Solved

Anyway for Tivoli to monitor when there's MSCS (MS Clustering ) failover occuring

Posted on 2013-01-01
5
697 Views
Last Modified: 2013-04-04
I noticed that when MSCS failover to its standby cluster member,
ping only timed out for 1 sec (just like MS NLB).

However, sometimes when active / primary member fails over
to the standby node, the active/primary node may not crash nor
reboot.

So is there certain MSCS related services / processs being stopped
on the primary node & then being started up on the standby node?

If there is, let me know so that we can use Tivoli to monitor.

Tivoli monitoring for ping timeout is not feasible as my client's
Tivoli currently will only alert if there's ping timeout of more
than 5 mins
0
Comment
Question by:sunhux
  • 2
  • 2
5 Comments
 
LVL 13

Accepted Solution

by:
Yagya Shree earned 500 total points
ID: 38745630
Hi,

Please have a look into below links:

What to expect from the IBM Tivoli Monitoring infrastructure in a clustered environment
http://pic.dhe.ibm.com/infocenter/tivihelp/v15r1/index.jsp?topic=%2Fcom.ibm.itm.doc_6.2.1%2Fitm_highavail18.htm

Setting up the Monitoring Agent for Windows OS in a cluster environment
http://pic.dhe.ibm.com/infocenter/tivihelp/v30r1/index.jsp?topic=%2Fcom.ibm.itm.doc_6.2.2fp2%2Fmain_win12.htm

IBM Tivoli Monitoring for Microsoft Applications, V6.2.0 Interim Feature 1:
Microsoft Cluster Server Agent V6.2.0.1 User’s Guide
http://www.t-voli.com/T_Voli_Downloads/Tivoli_Products/ITM6222/ITMforMicrosoftApplications/MSCS6201.pdf
0
 

Author Comment

by:sunhux
ID: 38746686
Have browsed through those but I still can't figure out a good way to
monitor/detect & alert when there's an MSCS (cluster) failover.

Do we need to write a script to send to Tivoli ?
0
 
LVL 13

Expert Comment

by:Yagya Shree
ID: 38771422
Did you manage to get an answer for your query?
0
 

Author Comment

by:sunhux
ID: 38778003
Nope
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

When replacing some switches recently I started playing with the idea of having admins authenticate with their domain accounts instead of having local users on all switches all over the place. Since I allready had an w2k8R2 NPS running for my acc…
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now