EYE v7 brochure

12
INTRODUCING EYE V7 EYE UNIX System Analyser Organisational growth demands smarter systems - without any compromise in the service of existing mission-critical systems. With the EYE UNIX tool-set high- quality support levels can now be achieved with great consistency in UNIX enterprise environments. Intelligent analysis features make it possible to pro-actively monitor and manage system availability, performance, security and compliance, all in accordance to best practice industry standards. Interactive system reports provide clear and understandable views of problems, and dynamic features such as event sign-off ensure that our customers can remain focused on critical operational issues. The EYE UNIX tool-set is continually evolved to deliver a no-compromise business systemisation solution, in our strive to pro-actively ensure the highest levels of service excellence and UNIX systems continuity in the industry. IBM Services

Transcript of EYE v7 brochure

Page 1: EYE v7 brochure

INTRODUCING EYE V7EYE UNIX System Analyser

Organisational growth demands smarter systems - without any compromise in the service of existing mission-critical systems.

With the EYE UNIX tool-set high-quality support levels can now be achieved with great consistency in UNIX enterprise environments.

Intelligent analysis features make it possible to pro-actively monitor and manage system availability, performance, security and compliance, all in accordance to best practice industry standards.

Interactive system reports provide clear and understandable views of problems, and dynamic features such as event sign-off ensure that our customers can remain focused on critical operational issues.

The EYE UNIX tool-set is continually evolved to deliver a no-compromise business systemisation solution, in our strive to pro-actively ensure the highest levels of service excellence and UNIX systems continuity in the industry.

Application Testing Resourcing

Application Performance Management

Recruitment Solutions

Application Optimisation Public Sector Advisory Services

Application Management Project & PortfolioManagement

Academy Oracle Services

Cloud Services Synergy

Europe Technology Consulting

Human Resources Outsourcing

Applications SAP Services

Contact CentreServices

Specialised Financial Services

Holdings

Business Unit Security Solutions

Business ProcessOutsourcing

Security & Building

Information Security V 55

Microsoft Services

Facilities Management Western Cape

Network Solutions Managed Services

IBM Services

Infrastructure Technologies

Legal ProcessOutsourcing

Project & PortfolioManagement

Specialised FinancialServices

Recruitment Solutions

Resourcing

IT-as-aservice

Network SolutionsPublic Sector Advisory Services

Page 2: EYE v7 brochure

AVAILABILITY As a pro-active system monitoring tool, iHEALTH provides the means to identify systems with potential availability issues before they lead to an outage.

Alerts are colour coded and ranked to highlight issues that require immediate attention.

PERFORMANCE iHEALTH makes use of a wide spectrum of indicators to identify performance issues.

It is capable of building a history from SAR and other metrics, and can even identify and flag workload spikes and trend changes.

iHEALTH will automatically generate graphs of metrics that exceed thresholds, including that of the overall managed system and its shared processor pools.

COMPLIANCE & SECURITY iHEALTH provides software and configuration compliance checks in accordance to IBM and other industry leading best-practice standards, and security checks to complement those inherent in AIX.

Compliance checks can be configured for specific days, and alerts are accompanied by informational context and tips to clarify findings and recommendations.

IHEALTH SYSTEM ANALYSER OVERVIEW

The iHEALTH system analysis tool is able to identify a multitude of availability, performance, security, configuration and compliance issues within a UNIX enterprise environment.

A wide spectrum of health checks that include pro-active fault detection and configuration validation ensure that potential issues do not go by unnoticed as is commonly the case in large environments.

Our software includes support for current and emerging technologies such as VIO, NPIV and PowerHA, and IBM AIX releases as far back as v4.3. Support has also been introduced for Linux systems, with specific attention to log analysis and kernel ring buffer checks.

Additional features such as discrete event management, error reduction and an event message catalogue, issues can be relayed concisely, with sufficient context to suit varying operational skill levels.

The iHEALTH tool is constantly revised and updated according to customer needs, and is renowned for its ability to provide a rapid analysis of the operational state of customer UNIX systems.

Page 3: EYE v7 brochure

SIGN-OFF Findings are internally stored as discrete events in a database, allowing users to manage issues as in-hand, unresolved or resolved.

Resolving an event will immediately update the overall risk rating of the system in question, allowing customers to focus on unresolved issues.

INFORMATION AT YOUR FINGER TIPS A host of practical information is automatically generated and made available by the EYE system.

Our database makes use of de-duplication, which means that unchanged data objects are only stored once.

We understand that customers have unique requirements, and are able to integrate our system with NMON and other tools in order to provide a tailor-made solution.

EVOLUTIONARY Our software is actively maintained and evolved.

As a value-add to our customers, we are very open to feedback and feature requests.

Watch this space. Future versions of EYE could perform corrective actions by itself, allow sign-off of multiple associated events at once, and automatically refresh data for hosts based on observations.

EYE USER EXPERIENCEThe EYE tool-set allows consultants to cope with the strenuous demands of day-to-day enterprise support by freeing up time taken up to perform health checks, configuration and other system reporting functions.

• Our tools allow for automatic LPAR discovery and systems are automatically grouped by type and configuration, and even by user defined criteria such as location or application name.

• Issues are ranked by severity within all reports and new and high priority alerts are highlighted for attention.

• Consultants are able to manage and resolve individual events with a new event sign-off mechanism.

• Alerts can be mailed to support teams, using host and support contact information that can be captured for systems.

• Report sign-off can be used to track health check sign-off progress, to allow for operational and support team audits.

• Health check reports are detailed and contain performance graphs

• On demand reports can be generated for LPAR counts (even by operating system level), event occurrences as well as sign-off progress.

• LPAR, managed system and processor pool configuration tables are automatically generated.

• A host of useful information is available, including the system build date, cluster status and other helpful information.

Page 4: EYE v7 brochure

IHEALTH SYSTEM ANALYSIS

iHEALTH offers a host of features geared to improve health check and support productivity:

• Reports are ranked by severity level and issue count.

• Reports can be grouped by any user defined criteria, for example by site or application.

• A top level summary provides a quick glance of the most severe issues by category.

• Dynamic content reports displays events, with filtering controls for context specific information and advice.

• Sign-off system makes it possible to track remedial activities by support staff, and can be used for auditing purposes.

• Individual event sign-off makes it possible to granularly manage and resolve events.

• Group views with sign-off progress, sorted by severity.

• LPAR and managed system configuration tables enables automated system and LPAR configuration reporting.

• Managed system profile configuration views are provided, complete with cumulative (SAR) utilisation graphs.

• Identify and highlight new events for certain event types.

• Caters for user defined and site-specific health checks.

Page 5: EYE v7 brochure

CENTRAL DATA MANAGEMENT Manage all EYE data collection activities using a centralised approach.

Maintain a data repository on a central location, and schedule daily data collection and retrieval operations to aid rapid system analysis.

With this tool, there is simply no need to manually perform system data collection.

SYSTEM ADMINISTRATION It can be extremely tiring and frustrating to repeat an activity on multiple UNIX systems, as is often required.

iDIST however provides a powerful mechanism to interact with multiple systems in parallel.

Need a list of all users or execute an installation script on multiple systems? No problem!

EYE ADMINISTRATION All data collection activities (collection, retrieval, expiration) can be managed through this tool.

You can even use it to install or update the EYE data collector on any number of target systems.

IDIST DISTRIBUTED SYSTEMS MANAGEMENT

iDIST is central to the EYE system and manages parallel information or data collection.

This tool has the ability to securely initiate remote connections in parallel, and efficiently gather customer data for remote analysis.

It is able to target hosts, logical groups or even managed systems, and control the maximum number of concurrent connections to prevent strain on the network.

It can also be used to distribute files to/from systems or schedule user-specified command sequences or scripts in parallel, thereby reducing the maintenance effort that is typical within large corporate environments.

To make life even easier, it also provides functions to easily maintain and update the EYE data collector agent.

Page 6: EYE v7 brochure

SELECTIVE DATA REFRESHING Built-in profiles make it possible to selectively refresh data, and cater for very specific or unique information such as those used in performance, health, security and audit checks.

VALUABLE DATA REPOSITORY Our tools make it possible to identify differences in output from different times, find data objects that match a given pattern, produce historic health checks and automatically generate system configuration documentation.

REMOTE SUPPORT Snap-shots from this tool can be analysed by iHEALTH or manually by our by our experienced consultants - making remote support a breeze!

ICOL INFORMATION GATHERING

iCOL is a full featured data gathering tool with capabilities that surpasses most standard system snap-shot tools.

With support for AIX, Linux, VIO, HMC and other types of systems, this tool provides all that is necessary for remote analysis.

Predefined data profiles make it possible to target collection of just those aspects of a system that require frequent updating.

It also provides advanced features such as delta refreshes, automatic data ageing and is user customisable.

Install the data collector on a target system via iDIST or collect data without requiring any agent software installation at all.

The tool takes a safety first approach when gathering information from client systems by demoting itself to a non-privileged user where possible and enforcing strict resource usage limits.

Page 7: EYE v7 brochure

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

FACTS & FEATURES

IHEALTH

Model-specific hardware, environmental and sensor checks. yes

Disk space and i-node utilisation. yes

Detection of outages and abnormally high system load. yes

Error-reporting, log analysis and log-size checks. yes

Sense data analysis. yes

Process state analysis. yes

Security violations and compliance checks. yes

System and user resource limits checks. yes

PowerHA and cluster related checks. yes

Availability of critical system services and processes. yes

Performance checks - CPU, memory (VMM), network and I/O. yes

Storage and LVM, redundancy and path checks. yes

Support and analysis specific to IBM, EMC & Hitachi storage subsystems. yes

Networking - ether-channel, adapter, interface and protocol statistic checks. yes

Operating system software and microcode fix-level checks. yes

HMC - serviceable events, configuration and profile verification. yes

VIO - storage and network mapping verification. yes

System configuration verification and notification of CPU/memory configuration changes. yes

Software and licensed program products (LPP) verification checks. yes

Support for external (user-defined) modules and checks. yes

Managed system activity logs. yes

Detect if systems are operating in CPU compatibility mode. yes

Page 8: EYE v7 brochure

FACTS & FEATURES

IHEALTH

Model-specific hardware & firmware checks. yes

Disk space and i-node utilisation. yes

Detection of outages and network connectivity issues. yes

Log analysis and kernel ring buffer checks. yes

Free space checks. yes

Process state analysis. yes

Memory & swap space utilization. yes

Storage multipathing checks. yes

Network bonding and error checks. yes

Availability of critical system processes. yes

User account duplication. yes

Host names (RFC952/1123 compliance) yes

Linux client VSCSI mappings verification checks. yes

System configuration configuration change detection. yes

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

Page 9: EYE v7 brochure

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

FACTS & FIGURES

REPORTS

User sign-off with progress indicator and historic activities. yes

Sign-off of individual events. yes

Dashboard with sign-off by severity. yes

Action summary report by severity / group / user / host. yes

Event Report ranked by severity, highlighting affected hosts. yes

Managed system daily and long-term CPU usage. yes

Problem-specific time-slot performance graphs. yes

Contextual information, tips, and warnings. yes

Colour-coded highlighting of critical or high priority alerts. yes

Report verbosity filters. yes

LPAR configuration quick reference table. yes

Managed system configuration quick reference table. yes

Detailed managed system reports, including LPAR profile configuration. yes

Sorting of systems by alert priority, name or sign-off status. yes

Arrange reports by any number of user-defined logical groups. yes

Configuration information in CSV or PDF format. yes

Page 10: EYE v7 brochure

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

FACTS & FIGURES

IDIST

SSH encrypted client/server communication. yes

Target hosts, user-defined groups, managed systems in any combination. yes

Control maximum number of concurrent sessions. yes

User configurable timeouts. yes

Pre-defined data collection profiles provides control over what data to collect. yes

Refresh operations allows delta snap-shots to be merged into existing local data-files (NEW). yes

Ability to perform data collection on systems that do not have any installed EYE data collector agent. yes

Execute command sequences and scripts on remote systems. yes

Manage and maintain (install / update) EYE data collector agents on remote systems. yes

Distribute files to/from remote systems. yes

List LPAR client names by group / location / application / managed system yes

List VIO parent systems for client LPAR/s yes

Page 11: EYE v7 brochure

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

FACTS & FIGURES

ICOL

Supports data collection on AIX, Linux, HMC, pSeries VIO and other systems. yes

Built-in safety measures - demotes privileges where possible, enforces resource usage limits. yes

Support for data object versioning (ageing) - collect multiple versions of the same data. yes

Pre-defined data collection profiles provides control over what data to collect. yes

Support for user-defined collection profiles. yes

Data collection without any software installation (via streaming encrypted network connection). yes

Installed as a regular AIX LPP software bundle (manually or through IDIST). yes

Activated only on-demand (without any continuously running software)? yes

User-configurable collection CPU priority. yes

Page 12: EYE v7 brochure

FACTS & FIGURES

OTHER TOOLS

Automated LPAR discovery tool iscout

Pattern and content scanning of collected data igrep

Comparison of data from different LPARs and/or collection times idiff

PDF documentation generation idoc

The EYE software is the intellectual property of EOH. It is copyrighted, and we reserve all rights relating to the software.

EOH IBM Services T/+27 (11) 262 8660 F/+27 86 600 6049 http://eye.glacierconsulting.net

SYSTEM REQUIREMENTS & RECOMMENDATIONS

SOFTWARE

Analyser & User front-end AIX / Linux

Data collector AIX / Linux / Solaris / OSX / OTHERS

RECOMMENDED CONFIGURATION (ANALYSER)

CPU 1 x POWER7

Memory 4 - 8GB of RAM

Storage 20-100GB (for data repository)

DATA COLLECTOR RECOMMENDATIONS

Operating system (AIX) AIX v4.3 or higher

Operating system (Linux) SLES / RHEL / OTHERS

Note: installation packages for Linux & OTHER operating systems are generated on request depending on the versions installed and are dependent on site specific requirements