Skip navigation

Sentry Software

14 Posts authored by: Nathalie Leboul
Share:|

We are pleased to announce that Monitoring Studio X beta 3 is now available!

 

In this beta 3, the last beta before the GA version, you will enjoy the following enhancements:

  • Ability to perform cookie based authentication in HTTP requests
  • Ability to embed script files in a Template configuration
  • Ability for other KMs to extend Monitoring Studio's Web UI with specific icons, online help, actions and even additional pages to provide configuration or reporting specific capabilities
  • Improved Console Web UI
  • Improved Tree view (Host and Host Groups now placed under the Monitoring Studio icon)
  • Improved Windows Performance Counter Monitoring
  • Improved Dynamic Object builder
  • Improved Value Map

 

Please don't hesitate to share your thoughts. Your feedback so far has been of great value to us.

Share:|

We are very excited to announce that Monitoring Studio X beta is ready!

 

Monitoring Studio X is the next generation of Sentry Software well-known and powerful toolbox that you have widely adopted to shape and customize the monitoring of all your datacenters.

 

 

Today, we are proud to introduce some of Monitoring Studio X's most significant improvements and capabilities:

  • A modern Web interface to easily configure the monitoring of any component in your datacenter, see example below:

  • A live and user-friendly interaction with a PATROL Agent
  • A new REST API to query and interact with a PATROL Agent
  • A hot "Dry Run" feature to challenge your monitoring settings before implementing them

 

After months of hard work, this innovative and modern version of Monitoring Studio needs to pass the crucial test before its public release, which is to face its most demanding challenge... real-life users. That's why we would like you to try out the beta and contribute to the success of Monitoring Studio X.

Download Monitoring Studio X beta and share your experience with us through BMC Communities or our Web site before the end of December!

Short tutorials are available on our YouTube channel to walk you through basic concepts of the beta:

 

Thank you for your collaboration. We can't wait to hear what you think about the beta!

Monitoring Studio X is made available to allow a large user base to test and evaluate the next major version of our monitoring solution. Note that it is not recommended for production use at this stage.
Share:|

Reminder: What is Monitoring Studio?

Monitoring Studio is a well-known, widely adopted, powerful and mature toolbox that allows TrueSight Operations Mgmt administrators to implement a tailored monitoring of all their datacenters components.

 

Monitoring Studio offers a set of various "Monitors" that allows you to:

 

Monitor

  • File systems
  • Files
  • Folders
  • Processes
  • SNMP Traps
  • Windows Events
  • Windows performances counters
  • Windows services

Search for strings, extract numeric values

Run and analyze the output of...             

  • Commands and scripts
  • HTTP requests
  • SNMP polling
  • SQL queries
  • WBEM queries
  • Web services
  • WMI queries

 

And may other features...

 

With Monitoring Studio, you can monitor anything, anywhere. Yes, anywhere, because Monitoring Studio can perform queries remotely.

 

What is Monitoring Studio X?

Fans of Monitoring Studio have asked us to create an interface to be able to configure it very easily and quickly. We accepted the challenge, and while we were there, we extended this interface to interact with the PATROL agent, and even better, we developed a REST API to communicate with the PATROL Agent.

 

Monitoring Studio X new features are:

 

  • A new PATROL Agent web interface that shows an agent’s behavior, live! It is a responsive and reactive interface that provides immediate feedback of a PATROL Agent’s monitoring actions. -> Live interaction

 

  • A new Monitoring Studio web interface to configure the monitoring of any component of your datacenter. -> Easy configuration

 

  • A new REST API that you can use to query a PATROL Agent. -> Modern interaction

 

  • Icing on the cake: Monitoring Studio X offers a "Dry Run" feature to test your monitoring immediately and check whether the result matches what you expect.

 

How Does Monitoring Studio X Work?

Monitoring Studio X key concepts are Hosts, Templates and Monitors.

 

  • Host: A Host is a server or a group of servers that you define in Monitoring Studio in order to monitor it/them.

 

  • Template: A Template is a group of Monitors. It usually defines the monitoring (health and performance) of an application, like MySQL, RecoverPoint, etc. A Template is applied to one or several Hosts.

 

  • Monitor: A Monitor is a single monitoring action that is configured by the user. A monitor is part of a Template. A Monitor can be:
    •     Process monitoring
    •     File parsing
    •     HTTP request
    •     Database query
    •     SNMP polling
    •     Folder monitoring
    •     WBEM query
    •     WMI query
    •     Command line execution
    •     etc.

 

In a Nutshell

Monitoring Studio X will make your life much easier! It is not only a complete and mature toolbox to monitor any component of a datacenter, but also a powerful web interface to visualize a PATROL Agent’s information, that is intuitive, flexible, and reliable.

Share:|

What are the servers remotely monitored? How to know whether the remote monitoring that I have configured is working correctly? How to turn the debug on? What is the version of Hardware Sentry KM? What is the build number?

 

You can have access to a wealth of information about your hardware monitoring by executing PSL Commands in the Agent Query Tool in TrueSight Operations Mgmt.

 

By modifying our code and providing access to some of our PSL functions, we now allow you to execute PSL scripts on a PATROL agent running Hardware Sentry KM in order to run global reports, host reports, queries and commands (in versions 10.0.00 and higher).

 

Here are some examples of information that you can gather.

 

See Remote Systems Monitored by an Agent

  • Command: requires MS_HW_q; hostsInfo();
  • Output:

Easily Enable the Debug Mode... by Host!

Enabling the debug mode is quick, easy, and you can target a specific host to get only the information you are interested in!

  • Command: requires MS_HW_q; setDebug(mode, numberOfMinutes, listOfHosts);
  • Output:

Check Connectors

You can check if connectors are monitoring correctly a remote host and not encountering any issue with the instrumentation layer(s).

  • Command: requires MS_HW_q; connectorsReport(hostID);
  • Output:

Force a Discovery

This can be very useful if you have made updates and don't want to wait for the next discovery.

  • Command: requires MS_HW_q; rediscover(hostID);
  • Ouptut:

Provide Information to the Customer Support

Providing accurate information to customer support will always help resolving an issue faster.The Product Report reports product information such as product version, KM information, installed libraries and connectors.

  • Command: requires MS_HW_q; productReport();
  • Ouptut:

And Many More!

Don't hesitate to have a look at all the other commands.

  • Command: requires MS_HW_q; help();
  • Ouptut (partial):

 

Reminder: how to run a query on a PATROL agent?

  1. Access the PATROL Agent.
    1. In the navigation pane of the TrueSight console, click Configuration and select Managed Devices. In the Managed Devices table, the PATROL Agents are displayed under the associated Integration Services that are displayed under the corresponding Infrastructure Management Servers.
    2. For the PATROL Agent that you want to access, click + against the associated Infrastructure Management server and the Integration Service to expand them. The PATROL Agent is displayed.
  2. Click the PATROL Agent action menu and select Query PATROL Agent. The Agent Query Tool opens in a new browser window.
  3. In the Command box, specify the query.

 

Note: These commands are available in PATROL Central as well.

Download Hardware Sentry KM on Sentry's Website!

Enjoy!

Share:|

Monitoring Studio X beta version is coming soon! Developers are working hard and we are all excited by this amazing new version. With Monitoring Studio X, you will have a new Web UI to interact easily with a PATROL agent and visualize quickly your configuration.

 

X2.png

Would you like to share your ideas with designers and developers, have an impact on its conception?

 

This is a unique opportunity to participate in building a great product and help ensure the best quality! What you would like to see in it? Don't hesitate to tell us!

 

For people who don't know yet Monitoring Studio: it is the essential toolkit (for TrueSight Operations Mgmt and TrueSight Infrastructure Mgmt) for every monitoring administrator who wants to have a perfectly tailored monitoring of his data center, without any gap.

 

The beta version is planned to be available this summer. More information to come soon!

Share:|

Discovery issues may have various causes that can sometimes be difficult to identify. The new Report monitor implemented in Hardware Sentry KM for TrueSight Operations Mgmt | TrueSight Infrastructure Mgmt provides an overview of the discovery progress, collect, status, and results for a specific host. Each monitored attribute can be configured to trigger alerts when their value reaches an unacceptable or abnormal level to help you quickly pinpoint a discovery or performance problem.

 

 

The Report monitor is displayed in the Monitor list of the Device Details in your TrueSight console:

Report Monitor.PNG

The Report graph provides a real-time view of the data collected on a specific host. The graph can be customized to display several attributes at a time.

Report Graph.PNG

 

The collected data is distributed in 5 categories:

  1. Counters
  2. Execution
  3. Protocol
  4. Size
  5. Other

Note: The availability of attributes may vary according to the components discovered and monitored on your device.

 

Counter Attributes

These attributes report on the number of components discovered and monitored on a host. Although thresholds are not set by default, you can easily configure your own custom thresholds to get notified when a counter is going suspiciously low which may suggest a discovery issue. A graph displaying some of the following counter-type attributes can help you focus on a specific type of data to analyze and isolate an issue:

 

AttributeDescription

Count - All

Sum of all objects reported by the Count-x attribute, except for Count-ConnectedPorts and Count-Missing.

Count - Battery

Count of all batteries discovered on the monitored host.

Count - Blade

Count of all blades discovered on the monitored host.

Count - Connected Ports

Count of all connected ports discovered on the monitored host

Count - CPU Cores

Count of all CPU cores discovered on the monitored host.

Count - CPU

Count of all CPUs discovered on the monitored host.

Count- Disk Controller

Count of all disk controllers discovered on the monitored host.

Count - Disk Enclosure

Count of all disk enclosures discovered on the monitored host.

Count - Enclosure

Count of all enclosures discovered on the monitored host.

Count - Fan

Count of all fans discovered on the monitored host.

Count - LED

Count of all LEDs discovered on the monitored host.

Count - Logical Disk

Count of all logical disks discovered on the monitored host.

Count - LUN

Count of all LUNs discovered on the monitored host.

Count - Memory

Count of all memory modules discovered on the monitored host.

Count - Missing

Count of all objects that are currently missing.

Count - Network

Count of all network interfaces discovered on the monitored host.

Count - Other

Count of all other devices discovered on the monitored host.
Count - Physical DiskCount of all physical disks discovered on the monitored host.

Count - Power Supply

Count of all power supplies discovered on the monitored host.

Count - Robotics

Count of all robotics discovered on the monitored host.

Count - Tape Library

Count of all tape libraries discovered on the monitored host.

Count - Temperature

Count of all temperature sensors discovered on the monitored host.
Count - Voltage

Count of all voltage sensors discovered on the monitored host.

 

For example, a Count-All attribute displaying a number of monitored components lower than 5 may indicate that the host monitoring is likely incomplete and requires investigation.

 

 

Execution Attributes

These attributes report on the number of successful executions performed on a host, by protocol (including OS Commands) based on data collected upon each discovery.

 

AttributeDescription
Execution - CommandCount of successful command executions performed on the monitored host.
Execution - HTTPCount of successful HTTP request executions performed on the monitored host.
Execution - IPMICount of successful IPMI command executions performed on the monitored host.
Execution - SNMPCount of successful SNMP query executions performed on the monitored host.
Execution - UCSCount of successful UCS commands executions performed on the monitored host.
Execution - WBEMCount of successful WBEM query executions performed on the monitored host.
Execution - WMICount of successful WMI query executions performed on the monitored host.

 

Overloaded systems may prevent Hardware Sentry from operating properly. When a sudden drop in the number of executions occurs, it is likely due to a lack of resources available to the monitoring solution for monitoring the host in an optimal manner. Hardware Sentry 10 enables you to closely watch the amount of successful commands or queries execution on a host to rapidly pinpoint any overload or unpredicted change in the system’s workload.

Execution per min.PNG

 

Protocol Attributes

These attributes report on the status of the connections between Hardware Sentry 10 and the monitored host. When the monitored host is the localhost, connection issues may be due to invalid credentials or a protocol interruption or failure (SNMP service or SSH daemon stopped for example). When a connection becomes degraded or fails, the connection-specific ProtocolStatus attribute triggers an alert to immediately notify you about the protocol that requires attention. Note that the attribute graph is also annotated to provide additional information regarding the protocol error.

 

AttributeDescription
ProtocolStatus-CommandStatus of the connection to the monitored device with the OS command protocol.
ProtocolStatus-SNMPStatus of the connection to the monitored device with the SNMP protocol.
ProtocolStatus-WBEMStatus of the connection to the monitored device with the WBEM protocol.
ProtocolStatus-WMIStatus of the connection to the monitored device with the WMI protocol.

 

mix.PNG

Size Attributes

The size-type attributes report on the consolidated size, in gigabytes, of logical/physical disks and memory for the monitored host, giving you an overall view of the capacity potentially available on your device.

AttributeDescription
Size - Logical DiskSum of the size of all discovered logical disks on the monitored host.
Size - MemorySum of the size of all discovered memory modules on the monitored host.
Size - Physical DiskSum of the size of all discovered physical disks on the monitored host.

 

Other Attributes

AttributeDescription
Degrees Below WarningNumber of degrees before reaching the closest warning threshold.
Hardware Discovery StatusStatus of the discovery of all hardware components on the monitored host.
Hardware Discovery TimeTime taken to discover all hardware components on the monitored host.
Platform Detection TimeTime taken to detect the connectors that match the system. If connectors are pre-selected, the attribute value is '0'.
Power ConsumptionWattage consumed by all the discovered components on the monitored host.
Total Bandwidth

Sum of the values of all LinkSpeed attributes (only for plugged-in network cards).

 

Some of these attributes may anticipate critical situation and optimize the monitoring of your entire IT assets, for example:

 

The Degrees Below Warning attribute reports on the remaining number of degrees (C°) before the temperature reaches the closest warning threshold set on the temperature sensor of the device. Hardware Sentry 10 automatically sets thresholds according to the manufacturers' recommendation and the location of the temperature sensor. A continuous and close control of the temperature of your servers will help you optimize the overall temperature of your entire IT environment to avoid hardware overheating and keep your energy bill within budget.

 

The Hardware Discovery Status attribute can help you identify an unusual or suspicious workload on the agent monitoring a host.

A Hardware Discovery Status set to 1 (Waiting in Bottleneck), indicates that the discovery is waiting to be performed. A discovery process reported longer than a mere second in a bottleneck state (value at 1) is likely to indicate a resource issue. Although Hardware Sentry 10 handles these situations, splitting the configuration across other PATROL agents might help optimize the monitoring performance.

A Hardware Discovery Status set to 2 (On) can be trickier to analyze, since it may occur when the monitored host is slow or if the number of devices to discover is high. Typically, the graph should display a discovery status set to 1 when the host discovery starts, and then a value at 2 that should remain for the same duration from one discovery to another, meaning that Hardware Sentry 10 and host are behaving the same way from one discovery to another.

 

The Hardware Discovery Time attribute collects the time taken to discover the hardware components on a monitored host. The Hardware Discovery Time attribute of a specific host can be customized to alert you when sudden baseline deviation occurs and therefore help you isolate the root cause of the problem faster.

mix2.PNG

 

The Power Consumption attribute reports on the wattage consumed by all the discovered components on the monitored host. This measure makes it easier to determine which of your systems consumes the most or the less energy. The Power Consumption attribute provides a solid, overall view of a host power consumption and can help you better manage energy efficiency.

 

Monitoring the discovery and availability of critical components and processes, such as CPU, memory, battery, temperature, connections, etc.., is essential to maintain systems’ performance, anticipate critical hardware failure and minimize downtime. The Report monitor can help support the effort to maintain proactive problem detection policies by constantly monitoring critical key-performance indicators; it can also become a source of significant savings in terms of time and money by providing an overall portrait of systems health and performance and by quickly pinpoint the root cause of potentially critical issues.

 

Download Hardware Sentry KM on Sentry's Website!

Share:|

Sentry Software is proud to announce the release of Hardware Sentry KM v10.0.00 for TrueSight Infrastructure Mgmt |TrueSight Operations Mgmt

Download Hardware Sentry KM now!

This version includes major new features, improvements, and fixes, such as:

Host Group Monitoring

Hardware Sentry KM v10.0.00 now offers the possibility to add a group of hosts (that share the same configuration settings: OS, protocol, credentials, etc.) to your monitoring environment .

 

You may define a group name (internal ID) as well as a set of hosts to be included in the group to be created. The Internal ID, used as the group name makes it easier to identify the hosts that are part of a group in the PATROL or TrueSight console.

 

Hardware Sentry KM will create as many hosts instances as provided hostnames/IP addresses. The devices are displayed in TrueSight as if they were single hosts, and can be clearly identified as part of group thanks to their common Internal ID added to their label between brackets.

 

New Parameters to Detect Monitoring Problems

The Report instance collects and reports on information that provides an overview of health and performance of a system. Some parameters can be set to trigger alerts when their values reach an unacceptable or abnormal level to help you quickly pinpoint a monitoring problem.

 

Here are some examples of information you can get from the Report instance:

 

Communication Protocol Monitoring

The communication protocols enabled in Hardware Sentry KM (HTTP, SNMP, WBEM, WMI, Command Lines) are now checked for self-monitoring purpose as well as to prevent false alerts.

 

Hardware Components Count

Counter-type parameters provide valuable information on the number of the components monitored on your system, such as CPUs, Enclosures, Blades, etc.

 

For example, a Count-All parameter indicating monitored components lower than 5 may indicate that system’s monitoring is likely incomplete and requires investigation.

 

Protocol Execution Rate

These parameters report on the number of successful commands executions performed on the monitored host by protocol, per minute. These parameters can be used to better understand the efficiency and/or load on the KM.

Capture.PNG

 

FQDNs to Better Identify Devices

Hardware Sentry now allows you to associate your system to Fully Qualified Domain Names (FQDNs) of specific devices in TrueSight when you define the connection settings of your host(s).

 

The FQDN designates the specific location of a device within the Domain Name System (DNS) hierarchy; it communicates the host’s position relative to the root of the DNS namespace. Using FQDNs means easier identification of the faulty devices.

 

New Hardware Connector Library

Core component of Hardware Sentry KM for PATROL and BMC Performance Manager Express for Hardware, the Hardware Connector Library consists of several hardware connectors (*.hdf files) that describe how to discover hardware components and detect failures. With more than 200 connectors, the Hardware Connectors Library enables the monitoring of almost any server (physical, virtual, and blade servers) and external device (disk arrays, fiber switches, and tape libraries) available on the market.

 

The Hardware Connectors Library is regularly updated to keep you up-to-date with the new supported platforms, improvements, and fixed issues.

Discover the Hardware Connector Library now!

Share:|

Sentry Software is proud to announce the general availability of the Pure Storage KM for TrueSight Infrastructure Mgmt|TrueSight Operations Mgmt.

km-pure-storage-01.png

This new KM leverages the Pure Storage REST API to collect all the information available about the storage system, volumes, controllers, I/O modules, ports, and hardware components and displays it into the BMC framework.

km-pure-storage-02.png

Note: To get the exhaustive list of parameters, download the Parameter Reference Database from Sentry’s Website.

An API token is required to connect to the Pure Storage system. You will therefore have to create an API token in the Purity GUI before being able to configure the KM:

km-pure-storage-03.png

 

and see your device in TrueSight:

 

km-pure-storage-04.png

From there, you will be able to perform all the common verifications to ensure that:

Download Pure Storage KM for PATROL on Sentry's Website.

Share:|

Sentry Software is pleased to announce the General Availability of NetApp Filers KM version 3.3.01.

netapp-sm 3301.jpg

 

This version includes the following improvement and fixed issue:

  • Additional information about the cluster nodes status is provided with the Status and Status Information parameters of the SEN_NAP_C_NODE application class.
  • The KM was not able to discover hardware components when the shelves serial numbers were not returned by NetApp Data ONTAP 9.

 

Download NetApp Filers KM on Sentry's Website.

Share:|

Sentry Software is happy to announce the General Availability of Monitoring Studio KM version 9.4.01.

MS4.png

This version includes new features, improvements, and fixed issues, such as:

  • Support for Java 9.
  • Support for group macros in Host monitors and for Group & Host macros in all other monitors (ex: %{SEN_HOSTNAME}).
  • Ability to connect and authenticate against a remote system with SSH and keyboard-interactive authentication.
  • Nagios Performance objects with long names now monitored properly.
  • Empty lines that contain the "\r" character (carriage return) now properly handled by Monitoring Studio on Windows systems.
  • And many more...

 

And of course your favorite monitoring features:

SystemsSoftwareProtocolsAnd many more...

Command Line

File/Folder

File System

Windows Event

Windows Performance Counter

Database Query

Nagios Plugins

Process

Windows Service

SNMP Polling

SNMP Trap

WBEM Query

Web Request

WMI Query

Dynamic Instances

Multi-Parameter Formula

String Search and Numeric Value Extraction

Text Pre-Processing

Value Mapping

 

Download Monitoring Studio KM for PATROL on Sentry's Website.

Share:|

Sentry Software is proud to announce the general availability of the Dell EMC Unity KM for TrueSight Infrastructure Mgmt | TrueSight Operations Mgmt.

 

This new KM monitors the hardware health and the performance of any Dell EMC Unity storage system that comes with the embedded SMI-S provider. All the information about CIFS servers, controllers, file systems, NFS servers, physical disks, storage pools, volumes and hardware components are regularly collected and displayed in TrueSight:

km-dell-emc-unity-01.png

 

The configuration is pretty simple: after ensuring that the embedded SMI-S provider is enabled and that a user with operator role has been created on Unisphere, you just have to create a connection to the SMI-S provider.

km-dell-emc-unity-02.png

 

And that’s it! Your storage system appears in TrueSight:

km-dell-emc-unity-03.png

To be notified through events of any critical situation that may occur on your Dell EMC Unity storage system(s), Sentry Software recommends importing predefined thresholds into TrueSight Operations Management.

km-dell-emc-unity-04.png

 

It is also a good practice to create your own dashboards in TrueSight to only focus on what matters to you (storage capacity monitoring and optimization, performance monitoring, traffic management, etc.). Several use cases have been documented to allow you to take full advantage of the Dell EMC Unity KM.

km-dell-emc-unity-05.png

And that’s not all! Our technical writers explored non-traditional authoring tools for documenting this new monitoring solution. They approached technical writing from a software development perspective, embraced the software-code workflows entirely, creating doc-as-code! Find out this brand-new documentation here.

 

Download Dell EMC Unity KM for PATROL on Sentry's Website.

Share:|

Sentry Software is proud to release 3 updated storage KMs:

 

 

In addition to improvements and fixes specific to each product, this release includes the following common and major updates:

  • The Java Settings user interface has been significantly improved and simplified

java.png

 

 

  • The performance and behavior of the Java Collection Hub have been greatly enhanced. The Java Collection Hub  is a core piece of each product allowing to perform operations that would not normally be possible on a PATROL Agent.

Learn more about our storage monitoring solutions on Sentry's Website.

Share:|

Monitoring Studio by Sentry Software is the solution to eliminate any monitoring gap in TrueSight Operations Mgmt. Designed as a "toolbox", the solution enables the monitoring of almost any technology (application, server, device, etc.) for which there is no out-of-the box monitoring solution on the market. In a few clicks and without any coding, 100% of the IT infrastructure is fully covered. The latest version of Monitoring Studio (9.4.00) includes major new or improved features, such as:

 

The new Value Map Monitor is designed to extract values from result outputs generated by other Monitors and map these values to your statuses that match your specific needs. Based on these statuses, it becomes easy to apply thresholds and have Monitoring Studio trigger PATROL standard alerts directly in your PATROL environment.

ValueMap.png

 

The Web Request Monitor has been improved to offer PATROL and TrueSight Operations Mgmt users additional capabilities for advanced HTTP properties (Credentials, HTTP headers, Request body, Variables, etc.).

WebRequests.png

 

The Database Monitor overall performance (Oracle, MS SQL, MySQL or PostgreSQL servers) has been drastically improved to reduce system resource consumption (memory and CPU) and runtime.

 

The Command Line Monitor now offers PATROL users two procedures to execute command line locally and remotely respectively. The Monitor also fully supports local command execution with option to run continuously while monitoring remote hosts.

 

And many more! Read the complete Release Notes for further details on the improvements and bug fixes included in version 9.4.00 of Monitoring Studio and download the latest version.

Share:|

Sentry Software is proud to announce that EMC XtremIO KM for PATROL is now inscribed to the long list of storage monitoring solutions that fully integrate with TrueSight Operations Mgmt!

 

emc-xtremio-km.png

This new solution leverages XtremIO Manager Server to collect the following information about your EMC XtremIO storage systems:

  • Battery Backup Units: charge, current load, real power, status, etc.
  • Clusters: available capacity, data traffic, status, etc.
  • Controllers: traffic, health status, operation rates, etc.
  • Disk Arrays Enclosures: status, severity level of current alerts
  • Physical Disks: number of bad sectors detected, status, data traffic, etc.
  • Ports: bandwidth utilization, errors, link failures, synchronization losses, status, response time, data traffic, etc.
  • Power Supply Units: input power, level of current alerts, status, power failures, etc.
  • Volumes: capacity, data traffic, response time, time since last activity, etc.
  • XtremIO Management Servers: processor utilization, managed clusters, memory usage, collection status.
  • X-Bricks: severity level of current alerts, status.

km-emc-xtremIO-2-FullScreen.png

 

Wait no more! Download the solution on Sentry’s Website.

Filter Blog

By date:
By tag: