About
Installation
Requirements
Hardware
Software
Port Information
Perlmods
CGI Installation
Documentation
Results
Original PLM
|
IEPM-BW Requirements
Hardware Requirements
The hardware requirements for monitoring hosts and target hosts are different.
In either case, we require a local group account (preferably identified as 'iepm') on
the host. NOTE: the installation steps described in this document
require that there be an 'iepm' account on the monitoring host and will not work
otherwise. On the monitoring host, this account will also need to have root
privileges set, if this is not possible on a group account itself, the
installer MUST have access to a root account to conduct the install.
Monitoring host
A monitoring host should be a machine dedicated to the IEPM-BW software as the data
collection and its' analysis dominate the CPU's resources. The host must
have enough cpu power to run the probes, drive the MySQL database, and run the
analysis. It should also have enough disk space to support the database. The
detailed, recommended monitoring host hardware configuration and minimum
requirements are:
- host must support ssh
- local account on host, preferably identified as 'iepm', running the
t-shell and preferably root prividges
- Linux machine running RedHat7 or better
- Dual cpu xeon 3 GHz processors with hyperthreading or better
- 4 Gigabytes of memory to allow plenty of space for the MySQL database, TCP
buffers, and workspace
- either 1 or 10Gigabit/full duplex network interface
- 64bit 66MHz PCI bus
- 100 Gigabytes of disk space to allow for the MySQL data base and the
analysis reports which are generated
- access to a separate disk to back up the MySql database
- host registration in the DNS server is necessary
Target Host
The target host does not need to be a dedicated machine, but it should not be
a busy machine.
- A gigabyte of memory is recommended
- If the machine is dedicated to being a target, 1 Gz of CPU is enough
- Very little disk space is required. The server code is small and can
reside in the home directory of the account it runs from.
Hosts in General
All hosts (monitoring or target) should ensure:
- functionality for ssh passwordless access (we will provide public keys)
- pings to/from the host are enabled
- traceroute to/from this host is enabled
- test ports are opened to allow testing to execute
Software Requirements
|