HP Diagnostics contains two types of data collectors. Agents are embedded inside an application whereas Collectors run outside the application and collect data through polling. Collectors have expanded significantly in recent versions to support SAP, WebsphereMQ, SqlServer, Oracle, VMWare ESX, Tibco, and WebMethods. Installation is straightforward but there are some tips and tricks that will help you avoid confusion.
In a command line installation, this is a rather lengthy process as the license agreement is 31 pages long and you have to reach the bottom to accept.
Step 2: Choose install path.
File path can be local storage or NAS. Software can be installed on any drive or at any path.
The Collectors are built on the same codebase as the Agents, so they require a name, the same as an Agent requires a name. In a larger environment, you might have multiple collectors – for example, one for databases, one for messaging systems. Use this name to your advantage to organize your deployment.
Step 4: Choose the technologies to monitor
Only choose those options you are ready to configure and begin monitoring. If you enable an option but leave it unconfigured, the Collector will fail to execute.
Step 5: Point the Collector at Mediator
In a small installation, one could direct data to the Commander server acting as a Mediator. Collectors can be treated like an Agent for scalability.
In the “etc” directory under the Collector install directory, there will be a number of XML configuration files, one for each technology to be monitored. The collector.properties file controls which technologies will be monitored and which Mediator will receive the collected data.
Within each XML file there will be a block for each system to be monitored. Fro example, if you intend to monitor three database servers, you will have three blocks of XML, one for each system. There is a comment in the XML file indicated the path to a tool that will enable you to encrypt the passwords for your systems. One point that confuses many is the difference between the and tags. Using the tag (default example) with a plaintext password will not work.