Read Sample Text text version

StealthCollect For SQL Server Local Server Installation

StealthCollect SQL Server Local Server Installation

About StealthCollect................................................................................................................. 3 StealthCollect Architecture ........................................................................................................ 4 Multi-Tier or Single-Tier Installation......................................................................................... 5 Supported Platforms and Versions ........................................................................................... 7 Before You Install .................................................................................................................... 8 StealthCollect Installation Wizard ............................................................................................. 10 StealthCollect Setup Wizard - Installation Type ....................................................................... 10 StealthCollect Setup Wizard - Agents Framework Installation.................................................... 10 StealthCollect Setup Wizard - StealthCollect Installation .......................................................... 10 StealthCollect Setup Wizard - Monitored SQL Server Instance................................................... 11 StealthCollect Setup Wizard - SQL Server Authentication Details ............................................... 11 StealthCollect Setup Wizard - ERP Applications ....................................................................... 11 StealthCollect Setup Wizard - Performance Repository Installation Decision................................ 11 StealthCollect Setup Wizard - Performance Repository Instance and Authentication Method ......... 12 StealthCollect Setup Wizard - Performance Repository Database Files Directory .......................... 12 StealthCollect Setup Wizard - Installation Complete................................................................. 12 Configuring PeopleSoft ........................................................................................................... 13 Restoring Original PeopleSoft Configuration ......................................................................... 13

Copyright 2005 Quest Software, Inc. All Rights Reserved.

2

StealthCollect SQL Server Local Server Installation

About StealthCollect

StealthCollectTM is a server-based agent that samples and collects (multiple times per second) performance data from the SQL Server monitored instance memory and from the operating system APIs. The collected metrics are made available as data, either as a present activity stream or as historical activity. By going directly to the monitored instance memory and the operating system APIs, StealthCollect gathers session data samples from the SQL Server server in a non-intrusive manner, without incurring the overhead of using queries against the database and without affecting the currently running SQL Server processes. The raw samples are combined into high-level performance data. The data and statistics are made available in a number of easily navigable formats for efficient analysis, troubleshooting, and tuning of both historical and current session activities.

The StealthCollect technology has the ability to non-intrusively operate 24 hours a day, seven days a week and collect every beat of the database. This gives you the ability to find out what happened on a particular day at a particular time (for example, two days ago at 2:00 P.M.).

Copyright 2005 Quest Software, Inc. All Rights Reserved.

3

StealthCollect SQL Server Local Server Installation

StealthCollect Architecture StealthCollect consists of both server agents and client components. The client component establishes communication with a server agent, requests appropriate data from the server agent, and presents SQL Server operational information to the user in an intuitive manner. The server agent component contains the following key processes, each performing an operational function of the product:

Quest Agent Manager (QAM)-- Manages access to and creation of all server agent processes.

Collector -- A process which Gathers operational information directly from SQL Server's memory structures. Middle tier processes -- Processes which aggregate and store the data collected by the collector. The data is stored in files or in a performance repository instance. Performance Repository instance ­ A performance warehouse instance which contains the data collected and aggregated by the Middle-tier processes.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

4

StealthCollect SQL Server Local Server Installation

Multi-Tier or Single-Tier Installation StealthCollect can be installed as a single- or multi-tier installation. In a singletier installation, all processes, except for the repository database, run on the monitored instance host. In a multi-tier installation only the data collector runs on the monitored host while all the other processes run on the middleware host. The multi-tier installation is the preferred installation as it removes load from the monitored host to the middleware host. Note: Regardless of the middle tier configuration, the Performance Repository can and should be placed on a host other than that of the monitored instance.

The following pictures represent the single-tier and multi-tier installations. Single-Tier Topology

The single-tier topology is simple but at a cost of imposing additional overhead on the host and your monitored instance. Choose this configuration under any of the following circumstances: You are monitoring a non-critical environment (for example, test or nonproduction environments). Your host can handle additional resource demands. An additional middle tier host is not available.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

5

StealthCollect SQL Server Local Server Installation Multi-Tier Topology

In a multi-tier installation, the middle tier layer is installed on a host other than that of the monitored instance, providing for optimal performance. The middle tier and monitored host platforms are independent of one another. For example, you can have a middle tier running on WIN2K and a SQL Server instance running on Windows 2003. The advantages of such a configuration include the following: The CPU and I/O load on the monitored instance is reduced and passed onto the middle tier. The middle tier computer capacity should be adjusted to the amount and load of instances it is to serve. A site monitoring several instances can employ a single middle-tier host to contain the middle tier for all the monitored instances. This lightens the administrative and maintenance burdens. The repository can reside on the middle tier host or another host in the network depending on your configuration and needs.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

6

StealthCollect SQL Server Local Server Installation

Supported Platforms and Versions

Information about supported platforms and versions is available at: http://www.quest.com/performance_analysis/index.asp

Copyright 2005, Quest Software, Inc. All Rights Reserved.

7

StealthCollect SQL Server Local Server Installation

Before You Install Before you install the StealthCollect Agent on a local host, several installation tasks should be performed: Verify that StealthCollect supports your SQL Server version. Verify that StealthCollect supports your operating system. Decide whether you want a single- or multi-tier installation. For more information see Multi-Tier or Single-Tier installation. Ensure that the Windows user that runs the installation wizard is either a local administrator on the installation server or is a Windows domain administrator. Verify that your Windows user has the SQL Server administrator role or that you have a database authentication user with such a role on the monitored instance. Verify that the monitored and middle tier hosts have sufficient available space. Ensure that all hosts and clients involved in the installation are visible to one another through the network. Verify that the port (default 3566) which is to channel client-host communication is not being used. Verify that the monitored host database instance is up and available.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

8

StealthCollect SQL Server Local Server Installation

Monitored host specific requirements

Verify that the target installation directory has at least 500 MB of free space for single-tier installation or 2 GB of disk space for multi-tier installation.

Verify that the monitored instance is running and accessible from other hosts.

Middleware host specific requirements in a multi-tier installation

Verify that the target installation directory has at least 2 GB of disk space.

Performance Repository specific requirements:

Verify that your windows user has the SQL Server administrator role or that you have a database authentication user with such a role on the performance repository instance.

Verify that the target installation directory for the repository instance has at least 2 GB of free space if this is the first installation which uses this repository instance.

Note: The exact amount of required disk space will be determined during installation once the historical collection is configured.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

9

StealthCollect SQL Server Local Server Installation

StealthCollect Installation Wizard

The StealthCollect Installation wizard guides you through the process of installing the agent and configuring it to monitor a given SQL Server instance. StealthCollect architecture supports both single- and multi-tier installations. Changing from one to another requires a re-installation and results in data loss. All installation-related actions must be performed from the host on which the StealthCollect agent software is to be installed (locally). To begin the StealthCollect Wizard: Read the Wizard Introduction screen and click Next to Continue.

StealthCollect Setup Wizard - Installation Type Use this screen to define the installation type on the local server. First, enter the Agent Communication port number that permits communication between the client and the monitored host. This port must be available and the same for both the middle tier and monitored instance hosts. If Single-Tier, the middle tier will reside on this same database server and you need to run the installation only once. If two-tier is specified, first run the setup wizard on the middle tier host (unless you will be connecting to an existing middle-tier). Afterwards, run it on the monitored host. While installing the monitored host you will be prompted for the middle tier host.

StealthCollect Setup Wizard - Agents Framework Installation In this screen, specify the directory in which the Quest Agent Manager and StealthCollect software are to be installed, or accept the default. If a Quest Agent Framework already exists on this host's port, this step does not occur. To complete the Quest Agent Manager Installer Directory page of the setup wizard

If this local server is a member of a Windows cluster the selected installation directory must reside on a shared drive. If the server is protected by a firewall, select the appropriate checkbox.

Either accept the default installation directory location or specify the Installation Directory that is to serve as the root directory under which all Quest agents using this specified port and StealthCollect software are to be installed. You are advised to choose a directory with sufficient free space, as this directory will contain the agent binaries and data files. For more information, see Multi-Tier or Single-Tier installation.

StealthCollect Setup Wizard - StealthCollect Installation This screen is displayed during the installation and configuration of the StealthCollect program files. Copyright 2005 Quest Software, Inc. All Rights Reserved. 10

StealthCollect SQL Server Local Server Installation StealthCollect Setup Wizard - Monitored SQL Server Instance In this screen, specify the name of the SQL Server Instance to be monitored. The Instance Name should include both server and instance name (<server>\<instance>), for example zeus\PLeno. If the installation is to be in the default instance, only the server name needs to be provided. In most cases, the default instance will be displayed. If the displayed instance is not the monitored instance, either choose another instance name or enter the correct value. In the case of a cluster installation, please specify the instance network name.

StealthCollect Setup Wizard - SQL Server Authentication Details In this screen, specify the SQL Server connection method. This is done by selecting the authentication type, and supplying the connection details. SQL Server supports two types of authentication, Windows authentication and Database authentication. This authentication will be used for connecting from the middleware processes to the monitored instance. Windows Authentication (default)--uses your current Windows logon user account. This account must have the SQL Server administrator role.

Database Authentication--requires a SQL Server account name and password. This authentication method requires you to enter a SQL Server account which has the Administrator role in the Login name and Password entry boxes.

StealthCollect Setup Wizard - ERP Applications StealthCollect incorporates Enterprise Resource Planning (ERP) product views for PeopleSoft. Product views associate SQL statements from PeopleSoft with a specific program, form, and user name by displaying values from the Context Infos column. This can be useful because PeopleSoft Applications categorize all system users under a super username. Specify here if PeopleSoft is installed on this host. Refer to the Configuring PeopleSoft section for instructions on the subsequent necessary procedures for this installation.

Note: ERP product views are available for PeopleSoft version 8.0 or later.

StealthCollect Setup Wizard - Performance Repository Installation Decision The Quest Performance Repository offloads historical data from the short-term storage resources, enabling both a more efficient middle tier performance and access to advanced features, including: Historical data retention for more than 90 days Change tracking.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

11

StealthCollect SQL Server Local Server Installation Specify here if a performance repository is to be installed.

The performance repository can be installed subsequently if not installed during this installation from within the Performance Analysis client. In order to install the performance repository from within Performance Analysis, access the "StealthCollect Administration" screen, "StealthCollect Agent" node, "Performance Repository" tab and press the "Create Repository Manager" button.

StealthCollect Setup Wizard - Performance Repository Instance and Authentication Method Use this screen to specify the location of the SQL Server instance which is to serve as the performance repository. The Instance Name should include both server and instance name (<server>\<instance>), for example zeus\PLeno. If the installation is to be in the default instance, only the server name needs to be provided. If the repository database does not exist, it will be created.

The performance repository is a dedicated database that hosts performance data. Each repository can serve several monitored instances. If the repository instance does not have the repository database, it will be created.

Additionally, specify the SQL Server connection method. This is done by selecting the authentication type, and supplying the connection details. SQL Server supports two types of authentication, Windows authentication and Database authentication. Windows Authentication (default)--uses your current Windows logon user account. This account must have the SQL Server administrator role.

Database Authentication--requires a SQL Server account name and password. This authentication method requires you to enter a SQL Server account with Administrator role in the Login name and Password entry boxes.

StealthCollect Setup Wizard - Performance Repository Database Files Directory Enter here an existing performance repository directory on the server in which the repository database files are to be created. This screen appears only if this is the first installation using this Performance Repository instance. The specified directory must have more than 2 GB of free disk space.

StealthCollect Setup Wizard - Installation Complete This screen informs you of your successful installation. If you have installed the middle tier host, you are instructed to now perform the installation locally, from the monitored instance host and to designate this middle tier, when prompted.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

12

StealthCollect SQL Server Local Server Installation

Configuring PeopleSoft

In a PeopleSoft environment when slowdowns, performance problems, or errors occur, it is difficult to know with which PeopleSoft users are experiencing problems.

When reviewing collected performance metrics and related tables, it is difficult to associate those metrics back to the appropriate active PeopleSoft user session, making it difficult to track PeopleSoft user and program activity for problem resolution, historical performance consumption, and trend analysis reporting. To configure PeopleSoft for StealthCollect, set the EnableDbMonitoring flag to '1' in the PeopleSoft configuration file for each of the application server domains. After this change, PeopleSoft will populate the CONTEXT_INFO column in the master..sysprocesses system table. This lets StealthCollect monitor clients connected to the database server from multi-tier workstations. To configure PeopleSoft for StealthCollect 1. Login as the PeopleSoft user administrator. 3. Choose 1) Application Server

2. Run the psadmin.exe in the PeopleSoft Server Administration directory. 4. From the displayed PeopleSoft Application Server Administration menu, choose 1) Administer a domain. 5. From the Tuxedo domain list, select the domain which you want to administer. 6. From the PeopleSoft Domain Administration menu, select 6) Edit configuration/log files menu. 7. From the PeopleSoft Edit Configuration/Log Files Menu, select 1) Edit psappsrv.cfg (current configuration file). 8. In the displayed file, set EnableDBMonitoring=1. Restoring Original PeopleSoft Configuration To remove the StealthCollect PeopleSoft configuration, set the EnableDbMonitoring flag to '0' in the PeopleSoft configuration file for each of the application server domains. In accordance with the above sample procedure: 1. Re-run steps 1-7. 2. In the displayed file, set EnableDBMonitoring=0. 9. Re-run steps 4-8 for each domain you want StealthCollect to monitor.

3. Re-run the previous steps for each domain that you no longer want to monitor using StealthCollect.

Copyright 2005 Quest Software, Inc. All Rights Reserved.

13

Information

Sample Text

13 pages

Report File (DMCA)

Our content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:

Report this file as copyright or inappropriate

141614


Notice: fwrite(): send of 214 bytes failed with errno=104 Connection reset by peer in /home/readbag.com/web/sphinxapi.php on line 531