IBM DataPower Operations Dashboard v1.0.10.0
A newer version of this product documentation is available.
You are viewing an older version. View latest at IBM DPOD Documentation.
Prepare your Monitored Devices
The following steps are required in order to integrate DPOD into your monitored device(s) environment.
1. Prepare Authentication Information
Ensure you have obtained an admin privileged login for each DataPower Gateway. You will use this login to configure the DataPower Gateway for DPOD.
It is highly recommended you create a dedicated user for DPOD.
2. Prepare Network Time Protocol (NTP)
Ensure each of your monitored devices is configured to use NTP.
DPOD will be configured to use the same NTP Servers as your monitored device(s).
DPOD might produce inconsistent view of the system if its monitored devices do not use the same time source, as the reported time is based on the monitored device time.
3. Perform Required Configuration On Monitored Device(s)
The following steps needs to be performed on each of your monitored devices
- Set IBM DataPower Gateway System Identifier (also called Appliance Name in firmware 7 and above). This is defined on [Administration->Device->System Settings->System Identifier / Appliance Name]:
important : avoid using spaces in Appliance Names. - Configure the services in the XML Management interface [Network->Management->XML Management Interface] as follows:
- Enable SOAP Configuration Management
- Enable AMP Endpoint
- Enable SLM Endpoint
- Enable WS-Management Endpoint
- Firmware 6.X only - Disable (uncheck) SOAP Management URI
- Firmware 6.X only - Disable (uncheck) SOAP Configuration Management (v2004)
- Make sure the XML Management Interface is enabled
4. Backup Your Monitored Device(s)
Before you Add Monitored Devices to DPOD, it is imperative that you take a backup of your entire system.
During the installation process DPOD will:
Create Log Targets automatically once you will initiate that step.
- Enable system statistics
- Create network aliases for DPOD
- Perform other optional steps (e.g. Certificate Monitoring)
As all these actions potentially alter system configuration, a backup is paramount in case a restore is required later on.
5. Changes to a Gateway that DPOD performs
Please review this list before using the product.
Please review the changes that DPOD is about to perform to your Gateway and make sure they are acceptable.
You should be aware that not all the changes can be undone automatically and some may require manual intervention to revert.
Please refer to the uninstall procedure before you start