Operations Manager "proxy" is an item installed on a computerService. The proxy collects data, compares the sample data with the predefined values, creates alarms, and runs responses. The management server receives the configuration and distributes the configuration to the agent on the monitored computer.
All agents must report to one management server in the Management Group. This management server is calledProxy master Management Server.
The agent observes the data sources on the monitored computer and collects information based on the configuration sent by the management server. This agent also calculates the running status of the monitored computer and the objects on the monitored computer, andReport to Management Server. The agent generates an alert when the Monitored object's health condition changes or other conditions are met. In this way, the operator can know something to pay attention. By providing health data about the Monitored object to the management server, the agent provides the latest health status of the device and all applications it hosts.
You can configure a proxy as a proxy. A proxy is a proxy that forwards data to a management server on behalf of a computer or network device (rather than its host. For example, you can enable a proxy installed on the SQL cluster physical node to monitor cluster resources as a proxy. The agent can monitor the computers and devices where the agent cannot be installed.(This actually refers to: No proxy Monitoring)
(1) communication between proxy and Management Server
The Operations Manager agent sends alarms and discovery data to the master Management Server, which writes data to the operating database. The proxy also sends event, performance, and status data to the master Management Server, which writes data to both the operating database and the Data Warehouse database.
The agent sends data according to the scheduled parameters of each rule and monitor. For optimized collection rules, only when the counter sample and the previous sampleData is transmitted only when the difference reaches the specified tolerance (for example, 10% ).. This reduces network traffic and the amount of data stored in the database.
In addition,All agents send data packets to the management server as scheduled. This data packet is called a detection signal. By default, it is sent every 60 seconds.. The purpose of the detection signal is to verify the availability of the proxy and the communication between the proxy and the management server. Detailed information about the detection signal
For each proxy, Operations Manager monitors the running status of the Service observer from the Management Server perspective.
650) This. width = 650; "Title =" 02 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 02 "src =" http://img1.51cto.com/attachment/201407/17/639838_1405595120r3E9.png "Height =" 241 "/>
(2) Prerequisites for Agent installation
To successfully install the scom agent on a Windows computer, you must meet the following requirements:
% Systemdrive % must be formatted with NTFS
Windows Installer 3.1
Supports x64, x86, or IA64 Architecture
Microsoftcore XML services 6.0
Operating System: windows Server 2003 sp2, Windows Server 2008 SP2, Windows Server 2008 R2, Windows Server 2008 R2 SP1, Windows Server 2012, Windows XP Professional x64 Edition SP2, Windows XP Professional SP3, Windows Vista SP2 windows 7, posready, Windows XP embedded Standard, Windows XP embedded enterprise, Windows XP embedded posready, Windows 7 Professional for embedded systems, or Windows 7 Ultimate for Embedded embedded e Ms.
Supported operating systems on UNIX platforms:
HP-UX 11i V2 and V3 (PA-RISC and IA64)
Oracle Solaris 9 (iSCSI), Solaris 10 (iSCSI and x86), and Solaris 11 (iSCSI and x86)
Red Hat Enterprise Linux 4, 5, and 6 (x86/x64)
Novell SuSE Linux Enterprise Server 9 (x86), 10 SP1 (x86/x64), and 11 (x86/x64)
Ibm aix 5.3, AIX 6.1 (power), and Aix 7.1 (power)
The latest content, can refer to: http://technet.microsoft.com/zh-cn/library/hh205990.aspx
Linux monitoring provides basic functions, such as processes, logs, and disks. Windows involves more application monitoring.
(3) Agent deployment
You can push the agent through the console or manually install the agent. You can also use SCCM software for distribution and GPO installation.
By default, the Windows Firewall is enabled first, and then the agent is pushed. Otherwise, problems may fail. You can define firewall rules through the domain environment.
Use the AD group policy to unify the advanced security firewall settings of the company's clients.
650) This. width = 650; "Title =" 00 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 00 "src =" http://img1.51cto.com/attachment/201407/17/639838_1405595127F1tL.png "Height =" 484 "/>
(4) agent assignment
The proxy can communicate with the Master management server. As an optional option, the proxy can also communicate with the second management server.
You can change the Master management server of the proxy in the following three ways:
Using the Console
Ad Integration
You can allocate a primary and secondary Management Server to the agent through the console;
The agent queries the Active Directory every 60 minutes to update the configuration;
When configuring the ad ing, do not extend the ad, but create an ad (you can use the momadadmin.exe tool)
Powershell
You can also configure the Primary and Secondary Management Servers for proxy connection through powershell;
650) This. width = 650; "Title =" Clipboard "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" Clipboard "src =" http://img1.51cto.com/attachment/201407/17/639838_1405595130RbEK.png "Height =" 308 "/>
(5) proxy configuration
Scom2012 provides the proxy configuration interface. You can enable or disable ad integration on the proxy configuration interface, add members to the Management Group, change the operator account of the proxy, and view the Proxy version.
(6) proxy Communication
Agent Communication: Kerberos authentication is required (in the domain environment, trust relationships are required for different domains), or two-way trust is established through the certificate.
Communication between the agent and MS is encrypted and compressed.
(7) agent and agentless
Most management packages do not support agentless monitoring.
Agentless refers to the absence of proxy monitoring and does not need to install the scom client proxy.
650) This. width = 650; "Title =" 01 "style =" border-top: 0px; border-Right: 0px; Background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; padding-Right: 0px; "Border =" 0 "alt =" 01 "src =" http://img1.51cto.com/attachment/201407/17/639838_1405595135Dq9F.png "Height =" 484 "/>
========================================================== ======================================
This article is from the blog "Zeng luxin's technical column" and will not be reposted!