Chapter 5. Implementation planning 133
? Failover capability: The capability to switch back and forth between two sets of
production machines requires you to double the number of operational
servers (excluding the testing and quality assurance servers).
? Health Monitor Server (HMS): Although it would not consume a large amount
of system resources, implementing the HMS on the same systems that run
the services and processes it monitors is not recommended. Therefore, HMS
should be installed on the history server so it has no direct impact on normal
IBM Tivoli Business Systems Manager processing.
For more discussion about the number of servers and their specifications, read
the
IBM Tivoli Business Systems Manager: Installation and Configuration Guide
,
GC32-0800.
5.4 Network and connectivity
As IBM Tivoli Business Systems Manager collects information feeds from
multiple system management platforms and its workload is distributed on
different servers across the enterprise, well-implemented network and
connectivity are essential. Be sure to establish a formal arrangement for
networking support with your Network Support group before beginning
implementation.
Networking infrastructure and connectivity considerations include:
? Local area network (LAN) type: Is this an Ethernet or token ring infrastructure
or both? A full-duplex fast Ethernet card is recommended, with a suitable hub
or switch to be used exclusively by the IBM Tivoli Business Systems Manager
servers. This enables faster communication between IBM Tivoli Business
Systems Manager servers.
? IBM Tivoli Business Systems Manager uses TCP/IP network connectivity.
Each IBM Tivoli Business Systems Manager server must have a static IP
address.
? Will the IBM Tivoli Business Systems Manager environment to be in its own
network domain or part of a shared one?
? Is the other set of failover servers, if applicable, in another domain?
? Is there any firewall and/or router, with or without DNS?
Another connectivity issue concerns IBM Tivoli Business Systems Managers
use of Windows networking. This requires a proper setup of Windows security,
such as Active Directory. Applicable user accounts should be set up with
appropriate access authority prior to this implementation.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset