Improve company productivity with a Business Account.Sign Up

x
?
Solved

Anyway for Tivoli to monitor when there's MSCS (MS Clustering ) failover occuring

Posted on 2013-01-01
5
Medium Priority
?
739 Views
Last Modified: 2013-04-04
I noticed that when MSCS failover to its standby cluster member,
ping only timed out for 1 sec (just like MS NLB).

However, sometimes when active / primary member fails over
to the standby node, the active/primary node may not crash nor
reboot.

So is there certain MSCS related services / processs being stopped
on the primary node & then being started up on the standby node?

If there is, let me know so that we can use Tivoli to monitor.

Tivoli monitoring for ping timeout is not feasible as my client's
Tivoli currently will only alert if there's ping timeout of more
than 5 mins
0
Comment
Question by:sunhux
  • 2
  • 2
4 Comments
 
LVL 13

Accepted Solution

by:
Yagya Shree earned 1500 total points
ID: 38745630
Hi,

Please have a look into below links:

What to expect from the IBM Tivoli Monitoring infrastructure in a clustered environment
http://pic.dhe.ibm.com/infocenter/tivihelp/v15r1/index.jsp?topic=%2Fcom.ibm.itm.doc_6.2.1%2Fitm_highavail18.htm

Setting up the Monitoring Agent for Windows OS in a cluster environment
http://pic.dhe.ibm.com/infocenter/tivihelp/v30r1/index.jsp?topic=%2Fcom.ibm.itm.doc_6.2.2fp2%2Fmain_win12.htm

IBM Tivoli Monitoring for Microsoft Applications, V6.2.0 Interim Feature 1:
Microsoft Cluster Server Agent V6.2.0.1 User’s Guide
http://www.t-voli.com/T_Voli_Downloads/Tivoli_Products/ITM6222/ITMforMicrosoftApplications/MSCS6201.pdf
0
 

Author Comment

by:sunhux
ID: 38746686
Have browsed through those but I still can't figure out a good way to
monitor/detect & alert when there's an MSCS (cluster) failover.

Do we need to write a script to send to Tivoli ?
0
 
LVL 13

Expert Comment

by:Yagya Shree
ID: 38771422
Did you manage to get an answer for your query?
0
 

Author Comment

by:sunhux
ID: 38778003
Nope
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
In this article, we’ll look at how to deploy ProxySQL.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

589 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question