This document is the Oracle Enterprise Manager Cloud Control Administrator’s Guide for the 13c Release 1. It provides an overview of Oracle's comprehensive out-of-box monitoring capabilities including metric thresholds, baselines, advanced threshold management, custom events, corrective actions, and metric extensions. It also describes how to set up advanced monitoring configurations using templates, administration groups, and customizing alert messages. The document outlines how to manage incidents, problems, events and notifications. It provides guidance on accessing monitoring information and using the incident management functionality within Oracle Enterprise Manager.
Oracle database 12c data masking and subsetting guidebupbechanhgmail
This document provides an overview of Oracle Data Masking and Subsetting and describes its key components and architecture. It discusses the need to mask and subset sensitive data when copying it from production to non-production environments. The main components are Application Data Modeling, masking formats, transformations, subsetting techniques, and application templates. Data can be masked and subsetted using in-database, in-export, or heterogeneous execution methods according to a standardized methodology and workflow.
This document provides an overview of Oracle Communications Billing and Revenue Management (BRM). It describes key BRM concepts such as rating, pricing, billing, payments, and customer management. It also provides information on how BRM stores and processes data, how it can be used by telecom companies, and its main components.
This document provides an overview and introduction to new features in Oracle Database 12c Release 1 (12.1). It is intended for readers familiar with previous releases who want to learn about new features, options, and enhancements in this release. The document contains information on various areas including application development, data warehousing, compression, and more. It provides high-level descriptions of new features without detailed technical specifications.
Oracle Database Advanced Replication documentation describes features for replicating data across multiple database servers. It allows for both multimaster replication where multiple sites can update data, and materialized view replication where data is replicated from a master to read-only sites. The documentation covers concepts, architecture, planning, troubleshooting and other aspects of setting up and managing an advanced replication environment.
With Oracle Enterprise Scheduler, you can define, schedule and run jobs.
A job is a unit of work done on an application's behalf. For example, you might define a job that runs a particular PL/SQL function or command-line process. You can define a job that
executes Java code. Those job types are included with Oracle Enterprise Scheduler:
• Java job type for executing Java code.
• Web Service job type.
• EJB job type.
• Process job type for executing a command-line command.
• PL/SQL job type for executing functions in Oracle's extension language for SQL.
This document is the Oracle Database PL/SQL Language Reference for version 12c Release 1 (12.1). It describes the main features of PL/SQL including blocks, variables, subprograms, packages, triggers, input/output capabilities, and control statements. The document provides documentation and syntax descriptions to help developers write PL/SQL code. It notes changes in this release such as new capabilities for result caching, data types, triggers, libraries, views and privileges.
Here are the key steps to map non-qualified key flexfield segments to BI objects:
1. Create a new segment label for the non-qualified segment using the Manage Segment Labels page.
2. Populate the BI Object Name field for the new segment label with the desired BI object mapping.
3. Associate the new segment label with the appropriate segment code using the Manage Structure Instances page.
4. Deploy the flexfield changes.
This allows non-qualified segments to be mapped to BI objects and used in analysis, similar to qualified segments. The new
segment label acts as the mapping between the segment code and BI object.
This document provides an overview and instructions for using Oracle Installed Base. It describes how to manage item instances and systems, search transactions, use the mass update facility, and integrate Oracle Installed Base with other Oracle applications. It also covers setting up and managing counters to track item usage and consumption. The document contains 14 chapters covering topics like searches, item instance details, configurations, and the open interface program.
Oracle database 12c data masking and subsetting guidebupbechanhgmail
This document provides an overview of Oracle Data Masking and Subsetting and describes its key components and architecture. It discusses the need to mask and subset sensitive data when copying it from production to non-production environments. The main components are Application Data Modeling, masking formats, transformations, subsetting techniques, and application templates. Data can be masked and subsetted using in-database, in-export, or heterogeneous execution methods according to a standardized methodology and workflow.
This document provides an overview of Oracle Communications Billing and Revenue Management (BRM). It describes key BRM concepts such as rating, pricing, billing, payments, and customer management. It also provides information on how BRM stores and processes data, how it can be used by telecom companies, and its main components.
This document provides an overview and introduction to new features in Oracle Database 12c Release 1 (12.1). It is intended for readers familiar with previous releases who want to learn about new features, options, and enhancements in this release. The document contains information on various areas including application development, data warehousing, compression, and more. It provides high-level descriptions of new features without detailed technical specifications.
Oracle Database Advanced Replication documentation describes features for replicating data across multiple database servers. It allows for both multimaster replication where multiple sites can update data, and materialized view replication where data is replicated from a master to read-only sites. The documentation covers concepts, architecture, planning, troubleshooting and other aspects of setting up and managing an advanced replication environment.
With Oracle Enterprise Scheduler, you can define, schedule and run jobs.
A job is a unit of work done on an application's behalf. For example, you might define a job that runs a particular PL/SQL function or command-line process. You can define a job that
executes Java code. Those job types are included with Oracle Enterprise Scheduler:
• Java job type for executing Java code.
• Web Service job type.
• EJB job type.
• Process job type for executing a command-line command.
• PL/SQL job type for executing functions in Oracle's extension language for SQL.
This document is the Oracle Database PL/SQL Language Reference for version 12c Release 1 (12.1). It describes the main features of PL/SQL including blocks, variables, subprograms, packages, triggers, input/output capabilities, and control statements. The document provides documentation and syntax descriptions to help developers write PL/SQL code. It notes changes in this release such as new capabilities for result caching, data types, triggers, libraries, views and privileges.
Here are the key steps to map non-qualified key flexfield segments to BI objects:
1. Create a new segment label for the non-qualified segment using the Manage Segment Labels page.
2. Populate the BI Object Name field for the new segment label with the desired BI object mapping.
3. Associate the new segment label with the appropriate segment code using the Manage Structure Instances page.
4. Deploy the flexfield changes.
This allows non-qualified segments to be mapped to BI objects and used in analysis, similar to qualified segments. The new
segment label acts as the mapping between the segment code and BI object.
This document provides an overview and instructions for using Oracle Installed Base. It describes how to manage item instances and systems, search transactions, use the mass update facility, and integrate Oracle Installed Base with other Oracle applications. It also covers setting up and managing counters to track item usage and consumption. The document contains 14 chapters covering topics like searches, item instance details, configurations, and the open interface program.
Oracle database 12c application express end user's guidebupbechanhgmail
This document provides an overview of new features and changes in Oracle Application Express Release 4.2 from an end user perspective. Key updates include modernized interactive reports with improved date filtering, the ability to link directly to data grids from websheets, column aliases and improved lookups for data loading, and concurrency checking for uploaded data. Documentation content and screenshots were revised to cover the latest release functionality.
Oracle database 12c 2 day + php developer's guidebupbechanhgmail
Here are the key steps to configure and use DRCP with PHP:
1. Configure DRCP in Oracle Database:
- Set the drc_enabled parameter to TRUE in the init.ora file
- Restart the database
2. Install the Oracle DRCP client on the PHP web server:
- This provides the necessary libraries for PHP to use DRCP
3. Configure PHP to use persistent connections:
- Set the oci8.persistent_connections setting to On in php.ini
4. Connect to the database using the DRCP connection string:
- The connection string includes the DRCP service name, e.g.
"dbname=XE service_name=drcp
Oracle Database Client Installation Guide provides instructions for installing Oracle Database Client on Microsoft Windows. It discusses installation overview, preinstallation tasks, installing Oracle Database Client, postinstallation tasks, removing Oracle Database Client software, and troubleshooting. The guide includes appendices on installing Java Access Bridge and using response files for silent or unattended installations.
This document provides guidance on using Oracle Services Procurement to process the procurement of complex work and contingent workers. It discusses the licenses, profile options, and concurrent programs used in Oracle Services Procurement. It also provides overviews and steps for setting up Oracle Purchasing, Approvals Management, E-Business Tax, Procurement Contracts, iProcurement, Human Resources, Time and Labor, Internet Expenses, and Projects to process the procurement of complex work and contingent workers. Finally, it describes the key features and steps for processing complex work procurement and contingent worker procurement within Oracle Services Procurement.
Simplified user experience_design_patterns_for_the_oracle_applications_cloud_...Berry Clemens
The document discusses design patterns for Oracle Applications Cloud Service. It describes common page types like view pages, action pages, and landing pages. It also covers common UI components like headers, footers, page tabs, and tables. Pattern sets are provided to standardize how users can add or view data in tables. The goal is to simplify the user experience through consistent and intuitive page and interface designs.
The document is the Java EE 7 Tutorial and provides an overview of Java EE 7 platform features and technologies. It describes the Java EE application model including web, business, and client tiers. It also covers Java EE APIs, containers, security, and the roles of various developers. The tutorial examples are built and run using tools like NetBeans IDE and Maven.
Oracle database 12c 2 day + performance tuning guidebupbechanhgmail
This document provides a 2 day performance tuning guide for Oracle Database 12c. It describes how to use the Automatic Database Diagnostic Monitor (ADDM) and Automatic Workload Repository (AWR) to proactively and reactively tune database performance. Tools covered include the ADDM reports, AWR reports, Active Session History (ASH) reports and real-time monitoring pages in Oracle Enterprise Manager. The guide also discusses identifying and tuning high-load SQL statements.
This document provides installation instructions for Oracle WebCenter Sites 11g Release 1 (11.1.1.8.0) and includes the following key points:
- It outlines the installation process and prerequisites for installing WebCenter Sites on Oracle WebLogic Server, Apache Tomcat Server, or IBM WebSphere Application Server.
- It provides instructions for configuring the application server with managed servers, clusters, data sources, and other required settings before installing WebCenter Sites.
- It describes how to integrate the application server with a supported web server like Oracle HTTP Server, Apache HTTP Server, or IIS.
- It contains reference information like paths, directories, and start/stop commands for the application servers
Oracle-Service-Procurement - User Guide.pdfTarigTaha3
Here are the key points about Oracle Services Procurement:
- It automates and streamlines the entire services procurement process from requisitioning to payment. This includes services like maintenance, contingent labor, professional services, and facilities management.
- It integrates with other Oracle E-Business Suite applications to provide an end-to-end procure-to-pay process for services.
- It allows defining payment terms, progress payment schedules, financing advances, retainage rates for complex services contracts.
- It supports sourcing services from preferred suppliers defined in contracts at negotiated rates.
- Suppliers can track orders, submit invoices online, and manage change requests directly.
- For complex services, it calculates
This document provides instructions for installing Oracle Database Client on Windows systems. It discusses installation overview, types of installations, preinstallation tasks, the installation process, and postinstallation tasks. It also covers uninstalling Oracle Database Client and troubleshooting the installation process.
This document provides an overview and administration guide for Oracle Application Express (APEX) Release 4.2. It includes information on workspace and application administration, hosted instance administration, managing users, monitoring activity, and leveraging Application Builder defaults. The primary topics covered include managing files, preferences, caching, users, schemas, workspaces, requests, settings, and more. It is intended to help administrators and developers effectively manage and maintain their APEX environment.
Oracle database 12c 2 day + application express developer's guidebupbechanhgmail
Oracle Application Express is a rapid web application development tool that uses a browser-based interface to access PL/SQL code and data stored in Oracle database tables, eliminating the need for separate application servers. Developers work within private database schemas called workspaces to build and test applications, while end users access deployed applications through only a web browser. The embedded PL/SQL gateway or Oracle HTTP Server with mod_plsql act as the communication broker between the web server and Oracle Application Express objects in the database.
This document provides an overview and introduction to the Oracle Customer Data Librarian User Guide. It contains information about the primary author and contributors to the guide. It also includes standard legal information and notes about intended use and government use. The document contains a table of contents that lists the chapters included in the guide.
This document provides an introduction to Oracle Coherence, a data grid product. It discusses key Coherence concepts like targeted, parallel, and query-based execution on distributed caches using Coherence agents. It also describes Coherence's support for data grid aggregation, node-based execution, work management, integration with databases and EIS, continuous querying, clustering of objects and data for availability, reliability, scalability, performance, serviceability and manageability. The document explains how Coherence delivers events for changes as they occur using listener interfaces and event objects.
This document provides a guide to backing up and recovering Oracle databases using Recovery Manager (RMAN) and user-managed techniques. It covers RMAN backup and recovery concepts, starting and configuring RMAN, making RMAN backups of datafiles, control files, archived redo logs and incremental backups. It also covers restoring and recovering databases using RMAN as well as features like Flashback Database and restore points.
Global Human Resources Cloud Using Absence Management.pdfPrabhakar Subburaj
Absence management objects like plans, types, reasons, categories, and certifications use date effectivity to retain a history of changes over time, with each change represented as a separate physical record with its own effective start and end dates. Date-effective objects allow retrieving and editing past and future versions while maintaining a logical record across all physical records. Common HCM objects also use date effectivity to track changes to attributes and values over time.
This document provides an overview and instructions for using Oracle Application Express (APEX) websheets and database applications. It covers topics such as running websheets, adding and editing page sections and data grids, and managing websheet pages. The primary audience is end users of APEX. It includes information on features like breadcrumbs, navigation sections, online help, search, and the control panel.
This document provides an overview and instructions for using Oracle Incentive Compensation to define compensation plans, collect sales transactions, calculate compensation payouts, and generate reports. It describes the responsibilities of different user roles and how to set up rules, plans, resources, transactions, and payments. The guide also includes examples of common compensation scenarios and integrations with other Oracle applications.
This document provides instructions for installing Oracle Application Express release 4.2 for Oracle Database 12c. Key aspects covered include:
- Understanding the multitenant architecture in Oracle Database 12c and how it impacts Application Express installation.
- Choosing between installing Application Express from the database and configuring either Oracle REST Data Services, the embedded PL/SQL Gateway, or Oracle HTTP Server.
- Required pre-installation tasks like checking database requirements and choosing a web listener.
- Post-installation tasks like creating a workspace, adding users, and converting between runtime and development environments.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
More Related Content
Similar to toaz.info-oracle-enterprise-manager-13cpdf-pr_d27a8dfef1d5b8f2ea644bed24621723.pdf
Oracle database 12c application express end user's guidebupbechanhgmail
This document provides an overview of new features and changes in Oracle Application Express Release 4.2 from an end user perspective. Key updates include modernized interactive reports with improved date filtering, the ability to link directly to data grids from websheets, column aliases and improved lookups for data loading, and concurrency checking for uploaded data. Documentation content and screenshots were revised to cover the latest release functionality.
Oracle database 12c 2 day + php developer's guidebupbechanhgmail
Here are the key steps to configure and use DRCP with PHP:
1. Configure DRCP in Oracle Database:
- Set the drc_enabled parameter to TRUE in the init.ora file
- Restart the database
2. Install the Oracle DRCP client on the PHP web server:
- This provides the necessary libraries for PHP to use DRCP
3. Configure PHP to use persistent connections:
- Set the oci8.persistent_connections setting to On in php.ini
4. Connect to the database using the DRCP connection string:
- The connection string includes the DRCP service name, e.g.
"dbname=XE service_name=drcp
Oracle Database Client Installation Guide provides instructions for installing Oracle Database Client on Microsoft Windows. It discusses installation overview, preinstallation tasks, installing Oracle Database Client, postinstallation tasks, removing Oracle Database Client software, and troubleshooting. The guide includes appendices on installing Java Access Bridge and using response files for silent or unattended installations.
This document provides guidance on using Oracle Services Procurement to process the procurement of complex work and contingent workers. It discusses the licenses, profile options, and concurrent programs used in Oracle Services Procurement. It also provides overviews and steps for setting up Oracle Purchasing, Approvals Management, E-Business Tax, Procurement Contracts, iProcurement, Human Resources, Time and Labor, Internet Expenses, and Projects to process the procurement of complex work and contingent workers. Finally, it describes the key features and steps for processing complex work procurement and contingent worker procurement within Oracle Services Procurement.
Simplified user experience_design_patterns_for_the_oracle_applications_cloud_...Berry Clemens
The document discusses design patterns for Oracle Applications Cloud Service. It describes common page types like view pages, action pages, and landing pages. It also covers common UI components like headers, footers, page tabs, and tables. Pattern sets are provided to standardize how users can add or view data in tables. The goal is to simplify the user experience through consistent and intuitive page and interface designs.
The document is the Java EE 7 Tutorial and provides an overview of Java EE 7 platform features and technologies. It describes the Java EE application model including web, business, and client tiers. It also covers Java EE APIs, containers, security, and the roles of various developers. The tutorial examples are built and run using tools like NetBeans IDE and Maven.
Oracle database 12c 2 day + performance tuning guidebupbechanhgmail
This document provides a 2 day performance tuning guide for Oracle Database 12c. It describes how to use the Automatic Database Diagnostic Monitor (ADDM) and Automatic Workload Repository (AWR) to proactively and reactively tune database performance. Tools covered include the ADDM reports, AWR reports, Active Session History (ASH) reports and real-time monitoring pages in Oracle Enterprise Manager. The guide also discusses identifying and tuning high-load SQL statements.
This document provides installation instructions for Oracle WebCenter Sites 11g Release 1 (11.1.1.8.0) and includes the following key points:
- It outlines the installation process and prerequisites for installing WebCenter Sites on Oracle WebLogic Server, Apache Tomcat Server, or IBM WebSphere Application Server.
- It provides instructions for configuring the application server with managed servers, clusters, data sources, and other required settings before installing WebCenter Sites.
- It describes how to integrate the application server with a supported web server like Oracle HTTP Server, Apache HTTP Server, or IIS.
- It contains reference information like paths, directories, and start/stop commands for the application servers
Oracle-Service-Procurement - User Guide.pdfTarigTaha3
Here are the key points about Oracle Services Procurement:
- It automates and streamlines the entire services procurement process from requisitioning to payment. This includes services like maintenance, contingent labor, professional services, and facilities management.
- It integrates with other Oracle E-Business Suite applications to provide an end-to-end procure-to-pay process for services.
- It allows defining payment terms, progress payment schedules, financing advances, retainage rates for complex services contracts.
- It supports sourcing services from preferred suppliers defined in contracts at negotiated rates.
- Suppliers can track orders, submit invoices online, and manage change requests directly.
- For complex services, it calculates
This document provides instructions for installing Oracle Database Client on Windows systems. It discusses installation overview, types of installations, preinstallation tasks, the installation process, and postinstallation tasks. It also covers uninstalling Oracle Database Client and troubleshooting the installation process.
This document provides an overview and administration guide for Oracle Application Express (APEX) Release 4.2. It includes information on workspace and application administration, hosted instance administration, managing users, monitoring activity, and leveraging Application Builder defaults. The primary topics covered include managing files, preferences, caching, users, schemas, workspaces, requests, settings, and more. It is intended to help administrators and developers effectively manage and maintain their APEX environment.
Oracle database 12c 2 day + application express developer's guidebupbechanhgmail
Oracle Application Express is a rapid web application development tool that uses a browser-based interface to access PL/SQL code and data stored in Oracle database tables, eliminating the need for separate application servers. Developers work within private database schemas called workspaces to build and test applications, while end users access deployed applications through only a web browser. The embedded PL/SQL gateway or Oracle HTTP Server with mod_plsql act as the communication broker between the web server and Oracle Application Express objects in the database.
This document provides an overview and introduction to the Oracle Customer Data Librarian User Guide. It contains information about the primary author and contributors to the guide. It also includes standard legal information and notes about intended use and government use. The document contains a table of contents that lists the chapters included in the guide.
This document provides an introduction to Oracle Coherence, a data grid product. It discusses key Coherence concepts like targeted, parallel, and query-based execution on distributed caches using Coherence agents. It also describes Coherence's support for data grid aggregation, node-based execution, work management, integration with databases and EIS, continuous querying, clustering of objects and data for availability, reliability, scalability, performance, serviceability and manageability. The document explains how Coherence delivers events for changes as they occur using listener interfaces and event objects.
This document provides a guide to backing up and recovering Oracle databases using Recovery Manager (RMAN) and user-managed techniques. It covers RMAN backup and recovery concepts, starting and configuring RMAN, making RMAN backups of datafiles, control files, archived redo logs and incremental backups. It also covers restoring and recovering databases using RMAN as well as features like Flashback Database and restore points.
Global Human Resources Cloud Using Absence Management.pdfPrabhakar Subburaj
Absence management objects like plans, types, reasons, categories, and certifications use date effectivity to retain a history of changes over time, with each change represented as a separate physical record with its own effective start and end dates. Date-effective objects allow retrieving and editing past and future versions while maintaining a logical record across all physical records. Common HCM objects also use date effectivity to track changes to attributes and values over time.
This document provides an overview and instructions for using Oracle Application Express (APEX) websheets and database applications. It covers topics such as running websheets, adding and editing page sections and data grids, and managing websheet pages. The primary audience is end users of APEX. It includes information on features like breadcrumbs, navigation sections, online help, search, and the control panel.
This document provides an overview and instructions for using Oracle Incentive Compensation to define compensation plans, collect sales transactions, calculate compensation payouts, and generate reports. It describes the responsibilities of different user roles and how to set up rules, plans, resources, transactions, and payments. The guide also includes examples of common compensation scenarios and integrations with other Oracle applications.
This document provides instructions for installing Oracle Application Express release 4.2 for Oracle Database 12c. Key aspects covered include:
- Understanding the multitenant architecture in Oracle Database 12c and how it impacts Application Express installation.
- Choosing between installing Application Express from the database and configuring either Oracle REST Data Services, the embedded PL/SQL Gateway, or Oracle HTTP Server.
- Required pre-installation tasks like checking database requirements and choosing a web listener.
- Post-installation tasks like creating a workspace, adding users, and converting between runtime and development environments.
Similar to toaz.info-oracle-enterprise-manager-13cpdf-pr_d27a8dfef1d5b8f2ea644bed24621723.pdf (20)
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
3. iii
Contents
Preface........................................................................................................................................................... xxxv
Audience................................................................................................................................................. xxxv
Documentation Accessibility............................................................................................................... xxxv
Related Documents ............................................................................................................................... xxxv
Conventions ........................................................................................................................................... xxxvi
Part I Monitoring and Managing Targets
1 Enterprise Monitoring
1.1 Monitoring Overview................................................................................................................. 1-1
1.2 Comprehensive Out-of-Box Monitoring ................................................................................. 1-1
1.3 Monitoring: Basics ...................................................................................................................... 1-2
1.3.1 Metric Thresholds: Determining When a Monitored Condition is an Issue............... 1-3
1.3.2 Metric Baselines: Determining Valid Metric Thresholds............................................... 1-3
1.3.3 Advanced Threshold Management................................................................................... 1-4
1.3.4 Events: Defining What Conditions are of Interest.......................................................... 1-5
1.3.5 Corrective Actions: Resolving Issues Automatically ..................................................... 1-5
1.3.6 Metric Extensions: Customizing Monitoring................................................................... 1-5
1.3.7 Blackouts and Notification Blackouts............................................................................... 1-6
1.4 Monitoring: Advanced Setup.................................................................................................... 1-7
1.4.1 Monitoring Templates......................................................................................................... 1-7
1.4.2 Administration Groups and Template Collections ........................................................ 1-7
1.4.3 Customizing Alert Messages ............................................................................................. 1-8
1.5 Notifications.............................................................................................................................. 1-10
1.5.1 Customizing Notifications .............................................................................................. 1-10
1.6 Managing Events, Incidents, and Problems......................................................................... 1-11
1.6.1 Incident Manager.............................................................................................................. 1-12
1.6.2 Incident Rules and Rule Sets........................................................................................... 1-13
1.6.3 Connectors ......................................................................................................................... 1-14
1.7 Accessing Monitoring Information ....................................................................................... 1-14
2 Using Incident Management
2.1 Management Concepts............................................................................................................... 2-3
2.1.1 Event Management.............................................................................................................. 2-3
2.1.2 Incident Management ......................................................................................................... 2-6
4. iv
2.1.2.1 Working with Incidents............................................................................................... 2-7
2.1.2.2 Incident Composed of a Single Event........................................................................ 2-9
2.1.2.3 Incident Composed of Multiple Events ................................................................. 2-10
2.1.2.4 How are Incidents Created?..................................................................................... 2-11
2.1.3 Problem Management...................................................................................................... 2-11
2.1.4 Rule Sets............................................................................................................................. 2-12
2.1.4.1 Out-of-Box Rule Sets ................................................................................................. 2-13
2.1.4.2 Rule Set Types............................................................................................................ 2-14
2.1.4.3 Rules ............................................................................................................................ 2-15
2.1.5 Incident Manager.............................................................................................................. 2-19
2.1.5.1 Views........................................................................................................................... 2-21
2.1.6 Summing Up ..................................................................................................................... 2-21
2.2 Setting Up Your Incident Management Environment ....................................................... 2-22
2.2.1 Setting Up Your Monitoring Infrastructure.................................................................. 2-23
2.2.1.1 Rule Set Development............................................................................................... 2-23
2.2.2 Setting Up Administrators and Privileges.................................................................... 2-26
2.2.3 Monitoring Privileges....................................................................................................... 2-30
2.2.4 Setting Up Rule Sets ......................................................................................................... 2-32
2.2.4.1 Creating a Rule Set .................................................................................................... 2-33
2.2.4.2 Creating a Rule to Create an Incident..................................................................... 2-33
2.2.4.3 Creating a Rule to Manage Escalation of Incidents.............................................. 2-34
2.2.4.4 Creating a Rule to Escalate a Problem.................................................................... 2-36
2.2.4.5 Testing Rule Sets........................................................................................................ 2-37
2.2.4.6 Subscribing to Receive Email from a Rule ........................................................... 2-39
2.2.4.7 Receiving Email for Private Rules........................................................................... 2-39
2.3 Working with Incidents .......................................................................................................... 2-40
2.3.1 Finding What Needs to be Worked On......................................................................... 2-41
2.3.2 Searching for Incidents .................................................................................................... 2-44
2.3.3 Setting Up Custom Views ............................................................................................... 2-45
2.3.3.1 Incident Dashboard................................................................................................... 2-46
2.3.4 Sharing/Unsharing Custom Views ............................................................................... 2-47
2.3.5 Responding and Working on a Simple Incident.......................................................... 2-48
2.3.6 Responding to and Managing Multiple Incidents, Events and Problems in Bulk.. 2-49
2.3.7 Searching My Oracle Support Knowledge ................................................................... 2-51
2.3.8 Submitting an Open Service Request (Problems-only)............................................... 2-51
2.3.9 Suppressing Incidents and Problems............................................................................. 2-52
2.3.10 Managing Workload Distribution of Incidents............................................................ 2-52
2.3.11 Reviewing Events on a Periodic Basis ........................................................................... 2-53
2.3.11.1 Creating an Incident Manually................................................................................ 2-53
2.4 Advanced Topics...................................................................................................................... 2-54
2.4.1 Automatic Diagnostic Repository (ADR): Incident Flood Control ........................... 2-54
2.4.1.1 Working with ADR Diagnostic Incidents Using Incident Manager .................. 2-54
2.4.1.2 Incident Flood Control.............................................................................................. 2-54
2.4.2 Defining Custom Incident Statuses................................................................................ 2-56
2.4.2.1 Creating a New Resolution State ............................................................................ 2-56
2.4.2.2 Modifying an Existing Resolution State................................................................. 2-56
2.4.3 Clearing Stateless Alerts for Metric Alert Event Types............................................... 2-57
5. v
2.4.4 Automatically Clearing "Manually Clearable" Events................................................ 2-58
2.4.5 User-reported Events ....................................................................................................... 2-59
2.4.5.1 Format ......................................................................................................................... 2-59
2.4.5.2 Options........................................................................................................................ 2-59
2.4.5.3 Examples..................................................................................................................... 2-60
2.4.6 Additional Rule Applications......................................................................................... 2-61
2.4.6.1 Setting Up a Rule to Send Different Notifications for Different Severity States of an
Event 2-61
2.4.6.2 Creating a Rule to Notify Different Administrators Based on the Event Type 2-62
2.4.6.3 Creating a Rule to Create a Ticket for Incidents ................................................... 2-63
2.4.6.4 Creating a Rule to Send SNMP Traps to Third Party Systems........................... 2-64
2.4.7 Exporting and Importing Incident Rules ...................................................................... 2-65
2.4.7.1 Exporting Rule Sets using the Enterprise Manager Console .............................. 2-65
2.4.7.2 Importing Rule Sets using the Enterprise Manager Console.............................. 2-66
2.4.7.3 Importing Rule Sets Using EM CLI ........................................................................ 2-66
2.4.7.4 Exporting Rule Sets Using EM CLI......................................................................... 2-67
2.4.8 Creating Corrective Actions for Events......................................................................... 2-67
2.4.9 Compressing Multiple Events into a Single Incident.................................................. 2-70
2.4.10 Event Prioritization .......................................................................................................... 2-74
2.4.11 Root Cause Analysis (RCA) and Target Down Events ............................................... 2-75
2.4.11.1 How RCA Works....................................................................................................... 2-75
2.4.11.2 Leveraging RCA Results in Incident Rule Sets ..................................................... 2-76
2.4.11.3 Leveraging RCA Results in Incident Manager...................................................... 2-78
2.4.11.4 Leveraging RCA Results in the System Dashboard ............................................. 2-79
2.4.11.5 Creating a Rule to Update Incident Priority for Non-symptom Events............ 2-79
2.4.11.6 Creating Incidents On Non-symptom Events....................................................... 2-80
2.4.11.7 Introducing a Time Delay......................................................................................... 2-82
2.5 Moving from Enterprise Manager 10/11g to 12c and Greater.......................................... 2-83
Monitoring: Common Tasks................................................................................................... 2-84
Setting Up an Email Gateway......................................................................................... 2-85
Sending Email for Metric Alerts..................................................................................... 2-87
Sending SNMP Traps for Metric Alerts......................................................................... 2-90
Sending Events to an Event Connector ......................................................................... 2-94
Sending Email to Different Email Addresses for Different Periods of the Day ...... 2-97
3 Using Notifications
3.1 Setting Up Notifications............................................................................................................. 3-2
3.1.1 Setting Up a Mail Server for Notifications....................................................................... 3-2
3.1.2 Setting Up Email for Yourself............................................................................................ 3-4
3.1.2.1 Defining Email Addresses........................................................................................... 3-4
3.1.2.2 Setting Up a Notification Schedule............................................................................ 3-5
3.1.2.3 Subscribe to Receive Email for Incident Rules......................................................... 3-6
3.1.3 Setting Up Email for Other Administrators.................................................................... 3-7
3.1.4 Email Customization........................................................................................................... 3-8
3.1.4.1 Email Customization Reference ................................................................................. 3-9
3.1.5 Setting Up Repeat Notifications ..................................................................................... 3-12
6. vi
3.2 Extending Notification Beyond Email .................................................................................. 3-13
3.3 Sending Notifications Using OS Commands and Scripts.................................................. 3-13
3.3.1 Script Examples................................................................................................................. 3-16
3.3.2 Migrating pre-12c OS Command Scripts ...................................................................... 3-18
3.3.2.1 Migrating Metric Alert Event Types....................................................................... 3-18
3.3.2.2 Migrating Target Availability Event Types........................................................... 3-19
3.3.2.3 Migrating Job Status Change Event Types ............................................................ 3-20
3.3.2.4 Migrating Corrective Action-Related OS Scripts.................................................. 3-20
3.3.2.5 Notification Type Mapping...................................................................................... 3-21
3.4 Sending Notifications Using PL/SQL Procedures.............................................................. 3-21
3.4.1 Defining a PL/SQL-based Notification Method.......................................................... 3-21
3.4.2 Migrating Pre-12c PL/SQL Advanced Notification Methods ................................... 3-29
3.4.2.1 Mapping for MGMT_NOTIFY_SEVERITY ........................................................... 3-30
3.4.2.2 Mapping for MGMT_NOTIFY_JOB........................................................................ 3-34
3.4.2.3 Mapping for MGMT_NOTIFY_CORRECTIVE_ACTION .................................. 3-34
3.5 Sending SNMP Traps to Third Party Systems..................................................................... 3-35
3.5.1 SNMP Version 1 Versus SNMP Version 3 .................................................................... 3-36
3.5.2 Working with SNMP V3 Trap Notification Methods.................................................. 3-36
3.5.2.1 Configuring the OMS to Send SNMP Trap Notifications ................................... 3-36
3.5.2.2 Creating/Editing an SNMP V3 Trap Notification Method................................. 3-37
3.5.2.3 Editing a User Security Model Entry...................................................................... 3-38
3.5.2.4 Viewing Available SNMP V3 Trap Notification Methods .................................. 3-40
3.5.2.5 Deleting an SNMP V3 Trap Notification Method ................................................ 3-40
3.5.3 Creating an SNMP V1 Trap............................................................................................. 3-40
3.5.4 SNMP Traps: Moving from Previous Enterprise Manager Releases to 12c and Greater..
3-43
3.6 Management Information Base (MIB)................................................................................... 3-44
3.6.1 About MIBs........................................................................................................................ 3-44
3.6.2 MIB Definition................................................................................................................... 3-44
3.6.3 Reading the MIB Variable Descriptions ........................................................................ 3-45
3.6.3.1 Variable Name ........................................................................................................... 3-45
3.7 Passing Corrective Action Status Change Information...................................................... 3-46
3.7.1 Passing Corrective Action Execution Status to an OS Command or Script............ 3-46
3.7.2 Passing Corrective Action Execution Status to a PLSQL Procedure........................ 3-46
3.8 Passing Job Execution Status Information........................................................................... 3-47
3.8.1 Passing Job Execution Status to a PL/SQL Procedure............................................... 3-47
3.8.2 Passing Job Execution Status to an OS Command or Script...................................... 3-50
3.9 Passing User-Defined Target Properties to Notification Methods ................................... 3-50
3.10 Notification Reference............................................................................................................. 3-51
3.10.1 EMOMS Properties........................................................................................................... 3-51
3.10.2 Passing Event, Incident, Problem Information to an OS Command or Script......... 3-55
3.10.2.1 Environment Variables Common to Event, Incident and Problem .................. 3-55
3.10.2.2 Event Notification-Specific Environment Variables............................................. 3-56
3.10.2.3 Environment Variables Specific to Event Types................................................... 3-58
3.10.2.4 Environment Variables Specific to Incident Notifications .................................. 3-61
3.10.2.5 Environment Variables Specific to Problem Notifications.................................. 3-62
3.10.2.6 Environment Variables Common to Incident and Problem Notifications........ 3-63
3.10.3 Passing Information to a PL/SQL Procedure............................................................... 3-64
7. vii
3.10.3.1 Notification Payload Elements Specific to Event Types...................................... 3-73
3.10.4 Troubleshooting Notifications........................................................................................ 3-76
3.10.4.1 General Setup............................................................................................................. 3-76
3.10.4.2 Notification System Errors....................................................................................... 3-77
3.10.4.3 Notification System Trace Messages ...................................................................... 3-77
3.10.4.4 Email Errors................................................................................................................ 3-79
3.10.4.5 OS Command Errors................................................................................................. 3-79
3.10.4.6 SNMP Trap Errors..................................................................................................... 3-79
3.10.4.7 PL/SQL Errors........................................................................................................... 3-80
3.11 System Broadcasts.................................................................................................................... 3-80
4 Using Blackouts and Notification Blackouts
4.1 Blackouts and Notification Blackouts...................................................................................... 4-1
4.1.1 About Blackouts................................................................................................................... 4-1
4.1.2 About Notification Blackouts............................................................................................. 4-2
4.2 Working with Blackouts/Notification Blackouts................................................................... 4-3
4.2.1 Creating Blackouts/Notification Blackouts..................................................................... 4-3
4.2.2 Editing Blackouts/Notification Blackouts ....................................................................... 4-4
4.2.3 Viewing Blackouts/Notification Blackouts ..................................................................... 4-4
4.2.4 Purging Blackouts/Notification Blackouts That Have Ended...................................... 4-4
4.3 Controlling Blackouts Using the Command Line Utility...................................................... 4-5
4.4 About Blackouts Best Effort....................................................................................................... 4-7
4.4.1 When to Use Blackout Best Effort ..................................................................................... 4-7
5 Managing Groups
5.1 Introduction to Groups .............................................................................................................. 5-1
5.1.1 Overview of Groups............................................................................................................ 5-2
5.1.2 Overview of Privilege Propagating Groups .................................................................... 5-2
5.1.3 Overview of Dynamic Groups........................................................................................... 5-3
5.1.4 Overview of Administration Groups................................................................................ 5-3
5.1.5 Choosing Which Type of Group To Use .......................................................................... 5-4
5.2 Managing Groups....................................................................................................................... 5-4
5.2.1 Creating and Editing Groups............................................................................................. 5-5
5.2.2 Creating Dynamic Groups ................................................................................................. 5-6
5.2.3 Adding Members to Privilege Propagating Groups ...................................................... 5-8
5.2.4 Converting Conventional Groups to Privilege Propagating Groups .......................... 5-8
5.2.5 Viewing and Managing Groups........................................................................................ 5-9
5.2.6 Overview of Group Charts.............................................................................................. 5-10
5.2.7 Overview of Group Members......................................................................................... 5-10
5.2.8 Viewing Group Status History ....................................................................................... 5-11
5.2.9 About the System Dashboard ......................................................................................... 5-11
5.3 Using Out-of-Box Reports ...................................................................................................... 5-12
6 Using Administration Groups
6.1 What is an Administration Group?.......................................................................................... 6-1
6.1.1 Developing an Administration Group ............................................................................. 6-3
8. viii
6.2 Planning an Administrative Group.......................................................................................... 6-3
6.3 Implementing Administration Groups and Template Collections................................... 6-10
6.3.1 Creating the Administration Group Hierarchy............................................................ 6-11
6.3.2 Accessing the Administration Group Home Page....................................................... 6-11
6.3.3 Defining the Hierarchy .................................................................................................... 6-12
6.3.4 Defining Template Collections ....................................................................................... 6-16
6.3.4.1 Required Privileges ................................................................................................... 6-17
6.3.4.2 Corrective Action Credentials ................................................................................. 6-18
6.3.5 Associating Template Collections with Administration Groups .............................. 6-18
6.3.5.1 Associating a Template Collection with an Administration Group .................. 6-19
6.3.5.2 Searching for Administration Groups.................................................................... 6-20
6.3.5.3 Setting the Global Synchronization Schedule ....................................................... 6-21
6.3.5.4 When Template Collection Synchronization Occurs ........................................... 6-22
6.3.5.5 Viewing Synchronization Status ............................................................................. 6-23
6.3.5.6 Group Member Type and Synchronization........................................................... 6-23
6.3.5.7 System Targets and Administration Groups......................................................... 6-24
6.3.5.8 Disassociating a Template Collection from a Group............................................ 6-24
6.3.5.9 Viewing Aggregate (Group Management) Settings............................................. 6-24
6.3.5.10 Viewing the Administration Group Homepage................................................... 6-25
6.3.5.11 Identifying Targets Not Part of Any Administration Group.............................. 6-25
6.4 Changing the Administration Group Hierarchy................................................................. 6-26
6.4.1 Adding a New Hierarchy Level ..................................................................................... 6-27
6.4.2 Removing a Hierarchy Level .......................................................................................... 6-27
6.4.3 Merging Administration Groups ................................................................................... 6-27
6.4.4 Removing Administration Groups ................................................................................ 6-30
7 Using Monitoring Templates
7.1 About Monitoring Templates.................................................................................................... 7-1
7.2 Definition of a Monitoring Template....................................................................................... 7-2
7.3 Default Templates (Auto Apply Templates) .......................................................................... 7-2
7.4 Viewing a List of Monitoring Templates................................................................................. 7-2
7.5 Creating a Monitoring Template .............................................................................................. 7-3
7.6 Editing a Monitoring Template ................................................................................................ 7-4
7.7 Applying Monitoring Templates to Targets ........................................................................... 7-5
7.7.1 Applying a Monitoring Template ..................................................................................... 7-5
7.7.2 Monitoring Template Application Options ..................................................................... 7-5
7.7.2.1 Apply Options............................................................................................................... 7-5
7.7.2.2 Metrics with Key Value Settings ................................................................................ 7-6
7.8 Comparing Monitoring Templates with Targets ................................................................... 7-7
7.8.1 When is a metric between a template and a target considered "different"? ............... 7-8
7.9 Comparing Metric Settings Using Information Publisher.................................................... 7-8
7.10 Exporting and Importing Monitoring Templates ............................................................... 7-10
7.11 Upgrading Enterprise Manager: Comparing Monitoring Templates.............................. 7-10
7.12 Changing the Monitoring Template Apply History Retention Period............................ 7-10
8 Using Metric Extensions
8.1 What are Metric Extensions?..................................................................................................... 8-1
9. ix
8.2 Metric Extension Lifecycle......................................................................................................... 8-3
8.3 Working with Metric Extensions.............................................................................................. 8-5
8.3.1 Administrator Privilege Requirements ............................................................................ 8-5
8.3.2 Granting Create Metric Extension Privilege.................................................................... 8-6
8.3.3 Managing Administrator Privileges ................................................................................. 8-6
8.3.4 Managing Administrator Access to Metric Extensions.................................................. 8-6
8.3.4.1 Granting Full/Edit Privileges on a Metric Extension ............................................. 8-6
8.3.4.2 Revoking Access Privileges on a Metric Extension ................................................. 8-7
8.3.4.3 Transferring Metric Extension Ownership............................................................... 8-7
8.3.5 Creating a New Metric Extension ..................................................................................... 8-8
8.3.6 Creating a New Metric Extension (Create Like) .......................................................... 8-13
8.3.7 Editing a Metric Extension .............................................................................................. 8-13
8.3.8 Creating the Next Version of an Existing Metric Extension....................................... 8-14
8.3.9 Importing a Metric Extension ......................................................................................... 8-14
8.3.10 Exporting a Metric Extension.......................................................................................... 8-15
8.3.11 Deleting a Metric Extension ............................................................................................ 8-15
8.3.12 Deploying Metric Extensions to a Group of Targets ................................................... 8-15
8.3.13 Creating an Incident Rule to Send Email from Metric Extensions............................ 8-16
8.3.14 Updating Older Versions of Metric Extensions Already Deployed to a Group of
Targets 8-16
8.3.15 Creating Repository-side Metric Extensions ................................................................ 8-17
8.4 Adapters.................................................................................................................................... 8-20
8.4.1 OS Command Adapter - Single Column....................................................................... 8-21
8.4.2 OS Command Adapter- Multiple Values...................................................................... 8-24
8.4.3 OS Command Adapter - Multiple Columns................................................................. 8-25
8.4.4 SQL Adapter...................................................................................................................... 8-26
8.4.5 SNMP (Simple Network Management Protocol) Adapter......................................... 8-27
8.4.6 JMX Adapter...................................................................................................................... 8-27
8.5 Converting User-defined Metrics to Metric Extensions..................................................... 8-28
8.5.1 Overview............................................................................................................................ 8-29
8.5.2 Commands......................................................................................................................... 8-29
8.6 Metric Extension Command Line Verbs............................................................................... 8-33
9 Advanced Threshold Management
9.1 Accessing the Advanced Threshold Management Page....................................................... 9-1
9.2 Adaptive Thresholds.................................................................................................................. 9-1
9.2.1 Registering Adaptive Threshold Metrics ......................................................................... 9-2
9.2.2 Configuring Adaptive Thresholds.................................................................................... 9-5
9.2.3 Determining whether Adaptive Thresholds are Correct............................................... 9-6
9.2.4 Testing Adaptive Metric Thresholds ................................................................................ 9-8
9.2.5 Deregistering Adaptive Threshold Metrics ..................................................................... 9-9
9.2.6 Setting Adaptive Thresholds using Monitoring Templates.......................................... 9-9
9.3 Time-based Static Thresholds ................................................................................................... 9-9
9.3.1 Registering Time-based Static Thresholds....................................................................... 9-9
9.3.2 Deregistering Time-based Static Thresholds................................................................ 9-12
9.4 Determining What is a Valid Metric Threshold .................................................................. 9-12
10. x
10 Utilizing the Job System and Corrective Actions
10.1 Job System Purpose and Overview....................................................................................... 10-1
10.1.1 Changing Job Activity Summary Table Views............................................................. 10-2
10.1.2 Job Searches ....................................................................................................................... 10-3
10.1.2.1 Saving Job Searches................................................................................................... 10-3
10.1.2.2 Editing Saved Job Searches ...................................................................................... 10-3
10.1.2.3 Importing Saved Job Searches ................................................................................. 10-4
10.1.3 What Are Job Executions and Job Runs?....................................................................... 10-4
10.1.3.1 Job Executions............................................................................................................ 10-4
10.1.3.2 Job Runs ...................................................................................................................... 10-4
10.1.4 Operations on Job Executions and Job Runs ................................................................ 10-5
10.2 Preliminary Considerations.................................................................................................... 10-5
10.2.1 Administrator Roles ......................................................................................................... 10-5
10.2.2 Creating Scripts................................................................................................................. 10-6
10.2.3 Sharing Job Responsibilities............................................................................................ 10-6
10.2.4 Submitting Jobs for Groups............................................................................................. 10-6
10.3 Creating Jobs............................................................................................................................. 10-7
10.3.1 Selecting a Job Type.......................................................................................................... 10-7
10.3.2 Creating an OS Command Job........................................................................................ 10-7
10.3.2.1 Specifying a Single Operation................................................................................ 10-12
10.3.2.2 Specifying a Script ................................................................................................... 10-13
10.3.2.3 Access Level Rules................................................................................................... 10-14
10.3.3 Creating a SQL Script Job .............................................................................................. 10-14
10.3.3.1 Specifying Targets ................................................................................................... 10-15
10.3.3.2 Specifying Options for the Parameters Page....................................................... 10-15
10.3.3.3 Specifying Host and Database Credentials.......................................................... 10-15
10.3.3.4 Returning Error Codes from SQL Script Jobs...................................................... 10-16
10.3.4 Creating a Multi-task Job............................................................................................... 10-17
10.3.4.1 Job Capabilities ........................................................................................................ 10-17
10.3.4.2 Specifying Targets for a Multi-task Job................................................................ 10-17
10.3.4.3 Adding Tasks to the Job.......................................................................................... 10-18
10.4 Viewing and Analyzing Job Status...................................................................................... 10-18
10.5 Generating Job Event Criteria .............................................................................................. 10-20
10.5.1 Enabling Events For Job Status, Status Severity, and Targetless Jobs..................... 10-21
10.5.2 Adding Targets To Generate Events For Job Status ................................................. 10-22
10.6 Creating Event Rules For Job Status Change..................................................................... 10-22
10.6.1 Creating Job Status Change Event Rules For Jobs ..................................................... 10-22
10.6.2 Creating Job Status Change Event Rules For Targets ............................................... 10-25
10.7 Using Diagnostic Tools ......................................................................................................... 10-29
10.7.1 Enabling Job Logging..................................................................................................... 10-29
10.7.2 Viewing Job Logging...................................................................................................... 10-29
10.7.3 Debugging a Failed Job.................................................................................................. 10-30
10.7.4 Checking for Incidents Related to a Failed Job........................................................... 10-30
10.7.5 Packaging an Incident Generated by a Job Step......................................................... 10-31
10.7.6 Viewing Remote Log Files............................................................................................. 10-31
10.7.7 Diagnosing Problems with Cloud Control Management Tools .............................. 10-32
10.7.7.1 Health Overview ..................................................................................................... 10-32
11. xi
10.7.7.2 Repository Home Page ........................................................................................... 10-33
10.7.7.3 Management Services and Repository: All Metrics............................................ 10-33
10.7.7.4 OMS and Repository: Diagnostic Metrics............................................................ 10-34
10.7.7.5 OMS and Repository: Charts ................................................................................. 10-35
10.7.7.6 Management Servers and Job Activity Details Pages ........................................ 10-35
10.7.7.7 Job System Reports.................................................................................................. 10-35
10.8 Creating Corrective Actions................................................................................................. 10-36
10.8.1 Providing Credentials .................................................................................................... 10-36
10.8.2 Creating Corrective Actions for Metrics...................................................................... 10-37
10.8.3 Creating a Library Corrective Action .......................................................................... 10-38
10.8.4 Specifying Access to Corrective Actions..................................................................... 10-38
10.8.4.1 Defining or Modifying Access............................................................................... 10-39
10.8.4.2 Access Level Rules................................................................................................... 10-39
10.8.5 Setting Up Notifications for Corrective Actions ........................................................ 10-39
10.8.6 Providing Agent-side Response Actions..................................................................... 10-40
10.8.6.1 Specifying Commands and Scripts....................................................................... 10-41
10.8.6.2 Using Target Properties in Commands................................................................ 10-41
10.8.6.3 Using Advanced Capabilities ................................................................................ 10-41
10.8.7 Viewing the Details of a Corrective Action Execution.............................................. 10-42
11 Monitoring Access Points Configured for a Target
11.1 Introduction to Monitoring Access Points ........................................................................... 11-1
11.2 Viewing a List of Access Points Configured for a Target .................................................. 11-3
11.3 Deleting Access Points Configured for a Target ................................................................. 11-3
11.4 Viewing the Capability Metric Map for a Target ............................................................... 11-3
11.5 Viewing the Best Access Point Implementers (and their History) for Various Operations
Supported for a Target 11-4
11.6 Modifying or Reconfiguring the Monitoring Properties of the Access Points Configured for
a Target 11-5
11.7 EM CLI Verbs for Managing the Access Points Configured for a Target........................ 11-6
12 Always-On Monitoring
12.1 Best Practices ............................................................................................................................ 12-1
12.2 Installing Always-On Monitoring ......................................................................................... 12-2
12.2.1 Installing the Always-On Monitoring Repository Database...................................... 12-2
12.2.1.1 Database Sizing.......................................................................................................... 12-2
12.2.1.2 Database Character Set Definition .......................................................................... 12-5
12.2.2 Creating the Always-On Monitoring Repository User ............................................... 12-6
12.2.2.1 Granting Required Privileges to the Always-On Monitoring Schema Owner. 12-6
12.2.3 Installing Always-On Monitoring.................................................................................. 12-7
12.3 Configuring Always-On Monitoring .................................................................................... 12-7
12.3.1 Using the Always-On Monitoring Configuration Assistant (EMSCA) .................... 12-7
12.3.2 Configuring Email Servers in Enterprise Manager ................................................... 12-10
12.3.3 Configuring Downtime Contacts in Enterprise Manager......................................... 12-10
12.3.4 Synchronizing Always-On Monitoring with Enterprise Manager for the First Time.......
12-13
12.3.5 Configuring Enterprise Manager to Work with Always-On Monitoring .............. 12-13
12. xii
12.3.6 Verifying the Always-On Monitoring Upload URL on Enterprise Manager ........ 12-14
12.4 Saving the Em Key................................................................................................................. 12-14
12.5 Controlling the Service.......................................................................................................... 12-14
12.5.1 Always-On Monitoring Commands ............................................................................ 12-17
12.6 Updating Always-On Monitoring....................................................................................... 12-18
12.7 Data Maintenance .................................................................................................................. 12-19
12.8 Controlling Always-On Monitoring Configuration Settings ......................................... 12-19
12.9 Getting Performance Information ....................................................................................... 12-20
12.10 Modifiable Always-On Monitoring Properties ................................................................. 12-20
12.11 Diagnosing Problems ............................................................................................................ 12-21
12.12 High Availability and Disaster Recovery........................................................................... 12-22
12.12.1 Running Multiple Always-On Monitoring Instances................................................ 12-22
12.12.1.1 Shared Configuration Storage for the Multiple Instances................................. 12-22
12.12.1.2 Notification Queues for Tracking Incoming Alerts............................................ 12-23
12.12.1.3 Task Scheduler System ........................................................................................... 12-23
12.12.1.4 Configuring an SLB ................................................................................................ 12-23
12.12.2 Always-On Monitoring Disaster Recovery................................................................. 12-24
Part II Discovery
13 Discovering and Adding Host and Non-Host Targets
13.1 Overview of Discovering and Adding Targets ................................................................... 13-1
13.1.1 Understanding Discovery Terminology........................................................................ 13-1
13.1.1.1 What are Targets and Managed Targets? .............................................................. 13-1
13.1.1.2 What is Discovery?.................................................................................................... 13-2
13.1.1.3 What is Promotion?................................................................................................... 13-2
13.1.2 Options for Discovering Targets .................................................................................... 13-3
13.1.3 Discovery and Monitoring in Enterprise Manager Lifecycle..................................... 13-4
13.1.4 Discovery and Monitoring Process................................................................................ 13-4
13.2 Discovering and Adding Host Targets................................................................................. 13-5
13.2.1 Configuring Autodiscovery of Host Targets................................................................ 13-6
13.2.1.1 Prerequisites for Autodiscovering Host Targets................................................... 13-6
13.2.1.2 Setting Up Autodiscovery of Host Targets............................................................ 13-7
13.2.2 Adding Host Targets Using the Manual Guided Discovery Process........................ 13-9
13.3 Discovering and Adding Non-Host Targets........................................................................ 13-9
13.3.1 Configuring Autodiscovery of Non-Host Targets..................................................... 13-10
13.3.2 Adding Non-Host Targets Using the Guided Discovery Process........................... 13-12
13.3.3 Adding Non-Host Targets By Using the Declarative Process.................................. 13-13
13.4 Discovering and Promoting Oracle Homes ....................................................................... 13-14
13.5 Retrieving Deleted Targets................................................................................................... 13-17
13.5.1 Retrieving Deleted Target Types.................................................................................. 13-17
13.5.2 Retrieving Deleted Host and Corresponding Management Agent Targets .......... 13-18
14 Discovering and Adding Database Targets
14.1 Enabling Autodiscovery of Database Targets ..................................................................... 14-1
14.2 Discovering and Adding Container Database and Pluggable Database Targets........... 14-2
13. xiii
14.2.1 Discovering CDB and PDB Targets Using Autodiscovery......................................... 14-2
14.2.2 Adding CDB and PDB Targets Using the Guided Discovery Process...................... 14-4
14.2.3 Adding CDB and PDB Targets By Using the Declarative Process ............................ 14-7
14.3 Discovering and Adding Cluster Database Targets ........................................................... 14-8
14.3.1 Discovering Cluster Database Targets Using Autodiscovery.................................... 14-8
14.3.2 Adding Cluster Database Targets Using the Guided Discovery Process............... 14-10
14.3.3 Adding Cluster Database Targets By Using the Declarative Process..................... 14-12
14.4 Discovering and Adding Single Instance Database Targets............................................ 14-13
14.4.1 Discovering Single Instance Database Targets Using Autodiscovery.................... 14-14
14.4.2 Adding Single Instance Database Targets Using Guided Discovery Process ....... 14-15
14.4.3 Adding Single Instance Database Targets By Using the Declarative Process ....... 14-17
14.5 Discovering and Adding Cluster Targets........................................................................... 14-18
14.5.1 Discovering Cluster Targets Using Autodiscovery................................................... 14-18
14.5.2 Adding Cluster Targets Using the Guided Discovery Process................................ 14-20
14.5.3 Adding Cluster Targets By Using the Declarative Process ...................................... 14-22
14.6 Discovering and Adding Single Instance High Availability Service Targets ............... 14-23
14.6.1 Discovering Single Instance High Availability Service Targets Using Autodiscovery.....
14-23
14.6.2 Adding Single Instance High Availability Service Targets Using the Guided Discovery
Process 14-24
14.6.3 Adding Single Instance High Availability Service Targets By Using the Declarative
Process 14-26
14.7 Discovering and Adding Cluster Automatic Storage Management Targets................ 14-27
14.7.1 Discovering Cluster ASM Targets Using Autodiscovery......................................... 14-27
14.7.2 Adding Cluster ASM Targets Using the Guided Discovery Process...................... 14-28
14.7.3 Adding Cluster ASM Targets By Using the Declarative Process ............................ 14-30
14.8 Configuring a Target Database for Secure Monitoring.................................................... 14-31
14.8.1 About Secure Monitoring of Databases....................................................................... 14-31
14.8.2 Configuring a Target Database for Secure Monitoring............................................. 14-32
15 Discovering and Adding Middleware Targets
15.1 Discovering and Adding WebLogic Domains..................................................................... 15-1
15.1.1 Discovering WebLogic Domains Using Autodiscovery ............................................. 15-1
15.1.2 Adding WebLogic Domains Using the Guided Discovery Process.......................... 15-5
15.1.3 Adding Multiple WebLogic Domains Using EM CLI................................................. 15-9
15.2 Discovering New or Modified Domain Members ............................................................ 15-10
15.2.1 Enabling Automatic Discovery of New Domain Members...................................... 15-10
15.2.2 Manually Checking for New or Modified Domain Members.................................. 15-10
15.3 Adding Standalone Oracle HTTP Servers.......................................................................... 15-11
15.3.1 Meeting the Prerequisites.............................................................................................. 15-12
15.3.2 Adding Standalone Oracle HTTP Servers Using the Guided Discovery Process. 15-12
15.4 Adding Exalytics Targets...................................................................................................... 15-13
15.4.1 Meeting the Prerequisites.............................................................................................. 15-14
15.4.2 Adding Exalytics System Targets Using the Guided Discovery Process ............... 15-14
15.5 Removing Middleware Targets ........................................................................................... 15-16
14. xiv
16 Discovering, Promoting, and Adding System Infrastructure Targets
16.1 About Discovering, Promoting, and Adding System Infrastructure Targets................. 16-1
16.2 Discovering and Promoting Operating Systems................................................................. 16-2
16.3 Discovering and Promoting Oracle Solaris Zones .............................................................. 16-2
16.4 Discovering and Promoting Oracle VM Server for SPARC............................................... 16-3
16.5 Discovering and Promoting Servers ..................................................................................... 16-4
16.5.1 Discover an ILOM Server Using the User Interface .................................................... 16-4
16.5.2 Discover an ILOM Server Using the Command Line Interface................................. 16-5
16.5.3 Change the Display Name of a Discovered ILOM Server.......................................... 16-6
16.6 Discovering and Promoting Oracle SuperCluster .............................................................. 16-6
16.6.1 Prerequisites ...................................................................................................................... 16-6
16.6.2 Obtain the Discovery Precheck Script ........................................................................... 16-6
16.6.3 Run the Discovery Precheck Script ................................................................................ 16-7
16.6.4 Credentials Required for Oracle SuperCluster Discovery.......................................... 16-7
16.6.5 Manual Prerequisite Verification ................................................................................... 16-8
16.6.6 Oracle SuperCluster Discovery ...................................................................................... 16-8
16.7 Discovering and Promoting PDUs...................................................................................... 16-11
16.7.1 Verify PDU v1 NMS Table and Trap Hosts Setup Table.......................................... 16-11
16.7.2 Verify PDU v2 NMS Table and Trap Hosts Setup Table.......................................... 16-11
16.7.3 PDU Discovery in the Enterprise Manager................................................................. 16-12
16.7.4 Discovering a PDU Using Command Line Interface................................................. 16-13
16.8 Discovering and Promoting Oracle ZFS Storage............................................................... 16-14
16.8.1 Discovering an Oracle ZFS Storage Appliance .......................................................... 16-15
16.8.1.1 Target Members of an Oracle ZFS Storage Appliance....................................... 16-16
16.8.1.2 Target Members of an Oracle ZFS Storage Appliance Cluster......................... 16-16
16.9 Discovering Fabrics ............................................................................................................... 16-16
16.9.1 Discover an InfiniBand Network Switch..................................................................... 16-16
16.9.2 Discover an Ethernet Network Switch ........................................................................ 16-19
16.9.3 Use the Command Line To Discover a Switch........................................................... 16-20
16.10 Related Resources for Discovering and Promoting System Infrastructure Targets..... 16-21
Part III Hybrid Cloud Management
17 Enabling Hybrid Cloud Management
17.1 List of Unsupported Features................................................................................................. 17-1
17.2 Overview of Hybrid Cloud Management Terminology.................................................... 17-2
17.3 Getting Started with Hybrid Cloud Management.............................................................. 17-3
17.4 Overview of Hybrid Cloud Architecture and Communication........................................ 17-4
17.5 Prerequisites for Configuring a Hybrid Cloud Gateway Agent....................................... 17-7
17.6 Configuring an Management Agent as a Hybrid Cloud Gateway Agent....................... 17-7
17.7 Configuring an External Proxy to Enable Hybrid Cloud Gateway Agents to Communicate
with Oracle Cloud 17-8
17.8 Prerequisites for Installing Hybrid Cloud Agents.............................................................. 17-9
17.9 Installing a Hybrid Cloud Agent......................................................................................... 17-11
17.9.1 Installing a Hybrid Cloud Agent Using the Add Host Targets Wizard................. 17-11
17.9.2 Installing a Hybrid Cloud Agent Using EM CLI ....................................................... 17-14
17.10 Upgrading Hybrid Cloud Gateway Agents and Hybrid Cloud Agents ....................... 17-16
15. xv
17.11 Performing Additional Hybrid Cloud Management Tasks............................................. 17-16
17.11.1 Configuring Hybrid Cloud Agents for High Availability (Recommended).......... 17-16
17.11.2 Disabling Hybrid Cloud Gateway Agents.................................................................. 17-18
17.11.3 Disassociating a Hybrid Cloud Gateway Agent from a Set of Hybrid Cloud Agents......
17-19
17.11.4 Decommissioning Hybrid Cloud Agents.................................................................... 17-19
17.12 Patching Hybrid Cloud Agents and Hybrid Cloud Gateway Agents ........................... 17-19
17.13 Discovering and Monitoring Oracle Cloud Targets ......................................................... 17-20
17.14 Frequently Asked Questions About Hybrid Cloud Management ................................. 17-21
17.14.1 If I have deployed a Hybrid Cloud Agent on the Oracle Cloud virtual host. Can I
deploy another Hybrid Cloud Agent on the same virtual host? 17-21
17.14.2 Can I deinstall and deconfigure a Hybrid Cloud Gateway Agent without deinstalling a
Hybrid Cloud Agent with Which It Is Associated? 17-21
17.14.3 How Do I Relocate the Hybrid Cloud Gateway Agent to Another Host without
Deinstalling Anything Else? 17-22
17.14.4 How Can I Redistribute My Connections Once I Have Added the Hybrid Cloud
Gateway Agents? Does It Need Reconfiguration? 17-22
17.14.5 After an Oracle PaaS Instance Is Decommissioned from the Oracle Cloud Portal, What
Should I Do with the Hybrid Cloud Agent and the Related Targets in the Enterprise
Manager Cloud Control Console? 17-23
17.14.6 If I Change My SSH Keys on Oracle Cloud, What Should I Do in Enterprise Manager?.
17-23
17.14.7 What Are the Guidelines for Sizing the Number of Hybrid Cloud Gateway Agents?
What Is the Indication That My Hybrid Cloud Gateway Agent is Overloaded? 17-23
17.14.8 In a High-Availability Configuration with Multiple Hybrid Cloud Gateway Agents,
When I Patch One Hybrid Cloud Gateway Agent, the Monitoring Switches to the
Other Hybrid Cloud Gateway Agent. Once the First Hybrid Cloud Gateway Agent Is
Up After Being Patched, Will It Monitor the Hybrid Cloud Agents? 17-23
17.14.9 What Are the User Restrictions on Hybrid Cloud Agents and the Targets on Oracle
Cloud? 17-24
17.14.10 On What Operating System Can I Deploy a Hybrid Cloud Agent and a Hybrid Cloud
Gateway Agent? 17-24
18 Deploying JVMD for Hybrid Cloud
18.1 Overview of Deploying JVMD for Hybrid Cloud .............................................................. 18-1
18.2 Prerequisites for Deploying JVMD Agents on Oracle Cloud Virtual Hosts ................... 18-1
18.3 Deploying JVMD Agents on Oracle Cloud Virtual Hosts ................................................. 18-2
18.4 Changing the Default JVMD End Point for Hybrid Cloud Gateway Agents................. 18-3
18.5 After Deploying JVMD Agents on Oracle Cloud Virtual Hosts....................................... 18-3
Part IV Administering Cloud Control
19 Maintaining Enterprise Manager
19.1 Overview: Managing the Manager ....................................................................................... 19-1
19.2 Health Overview...................................................................................................................... 19-2
19.2.1 Viewing Enterprise Manager Topology and Charts.................................................... 19-2
19.2.2 Determining Enterprise Manager Page Performance ................................................. 19-3
19.3 Repository ................................................................................................................................. 19-6
16. xvi
19.3.1 Repository Tab .................................................................................................................. 19-7
19.3.2 Metrics Tab ...................................................................................................................... 19-11
19.3.3 Schema Tab...................................................................................................................... 19-13
19.4 Controlling and Configuring Management Agents.......................................................... 19-14
19.4.1 Manage Cloud Control Agents Page ........................................................................... 19-14
19.4.2 Agent Home Page........................................................................................................... 19-14
19.4.3 Controlling a Single Agent............................................................................................ 19-15
19.4.4 Configuring Single Management Agents.................................................................... 19-15
19.4.5 Controlling Multiple Management Agents................................................................. 19-16
19.4.6 Configuring Multiple Agents........................................................................................ 19-17
19.4.7 Upgrading Multiple Management Agents.................................................................. 19-18
19.5 Management Servers............................................................................................................. 19-18
20 Maintaining and Troubleshooting the Management Repository
20.1 Management Repository Deployment Guidelines ............................................................. 20-1
20.2 Management Repository Data Retention Policies............................................................... 20-2
20.2.1 Management Repository Default Aggregation and Purging Policies....................... 20-2
20.2.2 Management Repository Default Aggregation and Purging Policies for Other
Management Data 20-4
20.2.3 Modifying the Default Aggregation and Purging Policies......................................... 20-4
20.2.4 How to Modify the Retention Period of Job History................................................... 20-6
20.2.5 DBMS_SCHEDULER Troubleshooting......................................................................... 20-7
20.3 Dropping and Recreating the Management Repository .................................................... 20-9
20.3.1 Dropping the Management Repository......................................................................... 20-9
20.3.2 Recreating the Management Repository ..................................................................... 20-10
20.3.2.1 Using a Connect Descriptor to Identify the Management Repository Database ........
20-10
20.4 Troubleshooting Management Repository Creation Errors ............................................ 20-11
20.4.1 Package Body Does Not Exist Error While Creating the Management Repository...........
20-11
20.4.2 Server Connection Hung Error While Creating the Management Repository...... 20-11
20.4.3 General Troubleshooting Techniques for Creating the Management Repository 20-11
20.5 Cross Platform Enterprise Manager Repository Migration............................................. 20-13
20.5.1 Common Prerequisites................................................................................................... 20-13
20.5.2 Methodologies................................................................................................................. 20-14
20.5.2.1 Using Cross Platform Transportable Database................................................... 20-14
20.5.2.2 Migration Using Physical Standby ....................................................................... 20-18
20.5.3 Post Migration Verification ........................................................................................... 20-20
21 Updating Cloud Control
21.1 Using Self Update .................................................................................................................... 21-1
21.1.1 What Can Be Updated? ................................................................................................... 21-1
21.2 Setting Up Self Update............................................................................................................ 21-2
21.2.1 Setting Up Enterprise Manager Self Update Mode ..................................................... 21-2
21.2.2 Assigning Self Update Privileges to Users.................................................................... 21-3
21.2.3 Setting Up the Software Library..................................................................................... 21-3
21.2.4 Setting My Oracle Support Preferred Credentials....................................................... 21-3
17. xvii
21.2.5 Registering the Proxy Details for My Oracle Support................................................. 21-3
21.2.6 Setting Up the EM CLI Utility (Optional) ..................................................................... 21-4
21.3 Applying an Update................................................................................................................ 21-5
21.3.1 Applying an Update in Online Mode............................................................................ 21-5
21.3.2 Applying an Update in Offline Mode............................................................................ 21-6
21.4 Accessing Informational Updates ......................................................................................... 21-7
21.5 Acquiring or Updating Management Agent Software....................................................... 21-8
22 Configuring a Software Library
22.1 Overview of Software Library ............................................................................................... 22-1
22.2 Users, Roles, and Privileges.................................................................................................... 22-3
22.3 What’s New in Software Library........................................................................................... 22-5
22.4 Performing Software Library Tasks Using EM CLI Verbs or in Graphical Mode ......... 22-5
22.5 Software Library Storage ........................................................................................................ 22-8
22.5.1 Upload File Locations ...................................................................................................... 22-9
22.5.2 Referenced File Location................................................................................................ 22-11
22.5.3 Cache Nodes.................................................................................................................... 22-11
22.6 Prerequisites for Configuring Software Library................................................................ 22-11
22.7 Configuring Software Library Storage Location............................................................... 22-12
22.7.1 Configuring an OMS Shared File system Location.................................................... 22-12
22.7.2 Configuring an OMS Agent File system Location..................................................... 22-13
22.7.3 Configuring a Referenced File Location...................................................................... 22-15
22.8 Configuring Software Library on a Multi-OMS System .................................................. 22-16
22.9 Software Library Cache Nodes............................................................................................ 22-17
22.9.1 Configuring the Cache Nodes....................................................................................... 22-17
22.9.1.1 Adding Cache Nodes.............................................................................................. 22-18
22.9.1.2 Editing the Cache Nodes........................................................................................ 22-20
22.9.1.3 Deleting the Cache Nodes...................................................................................... 22-20
22.9.1.4 Activating or Deactivating the Cache Nodes ...................................................... 22-20
22.9.1.5 Clearing the Cache Nodes...................................................................................... 22-20
22.9.1.6 Synchronizing the Cache Nodes ........................................................................... 22-21
22.9.2 Exporting and Importing Files for Cache Nodes....................................................... 22-21
22.9.2.1 Export........................................................................................................................ 22-21
22.9.2.2 Import........................................................................................................................ 22-21
22.10 Software Library File Transfers ........................................................................................... 22-21
22.11 Using Software Library Entities........................................................................................... 22-22
22.12 Tasks Performed Using the Software Library Home Page.............................................. 22-23
22.12.1 Organizing Entities......................................................................................................... 22-23
22.12.2 Creating Entities.............................................................................................................. 22-24
22.12.2.1 Creating Generic Components .............................................................................. 22-24
22.12.2.2 Creating Directives.................................................................................................. 22-26
22.12.3 Customizing Entities ...................................................................................................... 22-28
22.12.4 Managing Entities........................................................................................................... 22-29
22.12.4.1 Accessing Software Library Home Page.............................................................. 22-29
22.12.4.2 Accessing Software Library Administration Page.............................................. 22-29
22.12.4.3 Granting or Revoking Privileges........................................................................... 22-29
22.12.4.4 Moving Entities........................................................................................................ 22-30
18. xviii
22.12.4.5 Changing Entity Maturity...................................................................................... 22-30
22.12.4.6 Adding Notes to Entities ........................................................................................ 22-31
22.12.4.7 Adding Attachments to Entities............................................................................ 22-31
22.12.4.8 Viewing, Editing, and Deleting Entities............................................................... 22-32
22.12.4.9 Purging Deleted Entities......................................................................................... 22-32
22.12.4.10 Searching Entities .................................................................................................... 22-33
22.12.4.11 Exporting Entities.................................................................................................... 22-34
22.12.4.12 Importing Entities.................................................................................................... 22-35
22.12.5 Staging Entities................................................................................................................ 22-35
22.13 Maintaining Software Library.............................................................................................. 22-37
22.13.1 Periodic Maintenance Tasks.......................................................................................... 22-37
22.13.2 Re-Importing Oracle Owned Entity Files.................................................................... 22-37
22.13.3 Removing (and Migrating) Software Library Storage Location .............................. 22-38
22.13.4 Removing a Referenced Storage Location................................................................... 22-39
22.13.5 Deactivating and Activating a Storage Location........................................................ 22-40
22.13.6 Scheduling Purge Job ..................................................................................................... 22-40
22.13.7 Backing Up Software Library........................................................................................ 22-41
23 Managing Plug-Ins
23.1 Getting Started.......................................................................................................................... 23-1
23.2 Introduction to Plug-ins.......................................................................................................... 23-2
23.2.1 Enterprise Manager Extensibility Paradigm................................................................. 23-2
23.2.2 Plug-Ins .............................................................................................................................. 23-3
23.2.3 Plug-Ins Deployed by Default ........................................................................................ 23-3
23.2.4 Plug-In Releases................................................................................................................ 23-4
23.2.5 Obsolete and Deprecated Plug-ins................................................................................. 23-4
23.2.6 Roles Required to Manage Plug-Ins............................................................................... 23-4
23.3 Workflow of Plug-In Deployment......................................................................................... 23-4
23.4 Introduction to Plug-In Manager........................................................................................... 23-8
23.4.1 Accessing Plug-In Manager............................................................................................. 23-8
23.4.2 Performing Operations Using Plug-In Manager.......................................................... 23-9
23.5 Knowing Your Plug-Ins .......................................................................................................... 23-9
23.5.1 Customizing Your View ................................................................................................ 23-10
23.5.1.1 Customizing Displayed Plug-Ins ......................................................................... 23-10
23.5.1.2 Customizing Displayed Columns......................................................................... 23-10
23.5.2 Checking the Availability of Plug-Ins.......................................................................... 23-11
23.5.3 Viewing Information about Plug-Ins........................................................................... 23-11
23.5.3.1 Differentiating Plug-In Releases from Enterprise Manager Platform Releases ..........
23-11
23.5.3.2 Identifying Plug-In ID............................................................................................. 23-12
23.5.3.3 Viewing Targets and Operating Systems Certified for Deployed Plug-Ins.... 23-12
23.5.3.4 Viewing Plug-In Dependencies............................................................................. 23-12
23.5.3.5 Verifying Deployed Plug-Ins................................................................................. 23-13
23.6 Downloading, Deploying, and Upgrading Plug-Ins ........................................................ 23-14
23.6.1 Downloading Plug-Ins................................................................................................... 23-14
23.6.1.1 Downloading Plug-Ins in Online Mode............................................................... 23-14
23.6.1.2 Downloading Plug-Ins in Offline Mode .............................................................. 23-15
19. xix
23.6.1.3 Importing Catalog Archives .................................................................................. 23-15
23.6.1.4 Importing Plug-In Archives................................................................................... 23-16
23.6.2 Deploying Plug-Ins to Oracle Management Service (Reduce OMS Restart time and
Downtime) 23-17
23.6.2.1 Tracking the Deployment Status of Plug-Ins on Oracle Management Service ...........
23-19
23.6.3 Upgrading Plug-Ins Deployed to Oracle Management Service .............................. 23-20
23.6.4 Deploying Plug-Ins on Oracle Management Agent .................................................. 23-20
23.6.4.1 Tracking the Deployment Status of Plug-Ins on Oracle Management Agent 23-21
23.6.5 Upgrading Plug-Ins Deployed to Oracle Management Agent ................................ 23-21
23.7 Undeploying Plug-Ins........................................................................................................... 23-21
23.7.1 Undeploying Plug-Ins from Oracle Management Service........................................ 23-21
23.7.2 Undeploying Plug-Ins from Oracle Management Agent ......................................... 23-22
23.8 Advanced Operations with Plug-Ins .................................................................................. 23-23
23.8.1 Re-deploying Plug-Ins on Oracle Management Agent............................................. 23-23
23.8.2 Deploying Plug-In Patches While Deploying or Upgrading Management Agent
(Create Custom Plug-In Update) 23-24
23.8.2.1 Creating Custom Plug-In Update Using EMCLI................................................ 23-24
23.8.2.2 Creating Custom Plug-In Update Using EDK .................................................... 23-25
23.9 Troubleshooting ..................................................................................................................... 23-26
23.9.1 Understanding Plug-In Homes..................................................................................... 23-26
23.9.2 Troubleshooting OMS Plug-In Deployment and Upgrade Issues .......................... 23-27
23.9.2.1 Troubleshooting OMS Plug-In Deployment Issues............................................ 23-27
23.9.2.2 Rollback and Resume OMS Plug-In Upgrade..................................................... 23-28
23.9.3 Troubleshooting Management Agent Plug-In Deployment, Upgrade, and Blocked
Issues 23-28
23.9.3.1 Troubleshooting Management Agent Plug-In Deployment Issues ................. 23-28
23.9.3.2 Troubleshooting Management Agent Plug-In Upgrade Issues........................ 23-28
23.9.3.3 Resolving a Plug-in Mismatch on a Management Agent.................................. 23-29
23.9.3.4 Running a Plug-in Mismatch Job to Resolve All Plug-in Mismatches ............ 23-29
24 Patching Oracle Management Service and the Repository
24.1 OMSPatcher Automation....................................................................................................... 24-1
24.1.1 Supported OMS Configurations and OMSPatcher Patchability................................ 24-1
24.1.2 OUI Inventory Configurations ....................................................................................... 24-2
24.1.3 Supported Patch Format.................................................................................................. 24-3
24.1.4 Supported Patching Methodologies .............................................................................. 24-3
24.2 Required OMSPatcher Parameters........................................................................................ 24-3
24.2.1 Creating a Property File................................................................................................... 24-4
24.3 Prerequisites for Running OMSPatcher................................................................................ 24-6
24.4 Using OMSPatcher................................................................................................................... 24-8
24.4.1 My Oracle Support: Searching for Patches .................................................................. 24-9
24.4.2 Running omspatcher apply.......................................................................................... 24-13
24.4.3 Running omspatcher rollback.................................................................................... 24-14
24.4.4 Running omspatcher lspatches.................................................................................. 24-14
24.4.5 Running omspatcher version...................................................................................... 24-15
24.4.6 Patching a Standby OMS System ................................................................................. 24-15
20. xx
OMSPatcher Command Syntax ........................................................................................... 24-16
Apply................................................................................................................................ 24-17
Rollback............................................................................................................................ 24-20
lspatches........................................................................................................................... 24-23
version .............................................................................................................................. 24-24
checkApplicable.............................................................................................................. 24-25
saveConfigurationSnapshot ......................................................................................... 24-26
Troubleshooting ..................................................................................................................... 24-28
OMSPatcher Troubleshooting Architecture ............................................................... 24-29
OMSPatcher Log Management Architecture.............................................................. 24-30
Logs for Oracle Support................................................................................................. 24-32
OMSPatcher: Cases Analysis, Error Codes, and Remedies/Suggestions .............. 24-33
OMSPatcher: External Utilities Error Codes............................................................... 24-35
Special Error Cases for OMSPatcher OMS Automation ........................................... 24-36
Multi-OMS Execution for UNIX based Systems ....................................................... 24-39
Features in OMSPatcher Release 13.6.0.0.0 ........................................................................ 24-43
Resume capability in Single-OMS Configuration...................................................... 24-44
Resume Capability in Multi-OMS Configuration...................................................... 24-48
25 Patching Oracle Management Agents
25.1 Overview................................................................................................................................... 25-1
25.2 Automated Management Agent Patching Using Patch Plans (Recommended) ............ 25-1
25.2.1 Advantages of Automated Management Agent Patching.......................................... 25-2
25.2.2 Accessing the Patches and Updates Page ..................................................................... 25-2
25.2.3 Viewing Patch Recommendations ................................................................................. 25-3
25.2.4 Searching for Patches ....................................................................................................... 25-3
25.2.4.1 Searching for Patches On My Oracle Support....................................................... 25-3
25.2.4.2 Searching for Patches in Software Library............................................................. 25-4
25.2.5 Applying Management Agent Patches.......................................................................... 25-5
25.2.6 Verifying the Applied Management Agent Patches.................................................... 25-9
25.2.7 Management Agent Patching Errors ............................................................................. 25-9
25.2.7.1 Oracle Home Credentials Are Not Set ................................................................... 25-9
25.2.7.2 Management Agent Target Is Down .................................................................... 25-10
25.2.7.3 Patch Conflicts Are Detected ................................................................................. 25-10
25.2.7.4 User Is Not a Super User ........................................................................................ 25-11
25.2.7.5 Patch Is Not Staged or Found................................................................................ 25-11
25.3 Manual Management Agent Patching................................................................................ 25-12
26 Personalizing Cloud Control
26.1 Personalizing a Cloud Control Page ..................................................................................... 26-1
26.2 Customizing a Region ............................................................................................................. 26-2
26.3 Setting Your Homepage.......................................................................................................... 26-3
26.4 Setting Pop-Up Message Preferences.................................................................................... 26-4
21. xxi
27 Administering Enterprise Manager Using EMCTL Commands
27.1 Executing EMCTL Commands .............................................................................................. 27-2
27.2 Guidelines for Starting Multiple Enterprise Manager Components on a Single Host.. 27-2
27.3 Starting and Stopping Oracle Enterprise Manager 12c Cloud Control ........................... 27-2
27.3.1 Starting Cloud Control and All Its Components ......................................................... 27-2
27.3.2 Stopping Cloud Control and All Its Components ....................................................... 27-3
27.4 Services That Are Started with Oracle Management Service Startup.............................. 27-4
27.5 Starting and Stopping the Oracle Management Service and Management Agent on
Windows 27-4
27.6 Reevaluating Metric Collections Using EMCTL Commands............................................ 27-5
27.7 Specifying New Target Monitoring Credentials in Enterprise Manager......................... 27-7
27.8 EMCTL Commands for OMS................................................................................................. 27-7
27.9 EMCTL Commands for Management Agent..................................................................... 27-13
27.10 EMCTL Security Commands ............................................................................................... 27-16
27.10.1 EMCTL Secure Commands........................................................................................... 27-17
27.10.2 Security diagnostic commands..................................................................................... 27-19
27.10.3 EMCTL EM Key Commands ........................................................................................ 27-20
27.10.4 Configuring Authentication.......................................................................................... 27-21
27.10.4.1 Configuring OSSO Authentication ....................................................................... 27-22
27.10.4.2 Configuring OAM Authentication........................................................................ 27-22
27.10.4.3 Configuring LDAP (OID and AD) Authentication ............................................ 27-23
27.10.4.4 Configuring Repository Authentication (Default Authentication).................. 27-23
27.11 EMCTL HAConfig Commands ........................................................................................... 27-23
27.12 EMCTL Resync Commands ................................................................................................. 27-24
27.13 EMCTL Connector Command ............................................................................................. 27-25
27.14 EMCTL Patch Repository Commands................................................................................ 27-25
27.15 EMCTL Commands for Windows NT................................................................................ 27-26
27.16 EMCTL Partool Commands ................................................................................................. 27-26
27.17 EMCTL Plug-in Commands................................................................................................. 27-27
27.18 EMCTL Command to Sync with OPSS Policy Store......................................................... 27-27
27.19 Troubleshooting Oracle Management Service Startup Errors ........................................ 27-28
27.20 Troubleshooting Management Agent Startup Errors....................................................... 27-28
27.20.1 Management Agent starts up but is not ready........................................................... 27-28
27.20.2 Management Agent fails to start due to time zone mismatch between agent and OMS..
27-29
27.20.3 Management Agent fails to start due to possible port conflict ............................... 27-29
27.20.4 Management Agent fails to start due to failure of securing or unsecuring ........... 27-29
27.21 Using emctl.log File to Troubleshoot.................................................................................. 27-29
28 Locating and Configuring Enterprise Manager Log Files
28.1 Managing Log Files ................................................................................................................. 28-1
28.1.1 Viewing Log Files and Their Messages ......................................................................... 28-3
28.1.1.1 Restricting Access to the View Log Messages Menu Item and Functionality.. 28-4
28.1.1.2 Registering Additional Log Files............................................................................. 28-5
28.1.2 Searching Log Files........................................................................................................... 28-6
28.1.2.1 Searching Log Files: Basic Searches ........................................................................ 28-6