Overview of monitoring rules in Oracle Enterprise Manager Ops Center.
This chapter discusses the types of monitoring rules and how the software uses monitoring rules and policies to generate alerts and incidents in the user interface.
Topics
Overview of asset monitoring in Oracle Enterprise Manager Ops Center.
Monitoring detects components or attributes of a managed resource that are not operating within parameters. Resource is a broad term for an asset (such as hardware or operating system), a group, a network, or a library that is managed by Oracle Enterprise Manager Ops Center. When you apply monitoring policy to all the assets, you enforce consistency in reporting status for the assets.
Monitoring rules and policies are the components of a complete monitoring configuration:
Monitoring Rules: Define alerting conditions. You apply one or more rules to an asset to raise an alert when the asset is operating outside the defined parameter.
Monitoring Policies: A set of monitoring rules targeted to a specific asset type. System-defined monitoring policies contain a set of rules that are applied to resources by default. You can also create your own policies, define the rules for the policy, and make those policies the default policies for new assets.
When you activate a monitoring rule on an asset, a monitor is activated on the asset's management access point (usually the Agent Controller or the Proxy Controller). The monitor gathers information about the condition of a resource. When an operating system is an agentless managed system, the software monitors the operating system remotely.
List of required roles for monitoring tasks in Oracle Enterprise Manager Ops Center.
Table -3 lists the roles required to complete monitoring tasks. You can restrict privileges to specific targets or groups of targets. Contact your administrator if you do not have the necessary role or privilege to complete a task. See the Oracle Enterprise Manager Ops Center Administration for information about the different roles and the permissions they grant.
Table 4-1 Monitoring Tasks and Roles
Task | Role |
---|---|
View a monitoring rule |
Read Plan/Profile Admin |
View a monitoring policy |
Read Plan/Profile Admin |
View the association of an asset and a monitoring policy |
Read Asset Admin Plan/Profile Admin |
View the historical data of a threshold rule |
Read Asset Admin |
Create, edit, or delete a monitoring rule |
Fault Admin |
Create, copy, extract, edit, and apply a monitoring policy |
Plan/Profile Admin |
Modify the monitoring configuration of an asset |
Fault Admin |
Delete a monitoring policy |
Plan/Profile Admin |
Group assets by a monitoring policy |
Asset Admin |
Apply a monitoring policy to an asset |
Fault Admin |
Apply a monitoring policy to a group |
Asset Admin and Fault Admin |
List of available operations in Oracle Enterprise Manager Ops Center.
You can perform the following actions, depending on the type of rules, the requirements, and your roles:
Create, edit or delete a monitoring rule.
Create, copy, extract, edit, apply, or delete a monitoring policy.
Modify the monitoring configuration for an asset.
Group assets by a monitoring policy.
Apply a monitoring policy to an asset or a group.
Lists the navigation instructions to locate monitoring information in Oracle Enterprise Manager Ops Center.
Table 4-2 Location of Monitoring Rules and Policies in the UI
Object | Location |
---|---|
Monitoring policies |
Expand Plan Management in the Navigation pane, then click Monitoring Policies. |
Monitoring rules |
Expand Plan Management in the Navigation pane, then click Monitoring Policies. Double-click a policy to see the rules. |
Asset-specific monitoring rules |
Select an asset from the Asset view, then click the Monitoring tab. |
Procedure for displaying an asset’s monitoring policy and to view a policy’s rules in Oracle Enterprise Manager Ops Center.
You can view rules for a specific asset or a specific policy from different places in the UI, as follows:
To view the rules for a specific asset, use Asset View:
In the Navigation pane, expand Assets, then click the asset.
In the center pane, navigate to the Monitoring tab and click it.
The name of the monitoring policy applied to the asset is displayed at the top of the monitoring rule grid, next to the number of rules.
To view the rules for a specific policy, use Policy View:
Describes the effect of disabling monitoring for an asset.
Note:
Disabling monitoring policies stops the evaluation of monitoring rule conditions against collected data and prevents the deployment of new monitors across your data center. It does not disable the collection of data on managed assets.
To disable monitoring, disable all monitoring policies for your data center so that incidents and alerts are not generated. When you reenable monitoring, the software applies the monitoring rules that are defined by the default monitoring policies to all of the assets.
You must use the command line interface to disable or reenable monitoring policies. See Oracle Enterprise Manager Ops Center Command Line Interface for more information.
To temporarily disable incidents from a single asset, or a group of assets, place the asset or group in Maintenance Mode. This mode is useful to prevent incidents generated during system maintenance.
Describes the types of severity for default rules and custom rules used in monitoring policies for Oracle Enterprise Manager Ops Center.
Monitoring rules state the values and boundaries for an asset's activity. A monitoring policy is a set of rules. Each monitoring policy contains rules for threshold levels. Default policies for monitoring hardware, operating systems, and Oracle Solaris Clusters are included in the software. You can use the default policies, but you cannot edit them. To edit or add monitoring rules to a monitoring policy, you must make a copy and then set that policy to be the default.
Monitoring rules define the alerting conditions. Rules are associated with, and determined by, the type of managed resource. You can apply a generic monitoring rule to many different attributes, but other monitoring rules are attribute-specific, hard-coded into drivers and cannot be relocated or reconfigured.
When you set a threshold, the UI displays the existing historical data for an attribute. The software might propose some default threshold values based on the analysis of historical data, and display existing thresholds as a bar on that historical data. You can enter any threshold value.
Each managed resource has a Monitoring tab. You can add, edit, enable, disable, and remove resource monitoring rules. You can tune the rules for a specific managed resource.
Note:
Tuning rules for a specific managed resource detaches the resource from the monitoring policy, keeping only a copy of the rules. When you modify rules in the policy, the change is not made to the rules that are associated with the resource.
Rules have Info, Warning, and Critical severity levels. Default values and severity levels are provided at installation, but you can edit the rules for your organization. For user-defined rules, you can define the time between when the alerting condition occurs and when the software generates an alert or incident. You can configure the software to send an e-mail or pager message when it identifies a Warning or Critical incident.
The following categories of monitoring rules are available:
System-defined rules: These are attribute-specific and are hard-coded into drivers. You can disable a system-defined rule, but you cannot edit, relocate, or reconfigure these types of rules.
User-defined rules: These are associated with, and determined by, the type of managed resource. You can apply a user-defined rule to many different attributes.
Description of rule types and their severity levels in Oracle Enterprise Manager Ops Center.
The following types of editable user-defined rule parameters, also known as rule types, are available:
Threshold: Sets an upper or lower monitoring threshold for the monitored attribute.
Boolean Control: Sets a logical operator of true or false for the monitored attribute.
Enumerated Control: A series of values that defines a subset of specific values among the possible values of the monitored attribute. An alert occurs when the attribute matches one of those specific values.
Expression: Defines the variables, literals, and operators for an attribute. An expression is an instruction to execute something that returns a value.
You cannot modify all rules, but most rules include some parameters that you can tune, or edit, to meet your organization's requirements.
The following are some examples of editable parameters:
Severity level of the alert: You can define the parameters for informational, warning, and critical alerts.
Raising and clearing values: These are threshold settings that determine when an alert is raised and cleared. These two values are always the same. For example, you can configure the software to raise an alert when a value reaches 90% and clear the alert when the value falls below 90%.
Monitor for alert limits at specific time: Defines when you want monitoring to occur, or to not occur. You might use this parameter when a daily maintenance procedure causes an attribute to operate outside of the normal monitoring threshold, but you do not want to raise an alert. You can define a period of time when the monitors are disabled and you can perform maintenance.
Generate alert after: Defines how long an issue occurs before an alert is generated. The number defines the time between when a threshold is exceeded and when an alert is generated. The alert is not triggered immediately. An alert is generated when the monitored attribute value is outside the threshold after the specified delay. You might use this parameter to limit false positive alerts due to a temporary condition.
Describes the states of monitoring rules in Oracle Enterprise Manager Ops Center.
Monitoring rules have two types of states:
Enabled or Disabled: Disabling a rule removes that attribute from monitoring. You can disable and enable rules on a per asset or group basis.
Active or Inactive: Reflects the system's state and indicates whether the software is monitoring the asset or group. When a rule is not enabled, monitoring is not active.
By default, all monitoring rules are enabled. The status appears on the Alert Monitoring Rules page, which you can access from the Monitoring tab. When Yes is in the Enabled and Active fields, the rule is enabled and active. When No appears in the corresponding field, a rule is disabled or inactive. Figure 4-1 shows the Service Alert Monitor status as enabled, but inactive.
Figure 4-1 Enabled and Active Monitoring Rules
An Enabled field appears in the list of monitoring rules for an asset. You can disable one or more rules for a specific asset. When No appears in the Enabled column, the rule is disabled.
When a rule is enabled, the active state reflects the system's actual state and indicates whether the software is using the rule. The following are some reasons that an enabled rule might be inactive:
When a specific attribute is not hard-coded into the driver, monitoring is not possible for that attribute.
The software cannot reach the resource or the attribute cannot be refreshed.
Some type of misconfiguration, such as a missing mandatory parameter or an illegal value for a parameter.
An internal error specific to the monitor, particularly for driver-specific monitors.
You can view the rules for a specific asset or you can view the rules for a policy that is associated with one or more assets.
Describes the effect of changing a monitoring rule.
Monitoring rules have pre-defined parameters. You can change the parameters, including the threshold values and the monitoring level, to meet your data center guidelines. You can define the parameters for an individual asset or for a group of assets.
You can create separate monitoring groups to consistently and efficiently define the parameters for all systems in each group. For example, you can create a group for a set of high priority systems. You edit one set of specific threshold values for all members of that group and apply a monitoring policy to the group. All members of the group are now monitored in the same way for the same values.
You can edit a monitoring rule for a specific asset or the monitoring rule for a monitoring policy. Editing the monitoring rule parameters for an individual system might be useful when a particular system is on a critical path. For example, you might consider the systems that you have the Enterprise Controller and Proxy Controllers on critical path systems, you can monitor the system continuously and create more stringent monitoring thresholds for those systems.
Note:
When you update a monitoring rule in a policy, the monitoring configuration of all assets that are associated with the policy are updated to reflect the revised rule.
You can perform the following tasks:
Change the values for the Warning and Critical thresholds
Change file system thresholds
Change the thresholds by system or by group
Set specific threshold values for different operating systems
For example, you can create a threshold on the Enterprise Controller system that sends a warning when the file system use exceeds 90%. This alerts you when the Enterprise Controller file system is almost full.
For a threshold alert, you can change how often and for how long the software monitors the resource. You can change the threshold values.
Alert window: Enables you to specify a period of the day when the monitoring rule is enabled. For example, when a daily maintenance operation causes a monitored attribute to exceed a threshold, you can exclude monitoring for that time to disable monitoring for that maintenance window.
Generate alert after: Enables you to configure monitoring to ignore a monitored attribute that is outside the defined monitoring parameters for a short period of time. Specifying a delay means that the software generates an alert only when the value remains above the specified limit for a given duration. The software does not generate an alert when the value goes above the limit once and then immediately goes back to normal.
Procedure for changing a monitoring rule in Oracle Enterprise Manager Ops Center.
See About Asset Attributes for more about the attributes that you can use in monitoring rules.
Describes ways to use the asset data that Oracle Enterprise Manager Ops Center stores.
The software maintains a history of each monitored asset's performance against its assigned threshold rules. When you add a new threshold-type monitoring rule or modify a threshold configuration for a specific asset, it does not impact the asset's attribute history.
The asset's attribute history, which is maintained by the software, is not specifically tied to the threshold rules. Oracle Enterprise Manager Ops Center only records statistical values of the asset attributes over time. However, the threshold wizard can leverage the history to suggest meaningful threshold values. When there is historical data for the monitored attribute, a graphical representation of the historical data appears along with a proposed default threshold value based on the analysis of the data.
When modifying a threshold configuration for a specific asset, you can choose the time frame from a list of options, from one day up to six months, to display a graphical representation of the historical data. You can use this information to tune the threshold rules.
Note:
When you edit the threshold limit for a specific asset, the software disassociates the asset from the default monitoring policy and creates a new monitoring policy for the asset.
Describes custom monitoring rules in Oracle Enterprise Manager Ops Center.
Each monitoring policy contains a default set of rules. The rule set and default parameters depend on the managed asset subtype.
When specifying an Expression monitoring rule, you use the Oracle Enterprise Manager Ops Center query language to write a logical expression that defines the alerting condition for one or more resource attributes. The logical expression includes attribute names, operators, and literal values. You can use a dotted notation to reference attribute subfields.
When adding a Threshold, Enumerated, or Boolean monitoring rule, you must define the monitored attribute. When adding an Expression rule type, specify an expression that references one or more attributes to monitor. The following are some examples of monitored attributes:
CpuUsage.usagePercentage
ProcessUsage.topMemoryProcesses.pid=*.physicalMemoryUsage
DiskUsageSet.name=*.busyPercentage.
Monitored attributes are available in the Javadoc that is in the Oracle Enterprise Manager Ops Center Software Developer's Kit (SDK). Go to the dvd/
platform
/Product/components/packages
directory and install the SUNWxvmoc-sdk.pkg
package.
Browse the available attributes and names for the monitoring framework. Attributes always start with an upper case letter, such as SystemUpTime
, and fields always start with a lower-case letter.
For example, when you want to list the valid monitored attributes for an operating system, go to the com.sun.hss.type.os.OperatingSystem
Javadoc page. This page displays all of the attributes of an OperatingSystem.
Each of these attributes is either a simple type, a structure or struct-like type, or a collection type. The following are examples of the different types of attributes:
Simple: You can use the name, such as SystemUpTime
Struct-like: You can drill-down into a field of the structure type. The fields always start with a lower-case letter, such as SystemLoad.average1Minute
Collection: You can drill-down into a member of the collection. For Maps you do this by specifying the appropriate 'key'. When you set the key, specify the value for the 'name' field, to get the value of a single member. For example, use the following to check the 'enabled' value of the interface named eth0: InterfaceInfos.name=eth0.enabled
Note:
Structures are sometimes nested. For example, a struct-like attribute can contain another struct-like field, or a collection. Collections typically contain struct-like values. To drill down, continue to append the appropriate field names.
You can perform a query which scans across all members of a collection by specifying the '*' wildcard value for the key or name. When you perform a query, you must use one of the following operators: max
, min
, or like
. For the query syntax, see the DomainQuery Java class
Javadoc. See for details on the Javadocs.
See the appendix for Expression Query Language for more information on the expression query language, grammar, lexical elements, and method details.
Overview of monitoring policies in Oracle Enterprise Manager Ops Center.
Monitoring policies contain the configuration used to monitor an asset, including defined thresholds for alerts. You can revise many of the threshold and monitor settings, or use one of several methods to create new policies.
Topics
Describes default monitoring policies and custom monitoring policies in Oracle Enterprise Manager Ops Center.
A monitoring policy is a collection of rules that are associated with each type of monitored asset. The policy defines the resources monitored and the rules for that asset type. You can add and edit policies and select the default policy for a specific asset type.
A set of default monitoring policies is included with the software. The policies are based on the type of resource being monitored, such as operating systems, servers, power distribution units, and SAN server arrays, and Oracle VM Server. Each policy contains a default set of rules. The rule set and parameters depend on the managed asset subtype. Alert monitors watch the state of managed resources and their attributes and raise an alert when the state is outside the pre-defined thresholds.
You can use the default rules and policies or you can use the following methods to create a new policy:
Copy an existing policy and then edit it, as needed, to modify the rules.
Extract an existing policy from an asset and modify it.
Create a new policy, then edit the policy to add rules.
When you discover and add an asset, the software applies the default monitoring policy for the asset's type immediately. Some monitoring policies install monitors or agents on managed resources, while other policies are designed to invoke arbitrary actions or scripts against the managed resource.
Go to the Plan Management section of the UI for a list of available monitoring policies. Click Monitoring Policies to display a list of all policies, the default status of the policy, and the intended asset or target type. The following types of monitoring policies are available:
System-Defined Policies: Typically use asset specific rules. The monitored details are determined by what is implemented on the specific asset. An example of a system-defined policy is the MSeriesChassis policy that monitors the Xsb Mode of a SPARC M-series chassis. A system-defined policy is read-only, you cannot disable or modify the rules defined in the policy. You can turn the rule off and on.
User-Defined Policies: Typically use generic rules and contain monitoring thresholds. An Operating System policy is an example of a user-defined policy that monitors the following generic operating system parameters: CPU usage, disk I/O queue length and utilization percentage, file system usage, memory usage, network bandwidth utilization, and swap usage, and system load.
The Navigation pane and center pane both display user-defined policies followed by system-defined policies. The icons and naming convention help to identify the type of policy in the Navigation pane. The names of all system-defined policy use the prefix OC and have a green check mark in the lower. For example, in Figure 4-2 OC - Chassis is a system-defined policy and Copy of OC - Chassis and OS Profile - Dev are user-defined policy.
User-defined policies have a silhouette of a person in the lower left corner. A green check mark in the icon indicates that this is a default monitoring policy. In Figure 4-2, OC - Chassis is a system defined policy that is the default policy. In Figure 4-3 Copy of OC - Chassis is a user defined policy and is also the default policy.
Figure 4-3 Default and User-Defined Policies
To view a detailed list of user-defined and system-defined policies, click Monitoring Policies in the Navigation pane, as shown in Figure 4-4.
You can create your own user-defined policies by creating, copying, or extracting a monitoring policy. You perform the Copy Policy action from the policy view and the Extract Policy action from the asset view. By extracting a policy from the asset view, you ensure that the subtypes are valid for that asset type. You can change the target subtype to a more specific or a more generic eligible target type. To be eligible, the policy must be a member of a more general policy for the specified target.
For example, you can highlight an Oracle Solaris operating system and extract a monitoring policy for an operating system. You can specify one of the following as the OS subtype for the new policy:
Oracle Solaris 10: Any supported Oracle Solaris 10 operating system.
Oracle Solaris 10 Operating System: Any supported Oracle Solaris operating system, beginning with Oracle Solaris10 8/07 (update 4). You might use this subtype when you use the Oracle Solaris Zones policy.
Oracle Solaris: Any supported Oracle Solaris operating system release.
Operating System: Any supported Oracle Solaris, Linux, or Windows operating system.
Lists the default monitoring polices in Oracle Enterprise Manager Ops Center.
Monitoring policy details vary, depending on the asset and associated resources being monitored. Figure 4-5 is an example of a system-defined monitoring policy for an operating system, including the Policy Details. The Details section of the page contains information about the policy, including the name, description, and the type of policy. The policy details also describes the applicable types of assets or targets, whether the policy is a sub-type of another policy, when the policy was last modified, and whether the policy is the default policy for the target types.
Figure 4-5 System-Defined Operating System Monitoring Policy
The following system-defined and generic monitoring policies are available:
OC – Chassis: Monitors the chassis fan and power supply
OC – CiscoSwitch: Monitors an Ethernet switch's power status, switch port status, and switch status.
OC – Dynamic System Domain: Monitors the state and status of the dynamic system domains on eligible servers. Server reachability is monitored. Informational alerts are available for the power state, either on or off, and the operating system state, either running or not. The Server Port Status generates a Warning alert when the server port is disabled or down.
OC – File Server: Monitors the file server reachability, backing devices usage percentage, storage allocation percentage, and storage usage percentage of generic file servers.
OC – Global Zone: Monitors the DHCP status, appliance health, CPU usage, disk I/O, file system usage, memory usage, network bandwidth, Swap usage, and system load of a global zone.
OC – ISCSI Storage Array: Monitors the iSCSI storage array reachability, storage allocation percentage, storage usage percentage, volume group allocated space percentage, and volume group used space percentage.
OC – Local Library: Monitors the storage library usage percentage for a local storage library.
OC – Logical Domain: Monitors Oracle VM Server for SPARC guest status, including the migration status, running or not, and whether the guest is powered on.
OC – M-Series: Monitors the Xsb Mode of a SPARC M-series chassis
OC – NAS Library: Monitors the storage library status and storage library usage percentage of network attached storage (NAS) libraries.
OC – Non-global Zone: Monitors CPU usage, disk I/O queue length and utilization percentage, memory usage, network bandwidth utilization, and swap usage for non-global zones.
OC – Operating System: Monitors the following generic operating system parameters: CPU usage, disk I/O queue length and utilization percentage, file system usage, memory usage, network bandwidth utilization, and swap usage, and system load.
OC – Oracle VM Server for SPARC: Monitors Oracle VM Server for SPARC status, including the DHCP client, appliance health, and free virtual CPU (VCPU) usage.
OC – Oracle VM Server for x86: Monitors Oracle VM Server for x86 status, including the DHCP client, appliance health, and free virtual CPU (VCPU) usage.
OC - Power Distribution Unit: Monitors Ampere levels of rack Power Distribution Units.
OC – Remote Oracle Engineered System: monitors remote Oracle engineered systems.
OC – SAN Library: Monitors the status of the storage area network (SAN) libraries.
OC – SAN Storage Array: Monitors the SAN storage array reachability and usage. The usage includes the storage allocation percentage, storage usage percentage, volume group allocated percentage, and volume group used space percentage.
OC – Server: Monitors the following parameters on a generic server: Power status, server port status, CPU, NIC, fan, fan tray, memory, and power supply.
OC – Server Pool: Monitors the total CPU allocation percentage, total cryptographic units allocation percentage, and the total memory usage percentage.
OC – Solaris Cluster: Monitors the Oracle Solaris cluster install mode, reachability, and monitor.
OC – Solaris Cluster Node: Monitors the online status, scalert.node reachability, and scalert.node alert monitor.
OC – Solaris Cluster Zone Cluster Group: Monitors the scalert.zone cluster alert monitor.
OC – Solaris Cluster Zone Cluster Node: Monitors the scalert.zone Cluster Node Alert Monitor
OC – Storage: Monitors the following parameters for a generic storage device: operating system status, power status, server port status, and storage alert.
OC – Switch: Monitors an Ethernet switch's power status, switch port status, and switch status.
OC – Virtual Machine: Monitors the reachability of the virtual machine, if the operating system is running, and the migration status of a virtual machine.
Procedure for creating a new monitoring policy or copying an existing monitoring policy in Oracle Enterprise Manager Ops Center as well as a list of other actions for monitoring policies.
Use the policy view to add a new monitoring policy or copy an existing monitoring policy.
To see the new policy, expand Plan Management and click Monitoring Policies. Click the policy to display details.
To add or remove rules or change monitoring parameters, double-click the policy in the center pane.
To view all assets that are monitored with this policy, click View Associated Assets.
To make this policy the default monitoring policy, click the Set as Default Policy icon.
Describes the effect of extracting a monitoring policy from the asset view.
Extracting a monitoring policy is similar to copying a policy. Copying a policy is performed from the policy view, as shown in Figure 4-4; extracting a policy is performed from the asset view, as shown in Figure 4-6.
Figure 4-6 Extract a Monitoring Policy Action
By extracting a policy from the asset view, you filter the possible subtypes to only those that are valid. You can change the target subtype to a more specific or a more generic eligible target type. To be eligible, the policy must be a member of a more general policy for the specified target.
Procedure for creating a new monitoring policy from an existing policy.
To see the new policy, expand Plan Management and click Monitoring Policies. Click the policy to display details.
To add or remove rules or change monitoring parameters, double-click the policy in the center pane.
To view all assets that are monitored with this policy, click View Associated Assets.
To make this policy the default monitoring policy, click the Set as Default Policy icon.
Describes the roles of an asset’s monitoring configuration, monitoring policy, and any unique monitoring rules.
Monitoring configurations contain monitoring policies and are associated with an asset type, such as an operating system. You can edit specific rules and parameters, but you cannot edit general monitoring policy properties, such as name and description after you create the policy. Editing a policy changes the monitoring configuration for all associated assets.
You can modify the monitoring configuration of an individual asset. When you create a monitoring configuration, the asset is no longer associated with the monitoring configuration and policies for that asset type. Instead, it has its own independent monitoring configuration.
When you modify a monitoring configuration for an asset, you create a policy and the asset is associated with the new created policy.
Describes how groups of assets are monitored in Oracle Enterprise Manager Ops Center.
When you apply a monitoring policy to a user-defined group, all applicable members of the group are associated with the policy. The policy associated with an asset is displayed next to the asset in the wizard. When you apply a policy to all assets in a group, the software disassociates the asset from the assigned policy and associates it with the policy that is assigned to the group.
When you remove the asset from the user-defined group, the asset is associated with the group's monitoring policy until you relocate it to another user-defined group that has a different policy or you manually associate the asset with a different monitoring policy.
Describes how to identify a user-defined group by its monitoring policy in Oracle Enterprise Manager Ops Center.
When you create a user-defined group, you can specify a rule that filters the assets based on the name of the associated monitoring policy. Use this type of rule to identify all the assets associated with that monitoring policy or to identify assets that are not associated with that monitoring policy.
When viewing the monitoring configuration of an asset, you can navigate to the definition of the monitoring policy bound to the asset.
This procedure will copy and make some changes to an existing Monitoring Policy.
From the Navigation tree, click Plan Management. Under Operational Plans, click on Monitoring Policies, then, click on OC - Global Zone.
In the Actions pane, click on Copy Policy and follow the wizard until the copied policy appears under User Defined policies.
Select the File System Used Space Percentage Monitoring Rule.
Click on the Edit Monitoring Rule button, go through the wizard, and verify that the changes were made.
From the Assets tree, select the asset type you want to edit.
From the Monitoring tab, click on Apply a Monitoring Policy from the Actions menu.
Select the new custom copy that was created previously and complete the wizard.
Note:
Make sure everything is working as expected by checking the Incidents tab. Make sure the current status of the incident is Cleared.
Procedure for modifying the defined threshold value for a Monitoring Rule.
From the Assets pane in the Navigation pane, click an asset type, such as the Operating system.
Click the Monitoring tab.
Select the File System Used Space Percentage in the Threshold Monitoring Rules.
Click on the Edit Monitoring Rule button.
Note:
This procedure can apply to any similar Collection attributes. Eg. File System Used Space Percentage, ZPool Usage Percentage, etc.
Setting a Threshold For a Specific Filesystem
From the Assets pane in the Navigation pane, click an asset type, such as the Operating system.
Click the Monitoring tab.
Select the File System Used Space Percentage in the Threshold Monitoring Rules.
Click on the Edit Monitoring Rule button.
In the Set Thresholds part of the wizard, click on the Add a Component button.
Type the name of the Filesystem you want to monitor and select the Warning and Critical Thresholds.
Selecting an “Any” threshold will apply to all Filesystems that do not have a specific threshold.
Note:
This procedure can apply to any similar Collection attributes. Eg. File System Used Space Percentage, ZPool Usage Percentage, etc.
Procedure for removing a monitoring policy in Oracle Enterprise Manager Ops Center.
You can delete user-defined monitoring policies; you cannot delete system-defined policies.
Any asset or group associated with a deleted policy is detached from the policy. However, the asset retains the monitoring configuration defined by the policy.
List of Oracle Enterprise Manager Ops Center documents with additional information.
For instructions in performing actions or to learn more about the role of this feature, go to the Oracle Enterprise Manager Ops Center Operation Reference:
See the Hardware chapter for information about hardware monitoring.
See the Operating System Management chapter for information about monitoring operating systems.
See the Incidents chapter for information about managing incidents that result from monitoring.
See About Maintenance Mode for information about temporarily disabling incidents.
See Expression Query Language for details about the language, grammar, lexical elements, and method details.
The following documents at http://docs.oracle.com/cd/E59957_01/nav/operate.htm
relate to monitoring: