This scenario illustrates how you can correlate events that occur together to indicate a different or more severe condition than when the events occur separately. You create an event to indicate the correlated condition. Several conditions are detectable only with the correlation of separate event occurrences or the same event. The follow events are such situations:
Correlating events lets you represent the true condition in a new event that you can use to trigger escalation policy to resolve the problem.
This scenario assumes that you have connectors monitoring running services, and you have had problems in the past with services that shut down immediately after they are started. It does the following:
Follow these steps:
AlertedMdrElementID=? and matches (Summary,'service has started')
AlertedMdrElementID=? and matches (Summary,'service has stopped')
This search criteria returns events from the same connector and CI, where the first event summary contains the text 'service has started', and the second event summary contains the text 'service has stopped'.
This selection specifies that the events must occur within 45 seconds of each other and that the 'service has started' event must occur before the 'service has stopped' event.
The search results appear.
The Create Event Policy wizard opens and displays the New Policy page.
The Create New Event page opens.
This change increases the severity to critical and changes the summary to a specific indication of the correlated problem.
The Select Data Sources page opens.
Note: If only certain connectors, such as the CA NSM connector, are monitoring services, you can assign to specific connectors instead.
The Confirm page opens.
The policy is deployed.
The Create Event Policy wizard opens and displays the New Policy page.
The Select Data Sources page opens.
The filter event policy is deployed. This policy discards the original service startup and shutdown events, so that only the created event becomes an alert in the Operations Console.
The Escalation Policies and Actions dialog opens.
The Alert Escalation Policy Editor dialog opens.
A pane opens for specifying alert attribute-specific criteria.
The policy triggers when an alert occurs with the summary you specified for the new event.
The Escalation Action Editor dialog opens.
Tabs appear for specifying ticket properties.
The ticket summary matches the alert summary.
The action is saved.
CA SOI saves the escalation policy. When the deployed event policy detects the correlated event condition, the following actions occur:
|
Copyright © 2013 CA.
All rights reserved.
|
|