SAP Solution Manager monitors the behavior of SAP Instances and sends notification email in case of misbehaviors. Integrating this solution with NetEye the benefit is the possibility to have the mails sent to a user on NetEye Server and thanks to a procmail script rows are inserted into the MessageConsole Application. The script could be like this:
#! /bin/sh
#
export PATH=/usr/local/bin:/usr/bin:/bin:$PATH
#
mailfile=~/tmp/mail$$.log
logfile=~/tmp/mailout$$.log
tmpfile=~/tmp/mailmsg$$.log
#
trap 'rm -f $mailfile $logfile $tmpfile; exit 1' 1 2 15
trap 'rm -f $mailfile $logfile $tmpfile' 0
#
cat >$mailfile
echo EOF >>$mailfile
#
if [ ! -e $mailfile ]
then
echo "Cannot write to $mailfile"
exit 1
fi
#
subject=`cat $mailfile | formail -xSubject | sed -e 's/^ *//g'`
if ! echo "$subject" | grep "SAP Alert"
then
exit 1
fi
#
state=$(grep -E "^[A-Z]* CCMS alert" $mailfile | tail -1 | awk '{ print $1 }')
if [ "$state" = "YELLOW" ]
then
severity=w
else
severity=c
fi
clienthost=SAP
#
to=`cat $mailfile | formail -X "From " | cut -d' ' -f2`
#
cat $mailfile | formail -I "" | (
line=""
read line
while [ "$line" = "" ]
do
read line
done
startblock=0
while [ "$line" != "EOF" ]
do
if echo "$line" | grep "^ALERT f"
then
cat /dev/null >$tmpfile
startblock=1
fi
if [ -z "$line" ]
then
startblock=0
fi
if [ $startblock -gt 0 ]
then
echo "$line" >>$tmpfile
fi
read line
done
)
#
if [ -s $tmpfile ]
then
msgfile="-f $tmpfile"
fi
#
nesendmsg -H localhost -s "$subject" -S "$severity" -l "$clienthost" $msgfile
exit 0
One of the advantage would be to monitor actively if the SAP instances are running, at the very least the one running the Solution Manager. This is done using the binary rfcping and the Nagios check command check_sap_rfcping using the following command syntax:
check_sap_rfcping -a $HOSTADDRESS$ -s-w 2000 -c 5000
Doing so it gives you a pretty good overview over your running SAP instances. 😉
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix. Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
Author
Juergen Vigna
I have over 20 years of experience in the IT branch. After first experiences in the field of software development for public transport companies, I finally decided to join the young and growing team of Würth Phoenix. Initially, I was responsible for the internal Linux/Unix infrastructure and the management of CVS software. Afterwards, my main challenge was to establish the meanwhile well-known IT System Management Solution WÜRTHPHOENIX NetEye. As a Product Manager I started building NetEye from scratch, analyzing existing open source models, extending and finally joining them into one single powerful solution. After that, my job turned into a passion: Constant developments, customer installations and support became a matter of personal. Today I use my knowledge as a NetEye Senior Consultant as well as NetEye Solution Architect at Würth Phoenix.
In the first part we created hosts and services to monitor a sequence of script using Tornado. The Tornado Rule Now let's continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then Read More
Some time ago, my colleague Giuseppe Di Garbo published this article on the NetEye Blog, where he explained how to integrate NetEye notifications with Telegram. It was a great starting point, and in fact many of us used it to Read More
In the latest update to NetEye 4.42, we're excited to announce the introduction of support for the Content-Security-Policy (CSP) header within the Icinga Web 2 interface. This enhancement plays a crucial role in strengthening your system's defenses against cross-site scripting Read More
Choosing the right backup solution is critical for system administrators and IT professionals. The upcoming NetEye 4.41 version will bring an update to MariaDB, moving from version 10.3 to 10.11. This makes it especially timely to explore the opportunities offered Read More
In NetEye environments we use Tornado to collect events, elaborate on them, and send notifications based on them from a lot of sources (syslog, email, SNMP traps and so on). In this article I'd like to suggest a different use Read More