Table of ContentsPreviousNextIndex

Fidelia Technology Logo

    Integrating with External Applications

10.1 HP OpenView Network Node Manager

10.1.1 Introduction

The integration package for HP OpenView Network Node Manager provides a bridge between the GUI and device discovery engine of NNM with Fidelia's NetVigil monitoring system. Once installed, the following features will be available:

10.1.2 Limitations

10.1.3 Importing Devices From NNM

The import tool takes the NNM topology information, and creates a file suitable for the bulk provisioning tool. Here are step-by-step instructions:

			cd $NETVIGIL_HOME
			utils/createImportFile.pl --topology /tmp/topology.txt \
			--comm /tmp/snmpconf.txt --output /tmp/import.txt  

A copy of createImportFile.pl tool is available within the integration package for NNM (see below) and is copied into $NETVIGIL_HOME/utils when the package is installed on the NetVigil host.

  1. Start the BVE server using etc/bveapi.init start on Linux/Solaris, or net start nvbveapi on Windows platform
  2. Provision the devices into NetVigil using the following commands:
									cd /path/to/netvigil
									utils/provisionDevices.pl --host 127.0.0.1 --user your_username \
										--password your_password --location "location_name" \
										--file /tmp/import.txt 

The provisioning tool will continue to create each device from the topology map into NetVigil provisioning database, perform auto-discovery to find out what SNMP/port tests are available on the device, and create the tests.

10.1.4 Setting Up Automatic Node Synchronization

		------------------------------------------------------------
		NetVigil :: HP OpenView NNM Integration Package
		------------------------------------------------------------
		Please select one of the following installation options
		[1] : Install NNM Specific Components
		[2] : Install NetVigil Specific Components
		Your selection (1-2) : 

The installation process will copy the integration package into proper locations.

  1. Edit /usr/local/netvigil/etc/netvigil.init on NetVigil host and enable the SNMP trap handler by setting TRAPD="Y".
  2. Start the SNMP trap handler using:
		cd /usr/local/netvigil/etc
		./trapd.init start  
  1. Make sure that the periodic maintenance tasks have been added to cron.
  2. On the NNM host, restart NNM to apply the changes using ovstop/ovstart (Unix) or the Start menu (Windows)
  3. You also need to modify NNM Event Correlation configuration so that it does not correlate to the OV_Node_Added event. Otherwise when multiple nodes are discovered close to each other, the event correlation engine will suppress some of the notifications and NetVigil will fail to know about the nodes. For instructions on updating the event correlation, see "To update event correlation configuration:" on page 136.
  4. To update event correlation configuration:

1. From the NNM user interface, select Options | Event Configuration | Edit | Event Correlation. This will bring up the ECS Configuration Tool (on a browser).

2. Select RepeatedEvent correlation in the default stream and click on Modify.

3. Select InputEventTypeList and click on View/Modify.

4. Locate the OV_Node_Added event (1.3.6.1.4.1.11.17.1.0.58785794) and click on true in the Enable Event Type column.

5. Change the current value from true to false and press Return.

6. Close the window and click Apply.

10.2 NOCOL/SNIPS

NetVigil includes a script that can take existing NOCOL/SNIPS data, and insert the data for each monitored object (by NOCOL/SNIPS) into NetVigil. This is accomplished using the External Data Feed (EDF) protocol. For a complete description of the EDF protocol, see Chapter 18, "External Data Feed (EDF) Reference."

Before starting, identify the devices and tests that you would like to integrate into NetVigil. NetVigil has native support for many of the monitoring functions performed by NOCOL/SNIPS and you should use NetVigil to perform these tests. For example, since NetVigil has native monitors for DNS, BGP, SQL database, etc., you should plan on using these monitors instead of exporting data from NOCOL/SNIPS. If you have written custom monitors or using user contributed monitors for NOCOL/SNIPS, those are good candidates for integration. In such a case, NOCOL/SNIPS continues to run the monitors and the collected results are inserted into NetVigil so that you get a unified monitoring status for the devices and also utilize reporting and archival features of NetVigil.

First, the device currently being monitored using NOCOL/SNIPS needs to be provisioned into NetVigil. Select a DGE to host all NOCOL/SNIPS tests. If you have multiple installations of NOCOL/SNIPS in your network, each of these installations can be setup on a different DGE (or same if you wish), but you cannot setup devices that are monitored via NOCOL/SNIPS from the same legacy host on different DGE. Once you have picked this DGE, you can proceed to provision the devices in the location where that particular DGE is located. You must use the same device name and address to use to create the device in NetVigil that was used in the NOCOL/SNIPS configuration file. For example, for the following ippingmon configuration entry:

##  snips name  address/FQDN    warn   error   critical
#  -----------  ------------    ----   -----   --------
isp1-gateway    gw1.abc.org 

create a device in NetVigil with device name isp1-gateway and device address gw1.abc.org. Even if gw1.abc.org has IP address 1.2.3.4, do not use the IP address unless you are using the IP address in NOCOL/SNIPS configuration as well. The device name and address must match that of NOCOL/SNIPS configuration for proper integration.

Once the devices have been created, you can proceed to create the equivalent NOCOL/SNIPS tests on NetVigil.

At this time you can also add any necessary native NetVigil monitors to these devices.

Finally, copy NETVIGIL_DIR/utils/exportFromNocol.pl to the host where NOCOL/SNIPS is running and save the script on an appropriate directory (e.g., SNIPS_HOME/bin). Edit exportFromNocol.pl and edit the following variables when necessary:

Variable
Meaning
$snipsroot
Location of NOCOL/SNIPS installation
$netvigil_edf_host
fqdn/ip address of DGE where devices have been provisioned
$netvigil_edf_port
Specifies the port on which the EDF server is running, if other than default (3003)
$netvigil_edf_user
login id to use to log into EDF server
$netvigil_edf_pass
password to use to log into EDF server

The last four variables are set in NETVIGIL_DIR/etc/dge.xml. Once the changes have been completed, set up a cron job to execute exportFromNocol.pl periodically. The recommended interval is 5 minutes, but if you are running a NOCOL/SNIPS monitor at shorter intervals, use the same value for running the export script. The script will take all NOCOL/SNIPS data and try to insert it into NetVigil using the EDF protocol, but only the devices and tests that you have provisioned will be accepted and the rest will be ignored.


Fidelia Technology, Inc.
Contact Us
Table of ContentsPreviousNextIndex