com.ibm.itame.doc/welcome.htmIBM Tivoli Federated Identity Manager Version6.2.1Licensed Materials-Property of IBM.©Copyright IBM Corp.2000,2010.All Rights ernment Users Restricted Rights-Use,duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.IBM,Tivoli,and WebSphere are trademarks or registered trademarks of International Business Machines in the US,other countries,or both.Other company,product,or service names may be trademarks or service marks of others.Part Number:CF2NGMLPrinted in Ireland。

IBM Tivoli Storage Manager 数据保护方案说明书

IBM Tivoli Storage Manager 数据保护方案说明书

Keeping Your Options Open:The Smart Strategy for Data ProtectionData protection shouldn’t lock you in. Get data protection for today that scales for tomorrow. Take a look at three options you need to consider:1. On-premise appliances2. Cloud services3. Hybrid on-premise appliances with cloud services1. How can a PBBA help me simplify backup and recovery?An enterprise-class PBBA can help automate backups with a simple, self-service solution soyou don’t have to worry about integrating and managing different devices or deal with the frustrations of tape backup.2. Why is a PBBA better than tape backup?If you have tape backup, you know its shortcomings: mechanical failures, incomplete restores,lots of manual work and long backup times. Your staff has to physically mount and unmount tapesand transport them offsite for storage. Then, when you need to restore data fast, your staff has to retrieve the tapes from storage.3. How fast can I restore in the event of a data failure?With an on-prem backup appliance, there’s no need to retrieve tapes from storage to get yourdata back. Plus, you don’t need to waste time physically mounting tapes. You can usually restore from your appliance in minutes—rather than hours or even days!4. What features should I look for in an enterprise-class PBBA?The first thing to consider is security. An enterprise-class appliance needs to provide dataencryption. You’ll also want a PBBA that minimizes power consumption, floor space and coolingrequirements to save energy, space and money. If you want to add cloud backup in the future,choose a PBBA that offers deduplication so only changed data is sent to the cloud—decreasingbackup time, freeing up bandwidth during replication, and reducing the cloud storage capacity needed and its associated costs.Seagate Technology | 1-800-SEAGATE | To simplify backups and restore data fast, consider on-prem appliances.On-prem enterprise-class purpose-built backup appliances (PBBAs) PBBAs can automate backups and speed restores. What features should you look for?Seagate Technology | 1-800-SEAGATE | | Seagate Technology LLC, 10200 South De Anza Boulevard, Cupertino CA 95014 U.S.A 5. Why do I need cloud backup?The cloud provides cost-effective backup and DR, archive, query and other less critical dataoperations. You pay only for the capacity you need, adding more capacity as your data volume grows.6. Is my data really safe and secure in the cloud?Your data is safe. Data can be encrypted onsite, in transit and at rest in the cloud—while youcontrol the encryption keys. Next, insist on an SSAE 16-certified data center, the gold standardfor security. Finally, if your organization requires dedicated space, you can get it. If you don’t need that level of security, consider lower-cost colocation.7. Can I simplify upgrades as the data volumes grow?Make sure your solution scales painlessly as data expands. Look for a cloud provider thatprovides scale-up architecture to add capacity to the same unit or scale-out architecturedesigned to add devices without disruption. “Clustering” allows you to add an appliance to a cluster and manage the entire cluster as a single vault via one management console.8. What happens if a disaster takes out my onsite systems?If a major disaster takes out your local data center, your organization can operate from thecloud without significant downtime (less than an hour with a 1-hour SLA) until you get your local systems up again.For low-cost backup and fast reliable DR, choose the cloud.Cloud backup and disaster recovery (DR)When disaster strikes, your data is safe in the cloud. Keep your business running when everything around you crashes.Choose the best solution for your environment today, keeping an eye on the future. As your needs change and expand, make sure you have a vendor like Seagate EVault that can grow with you every step of the way.Seagate Technology | 1-800-SEAGATE | | Seagate Technology LLC, 10200 South De Anza Boulevard, Cupertino CA 95014 U.S.A © 2015 Seagate Technology LLC. Seagate, Seagate Technology, and the Wave logo are trademarks or registered trademarks of Seagate Technology LLC or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. Complying with all applicable copyright laws is the responsibility of the user. Seagate may change, without notice, product offerings or specifications.1 Hybrid Cloud PBBAs Help to Manage and Secure Data Cost-Effectively. Phil Goodwin, IDC Research Director, Storage Systems and Software. August 2015.9. What exactly is hybrid cloud data protection?Hybrid cloud data protection means you get easy-to-manage, reliable local backup and fast restores combined with a cost-effective extra layer of protection in the cloud.10. What are some advantages of a hybrid cloud solution?With on-prem appliance and cloud backup integration, the cloud provides secondary backupfor your data should your local systems go down. The cloud can also provide you with “burstoperations,” giving you additional capacity for a brief period without having to add permanent extra capacity on-prem.11. Is it possible to offload all our backup and DR to a managed service provider?A managed service provider (MSP) can take care of all your data backup and DR needs todayand eliminate complex and disruptive upgrades as you grow. Here are some things to look for:• Option to keep data in your own data center or in your service provider’s private cloud• Self-healing automated data dispersal technology that guarantees data is optimallydistributed within one or more geographically dispersed data centers with failover enablement • Separate data and metadata distribution and storage12. Is there an advantage to working with a single vendor for our hybrid cloud solution?A single vendor ensures that your on-prem and cloud solution is optimally integrated andmanagement is centralized through one console. In terms of security, when working with morethan one vendor “you get the least common denominator between them to provideinteroperability.”1 Even if both have good security, you may not be able to take advantage of it if the systems are incompatible.If you choose a hybrid cloud solution, choose one that gives you simple, centralized control andmanagement—no matter what kind of environment you have (physical-to-virtual, virtual-to-virtual,etc.). Insist on end-to-end encryption and physical data center security. Optimize your systems withdeduplication, compression and full support.Do you want more information? Visit our website or call us at 866-766-2186.PBBAs and cloud team up to give you the best of both worlds.Hybrid cloud data protectionAs businesses grow, they often find that fast local restores and low-cost secure cloud backup offer the perfect blend that grows with them.。

IBM Tivoli Enterprise Storage Monitoring 2 用户指南说明书

IBM Tivoli Enterprise Storage Monitoring 2 用户指南说明书

IBM Software Group IBM Tivoli Solutions IBM Tivoli Enterprise Storage Monitoring2 IBM Tivoli Enterprise Storage MonitoringContents2 IBM Tivoli Enterprise storage monitoring4 Common issues in Enterprise Tivoli Storage Management5 Monitoring without a common workspace5 An approach to monitoring without getting lost6 Backup6 Configuration and performance7 Monitoring availability of space7 Co nclusio n IBM Tivoli Enterprise storage monitoring Historically, storage administration monitoring for enterprise organizations has been mainframe-based. Early monitoring was primarily done using manual techniques and was driven by resource constraints — wanting to know how full the disks were, to try to guess when more storage would be needed, or when performance would start to be impacted, so that disk availability and performance were the primary focus of storage management. Storage administrators used storage pooling and data management tools to move data, gain availability and improve performance. Over time, technology improvements — such as increased cache, parallel access volumes (PAVs) and lower cost of storage — reduced those constraints and the amount of manual intervention required to tune the storage environment. As a result, monitoring requirements have evolved. Monitoring today is still centered around performance and availability, but also includes trending and forecasting as well as intelligent analysis. Distributed storage entered the picture with a finite resource referred to as locally attached disk. Storage Area Network, (SAN) configurations with their Fibre Channel fabric topology have now proliferated to extend the local disk concept and share a storage frame with hundreds of distributed systems. SAN configuration, provisioning and security were the initial focus of storage administration in distributed platforms. Monitoring tools were incorporated into the configuration tools, to improve visibility into utilization. While hard constraints were not the driving factor in distributed storage monitoring, exponential growth drove improvements in monitoring in areas of improving efficiencies and identifying data lifecycle requirements. Monitoring today’s distributed environments focuses on performance and life-cycle management of data. The differing paradigms, problemIBM Software Group 3focuses, and personnel involved in both mainframe and distributed platform storage administration have led toseparate tools and “silos” of information that make it difficult to consolidate monitoring and management of storage across the enterprise.For additional information, refer to one of the Tivoli Monitoring manuals at/infocenter/tivihelp/v3r1/index.jsp?toc=/com.ibm.omegamon.stor.doc/toc.xmlThe IBM zSeries® storage monitoring begins withOMEGAMON XE for Storage on z/OS. It provides forvisibility into performance, availability and early indicators of problems for direct access storage disk (DASD), tape, system catalogs, hierarchical storage management (HSM), removable media (RMM) and more. For more detailed or specialized information, additional agents may be added to the Tivoli Monitoring framework, including IBM Tivoli Advanced Catalog Management, IBM Tivoli Advanced Audit for DFSMShsm, IBM Tivoli Advanced Reporting forDFSMShsm and IBM Tivoli Advanced Backup and Recovery for z/OS disaster recovery and compliance management.Distributed systems are defined as all hardware that is not IBM System z. Distributed storage monitoring includes IBM T otalStorage Productivity Center, IBM Tivoli Storage Manager and includes newer technologies.While these systems are highly flexible, it is also important to understand that with flexibility comes an element ofcomplexity. It is important to establish environment standards early in the design and deployment of the Tivoli Monitoringinfrastructure to allow for effective control and management.T oday, many storage administrators remain focused on a single platform, either distributed or mainframe, but that isinexorably changing. Business pressures and consolidations are challenging more storage administrators to be responsible for monitoring multiple platforms and their unique challenges and toolsets. The IBM Tivoli® Monitoring infrastructure has allowed for the integration of monitoring tools for the different platforms. While the objectives of storage administration between mainframe and distributed are aligning, the base toolsets are quite different. The Tivoli Monitoring infrastructure enables the smooth integration of various monitoring tools for the different platforms. The open flexibility of the Tivoli Monitoring framework allows storage administration of these platforms through a single portal.4 IBM Tivoli Enterprise Storage MonitoringCommon issues in IBM Enterprise Storage ManagementA Tivoli Monitoring agent for each system is installed and registered with a Tivoli Enterprise Monitoring Server. The Tivoli Enterprise Portal navigator view is presented by platform and, when expanded, by system. An environment may have three or four different platforms: System z, Linux, UNIX and Microsoft Windows. Under each platform, there may be numerous systems, including IBM z/OS Parallel Sysplexes® and LPARS, Linux systems, various UNIX systems and perhaps hundreds of Windows systems.Storage administrators might need to monitor backups for disaster recovery purposes across multiple platforms. If an application runs on System z and on a distributed platform, both sets of backups will need to be monitored for successful completion. Perhaps the backup on z/OS uses automatic backup, archive and recovery software (ABARS) and ismonitored using IBM Tivoli Advanced Backup and Recovery Manager. Perhaps the backup on the distributed platform uses Tivoli Storage Manager. The backups must occur within a certain timeframe in order to be considered viable for recovery in the event of a disaster.Storage administrators are often held responsible for the performance related to the I/O of applications. There might be performance problems with hardware that is configured in IBM DS8000® using T otal Storage Productivity Center for use on System z. These problems are not easily identified. Monitoring with OMEGAMON XE for Storage on z/OS with knowledge of the hardware configuration may provide insights into performance problems relating to configuration.Storage administrators are typically responsible for theAvailability of space. As application development moves from System z to distributed, there may be instances where data must be sent by ftp between platforms. Storage monitoring to ensure that space is available before it is needed is a key to avoiding space problems before they occur.These examples are not meant to be inclusive of all storagemonitoring needs.Storage management monitoring across platformsUsing the standard Tivoli Enterprise Portal interfaces, cross-platform storage monitoring might require a typical storage administrator to drill down to multiple workspaces and views. Even with the capability of multiple windows, remembering the valid data between workspaces can be a challenge and a manual effort.IBM Software Group 5Monitoring without a common workspace A user can drill down to the distributed platform, find the agent with the data they are interested in monitoring, find the system where the data should be and either screen print it or leave it on the screen. Then, the user can create another window and repeat for the z/OS platform, find the agent containing the requested data and then drill down to the LPAR where the data is displayed and compare the data between the two screens.There’s got to be a better way ….An approach to monitoring and manag-ing enterprise storage without getting lost Using the storage monitoring previously mentioned, along with the OMEGAMON Dashboard Edition (DE) features incorporated into Tivoli Monitoring views and their underlying queries from the Tivoli Monitoring agents into a single common workspace. Adding IBM Tivoli OMEGAMON DE on z/OS to your IBM Tivoli Monitoring infrastructure entitles the use of many features that enhance monitoring from multiple OMEGAMON agents. Tivoli OMEGAMON DE provides a portal through which you can take advantage of an expansive view into your environment. Using Tivoli OMEGAMON DE on z/OS, you can collect metrics from operating systems, middleware, databases, storage, web applications servers and network sources — for integrated performance and availability views in a single screen. OMEGAMON DE provides more sophisticated monitoring with policies. Policies are automated responses to conditions including schedules and interrogation of situation results. Policies can be used to intelligently monitor across platforms, systems and agents. It is designed to help you make decisions more quickly, efficiently and proactively on an enterprise level. Instead of locating data within the physical topology where each system must be located, expanded and the data captured, a Logical View can be defined to combine data from all of the agents where monitoring across platforms and system components are wanted Navigation is simpler and in one place. There is a small drop in performance when running queries from multiple platforms to be displayed on a single workspace, but the choice of navigating to five different screens would probably exceed the delay of the queries. Situations can be written to track the values of specific attributes. Where monitoring values across the various platforms is needed situation correlation can be used. Situation Correlation is when the situation evaluates not just the value of attributes but the condition of other situation conditions that match or not match the conditions coded in them.Using the three scenarios described in the introduction, we explain what views might be combined to solve the sample usage cases.6 IBM Tivoli Enterprise Storage MonitoringBackupFor the application backup scenario that must occur on separate systems, a customized logical view can be created using a query from IBM Tivoli Advanced Backup and Recovery for z/OS that contains backup information from an application that runs on an LPAR. In the same workspace, another view can be created using a query from IBM Tivoli Storage Manager that contains backup information from a system that runs on Linux. Situations or policies can be defined to provide 24-hour monitoring and alerts for both platforms. The resulting workspace is a like single pane of glass instead of multiple screens requiring drill-down to multiple workspaces. The backup from z/OS can be monitored using the workspace “A History of ABM and CBTI Events” from IBM Tivoli Advanced Backup and Recovery manager. The addition of filtering can isolate the backups of interest for a particular application, while the backup using Tivoli Storage Manager on the distributed side can be monitored using the workspace “Schedule” from Tivoli Storage Manager. The exact same query can be used or customized in the new logical workspace.Policies or situations can be defined for each platform to determine if the backup was successful and within the appropriate window and correlated upon the successful monitoring of the other platform.The entire Advanced Backup and Recovery Agent navigator tree can be added to the logical workspace allowing drill-down capability to any additional data as needed. The IBM Tivoli Storage Manager Agent navigator tree item can also be added to the logical workspace. When defined correctly, the situation events defined at the physical view also appearsin the Logical View.Configuration and performanceStorage in an IBM DS8000 may be configured for System z only or also contain storage configured for distributed systems as well. Performance can be affected either by configuration or workload.Selected views from T otalStorage Productivity Center and IBM Tivoli OMEGAMON XE for Storage Views on Application Monitoring or Cache CU Performance and Cache CU Status can be used to see the impact of theconfiguration on the I/O performance on System z.IBM Software Group 7The workspace Volume Data as well as HBA Data fromT otalStorage Productivity Center along with OMEGAMON XE for Storage Application Summary and System-Managed Storage (SMS) Storage Group performance data may aid in the identification of a configuration -related performance problem. With user -specific thresholds and situations defined to raise an event when critical application performance is affected, the user can access a single view of all components involved in the configuration of the storage. The view is not a guarantee that the problem is configuration-related, but the information is a key to identifying solutions. Monitoring availability of spaceIn this scenario, SMS Storage Group Space workspace is viewed for available space along with the distributed platform system monitoring agent. Thresholds provide the visual alert, while situations provide the notification in advance of a potential problem. Using OMEGAMON XE for Storage on z/OS views of SMS Storage Group Space to monitor a Storage Group, volume or a list of volumes in the User DASD Group Space navigator workspaces, monitoring of availability of space can alert the user to shortages before they can have an impact on an application. On the distributed platform, the appropriate agent view is selected for disk storage monitoring. Disk space on a Windows system can be monitored using the Logical Disk Usage view to determine if sufficient space is available for the FTP to complete successfully. Situations can be defined to monitor both platforms at an interval well in advance of critical application runs, allowing enough time to correct a potential space availability issue before it affects critical application processing.ConclusionFor today’s storage administrator who is responsible for monitoring both zSeries and distributed storage, adding IBM Tivoli OMEGAMON DE on z/OS adds to the use of the IBM Tivoli Monitoring infrastructure to customize monitoring across platforms.By having the views on a single logical view, all affected systems can be monitored relative to other platforms, monitoring agents and systems. Multiple views might be desirable depending upon the configuration and platforms involved.Benefits include:• Enhanced visibility across the enterprise of all systems affecting a business application• Improved communications across platform support teams • Simplified problem determination, avoiding costly outages • T aking full advantage of technology resulting in better resource utilization and reduced manpower costs• Improved service and availabilityStay tuned for a more in-depth explanation of how these workspaces are created using the features of IBM Tivoli OMEGAMON DE on z/OS in the IBM Tivoli Monitoring Portal.AuthorVickie Dault, IBM T echnical Storage SpecialistPlease Recycle© Copyright IBM Corporation 2011IBM Global Services Route 100Somers, NY 10589 U.S.A.Produced in the United States of America August 2011All Rights ReservedIBM, the IBM logo, , DS8000, OMEGAMON, Tivoli, zEnterprise, z/OS and zSeries are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademarkinformation” at /legal/copytrade.shtml Other company, product and service names may be trademarks or service marks of others.Other company, product and service names may be trademarks or service marks of others.TIW14102-USEN-00。

IBM Tivoli软件组:Maximo性能最佳实践 2007年说明书

IBM Tivoli软件组:Maximo性能最佳实践 2007年说明书

IBM & Non-IBM Software
>Monitoring
>Server/Device Mgmt
>Discovery tools >Customer developed
IT Infrastructure
(Server, Storage, Network, Security, Software, Applications, Transactions, Services)
TDI
T
TCM
Omnibus/Impact
Service Desk Agents
TADDM DB
TSRM + CCMDB App. Server,
Integration Tool : ITIC,TDI, MEA
Inbound Integration with IMAP/POP3 Converter
Send SMS Notification
© 2007 IBM Corporation
IBM Software Group | Tivoli software
Approaches to Performance Tuning
Proactive – Usually done during roll out to prepare for go live loads – Planning hardware for required loads and throughput – Clustering for required loads and fault tolerance – Planning storage requirements – Implementation Options
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

© 2006 IBM Corporation 2004
Tivoli Storage Management Software – Technical Conference
Information On Demand
业务流程
Manage, Collaborate, Optimize
IT
业 务 驱 动 的 开 发
85% 的信息是 unstructured
Customers Employees Transactions Partners
30-50% 的实际时间是 copy management
42% 的交易是 paper-based
Products Organizations Financials E-mails Reports Web content Media Documents
Optimize, Virtualize, Integrate, Accelerate
8
Information On Demand | Information Assets and Systems
© 2006 IBM Corporation 2004
Tivoli Storage Management Software – Technical Conference
With Information On Demand…
控制信息复杂性
Tools & Байду номын сангаасpplications
Processes
People
Insightful Relationships Data & Content Business Context
Information as a Service
Optimize, Virtualize, Integrate, Accelerate “Today, 70% of our people’s time is spent searching for information and only 30% making intelligent decisions. We want to flip the ratio Heterogeneous providing 70% for intelligent and analytical Applications & Information decision making and only 30% on administrative work.”
高效灵活的自动化存储架构管理
IBM TotalStorage Productivity Center
倪敦 Tivoli Storage IBM Software Group
© 2006 IBM Corporation
Tivoli Storage Management Software – Technical Conference
Dr. DB2 Martin Hofmann abc… IBM Content Manager xyz… Oracle
and more…
Exec. Director, Group Supply Strategy Volkswagen AG 9
Information On Demand | Information Assets and Systems
Tivoli Storage Management Software – Technical Conference
我们面临的挑战
信息的多样性 (Variety of information)
60% + of CEOs: 需要更快的获取并理解数据信息,以 便于更好的作出商业决策 只有 1/3 的 CFOs 相信信息是易于使用、选裁和整 合的
Information Accelerators
Industry Specific Services, Models, Maps, Schemas & Policies
Increasing Virtualization
Information Services
Data Mgmt, Information Integration , Business Intelligence, Content Mgmt, Master Data Mgmt
预 测 , 安 全 , 监 控 , 优 化
10
Information On Demand | Information Assets and Systems
, , ,
信息资产 & 系统
Files, Storage, Servers, Networks
© 2006 IBM Corporation 2004
Effectively Manage Information Assets
IBM IT 服务管理
IT Process Management IT Process Management Products
Tivoli Storage Management Software – Technical Conference
我们面临的挑战
典型的财富500强企业
数据量 (Volume of data)
磁盘存储增长迅速
Server-based disk storage
250 200 150 100 50 0
存储相关开销占IT预算的百分比也增长 迅速
IT Service Management
Model, Design, Develop, Test
Business Processes
Provision, Secure, Monitor, Optimize
Agile Business
Maximizing Business Value
Business Driven Development
Labor Cost
Change Management
Service level
George Surdu
Director, Information Technology Infrastructure Ford Motor Company 7 Information On Demand | Information Assets and Systems
30% 的用户时间用于搜 寻相关信息
Databases
79% 的公司: 具有 2 + repositories… 25%: have 15 +
40% 的IT预算花费在整合 上
平均billion-dollar的公司: 48 个独立的 财务系统 / 2.7 个 ERP 系统
来源: IBM & Industry Studies, Customer Interviews 4 Information On Demand | Information Assets and Systems © 2006 IBM Corporation 2004
Tivoli Storage Management Software – Technical Conference
Information On Demand: Tivoli ITSM
Manage, Collaborate, Optimize
Business Applications
Commercial, Internally Developed, Composite-Based
Servers
Storage
Networks
Staff
Vincent Lettler
CIO Cuisines Schmidt 6 Information On Demand | Information Assets and Systems © 2006 IBM Corporation 2004
Tivoli Storage Management Software – Technical Conference
模 型 设 计 开 发 测 试
业务应用
Commercial, Internally Developed, Composite-Based
信息整合器
Industry Specific Services, Models, Maps, Schemas & Policies
服 务 管 理
信息服务
Data Management, Information Integration, Business Intelligence, Content Management, Master Data Management
With Information On Demand…
管理人力成本,改进响应时间
业务专家和相关工具
Desktop Network Application Database Server Mainframe Storage
Availability
通过数据和流程整合IT资源
要执行的管理任务
Change
Security “The IBM approach to IT Service Management is taking Enterprise Systems Management at Ford Information to a new level. Optimization of both the IT 降低人力成本 life cycle infrastructure and IT processes will help to make ITIL best practices a reality and Ford a 改进响应时间 Release more flexible, dynamic organization. ”
Tivoli Storage Management Software – Technical Conference
相关文档
最新文档