Data Virtualization Demoette… Logging in CIS

Slides:



Advertisements
Similar presentations
An End-User Perspective On Using NatQuery Extraction From two Files T
Advertisements

Understanding Analysis Reports In HP LoadRunner
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
LiveCycle Data Services Introduction Part 2. Part 2? This is the second in our series on LiveCycle Data Services. If you missed our first presentation,
Tutorial 121 Creating a New Web Forms Page You will find that creating Web Forms is similar to creating traditional Windows applications in Visual Basic.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
Performance Dash A free tool from Microsoft that provides some quick real time information about the status of your SQL Servers.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Damian Tamayo Tutorial DTM Data Generator Fall 2008 CIS 764.
Navigating SQL Server Lesson 3. Skills Matrix Graphical User Interface (GUI) Management Tools SQL Server Management Studio SQL Server Configuration Manager.
37 Copyright © 2007, Oracle. All rights reserved. Module 37: Executing Workflow Processes Siebel 8.0 Essentials.
3 Copyright © 2004, Oracle. All rights reserved. Working in the Forms Developer Environment.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
EValid LoadTest, eV.manger and Validation. Agenda Load Test capability of eValid How to execute load test by using eValid Introduction to eV.manager Validation.
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
Load Test Scenario Presentation Outline Introduction to Load Test Load Test capability of eValid Steps to create the Load Test Scripts.
SQL Database Management
ArcGIS for Server Security: Advanced
Data Virtualization Demoette… ODBC Clients
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Data Virtualization Tutorial: Custom Functions
Data Virtualization Demoette… Packaged Query Single Select Option
Visual Basic 2010 How to Program
Project Management: Messages
Data Virtualization Demoette… Business Directory Custom Properties
Data Virtualization Demoette… Caching – Database – Multi Table
Configuring ALSMS Remote Navigation
Business Directory REST API
Working in the Forms Developer Environment
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Netscape Application Server
Data Virtualization Tutorial: Introduction to SQL Script
Data Virtualization Demoette… Custom Java Procedures
Data Virtualization Demoette… Flat-File Data Sources
Data Virtualization Demoette… JMeter Load Testing CIS JDBC
Data Virtualization Demoette… ADO.NET Client
Data Virtualization Community Edition
Data Virtualization Demoette… JMeter Load Testing CIS SOAP
Data Virtualization Tutorial… LDAP Domains in CIS
Cisco Data Virtualization
Data Virtualization Community Edition
Data Virtualization Demoette… CIS Rights
Data Virtualization Tutorial… CORS and CIS
Data Virtualization Demoette… Data Lineage Reporting
Data Virtualization Tutorial… OAuth Example using Google Sheets
CONTENT MANAGEMENT SYSTEM CSIR-NISCAIR, New Delhi
Data Virtualization Tutorial: XSLT and Streaming Transformations
Introduction Purpose Objectives Content Learning Time
Data Virtualization Demoette… JDBC Clients
Using Data Dictionary and Dynamic Performance Views
Data Virtualization Tutorial… Semijoin Optimization
Data Virtualization Demoette… Column-Based Security
Creating an Oracle Database
SQL Server Monitoring Overview
Data Virtualization Demoette… Parameterized Queries
Data Virtualization Demoette… Salesforce.com Data Source
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
Data Virtualization Demoette… DDL Feature
Data Virtualization Tutorial: JSON_TABLE Queries
Data Virtualization Community Edition
CIS 336 strCompetitive Success/tutorialrank.com
Utilize Group Policy Terminal Server Settings
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Title: Agile Communication Environment Keycode Retrieval System (KRS) User Guide Issue: 0.4 Date: July 2011 Hi and welcome to the Order.
Configuration Of A Pull Network.
Using screens and adding two numbers - addda.cbl
Planning a Group Policy Management and Implementation Strategy
Windows Operating System
Presentation transcript:

Data Virtualization Demoette… Logging in CIS Hello, and welcome to the Demoette series for Cisco Information Server, or CIS. In this Demoette, we provide an overview of the logging capabilities of CIS.

Agenda What is it and why does it matter? A basic demo Summary Here is our agenda. We begin by defining Logging and outlining its importance for our customers. Next we walk through a very basic demo of Logging. Finally, we summarize the contents of this demoette.

Agenda What is it and why does it matter? A basic demo Summary Let’s begin by discussing what Logging is and why it is important for our customers.

What is it? Logging Comprehensive and highly configurable event logging Event types include: Cache, Cluster, Data Source, Request, Resource, Security, Session, Storage, System Overview, Transaction, and Trigger Event targets include: Database, File, SNMP, Custom Event logging capabilities in CIS are comprehensive and highly configurable. Many different system events may be logged, but they fall into the following categories: Caching, Clustering, Data Sources, Requests, Resources, Security, Session, Storage, System Overview, Transaction, and Trigger events. If an event is configured to be loggable, it may be logged to one or more of the following targets. First, it may be logged to the CIS repository database. Second, it may be logged in the CIS Event Monitor log file. Third, it may be logged as an SNMP trap. Finally, it may be logged to a user-written custom event handler. In this demoette, we will look at the first three targets. However, Custom Event Handlers are beyond the scope of this demoette.

Why does it matter? Logging Enterprise-grade system administration Detailed information for Support issues Logging is important to our customers for two reasons. First, it is a key component of enterprise-grade system administration. Second, it is a valuable source of detailed information that is useful in product Support scenarios.

Agenda What is it and why does it matter? A basic demo Summary Next, let’s walk through a very basic demo of Logging.

Demo: Here is the business problem… CIS Here is the business problem we illustrate in this demo. CIS requests may be terminated, either manually or programmatically. This is sometimes done to cancel runaway queries, for example. In this demoette, our enterprise wants close monitoring of cancelled requests. Therefore, we will configure CIS to log Cancel events to its database and its log file. We will also configure CIS to create an SNMP trap for Cancel events.

Demo: Before you begin… Import CAR file Install and configure iReasoning MIB Browser Load CIS MIB Run Trap Receiver This demo uses a stored procedure that executes an infinite loop, simulating a runaway query. It also uses several views of Log data. Before you begin the demo, import the CAR file containing these resources, which can be found in the Additional Resources folder that accompanies this demoette. <CLICK> In order to show SNMP logging, you will need to install and configure the free MIB Browser from iReasoning. The download for this software includes detailed instructions. The first configuration step is to import the CIS Management Information Base, or MIB. It is named CompositeSoftware-MIB.mib, and is found in the CIS installation directory in the apps/server folder. <CLICK> The second configuration step is to run the program’s Trap Receiver. Be sure it is set to listen to localhost on the default port. Make sure the iReasoning MIB Browser is running before you begin the demo.

Demo: Examine CIS Configuration We are ready to begin our demo. First, let’s look at the various CIS configuration options that need to be set. From the Studio menu, click Administration, then Configuration. <CLICK> Under Server/Events and Logging, make sure that the Enable System Events option is set to true. If this is false, no Server logging of any kind will be enabled.

Demo: Examine CIS Configuration Next, let’s open the Logging folder. There are five logging mechanisms. Memory logging is used by CIS Manager. Custom logging is beyond the scope of this demoette. We’ll be taking a closer look at Database, File, and SNMP logging. The amount of data kept in Memory and Database logs is configurable, but generally speaking, Memory holds the least amount of data, Database holds more, and File Logger holds the most. <CLICK> We open the SNMP folder and see that SNMP events are disabled by default. To create SNMP events, be sure to set this option to True. <CLICK> Note that CIS publishes SNMP traps on the default port 162.

Demo: Examine CIS Configuration Now let’s look at the specific events that can be generated for logging. As you can see, they fall into a number of categories. <CLICK> Each event has default log settings, and most are set to log to database and log file. For this demoette, we are going to work with a specific data request event called Request Cancel. <CLICK> We add SNMP to the list of log targets for this event. Now when a request is cancelled, it will be logged to the system database, the server event log file, and an SNMP trap will be generated.

Demo: Generate a Cancel Event This demoette provides a resource named procInfiniteLoop, which simply runs an endless loop that opens and closes a cursor. Execute this procedure so that we have an example of a runaway query Request that can be cancelled in order to generate the Cancel event we are interested in. <CLICK> Now open CIS Manager, and navigate to Monitoring | Requests. <CLICK> Select the runaway request. <CLICK> To be sure you are selecting the right Request, note that it has no parent ID… <CLICK> … and the script itself is shown in the Summary column. <CLICK> Cancel the Request.

Demo: Examine the SNMP Trap Our iReasoning Trap Receiver shows the event. Double-click it and all the details of the trap will be shown.

Demo: Examine the Log File Next, let’s take a look at the Server Events Log file. We could open the file with any text editor, but for this demoette, we have defined the log file as a flat-file CIS data source, with one column per line. We have built a simple View that selects all Cancel events from the log.

Demo: Examine the Log File We have also built a simple parameterized query that will return ALL events related to a specific cancelled request. We enter the Request ID… <CLICK> and the parameterized query returns the Start, Cancel, and Termination events for the Request.

Demo: Examine the System Database Finally, let’s look at the Cancel event on the System Database. Events are held in a System Table named LOG_EVENTS. We built a View against this table which finds the Request ID and uses it to retrieve all events related to a cancelled Request. Our demo is complete.

Agenda What is it and why does it matter? A basic demo Summary Let’s summarize what we have seen in this presentation.

Summary Logging Comprehensive and highly configurable event logging Event types include: Cache, Cluster, Data Source, Request, Resource, Security, Session, Storage, System Overview, Transaction, and Trigger Event targets include: Database, File, SNMP, Custom Enterprise-grade system administration Detailed information for Support issues Event logging capabilities in CIS are comprehensive and highly configurable. Many different system events may be logged, but they fall into the following categories: Caching, Clustering, Data Sources, Requests, Resources, Security, Session, Storage, System Overview, Transaction, and Trigger events. If an event is configured to be loggable, it may be logged to one or more of the following targets. First, it may be logged to the CIS repository database. Second, it may be logged in the CIS Event Monitor log file. Third, it may be logged as an SNMP trap. Finally, it may be logged to a user-written custom event handler. Logging is important to our customers for two reasons. First, it is an important component of enterprise-grade system administration. Second, it is a valuable source of detailed information that is useful in product Support scenarios. Thank you.

TOMORROW starts here.