Ýêçàìåí Tivoli 594 - IBM Tivoli Enterprise Console V3.9 Implementation

Ðàçäåëû ýêçàìåíà: 

Ðàçäåë 1 - Tivoli Architecture and Databases

  • Given a customer without an understanding of the Tivoli Enterprise Console architecture, describe how TEC works so that the customer can identify the various components of TEC and diagram how they interact.

With emphasis on performing the following steps:

    • Describe the TEC architecture.
    • Explain how adapters collect information.
    • Explain how adapters deliver events.
    • Describe the architecture of the TEC server and the tec_server process.
    • Explain the tec_reception process.
    • Explain the tec_rule process.
    • Explain the tec_dispatch process.
    • Explain the tec_ui_server process.
    • Explain the tec_task process.
    • Explain the tec_gateway process.
    • Explain RIM layer.
    • Describe the JAVA and Web event consoles.
    • Explain State Based Correlation.
  • Given database administrator (DBA) access to an RDBMS, TEC V3.9 media, appropriate Tivoli Administrator privileges, and an installed managed node, install TEC V3.9 server functionality validated by the appropriate commands showing that the Tivoli Enterprise Console server is running.

With emphasis on performing the following steps:

    • Create and verify RDBMS prerequisites.
    • Get and mount the TEC V3.9 CD-ROM.
    • Understand the implementation order of all TEC components.
    • Install the TEC V3.9 server product on one managed node by specifying RIM parameters.
    • Verify RIM setup.
    • Install the TEC V3.9 console. With the Java console, this can be a managed node or a non-Tivoli node (done manually).
    • Run the Installation Wizard.
    • Start the Server.
  • Given Tivoli administrator privileges, verify the ability to connect to the TEC RDBMS server using the TEC RIM object, so the event server successfully connects to the database.

With emphasis on performing the following steps:

    • Run the Tivoli environment setup scripts.
    • Verify existence of RIM object.
    • Confirm ability to connect.
  • Given the need to integrate IBM Tivoli Data Warehouse (TDW) with TEC, configure TEC/TDW integration.

With emphasis on performing the following steps:

    • Install ETL1.
    • Create the ODBC connection.
    • Install and schedule the ETL.
    • Extend the database.
    • Enable the ETL extraction.
  • Given an understanding of the proposed TEC architecture, determine recommended installation methods in order to obtain a functional TEC installation in a TME environment.

With emphasis on performing the following steps:

    • Determine method of installation (Installation Wizard, standard install).
    • Install TMR.
    • Install TEC .
    • Install managed node, gateway, and endpoints.

Ðàçäåë 2 - Tivoli Events, Event Groups, and Event Consoles

  • Given an event group name and a set of filters, create an event group and filters so that the appropriate events are displayed in the view.

With emphasis on performing the following steps:

    • Create an event group.
    • Add filters to an event group.
    • Verify filters exist in an event group.
    • Verify creation of default event groups and console(s).
    • Verify the additional filters that can be used in TEC V3.9.
  • Given a valid Tivoli administrator account with senior privileges, a defined event group, a Tivoli event console, Tivoli Web Console, and a set of roles to be given on that group to that console, assign the event group with those roles so that event console or Web Console, validated by the administrator of that console, will be able to appropriately access events in that event group.

With emphasis on performing the following steps:

    • Assign event groups and roles.
    • Assign event group filters.
    • Assign TEC console administrator role.
    • Create TEC operator.
    • Set configuration options for the Java and Web console.
  • Given an installed and functional TEC and NetView environment, configure the integration between NetView and TEC so that network status can be monitored from the TEC Console.

With emphasis on performing the following steps:

    • Select the appropriate NetView rule.
    • Select the appropriate TEC destination.
    • Configure appropriate TEC filters.
    • Import appropriate NetView event rules and classes.
    • Configure TEC to launch NetView features (Submap Explorer, Object Properties, Diagnostics).
    • Install NetView Web Console.

Ðàçäåë 3 - Tivoli Adapter Implementation

  • Given that ACF is installed on all gateway machines, deploy a Tivoli adapter to the target and verify that the configuration files exist and the adapter is running on the target.

With emphasis on performing the following steps:

    • Create and configure Profile Managers and Profiles.
    • Open ACF Profile.
    • Set before actions.
    • Set after actions, run gencds and restart adapter.
    • Customize adapter to use custom format files.
    • Set target location, user and group ownership and configuration file name.
    • Set target machine and push Profile.
  • Given TEC V3.9 media, appropriate privileges, a development directory, a list of install targets and a TEC server TCP/IP name, configure and deploy a non-TME event adapter and validate the successful reception of events based on test conditions on one of the install targets.

With emphasis on performing the following steps:

    • Install the non-TME adapter.
    • Modify the appropriate configuration files.
    • Package/create the adapter install image.
    • Deploy the adapter to the destination machines.
    • Generate an event condition and test for reception.
  • Given adapter information, appropriate privileges, a distribution list, adapter documentation, and knowledge of modifications to be made, modify adapter configurations validated by successful updates to adapter functions.

With emphasis on performing the following steps:

    • Identify the adapter information.
    • Identify which configuration files need to be changed.
    • Update configuration information.
    • Update and deploy the adapter profile.
    • Start and stop adapter(s).
    • Test adapter modifications.
  • Given the name of an adapter configuration file, appropriate access to the adapter machine, and a list of attribute/value pairs on which to filter, configure filtering for a TEC adapter, and test the new filtering configuration by confirming that an event with attributes to filter is either forwarded or discarded.

With emphasis on performing the following steps:

    • Shut down the adapter.
    • Utilize regular expressions for filtering.
    • Add/edit filter clauses.
    • Employ other configuration parameters to further control event flow.
    • Start the TEC adapter.
  • Given the TEC media and a TME, install, configure, and start adapter(s) such as HPOV and SNMP so that the configuration files exist and the adapter is running on the target.

With emphasis on performing the following steps:

    • Install the adapter from the Tivoli Desktop.
    • Edit the .conf file to activate filtering, if needed.
    • Verify the adapter daemon is running.
    • Edit the necessary files to enable new traps.
  • Given the name, process identifier, location of an installed TEC event adapter, appropriate privileges, adapter documentation, and installed TEC server functionality, test the ability of the specified adapter to detect, format, and send events by verifying whether a test condition results in the matching test event being received.

With emphasis on performing the following steps:

    • Make sure the adapter is running.
    • Make sure the TEC server is running.
    • Identify the particular event class to use as testing item for this adapter. (e.g., su failure for logfile adapter).
    • Create a raw event or condition on the node that has the adapter running.
    • Test reception of the event.
  • Given open ports on the firewall, access to TEC media, appropriate privileges, a development directory, a remote node, an adapter name, and privileged access to the remote node, deploy the non-TME version of the adapter on the remote node, validated by generation of a test condition resulting in successful reception of the event on the TEC server.

With emphasis on performing the following steps:

    • Determine the port used to communicate with the node.
    • Update the adapter configuration files.
    • Create and deploy the adapter image to the desired external node.
    • Generate an event and verify reception condition (depending on type of adapter) on the external node.
  • Given a TEC gateway, test the ability of the TEC gateway to process duplicate events using the State Based Correlation Engine so that duplicate events are dropped.

With emphasis on performing the following steps:

    • Verify TEC gateway SBC is running.
    • Verify appropriate gateway and SBC configuration file settings.
    • Use the State Based Correlation Engine to filter duplicate events.
    • Manage tec_gateway throttling.
  • Given that the Tivoli Framework is installed and policy regions exist, create Profile Managers and assign subscribers to match customer requirements.

With emphasis on performing the following steps:

    • Create profile managers hierarchy.
    • Create profiles within the profile managers.
    • Subscribe managed resources to profile managers.
    • Set distribution options.
    • Set dataless or database profile manager functions.
  • Given the TEC V3.9 media, install the EIF toolkit and necessary libraries so that custom adapters can be created.

With emphasis on performing the following steps:

    • Extract the necessary files for adapter creation.
    • Become familiar with the APIs involved in building a custom adapter.

Ðàçäåë 4 - Tivoli Tasks, Jobs, and Scripts

  • Given a running event console and event conditions under which a given list of tasks should be run, create an automated task so that the tasks will be run upon reception of an event meeting the conditions.

With emphasis on performing the following steps:

    • Start the event console and open an event group.
    • Configure automated task(s).
    • Send test event which matches input conditions.
  • Given a policy on which events to keep or clear from the database and the maximum number of events to clear per interval, create a scheduled job to enforce the given policy.

With emphasis on performing the following steps:

    • Estimate the event load.
    • Verify and adjust the TEC configuration to match policy.
    • Restart the TEC server.
    • Create a task to clean the database, using the Clean Database task in the TEC tasks library as a template.
    • Create a job and schedule it for the determined maintenance interval.
    • Confirm the database is being cleared according to policy.
  • Given a routine task or job and a group of endpoints, create a Tivoli task or job so that it can be executed against the endpoints or subscribers from a single location without errors.

With emphasis on performing the following steps:

    • Create the task library.
    • Create the task to automate.
    • Decide what platform the task will run against.
    • Supply the appropriate authentication roles, user IDs, group IDs, and source host path to the script.
    • Create the job.
    • Execute the task or job.

Ðàçäåë 5 - Rulebases

  • Given the host name of a destination TEC server and a local TEC server, set up event forwarding so that certain events are forwarded to the destination TEC server.

With emphasis on performing the following steps:

    • Write a rule to forward events.
    • Test the rule.
  • Given a TMR without TEC that is connected to one or more TMRs with TEC, configure the TMR without TEC to access the TEC resources of the other TMRs.

With emphasis on performing the following steps:

    • Exchange necessary resources.
    • Update necessary resources.
    • Send events from the TMR with no TEC to the TMR with TEC.
  • Given a customer business problem, and appropriate privileges, write rules and classes so that they successfully address and solve the customer business problem.

With emphasis on performing the following steps:

    • Break down business problem into events and responses.
    • Determine relationships/common attributes of different events.
    • Determine unique/specialized event information.
    • Design event class definitions and event class hierarchy.
    • Modify and activate event class definitions.
    • Subdivide/break up responses to lowest common form (e.g. if event A; do event B).
    • Differentiate responses into if/then and causal/cancel responses and write these in pseudo-code format.
    • Create a rule base.
    • Write rules to satisfy these responses.
    • Enable rules.
    • Test event class and rule executions.
  • Given class and rules files, import the files into a rule base and activate it so that the rule base uses the new classes and rules.

With emphasis on performing the following steps:

    • Create a new rule base if needed.
    • Determine the order for class and rules files.
    • Import BAROC files in order.
    • Import rule files.
    • Import rule files into the rule base target.
    • Compile the rule base.
    • Load the rule base.
    • Stop and restart the TEC server.
    • Test new classes and rules by sending events.
  • Given the class information to be modified, a rule base, and appropriate Tivoli privileges, modify the appropriate BAROC event class definition file, activate the changes, and validate by testing reception of a posted event with the new class information.

With emphasis on performing the following steps:

    • Update a BAROC file.
    • Add that BAROC file to the rules base.
    • Compile and load that rules base.
    • Send a test event.
    • Verify the event was received.
  • Given a specification of what a rule base should do and a report of what it is really doing, debug the rules so that the rule base matches the specification.

With emphasis on performing the following steps:

    • Identify events required to reproduce the problem.
    • Turn on rule tracing around necessary rule(s).
    • Reproduce the problem by sending events.
    • Turn off rule tracing around necessary rule(s).
    • Analyze the Trace Log output.
    • Correct the rule base.
    • Verify the rule base modifications correct the problem by sending the same problem events.
  • Given a set of event relationships, write correlation rules to match and process those events.

With emphasis on performing the following steps:

    • Write a rule using the appropriate predicates.
    • Distinguish between cause effect and related events using appropropriate rule predicates.
  • Given the creation of a new prolog predicate or fact files, determine how to make this available to the TEC server.

With emphasis on performing the following steps:

    • Configure the environment variables in the system to ID the prolog compiler.
    • Load and activate as required.

Ðàçäåë 6 - Troubleshooting

  • Given appropriate privileges, a valid administrator's event console name, and event information to be modified, view and modify events using the appropriate commands.

With emphasis on performing the following steps:

    • Use appropriate CLI to view desired event(s).
    • Modify appropriate event(s).
    • View modified events.
  • Given administrator privileges and desired level of tracing, enable RIM and OSERV tracing so that corrective action can be taken, RIM connections can be established, and the OSERV and other Tivoli components can be traced.

With emphasis on performing the following steps:

    • Decide the level of tracing.
    • Configure the environment with Tivoli environment variables.
    • Run the appropriate commands and verify output.
    • Configure RIM tracing and determine the level of tracing required.
    • Configure OSERV tracing and determine the level of tracing required.
  • Given a running TEC server, turn rule tracing on or off for the current rule base so that a new rule trace file is created and updated with trace information when tracing is turned on and so that no trace information is written when tracing is turned off.

With emphasis on performing the following steps:

    • Look up the trace file location.
    • Identify the current rule base.
    • Compile rule base with tracing.
    • Load the rule base.
    • Reconfigure TEC with trace file.
  • Given a particular adapter, appropriate Tivoli privileges, and the name and location of the diagnostic configuration file, start (stop) the event adapter and verify that diagnostic output is being written to the appropriate log file.

With emphasis on performing the following steps:

    • Identify and modify the appropriate adapter configuration file.
    • Enable the updated configuration file on all relevant targets.
    • Turn a particular adapter off and on.

Ïîäãîòîâêà ê ýêçàìåíó: 

Êóðñû ñ ïðåïîäàâàòåëåì:

Course title: IBM Tivoli Enterprise Console V3.9
Course duration: 3-5 days depending on geography
Course number: Course numbers vary depending on the education delivery arm used in each geography. Please refer to the Web site below to find the appropriate course number according to the education delivery vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for IBM PartnerWorld You-Pass, We-Pay.
Abstract: This class is the first level of hands-on training offered for IBM Tivoli Enterprise Console 3.9 and IBM Tivoli NetView 7.1.4. Topics include: Capabilities and benefits of the products, Architecture and terminology, Installation and configuration information, Integration of ITEC and NetView, Events, event adapters, event consoles, and event servers, Rule creation and maintenance, Troubleshooting tips and tricks, Tivoli Enterprise Data Warehouse. The information covered in this course will provide you with the opportunity to master several key skills needed to perform day-to-day administrative functions of the Tivoli Enterprise Console 3.9 environment.

For information on pricing, scheduling and course registration: Course names and/or course numbers vary depending on the education delivery arm used in each geography. Please refer to the Tivoli software education Web site to find the appropriate course and education delivery vendor for each geography. 

Ëèòåðàòóðà: 

Publication title: Redbook - TEC Implementation Examples
Publication order number: SG24-5216-00
Abstract: This redbook will help you install, tailor and configure Tivoli Enterprise Console (TEC) software and also show how to customize the Tivoli Management Environment applications such as tasks, monitoring and NetView showing how these applications can integrate with TEC. By using a real-life customer example we discuss the planning stages through to implementation showing practical examples based on a set of specific customer requirements. This redbook will be especially helpful to those who need to implement the Tivoli Enterprise Console, and develop specific TEC rules for event correlation in order to provide an event management solution.

To order publication access IBM Publications Center on the Web or by phone: (note publication order number): 

IBM Publications Center
(http://www.ibm.com/shop/publications/order

or call IBM Direct Publications: 1-800-879-2755 (US) 1-800-426-4968 (Canada)

 or from any non-IBM bookstore

Ñàìîñòîÿòåëüíàÿ ïîäãîòîâêà:

Self Study: IBM Tivoli Management Framework V4.1.1 Product Information and Related Links
Order number: n/a
Abstract: Detailed information and documentation about IBM Tivoli Management Framework V4.1.1 can be found at the Web site listed below. The documents contained on this Webpage are the Read This First, Release Notes, Planning for Deployment Guide, Enterprise Installation Guide, User's Guide, Firewall Security Toolbox User's Guide, Reference Manual, and the Maintenance and Troubleshooting Guide. 

IBM Tivoli Management Framework V4.1.1
http://publib.boulder.ibm.com/tividd/td/ManagementFramework4.1.1.html 

Self Study: IBM Tivoli Enterprise Console V3.9 Product Information and Related Links
Order number: n/a
Abstract: Detailed information and documentation about IBM Tivoli Enterprise Console V3.9 can be found at the Web site listed below. The documents contained on this Webpage are the Release Notes, Installation Guide, User's Guide, Adapters Guide, Rule Developers Guide, Event Integration Facility Reference, Command and Task Reference, Rule Set Reference and Warehouse Enablement Pack: Implementation Guide. Reading these documents in addition to hands-on experience and skills with the product will help prepare a candidate for certification testing. 

IBM Tivoli Enterprise Console V3.9
http://publib.boulder.ibm.com/tividd/td/EnterpriseConsole3.9.html

 Ïðàêòè÷åñêèé òåñò

 

Ïðèìå÷àíèå: Ýòîò òåñò ðàçðàáîòàí ñ öåëüþ äàòü êàíäèäàòó ïðåäñòàâëåíèå î ñîäåðæàíèè è ôîðìàòå âîïðîñîâ ñåðòèôèêàöèîííîãî ýêçàìåíà. Äàííûé òåñò íå ÿâëÿåòñÿ îöåíî÷íûì òåñòîì. Âûïîëíåíèå åãî íå ãàðàíòèðóåò âûïîëíåíèå ñåðòèôèêàöèîííîãî òåñòà.  

1.       Which process coordinates all Event Server processes?

A.      tec_rule

B.      tec_server

C.      tec_dispatch

D.      tec_reception

2.       What does the wgetrim tec command display?

A.      the usage statement

B.      the TEC RIM information

C.      the status of the Event Server

D.      the currently loaded rule base

3.       To what does the acronym ETL refer when integrating Tivoli Data Warehouse with TEC V3.9?

A.      Expand Then Load

B.      Extract Transform and Load

C.      Extraction Translation Loader

D.      Enterprise Transform Loader

4.       An event group contains two filters, filter_A and filter_B. Which events belong in the event group?

A.      all events

B.      events that match criteria in either filter_A or filter_B

C.      events that match criteria in both filter_A and filter_B

D.      events that do not match criteria in both filter_A and filter_B

5.       A user with a senior role within the TMR is attempting to close events within a given event group. The user receives an authorization failure. This authorization failure is most likely the result of the user not having which role on the specific event group?

A.      admin

B.      senior

C.      RIM_view

D.      RIM_update

6.       How can a customer verify if a logfile adapter installed on one of the Sun Solaris servers has captured a particular syslogd-based log message?

A.      add the log message to /etc/syslog.conf and restart the adapter

B.      check if the message satisfies the syntax in the tecad_logfile.fmt file

C.      check if the message satisfies the syntax in the tecad_logfile.cds file

D.      log the appropriate message to syslogd while the adapter is in debug mode

7.       What is the documented method for stopping the HP OpenView event adapter?

A.      run init.tecad_hpov stop

B.      distribute a blank adapter profile

C.      shut down the HP OpenView NMS

D.      run $OVHOME/bin/ovstop tecad_hpov

8.       In which programming language are the State Based Correlation Rules written?

A.      C

B.      XML

C.      PERL

D.      PROLOG

9.       An administrator writes State Based Correlation Engine rules to filter out duplicate events. What is the correct method for testing whether the State Based Correlation Engine is properly filtering the events?

A.      edit the ed_config file and set FilterLog=TRUE

B.      execute the wtdumprl command

C.      execute the wlsdump command

D.      add the dup_detect facet to the baroc file that defines the class

10.   Which TEC task is used to send information about the TEC event to an administrator?

A.      Send_Email

B.      Send_Notification_Email

C.      Send_Administrator_Alert

D.      Send_Administrator_Email

11.   Why is the wtdbclear binary preferred over the wtdbclear.pl Perl script?

A.      The wtdbclear.pl script can only be run from the Event Server.

B.      The wtdbclear binary accesses the new database stored procedures to improve rate of database clearing.

C.      The wtdbclear.pl script only clears the reception log.

D.      The wtdbclear binary provides the ability to trace the command using the -D flag.

12.   When executing a task that is proven to work against an endpoint, it continues to fail regardless of the time out value. What should be checked?

A.      make sure the endpoint is alive

B.      make sure the endpoint responds to wping

C.      make sure the endpoint is configured to allow task execution

D.      make sure the endpoint is in the same policy region as the task being run against it

13.   An administrator has two functioning TEC Servers in separate TMRs: one primary and one secondary. When sending events from the primary to the secondary, TEC events do not show up. Which two options should be checked? (Choose two.)

A.      TestMode

B.      DebugMode

C.      LogSources

D.      UnmatchedLog

E.       ServerLocation

14.   Which two BAROC event class definition files are imported into the rulebase automatically when creating a new rulebase with the wrb -crtrb command? (Choose two.)

A.      tec.baroc

B.      root.baroc

C.      eif.baroc

D.      ui_server.baroc

E.       tecad_logfile.baroc

15.   What is the expected trace line output indicating that an all_instances predicate has found no events matching the required conditions?

A.      fail all_instances

B.      end all_instances

C.      exit all_instances

D.      stop all_instances

16.   How is a fact file loaded?

A.      setting the BIM_PROLOG_DIR environment variable

B.      using the assert predicate in a rule to load the .pro file

C.      using the consult predicate in a rule to load the .wic file

D.      using the open and read predicates in a rule to read in the .pro source file

17.   What is the procedure to enable trace2 tracing on the tec_master process?

A.      Issue the trace2 command wtrace tec_master.

B.      Edit the .tec_config file in $BINDIR/TME/TEC and change the trace level from error to trace2 under the tec_master process and then stop and restart TEC.

C.      Edit the .tec_diag_config file in $BINDIR/TME/TEC and change the trace level from error to trace2 under the tec_master process and then stop and restart TEC.

D.      Edit the .tec_diag_config file in $BINDIR/TME/TEC and change the trace level from error to trace2 under the tec_master process. The TEC Server does not need to be recycled.

18.   How is RIM tracing stopped?

A.      kill all the RIM processes that are running

B.      issue the command wrimtrace "TRACE_OFF"

C.      issue the command wrimtrace tec "TRACE_OFF"

D.      issue the command wrimtrace tec "STOP_TRACING"

19.   What is the default location for the rule trace output file?

A.      /tmp/rules.out

B.      /tmp/trace.rules

C.      /tmp/rules.trace

D.      $DBDIR/default.rb/rules.trace

20.   On a UNIX system, which file is modified to create Logfile Adapter trace output?

A.      tecad_logfile.err

B.      tecad_logfile.fmt

C.      tecad_logfile.cds

D.      tecad_logfile.config

Answer Key:

5.      B

6.      B

7.      B

8.      B

9.      A

10.  D

11.  D

12.  B

13.  B

14.  A

15.  B

16.  A

17.  AE

18.  AB

19.  A

20.  C

21.  C

22.  C

23.  C

24.  A


Ñòðàíèöà ñàéòà http://185.71.96.61
Îðèãèíàë íàõîäèòñÿ ïî àäðåñó http://185.71.96.61/home.asp?artId=5361