Online Diagnostics (EMS and STM) Administrator's Guide March 2013

The TCP and UDP Options
Both of these options send TCP or UDP encoded events to the target host name and the port specified
for the specified request.
To set the TCP or UDP options, complete the following steps:
1. Select TCP or UDP, as appropriate, in the <Notify via> list.
2. Specify the target host name and the port.
The E-mail Option
The e-mail option sends events to the specified e-mail address.
To set e-mail notification, complete the following steps:
1. Select the E-mail option from the <Notify via> list.
2. Specify the complete e-mail address in the E-mail Address field.
The syslog Option
The syslog option sends events to the system log.
For an abnormal event, a system logging level error is associated with the logged message.
An abnormal event message (error) is returned under the following conditions:
The When value is . . . condition is TRUE.
The When value changes condition is TRUE.
To set for a system log notification, select syslog in the <Notify via> list.
The console Option
The console option sends events to the system console.
To set the console notification, select console in the <Notify via> list.
The textlog Option
The textlog option sends events to the specified file.
To set textlog notification, complete the following steps:
1. Select the textlog option in the <Notify via> list.
A default path, /var/opt/resmon/log/event.log, is displayed when you select textlog.
2. Specify the file name and path in the File Path field.
Adding a Notification Comment — <Comment>
The notification comment is useful for sending task reminders to the recipients of an event. For
example, you can add the name of the person to contact if an event occurs. If you have configured
HP Serviceguard package dependencies, you can enter the package name as a comment in the
corresponding request.
Configuring the Peripheral Status Monitor
This section addresses the following topics:
“Configuring HP Serviceguard Package Resource Dependencies with the PSM ” (page 44)
“Copying Monitoring Requests ” (page 45)
“Modifying Monitoring Requests ” (page 45)
“Removing Monitoring Requests ” (page 45)
“Viewing Monitoring Requests ” (page 46)
“Using the set_fixed Utility ” (page 46)
“Replicating Configuration Settings on Multiple Systems” (page 46)
Configuring the Peripheral Status Monitor 43