HP Reference Information Storage System Version 1.
Legal and notice information © Copyright 2004-2007 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
Contents About this guide . . . . . . . . . . . . . . . . . . . . . . . . . Intended audience . . . . . . . . Related documentation . . . . . . Document conventions and symbols HP technical support . . . . . . . Subscription service . . . . . . . Other web sites . . . . . . . . . Providing feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . RISS Configuration . . . . . . . . . . Domain Configuration . . . . . . Appliance Configuration . . . . . Firewall Settings . . . . . . . . . . . SSL Configuration . . . . . . . . . . Available certificate signing requests Creating a certificate signing request Deleting a certificate signing request Installing and generating a certificate Installing and generating a certificate Software Version . . . . . . . . . .
Cloning smart cells (copying data) . . . . . . . . . Reprocessing . . . . . . . . . . . . . . . . . . . . Rescheduling all reprocessing schedules . . . . . . . Editing reprocessing schedules . . . . . . . . . . . Changing the reprocessing status . . . . . . . . . Using the Reprocessing Utility . . . . . . . . . . . Viewing reprocessing history logs . . . . . . . . . Repository-level retention . . . . . . . . . . . . . . .
Validating file from command line PST Import Monitor . . . . . . . . . Using PST Import Monitor . . . . Displaying reports and log files . Archive Request file specifications . . . . Settings description . . . . . . . . Sample file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting a scheduled event . . . . . . . . . Modifying rules in Mail Attender . . . . . . . . . Modifying a rule using Mail Attender . . . . . Starting selective archiving . . . . . . . . . . . Status View . . . . . . . . . . . . . . . . . . Monitoring View . . . . . . . . . . . . . . Deleting end-user deleted items on the RISS . . . . Location of deleted items . . . . . . . . . . Configuring deletion retention . . . . . . . . Scheduling deletion from RISS . . . . . . . . End-user delete security . . . . .
Selective archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Multiple restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figures 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ..PCC user interface . . . . . . . . . ..Performance Graph: Store Rate . . . . ..Performance Graph: Free Memory . . ..Domain Configuration . . . . . . . . ..New LDAP connection . . . . . . . ..Create DAS job . . . . . . . . . . ..Mapping information . . . . . . . . ..Advanced options . . . . . . . . . ..Assign a job to a portal . . . . . . . ..Account Manager view . . . . . . . ..
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 10 ..Rules . . . . . . . . . . . . . . ..Edit Local Rule window . . . . . . ..Add Information Stores window . . . ..Possible conditions . . . . . . . . ..Monitoring View window . . . . . ..Mailbox store . . . . . . . . . . ..Deletion settings . . . . . . . . . ..Initial installation . . . . . . . . . ..Additional Servers installation . . . ..Upgrade . . . . . . . . . . . . ..Server Definition . . . . . . . . . ..
Tables 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ..Document conventions . . . . . . . . . . . . ..RIM applications for users . . . . . . . . . . ..RISS applications for administrators . . . . . . ..Views for common system administration tasks . ..Views accessible from left menu . . . . . . . ..Smart cell life cycle states . . . . . . . . . . ..Link to Overview . . . . . . . . . . . . . . ..Application Events features . . . . . .
44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 12 ..Links to Event Viewer . . . . . . . . . . . . . . . . . ..Links to SNMP Management view . . . . . . . . . . . . ..Links to Email Reporter view . . . . . . . . . . . . . . ..Detailed Email Reports . . . . . . . . . . . . . . . . ..Links to LogFile Sender view . . . . . . . . . . . . . . ..Link to RIM Management view . . . . . . . . . . . . . ..Mining Overview view features . . . . . . . . . . . . . ..
About this guide This guide provides information about: • Administering the HP Reference Information Storage System (RISS) • Administering the HP Reference Information Manager (RIM) Intended audience This guide is intended for: • HP Reference Information Storage System (RISS) administrators • HP Reference Information Manager (RIM) administrators Related documentation In addition to this guide, HP provides the following RISS and RIM documentation.
Document conventions and symbols Table 1 Document conventions Convention Element Medium blue text: Related documentation Cross-reference links and email addresses Medium blue, underlined text (http://www.hp.
• • • • • • Technical support registration number (if applicable) Product serial numbers Product model names and numbers Applicable error messages Operating system type and revision level Detailed, specific questions For continuous quality improvement, calls may be recorded or monitored. Subscription service HP strongly recommends that customers register online using the Subscriber’s choice web site: http://www.hp.com/go/e-updates.
About this guide
1 RISS overview This chapter describes key concepts involving the HP Reference Information Storage System (RISS) and Reference Information Manager (RIM). It contains the following topics: • RISS, page 17 • RIM, page 17 RISS RISS is a fault-tolerant, secure system of hardware and software that archives files and email messages for your organization, and lets you search for archived documents.
Table 3 RISS applications for administrators Application Tasks Platform Control Center (PCC) Monitor and troubleshoot system status and performance, and manage user accounts. See "Introduction to Platform Control Center (PCC) " on page 21. PST Importer Batch process multiple PST files. See "PST Importer" on page 85. Audit Log Enable the Audit Log for regulatory compliance. See "Audit log" on page 97. Mail Attender for Exchange Create selective archiving rules for Microsoft Exchange and Outlook.
6. 7. 8. 9. Power on smart cells. Power on metaservers. Power on remaining servers. Wait for all machines to start, then log in to the PCC console and issue the command: /opt/bin/restart 10. Once RISS has restarted, verify (with the PCC web interface) that the RISS is running and monitoring is reporting system availabilities as expected. NOTE: In the event both routers go down, the system should be restarted with /opt/bin/restart once the routers are back up. Version 1.
RISS overview
2 Introduction to Platform Control Center (PCC) This chapter introduces the Platform Control Center (PCC) administration tool for monitoring and troubleshooting the RISS and user accounts.
Figure 1 PCC user interface User interface orientation tips To orient yourself, pay attention to the different ways a view is characterized. • Link text: A navigation link leading to a view is a general description of the view. Most links to a view are from the left menu. • HTML name: Each PCC view has a descriptive HTML name, which is displayed in the browser.
Views for common tasks Table 4 Views for common system administration tasks Task View Check overall system health and performance "Overview" on page 27 Check smart cell health and performance "Appliance Statistics" on page 29 Monitor system status and RAID support "System Status" on page 31 Start, stop, and restart system servers "Appliance Control" on page 33 Check the RISS configuration "RISS configuration" on page 37 Display firewalled ports enabled in the system "Firewall Settings" on page
Left menu item Description "System Status" on page 31 View summary, by server, of system capacity and performance. "Appliance Control" on page 33 Start, stop, or restart one or more servers on the system. "Performance Graph" on page 34 Graph system storage and indexing rates and system performance. General Configuration views "RISS configuration" on page 37 Display hardware and configuration information about the RISS system.
Left menu item Description "LogFile Sender" on page 77 Send output and error log file reports, by machine type, to email recipients. Systems Insight Manager "System Insight Manag ement" on page 83 Access the HP Systems Insight Manager to control monitoring and enable and disable notifications. Monitoring and reporting PCC monitors the system and reports on its health and activity.
Life cycle state Definition Importance COMPLETE_PROCESSING Data indexing is being completed. The cell is full. It is available for document search and retrieval, but not storage. If backup is enabled, cell data can be backed up. maintenance BACKING_UP The cell is available for document search and retrieval. If backup is enabled, the cell is backing up all its indexes and new data that has not yet been backed up. maintenance SYNC_WAIT The cell is available for document search and retrieval.
3 System Status This chapter discusses the information that is found in the system status views. It includes the following topics: • • • • • Overview, page 27 Storage Status, page 30 System Status, page 31 Appliance Control, page 33 Performance Graph, page 34 Overview The Overview provides a high-level look at system health. It displays the following information: • • • • • • • Critical events that are occurring in a system service or application.
Application Events features Table 8 Application Events features Feature Description Event Information describing the event or error, including the service or application name. Machine The name of the server on which the event is occurring. IP The IP address of the server on which the event is occurring. Date The date of the event. Level The status of the event. In Application Events, the only status shown is critical.
NOTE: If the number of documents shown is –1, the values cannot be read. Appliance Statistics The Appliance Statistics area provides status, health, and storage information about the RISS smart cells. You can click a tab to view information about smart cells in all domains or smart cells in a particular domain. The Appliance Statistics area also shows the IP addresses of free smart cells in the system. Each smart cell’s life cycle state is color-coded.
Appliance Statistics features Table 9 Appliance Statistics features Feature Description RISS Appliance The RISS appliance name, IP address, and document storage rate. Domain The name of the domain. Group Name A smart-cell group identifier generated automatically by RISS. This number is unique across all systems. Smartcell IP The IP address of the smart cell. Smartcell Role A smart cell can be Primary, Secondary, Replica-1, or Replica-2. State The current life cycle state of the smart cell.
Table 10 Storage Status view features Feature Description Appliance Store The number of documents and store rate per domain, and the allocated space on the system for storage and replication. The dark area on the right side of the storage bar graph shows the point at which storage space is 90 percent full. NOTE: The storage bar graph shows only assigned and allocated smart cells for all active domains. The RISS might have free, unallocated hardware that is not represented in the bar graph.
Table 12 System Status view features Feature Description Status The icon in front of the host name displays the status of the host machine. • A green check icon indicates the server is started and healthy. • A gray icon indicates that JBoss and the RISS applications on the server have stopped. • A yellow icon indicates that JBoss is running, but one or more RISS applications on the server are unhealthy.
Table 13 Link to System Status view Origin Link left menu System Status Appliance Control Use the Appliance Control view to start, stop, or restart one or more servers on the system. This view is useful to show the start, stop, and pending status of a server. However, you should use it only when necessary — for example, when you are upgrading a host or before a planned power outage. The Appliance Control view should be used only by system administrators or HP service representatives.
• Start: Start a single machine, start all machines, or start all machines in a selected server group. • Stop: Stop a single machine, stop all machines, or stop all machines in a selected server group. • Restart: Stop and immediately start a single machine, or stop and immediately start all machines or all machines in a selected server group. • Staggered Restart: Restart all machines in sequence, or all server group machines in sequence, with a minimum of downtime.
Figure 2 Performance Graph: Store Rate Example: System Monitoring graph An example of a system monitoring performance graph is shown below. This graph charts the free memory on the database server at hourly intervals over the past 24 hours. Figure 3 Performance Graph: Free Memory Creating performance graphs 1. Click the System Monitoring tab or the Appliance Store and Indexing tab for the category of graph that you want to create. 2.
• Time Frame: For a preselected time period, click Select Time Frame, and select a time frame from the drop-down list. • From Date, To Date: For a custom time period, click Custom Time Range, and select the start date and time and end date and time. The custom time range can be useful for troubleshooting. • Interval: Select the reporting interval from the drop-down list. 5. Click Generate Graph.
4 Configuration This chapter contains the following information: • • • • RISS configuration, page 37 Firewall Settings, page 38 SSL Configuration, page 38 Software Version, page 41 RISS Configuration The RISS Configuration view is an administrative tool that displays hardware and configuration information about the RISS. This view is divided into two parts: • Information about the services enabled in each domain is in the upper portion of the view.
Firewall Settings The Firewall Settings view shows the firewall settings for the PCC server and the RISS HTTP portals, and their virtual IP (VIP) addresses. It includes the following information: Table 19 Firewall ports Feature Description Virtual IP The virtual IP address. Port The port number. Service The service running on the port. Type The transfer protocol used on the port: TCP or UDP Inbound/Outbound Shows if the firewall is enabled or disabled on the port’s inbound and outbound traffic.
Available certificate signing requests Table 22 Available certificate signing requests (CSRs) in the RISS system Feature Description Machine Type The host for which the CSR has been generated. The host is either a PCC or HTTP portal. Virtual IP The virtual IP address of the host. Creation Date The date the CSR was created. Path The path to the CSR. The CSR files are always placed on the PCC host. Creating a certificate signing request To create a certificate signing request (CSR): 1.
NOTE: After deleting pccCert.pem or httpCert.pem in /opt/keys, be sure to log off or close the PCC UI. If you don’t and refresh, the PCC UI will re-create these files. (The SSL Configuration page will also not allow new CSRs be created.) Installing and generating a certificate on the PCC portal Follow these steps to generate and install a certificate for the RISS PCC portal. 1. Create a certificate signing request (CSR) for the PCC: a.
3. Send the certificate request to a certificate authority (CA) such as VeriSign for signing. Follow the instructions provided by your CA. 4. Import the certificate you receive from the CA into the RISS PCC: a. Store the certificate from the CA on your local machine (for example, as httpCertSigned.pem). b. Copy the certificate to the PCC: scp httpCertSigned.pem root@[external ip address of PCC]:/opt/keys/ httpCertSigned.pem 5.
Configuration
5 Account Synchronization Use this view to configure dynamic account synchronization (DAS), which automatically creates and updates email user accounts on the RISS, and imports groups and group memberships. You can define multiple configurations that track sets of users from one or more LDAP servers for specific RISS domains.
Creating and running DAS jobs The basic steps for creating and running a DAS job are as follows: 1. Create an LDAP connection. See "Creating LDAP server connections" on page 44. 2. Create the job. When you create a new job, you assign the job a name and an LDAP connection, and set up the job query in the LDAP server. See "Creating jobs" on page 45. 3. Assign the job to an HTTP portal. See "Assigning HTTP portals" on page 47. 4. Run the job. See "Running DAS jobs" on page 47.
Creating jobs To create a DAS job: 1. In the DAS Available Jobs area, click New JOB. 2. Name the job you are creating by entering it in the Job Name box. (In addition to the characters noted below, the name can contain no spaces.) Click Next Step. Figure 6 Create DAS job 3. From the drop-down list, select the LDAP connection you want to use with the job.
Mapping advanced options Click the Advanced Options icon ( ) to display the advanced options. Figure 8 Advanced options 1. Complete the advanced options form by entering the following information: • Group Name: Not used at this time. • USNChanged: Active Directory’s unique sequence number (USN). Active Directory increments the USN for each change in any of its user accounts. When DAS finds a larger USN, it extracts new information. For initial setup, set USNChanged to 1 so DAS extracts all users.
• Delete LDAP Filter: Criteria to include or exclude specific users in the LDAP deleted users directory. Add to the default for special cases. For Domino, ignore this field because it is not enabled. 2. Click Next Step to create the job. 3. To assign this job to an HTTP portal, click Assign Job. See "Assigning HTTP portals" on page 47 for further instructions. Assigning HTTP portals Before running a DAS job, assign an HTTP portal on which to run the job. Only one job can be assigned to an HTTP portal.
c. Click Confirm Schedule to save your changes. d. To launch the selected job, click Start. A notice appears stating that the job started successfully. 4. Click Back to Main Page to return to the DAS view. To stop a DAS job: 1. In the DAS Available Jobs view, select the job and click Start/Stop. A notice appears stating that the job has stopped. 2. Click Back to Main Page to return to the DAS view. Editing or deleting jobs To edit or delete an active or configured job: 1.
6 Account Manager (AM) Use the Account Manager (AM) view to provision and update user accounts. This chapter contains the following topics: • • • • AM overview, page 49 Managing user accounts, page 51 Managing groups, page 54 Managing repositories, page 54 Table 26 Link to Account Manager view Origin Link left menu User Management > Account Manager Account Manager overview Use Account Manager (AM) to view and update user accounts and repositories for unusual circumstances on the RISS.
Figure 10 Account Manager view The total number of users and groups for the domain(s) is shown in the upper right corner of the view.
Account Manager view features Table 27 Account Manager view features Feature Description Search button Use the search feature to find users, groups, or repositories. The search function uses the “Like” SQL database capability. For example, in the User panel, you could enter jack to match users jackdoe or jacksmith. Entering %doe would match users jackdoe, janedoe, or maryjanedoe. Entering %ja% would match users jadams, jackdoe, janedoe, jacksmith, or maryjanedoe. Searches are not case sensitive.
Editing user information To edit user information: 1. Click the User radio button, then click the user name that you want to edit. See "Account Manager view features" on page 51 for information on searching for a user. 2. In the RISS Account and LDAP Information form that appears, clear the check box labeled Deactivate this check box and then edit the user entries. Figure 11 Editing user account information 3. Edit the relevant user entries. 4. Click the Save Now! button.
Feature Description Username (Required.) The system login name for the selected user. Usernames must be unique, but they can be the same except for their domains. For example, johnkdoe@company.com could be an Active Directory user imported into the system through dynamic synchronization (DAS); at the same time, user johnkdoe could be created as a local user in the RISS. Local Password The password in the RISS system for a selected user.
Feature Description All Repositories All repositories to which a user has access — either through direct access or through group membership. Proxies Displays the email addresses that will route to the user’s primary repository. Check boxes Active/Disabled Select or clear this check box to enable or disable the user account on the RISS. RISS Admin Select this check box to grant the user administrative privileges on the PCC. It’s best to create a new, local account for the administrator.
2. In the RISS Account and LDAP Information form that appears, clear the check box labeled Deactivate this check box and then edit the user entries. Figure 12 Editing repository information 3. Edit the relevant entries. 4. Click the Save Now! button. Version 1.
Repository information Table 29 Repository information Feature Description Name (Required.) The name of the selected repository. Domain The RISS domain to which the selected repository belongs. Select the domain from the drop-down list; the selection limits the scope of the Search and A-to-Z filter buttons. Retention The amount of time that messages and documents are retained in the repository. The time period is shown in days. For example, 2556 days is 7 years.
7 Other user management features This chapter explains how to use the Manual Account Loader and Error Recovery user management features. The chapter contains the following topics: • Manual Account Loader, page 57 • Account Error Recovery, page 58 Manual Account Loader Manual Account Loader (MAL) is a batch tool used to load users into the RISS when the Exchange or mail server is not using LDAP. If the Exchange server is using LDAP, use dynamic account synchronization (DAS) instead.
The loading process takes about one hour for 50,000 accounts. 6. To verify the results, open the Account Manager. Error Recovery The Account Error Recovery view displays account synchronization activities that have not been performed successfully.
Repairing synchronization errors To repair synchronization activity errors, identify the activities that you want to reattempt or delete. Click an entry to display more information about an activity, including its Java User Management Services (UMS) database entry (only shown if a UMS database entry matches the activity). You will need to decide the order in which to reattempt or delete the activities. To repair or delete synchronization errors: 1.
Other user management features
8 Data management This chapter discusses the following topics: • • • • • Replication, page 61 Smartcell Cloning, page 64 Reprocessing , page 66 Repository level retention, page 68 Database and data backup, page 70 Replication NOTE: This view is available only if a replicated system is configured. Use the Replication view to monitor and to start or stop replication for a domain on a remote system. Replication status is updated after each polling cycle.
The top part of the Replication view describes the database replication. Table 34 Database Replication features Feature Description Local Server/Source Server The replication and primary systems if you are logged into the replicated system. Local Server/Target Server The primary and replication systems if you are logged into the primary system. Replication Set A set is made of one or more db2 tables that replicated.
Replication Status The middle part of the Replication view displays the status of the replication. Table 35 Replication Service General Status Feature Description Domain The domain name and group ID of the domain being replicated. State Shows whether or not replication is in progress. File Batch Count The number of batches being replicated. Update Time The time of the last replication update. Next Retry Time The date and time of the next replication update.
Smart cell cloning Use the Cloning view to show the status of current and past cloning operations, and to clone a smart cell. You can clone a smart cell if its mirror smart cell is SUSPENDED, DEAD, or FAILED. (See "Smart cell life cycle states" on page 25.) Cloning a smart cell copies all its information to another smart cell that is in the FREE state to give the smart cell a new, viable mirror. Cloning operations can take a long time (as much as a day), depending on the amount of information cloned.
Cloning view features Table 38 Cloning view features Feature Description Source The IP address of a smart cell without a viable mirror. If all smart cells have viable mirrors, the Source displays No Broken Groups Found. If more than one smart cell needs a mirror, a Change Source button appears below the automatically selected IP address. Free Cells The number of smart cells currently in the FREE state. This number is decreased by one after a cloning operation starts.
3. Check the Status Area to see results of the cloning operation. A check icon indicates the cloning operation is proceeding normally. An X icon appears if the cloning operation has failed. Reprocessing The Reprocessing view displays each domain and shows whether reprocessing is enabled, when reprocessing is scheduled, and a history log report. Reprocessing is an engine service that scans recently stored data and reallocates messages to the proper repository.
4. To ensure the schedule is enabled, verify that the corresponding Reprocessing Status check box is selected. If selected, the text Enabled appears next to the check box. Changing the reprocessing status You can enable or disable a reprocessing schedule of a specific domain or all the domains listed. To change a reprocessing schedule: 1. In the Reprocessing view, locate the domain whose schedule you want to enable or disable. 2.
Viewing reprocessing history logs The reprocessing history log at the bottom of the Reprocessing view shows a list of the last successful reprocessing runs for each configured domain. The log includes each domain group, when a domain was reprocessed last, and the number of processed files. This report is based on data from smart cell groups, which is averaged from the individual smart cells of each group. Repository-level retention RISS archives emails and other documents in one or more repositories.
Figure 16 User Repository search results 4. In the form that appears, clear the check box at the bottom of the form. Figure 17 Edit repository retention period 5. Change the retention period in the Retention text box. Retention periods are shown in days. 6. Click Save Now!. NOTE: You can view user repositories on replica domains, but you cannot edit them. Retention periods and other fields cannot be edited and action buttons are unavailable when you select a domain that is a replica of another domain.
Figure 18 Edit domain retention period 3. Click Save Retention Now!. 4. To ensure that retention is enabled, verify that the domain’s Retention Status check box is selected. If selected, the text Enabled appears next to the check box. Changing the retention processing status You can enable or disable retention processing for a specific domain or all the RISS domains. To change the retention processing status: 1. Locate the domain whose retention processing you want to enable or disable. 2.
Table 41 DB Backup History Feature Description Backup Status General status of the backup server and each of its services. • A check icon indicates normal operation. • A ! icon indicates a problem or inactive service. Configuration Information Configuration information such as backup service (enabled or disabled), job schedule (time) database backup file path location, Tivoli version. RISS Backup Events Information about the backup.
3. If the database server was reinstalled, run one of the following commands to restore the /db2/VolBack partition from either the version stored on the kickstart server or tape backups. NOTE: This will delete the content of the VolBack directory. • /opt/bin/backup/db2BackupUtility -restore_from_kickstart • /opt/bin/backup/db2BackupUtility -restore_from_tape 4. To restore the database, make sure the database is up by issuing the command: su – db2udb –c db2start 5. To restore DB2, run the following command.
9 Reporting This chapter includes information about the following topics: • • • • Event Viewer, page 73 SNMP Management, page 74 Email Reporter, page 76 LogFile Sender, page 77 Event Viewer The Event Viewer shows the critical and recovery events that have occurred in system services or applications. You can also use the Event Viewer to search for events by type. The following information is displayed in the Event Viewer.
You must enter criteria for all searches except Show All Alerts. The search function uses the “Like” SQL database capability. For example, you could enter sc to match host names sc-s1-172-1.company.com or sc-s2-204-1.company.com. Entering %204% would match hosts sc-s2-204-1.company.com, or ms-s0-204-1.company.com. Searches are not case sensitive. 3. Click Submit. Other Event Viewer features You can change the number of events displayed on each Event Viewer page by following these steps: 1.
A server can be deleted from the list by clicking the radio button in front of the server entry, then clicking Delete Server. NOTE: If you do not have a monitoring management server, you can receive SNMP event notifications via email. See "Receiving SNMP events by email" on page 76. Selecting SNMP traps In the Trap Manager Service area, select the SNMP events, or traps, to be monitored. When one of the traps fails, a notification is sent to the SNMP monitoring management server and/or email recipient.
Receiving SNMP events by email If you do not have a monitoring management server, you can receive SNMP notifications via email. This option is also useful if you are away from the office. To enable the service, enter your email address or the email address of the person who will receive the notifications, and click Add. Repeat this step if you want to add more recipients. You can disable or delete an email recipient by clicking the radio button in front of the person’s name, then clicking Disable or Delete.
Table 47 Detailed Email Reports Feature Description VERSION Provides information about the RISS software version from the Overview. See "RISS Version" on page 30. EMAILMINER_ METRICS Provides statistics collected by RIM for Messaging. See "Mining Overview" on page 79. DAS_STATS Provides user account information from the Account Manager Service section of the Overview. See "Account Manager Service" on page 28. Also provides names of the scheduled account synchronization (DAS) jobs.
To send a log file: 1. Enter the recipient’s email address in the Email Address field. You can enter only one email address. 2. Select a log file to send. You can select only one log file to send. 3.
10 External access The PCC left menu contains links to two external functions that are not managed within the PCC: • "RIM Management" on page 79, which accesses the Reference Information Manager (RIM) email mining system • "System Insight Management" on page 83, which accesses the HP Systems Insight Manager RIM Management This view provides an entry point to the email mining system. It also displays an overview showing the mining system status for each domain.
Table 50 Mining Overview view features Feature Description Header The header shows the name of the email miner (for example,. EM-S0-110-1), and the version of the RIM for Messaging software (for example, 1.05.0000). Statistics Collected The date and time that the statistics were collected (for example, 5/11/2006 2:10:17 PM). Sections Each section in the mining overview describes a major area inside the email miner, together with an overall health status for that area.
Table 53 Configured Tasks features Feature Description Task Name The name of the task. Status The following status types can be displayed: • The task is enabled. • The task is disabled. The Task Information summary displays the yellow icon if all configured tasks are disabled. Otherwise, the summary displays the green icon. Task Type The type of task, for example Selective Archiving or Journal Mining.
Feature Description Process Information • Status: No error conditions for any journal mining process on the journal mailbox. A journal mining process is in a retry state. A journal mining process is in a failed state. • Active: The number of journal mining processes that were executing at the time statistics were collected. • Failed: The number of journal mining processes that were in a failed state at the time statistics were collected.
See "Journal Mining" on page 81 for information on these areas. Synchronize Deleted Items The Synchronize Deleted Items section contains the following areas described in Journal Mining: • Process Information • Message Statistics • Processes in Failed Or Retry State See "Journal Mining" on page 81 for information on these areas.
External access
11 PST Importer This chapter contains the following topics: • • • • PST Importer overview, page 85 Installing PST Importer, page 86 Using PST Importer, page 87 Archive Request file, page 85 PST Importer overview PST Importer allows system administrators to: • Load legacy (pre-RISS 1.0) PST files into RISS. • Scan PST files to ensure RISS finds and archives new messages. • Provide optional tombstoning of messages in PST files.
Installing PST Importer Installation requirements Before installing PST Importer, verify that you meet the following requirements. Client hardware requirements Client machine with 512 MB RAM and 200 MB free disk space. Client software requirements • Windows 2000 or later. Highly recommended: Windows XP. • Outlook 2000 or later. Highly recommended: Outlook 2003. NOTE: If you use Outlook 2003, also install Service Pack 1 for the Outlook plug-in to work correctly.
Using PST Importer Archive Request Loader Use Archive Request Loader to create or validate an Archive Request file. This tool also generates an output log file, detailing issues that occurred during the load process. Before adding a file to PST.MDB, Archive Request Loader performs the following tasks: • • • • • Verifies accessibility to file with appropriate access rights. Obtains hash of file to be inserted. Queries PST.MDB for duplicate entry using generated hash.
Figure 20 Creating a new file 3. Click Add, and select the PST files. Only files in the Select Files To Process list are imported. In the file you are creating, the corresponding XML tags are and . 4. To import PST files larger than 150 MB, edit the following setting in RISS PST Importer.ini to reduce performance degradation and increase throughput: [PSTLaunchMgr] MaxProcesses=1 5. If necessary, select PST files you do not want to process, and click Remove. 6.
• Audit Repository: Name of repository that receives the PST Importer log file created during the import process. The XML tag is . 8. To indicate mining and tombstone settings, select the applicable check boxes: • Use TNEF: If selected, stores submitted messages in TNEF format. The XML tag is . • Distribute To All Recipients: If selected, PST Importer sends a copy of the document to all addresses specified in the message.
/HPPSTInit /i ArchiveRequestFileName.xml /o LoadLogFileName.log [/c] [/v5] Parameter Description /i Required. Name of input file to be processed. Replace ArchiveRequestFileName.xml with the full UNC path and XML file name. /o Required. Name of Archive Request Loader log file to which diagnostic and processing information is written. Replace LoadLogFileName.log with the full UNC path and log file name. /c Optional.
Figure 21 PST Import Monitor 2. PST Import Monitor displays basic data about the PST process status. To view specific processing information, see the following: Item Information area: • Total: Total number of items found in the PST files so far. • Processed: Number and percentage of items processed and submitted to RISS. • Rejected: Number and percentage of items that PST Importer could not process due to errors. The PST Importer log file contains error information explaining why the item was rejected.
NOTE: Collecting statistics impacts performance. • To reset a failed process, select Failed under Active Processes to display a list of all failed processes. Right-click the failed process, then click Reset, as shown in the following figure. Figure 22 Resetting process Depending on the reasons the process failed, resetting a failed process might not correct the problem. However, PST Importer tries to reprocess it as directed.
The log file is delivered to the repository specified by in the Archive Request file. The log file is sent as an email attachment. Upon successful submittal, the file is deleted. If a mining process terminates and is retried, a separate log file is generated. Use the Web Interface to determine the processing history of a PST file. To change the verbosity level, modify the following RISS PST Importer.
Table 56 Tags in Tag Description Version number associated with this Archive Request format. Current version is 1.0. Exchange server used when accessing the GAL for address resolution. Mailbox on Exchange server used when accessing the GAL for address resolution. DNS name or IP address of the RISS SMTP portal used to submit messages to RISS. Port number used with . This setting is optional. The default is 25.
Table 57 Tags in Tag Description Path and file name of imported file. Wildcards are allowed and are expanded prior to processing. UNC paths are supported and highly recommended. Type of import processing to be performed on the . PST is the only processing type supported in the current release.
E:\PSTFiles\Persist Search Results.pst PST E:\PSTFiles\ComplianceSearch_001.pst PST E:\PSTFiles\Outlook.
12 Audit Log The Audit Log feature provides a surveillance system log for companies that are required to prove they are adhering to surveillance processes. This chapter describes how to enable the Audit Log feature, set retention periods, monitor status, and grant user access to the repository. For information on performing Audit Log repository queries, see the Audit Log section in the HP Reference Information Storage System User Guide.
NOTE: The user’s personal repository must be in the same domain as the Audit Log repository. 9. Click Add The repository is added to the user’s direct repositories. 10. Click the Save Now! button. Monitoring status Use the PCC RISS Configuration view (Configuration > RISS Configuration) to check whether the Audit Log feature (AuditLog Service) is enabled for a specific domain.
13 Backup system administration The optional RISS backup system is the final line of defense in the integrated RISS data-protection strategy. The RISS backup system uses Tivoli Storage Manager (TSM) to create backups of RISS data. This chapter describes the processes involved in accessing the RISS backup server, configuring TSM, and managing smart cells, and contains detailed procedures for maintaining and labeling backup files and media.
• Use a remote console program like VNC. (Use the PCC’s IP address.) • Use the command line shell from the Tivoli administrative console program (dsmadmc, with admin as the user name and admin as the password). The availability of these options depends on the access mode that is configured for your RISS. Discuss this with your HP service representative. Smart cell data backups After a RISS storage domain has been configured for backup, each smart cell group in that domain performs a backup every hour.
are first stored after they are backed up or archived. A copy group is used to define how many versions of a file are kept and how long client data is retained. The figure below shows how these categories are related. Figure 26 Policy domain structure How RISS configures TSM The RISS backup server is initially configured with the script /usr/local/tsmBackup/configTiv init from the PCC machine.
• Libraries are defined. The name for the libraries is taken from the master configuration file (bct) and the string “LIB” is added as a prefix (for example, LIB.TAPE). • A path is defined for each library. In the path, the device parameter specifies the device alias name of the library’s robotic mechanism. • The devices that belong to each library are defined. For each device a path is defined that contains the device alias and the previously defined library name.
Figure 27 Library properties 4. Click the Volumes link to see a list of volumes that are assigned to that library. 5. In the Select Action list, select Add Volumes, and then click Go. 6. Select None of the volumes are labeled, and then click Next. 7. Select Search for all eligible volumes in the library’s regular slots, and then click Next. 8. Depending on whether or not your library has a barcode reader, select the appropriate option. (See the figure below.
A search begins for new volumes in the library. You can monitor the status of the search by selecting the backup sever properties and clicking Server Processes as shown in the figure below. When the search ends, the new media appears in the library volumes list. Figure 29 Server process list Adding and labeling new media (command line) The Add Volumes wizard mentioned in "Adding and labeling new media (Web interface)" on page 102 gathers information to build the necessary Tivoli command.
LABEL libvolume LIB.TAPE search=yes labelsource=barcode overwrite=YES checkin=SCRATCH More information about this topic is available at the Tivoli Online Information Center under these headings: • http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmcw.doc/ anrwgd53235.htm • http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmcw.doc/ anrwgd53264.htm • http://publib.boulder.ibm.com/infocenter/tivihelp/topic/com.ibm.itsmcw.doc/anrwrf53237.
Figure 30 Provisioner status 3. Determine which smart cells failed and can be restored: a. In the MBean view for the primary controller, click the button next to ListBrokenGroups. Groups that failed and have not been recovered are listed. b. Copy GroupIDs and Roles of broken groups. c. Click Back to MBean view. 4. Restore the smart cell: After you determine which smart cell you want to restore, begin the other Provisioner operation, RestoreSmartCellUsingGroupIDAndRole.
Preparing the backup server for disaster recovery The following steps and procedures describe how to restore the backup server (not the entire RISS system) in case the server itself or storage volumes are lost or destroyed. Restoring the backup server involves performing backups of the primary storage pools and the backup server database and configuration, and then storing this data off-site.
NOTE: The commands that begin with tsm: INTERNAL> were issued from the Tivoli command line interface (dsmadmc) from the PCC machine. The Administrative Command Line is also installed on the backup server. To start it, click Start > Programs > Tivoli Storage Manager > Administrative Command Line. 1. Set the configuration for DRM as suggested on pages 758 to 762 in the TSM Administrator’s Guide. a. Enable backup for the storage pool that holds the smart cell group data: tsm: INTERNAL>set drmprimstgpool SP.
Volume TAPE.3 was used for the database backup. 4. Move backup volumes off-site: a. This command should list the volumes TAPE.2 and TAPE.3: tsm: INTERNAL>query drmedia * wherestate=mountable tsm: INTERNAL>move drmedia * wherestate=mountable Volumes TAPE.2 and 3 were moved to the exit port of the library; their state was set to notmountable. b. This marks the state of the two volumes as courier: tsm: c.
Before you continue, make sure that you have the two volumes that contain the storage pool and database backup, and the recovery plan file. 1. Reinstall the backup server. Use the backup server installation media to reinstall the operating system and Tivoli Storage Manager software as described in the RISS Installation Guide in “Optional backup server.” (Your HP service representative has this document.) Perform all of the steps to create a working, fresh installation of the TSM server.
This sets the correct state for the volume containing the database backup. tsm: INTERNAL>move drmedia * wherestate=mountable This sets the state of the backup volumes to non-mountable and ejects them. They can now be returned to the off-site vault. n. Use the backup db, stgpool, and prepare commands to start another backup cycle. Version 1.
Backup system administration
14 Configuring Outlook or Lotus Notes This chapter contains the following information: • Configuring your system for Exchange and Outlook, page 113 • Configuring your system for Domino and Lotus Notes, page 144 Configuring your system for Exchange and Outlook The email miner can be configured to minimize the impact on the Exchange server, or to maximize mining throughput, depending on the customer’s requirements and hardware configuration. Typically there is a 10% impact on well configured mail servers.
Table 58 User accounts on customer servers For User type and mailbox location Default last name, user logon (password), alias* Group membership or permissions Mailbox mining Domain user and mailbox on Exchange servers Appuser, appuser (skyline); alias=appuser Administrators, Exchange Domain Servers Journal mining Active Directory user and mailbox on Exchange servers LocalJournalUser, LocalJournalUser (skyline); alias=LocalJournalUser User Dynamic Account Synchronization Active Directory user on
Cache related registry settings For [HKLM\Software\Hewlett-Packard\Outlook PlugIn\Cache]: • AttachmentsOnly=True: Indicates whether the Offline Cache Manager should cache only those archived messages that contain one or more attachments. The default is True. Changing this to False causes the Offline Cache Manager to cache all messages, whether or not attachment(s) exist. This is a user-configurable setting.
• MaxFetchCount=50: Number of archived messages that are retrieved from the RISS at one time. This is an administrator/diagnostic setting and should be modified only at the direction of HP technical support. • LogToDisk=False: Replicates the status information reported in the RISS Offline Cache Status window to a log file on the local file system. The file that contains this information is stored in the plug-in installation folder with a CacheMgr_YYYYMMDD_HHMMSS.log file name.
• AdminMode=False: Indicates the machine is in Administrative mode. The default is False. When set to True , the user is restricted from changing user-configurable settings. • Version=X.XXXX: Plug-in version. This should never be modified. • LogFilePath=: A fully-qualified path name that instructs the plug-in to record certain diagnostic information to disk. This is a user-configurable setting.
The Options dialog box appears. 5. Click Archive Options. The Archive Options panel appears. 6. In the URL to Modify (Fetch URL) list, select the default URL to display it in the URL to Modify box, and edit the URL. Replace HOST with the DNS name associated with the virtual IP (VIP) web user interface for the system. 7. In the Search URL box, enter the RISS Internet address. Replace HOST with the DNS name associated with the VIP Web Interface for the system. 8. Click OK. 9. In Outlook, click Search Archive.
e. Select Archive all messages sent or received by mailboxes in this store. f. Click Browse. g. Select the journal user and mailbox where messages from the mailbox store are copied. h. Click OK twice. i. Repeat step b through step h for each Storage Group on the server. 5. Repeat this procedure on other Exchange servers as needed to set up other mailbox stores for journaling.
4. From the Look In list in the Design Form dialog box, select User Templates in File System. 5. Click Browse, select the drive containing the RISS Utilities CD, select the Exchange folder, and then select the PERSISTMailItem form (PERSISTMailItem.oft). 6. Click OK. The PERSISTMailItem form appears in the Design Form dialog box. 7. Select the PERSISTMailItem form, and click Open. 8. In the Form Editor window, select Tools > Forms > Publish Form as. 9.
4. Choose an Outlook profile that can access the Global Address List (GAL) and click OK. Based on the previous selections, known mailboxes will populate the right pane. 5. Click the Settings view button to change to the Settings view. Figure 32 Settings view button 6. Double click the journal mailbox to bring up the properties dialog box. 7. Make sure Hide this information store from all selection lists is checked. The other two boxes should remain unchecked. Figure 33 Mailbox Properties 8.
Repeat this process for the SMTP and System Attendant information stores. Set up Auto-Search To set up Auto-Search: 1. In the left pane, select the Information Stores root folder. The bottom of the right pane displays the Automated Information Store Searches window. 2. Right click in this pane and select New Auto-Search. Figure 34 New Auto-Search The Edit Automated Search window appears. Make sure Search for Mailboxes is selected. 3. Click the Mailboxes tab. 4.
Scheduling an event To schedule an event: 1. Start Scheduler. 2. Select New to display the New Event dialog box. 3. After the New Scheduled Event window opens, enter a descriptive name for the event. The name should not contain any special characters. Figure 35 Scheduling an event 4. To select an event type, click the down arrow to see the types that are supported. Select an event type and click OK.
5. Click Apply. 6. Close the EMS Scheduler application. 7. Restart the Launch Manager service to make the new setting take effect. Repeat this procedure as needed for all mailbox mining events. Enabling a scheduled event After a new event has been created, it must be edited to enable it and set other parameters. In the Schedule Events Maintenance window, click Edit. The edit window that appears is specific to the selected event type. Each edit window is examined in the sections that follow.
• DocRef Host: Select the DocRef Host check box and enter the VIP of the RISS domain for which mailbox mining is being set up. See "Enabling load balancing message by message" on page 123 for information on enhancing performance during HTTP queries. • Use TNEF: Select the Use TNEF check box if you want to change the default value from No to Yes. If Yes is selected, messages will be sent to the RISS in TNEF format.
Figure 38 Selective Archiving Event window Editing journal mining events The Journal Mining Event window has a variety of configurable options: 126 Configuring Outlook or Lotus Notes
Figure 39 Journal Mining Event window • Enabled check box: Use to enable or disable an event. The default value is Disabled. • Number of Processes: Use to change the number of processes for each event from the default value of 1. • Frequency: Use the two Frequency check boxes to change the time interval between events from the default value of 2 minutes to any multiple of minutes, hours, or days. • SMTP Address: Select the SMTP Address check box and enter the RISS Virtual IP (VIP) used for SMTP.
• Delete Messages: Select the Delete Messages check box if you want to change the Delete Messages default value from Yes to No. This value indicates whether messages should be deleted from the journal mailbox Inbox folder and moved to the Deleted Items folder after the messages have been archived on the RISS. • Clear Deleted Items: Select the Clear Deleted Items check box if you want to change the Clear Deleted Items default value from Yes to No.
Figure 41 Synchronize Deleted Items event window • Enabled check box: Use to enable or disable an event. The default value is Disabled. • Override: Select the Override check box if you want to change the Delete Non-Tombstone Items From Exchange Retention default value from No to Yes. After making the changes, click Apply, and then click Close to finalize the changes. Clicking the Advanced button allows changes to be made that override default settings in the RISS.ini initialization file.
The appropriate edit window opens. 3. Make any relevant changes, and click Apply and then Close to finalize the changes. A dialog box appears indicating that a companion rule for this event has been created in the Mail Attender for Exchange database. 4. Edit the rule in the Mail Attender for Exchange console interface so the information stores that should be included in the scheduled event processing are added. Deleting a scheduled event To delete a scheduled event: 1.
Modifying a rule using Mail Attender 1. In the left pane, click + by Management to expand that folder, and then select Rules. Figure 44 Rules 2. In the right pane, double click the rule (created by the RISS Scheduler) to be modified. This brings up the window used for editing rules. The General tab is used for changing the description and category. Figure 45 Edit Local Rule window 3. Enter a description. Version 1.
The description entered here must match the name of the event set up in the RISS Scheduler. Otherwise, the RISS Launch Manager will fail to complete processing when this rule is executed. 4. Click the Information Stores tab. A rule must have at least one information store associated with it. Click Add to add an information store. The Add Information Stores window appears. Figure 46 Add Information Stores window 5.
Figure 47 Possible conditions CAUTION: The actions sections of a template rule should never be changed without the specific guidance of HP technical support. Starting selective archiving After configuring the schedule, execute selective archiving for the rule. To do this, highlight the rule description from the Mail Attender Console, click the right mouse button, click in the right pane, and click Process Now from the menu selection. A Log File Date screen shows the time the rule began processing.
Figure 48 Monitoring View window The first area shows the status of the Launch Manager Service. This service launches the enabled events defined in the Scheduler. From this area, you can start or stop the service. You can also set the refresh interval. The Launch Manager Service must be running for any event to be scheduled.
Deleting end-user deleted items on the RISS Mail items can be deleted by the end-user from the Exchange mail store and from the RISS in a coordinated fashion. Exchange 2000 and 2003 support a retention interval on end-user deleted items. If the interval was allowed to lapse, the deleted items would be permanently removed (hard deleted) from the Exchange mail store. To coordinate the deleted items, the delete rule is executed within the Exchange retention interval.
Figure 49 Mailbox store 1. Right click the mailbox store and select Properties to display the Mailbox Store Properties dialog box. 2. Click the Limits tab and assign the values to the Deletion Settings.
Figure 50 Deletion settings Once applied, any subsequent deletions performed on mailboxes contained in the given mailbox store are retained for the number of days specified. NOTE: HP recommends that the Keep deleted items for (days): and the Keep deleted mailboxes for (days): parameters be set to 7. Scheduling deletion from RISS To schedule deletions, enable a scheduled event using Scheduler and establish a corresponding rule using Mail Attender.
• Ensure that a scheduled event selecting Synchronize Deleted Items for the event type exists. • Ensure that the event type Synchronize Deleted Items also exists. Synchronize Deleted Items launches PTDelItems.exe. It also removes tombstoned items from the RISS based upon user-initiated delete options within the Outlook User Interface. Creating a Mail Attender rule To create a Mail Attender rule: 1. In the Folders tab: a. Set the folders to be All Folders or another selection. b.
Table 60 CSV Columns Column Number Column Heading Column Value 1 Server Name [MAILBOX_SERVER_NAME] 2 Distinguished Name [MAILBOX_DN] 3 Store IED [MAILSTORE_EID] 4 Folder EID [FOLDER_EID] 5 Message EID [MESSAGE_EID] 6 Is In Dumpster [MESSAGE_IN_DUMPSTER] At the bottom of the dialog box, select the following items in the boxes: • No warning before performing this action • Apply once per item per execution Table 61 Summary report Count Which Items? Count Messages Total Items Counts? One
You can refresh existing administration and password values or create new values, provided that any change is also added to the RISS configuration. If the status line shows Failed to decrypt password when you open the SetAdmin dialog box, the password is corrupted and will not work with the PTDelItems program. You will need to refresh or create new administration and password values. Make sure they match the values on the RISS.
The list of Exchange mail servers is entered by the HP service representative in the installation configuration file. The install procedure extracts the SystemMailbox information and saves it back into the configuration file. Multiple RISS systems Your HP service representative can initially set your OWA RISS configuration for multiple RISS servers, and set standard and specialized RISS URL templates. Any number of RISS servers can be listed. Installed RISS servers have standard URL addresses.
Table 63 Mail Attender rule to delete temporary items in Drafts folder General RissDeleteDrafts Information Stores Folders \Drafts Include subfolders Conditions Test Message Keywords Keywords= [MESSAGE_MAPICUSTPROP("PTOWASTATUS",C6448195FCA8CB4BB3E31303AA83C02C)] Test=”Equals” Value=”PTOWATEMP” Actions Report Delete Message Deletion Type=”Hard Delete” Other action settings: Click the Modify buttons and select the following check boxes.
ASP pages Use the ASP section to change the appearance of RISS archived items, and to set the UsePropertyTemplate flag. For OWA RISS, a mail item that is RISS archived will optionally display the RISS icon. You can disable the appearance of the icon by changing the Icon configuration setting. The UsePropertyTemplate flag should be set to TRUE only for Exchange 2000. Exchange 2003 performs the correct action by default.
Configuring your system for Domino and Lotus Notes This section contains information about configuring your system to enable Lotus Notes selective archiving.
Compacting databases Save disk space by periodically compacting the database on the gateway server. To compact the database: 1. In the Administrator client, click the Configuration tab. 2. Click the expansion arrow by Server, and then click Programs. 3. Click Add Program. 4. In program name, enter ncompact.exe. 5. In the command line enter -B. 6. Adjust the schedule as needed. 7. Click Save & Close. Creating mail.box files Improve performance by creating four mail.box files on the gateway server.
• EXTMGR_ADDINS=nhpclient.dll • RISS_DOMAIN_NAME=RISS domain name (for example, csf.store) • RISS_HOST_ADDRESS=IP address of the RISS system where domain name and host name define the RISS system used to archive the emails.
A Email Miner version P2.0 for Lotus Notes installation guide This appendix contains the following information about installing Email Miner version P2.
Frequently asked questions Architecture Table 64 Architecture Question Answer What version of Domino must my servers be running? Email Miner requires that your servers are running Domino 6.x or 7.0. What files are placed on my Domino server? Email Miner is self-contained within two Lotus Notes databases. There are no other files to be placed on the servers. How does Email Miner work? Email Miner uses a scheduled agent to perform all of the processing.
Permissions Table 65 Permissions Question Answer What access does Email Miner require to the mail databases? Email Miner only requires Editor access. Whose permissions is Email Miner using to access the mail databases? Whatever ID (Server/user) signed the Email Miner agent is the ID being used to process the mail databases. Can I sign the Email Miner agent with my server ID? Yes. This is a very common practice. Some companies also choose to use a generic administration ID to sign the agents.
Upgrade Table 68 Upgrade Question Answer How do I upgrade Email Miner? Within the installation database there is an upgrade procedure that will guide you through the upgrade steps. Must I upgrade every server (replica) of Email Miner? No. The upgrade only needs to be performed on one server, providing that the Email Miner database can properly replicate to all other replicas. What happens to the Email Miner data when I upgrade? Nothing. All of the data remains intact.
Email Miner Installation The installation database must be located on a Lotus Domino client and can reside in any directory within the Notes data structure. NOTE: If Email Miner already exists on the installation server, the installation database must be located within the directory where Email Miner resides.
NOTE: This field will be automatically populated with the name of the person performing the installation and LocalDomainServers. • Use Options to specify the installation options. Select Automatically create replicas if you want to create the Email Miner replicas during the Installation. If you do NOT select this option, the Email Miner replicas are not automatically created and must then be deployed manually.
Select Configure server definition if you want the Server Definitions that are created by the installation to either combine with an existing Server Definition or be modeled after an existing Server Definition. Select the Method that you wish to use for the Server Definitions. Select the Server definition that is to be used. The drop-down list displays the current Server Definition documents found within the existing Email Miner database.
NOTE: When the Replace Design dialog box appears, be sure to select the Email Miner (miner.ntf) template for the miner.nsf database, and the Email Miner Reference (referenc.ntf) template for the referenc.nsf database. Enable e-mail miners The Email Miner agents that have been installed must be enabled to begin archive processing. The HP Reference Information Storage System Installation Guide contains the procedure to follow. Ask your HP service representative for a copy of this procedure.
Table 70 Installation error messages Error number Error message Cause Action ERR0001 Could not find Server Definition for ’xxx’ The Server Definition for the specified server (’xxx’) cannot be found within Email Miner. Contact HP technical support. ERR0002 You must place the installation database on a Domino server The installation database does not currently reside on a server (KitType = 2). Move the installation database to a Domino server.
Email Miner version P2.
B Email Miner version P2.0 for Lotus Notes administration guide This appendix contains the following information about administering Email Miner version P2.
Mail server configuration There are two components for every mail server. • Server Definition The Server Definition defines the characteristics of each mail server. A Server Definition will automatically be created for each mail server during the Email Miner Installation. Each mail server must be included in a Server Definition and if one does not exist, Email Miner will email the administrators about the problem.
Figure 55 Processing options • Use RISS email address to specify the email address for the RISS: domino@[email address of RISS SMTP interface]@[foreign domain] riss. Use the foreign domain set up during system installation. • Use Maximum queue size to specify the maximum number of messages that can be queued before no more messages are sent to the RISS. • Use Options to specify the processing options to be used when Email Miner encounters an error while processing.
Figure 56 Message and Title fields Use Title to specify the title of the user’s confirmation dialog box that displays upon a successful deployment. Use Message to specify the message of the user’s confirmation dialog box that displays upon a successful deployment. • Select Query RISS to require a duplication document check before sending any document to the RISS. 4. Specify the Logging options: Figure 57 Logging options • Use Retention to specify how many days the log documents are to be retained.
Use Notifications to specify who should be notified. • Select Restrict replication to prevent all server-specific information from replicating to all servers. This is used to reduce the size of the Email Miner database on the servers. Use Replication servers to specify the servers that are to contain the server-specific information for the servers within this Server Definition document.
There are two ways to create Mail User Information documents within Email Miner. You can either do it manually using the Import User process, or you can automate it with the Synchronize with Address Book process. Import users This is a manual process and gives you complete control over which mail users are processed. The import allows you to select mail users based upon explicit name, group membership, or mail server.
The Import document is automatically saved and can be viewed within the Administration\1. Servers\4. Imports view. Synchronize with Address Book This is an automated process that allows you to specify which mail users should be automatically synchronized. You can specify if you want to add, delete and/or update the Mail User Information. The Name and Address Book is used as a reference only, and will NOT be updated by this process.
Figure 63 Include resource database Select Restrict mail users when you need to synchronize only a subset of the domain. Use Restriction type to specify how to restrict the mail users. Select By groups when wanting to restrict using group names. Select By servers when wanting to restrict using server names. Use Restriction method to specify whether to include or exclude the restricted names. Select Exclude to synchronize all domain documents except for the ones specified.
Multiple restrictions Multiple Document Mail Restrictions can exist for different folders/views with different retention periods. For example, a restriction managing the Inbox can exist with a retention period of 90 days, as well as a second restriction managing the Sent view with a retention period of 180 days. If two Document Mail Restrictions have the same priority and different retentions for the same folder, the restriction that was last modified will take precedence.
Document 1. Basics: Figure 65 Basics • Use Method to specify if the documents should be managed. • Use Type to specify how to locate the documents. Select Content to locate using keywords/phrases. Select Retention to locate using the document age. Select Size to locate using the document size. • Use Retention method to specify how to determine the age of the documents. Use Secondary retention method to specify the secondary method to be used in the event that the primary retention field does not exist.
Figure 67 Size • Use Size to specify the threshold size for the documents. Any document larger than this size will be mined. • Use Options to specify the size options. Select Include documents with attachments to include documents that contain attachments. 3. Folder specific options: Figure 68 Folder specific options • Use Options to specify the folder specifics options. Select Exclude folders to specify that documents within special personal folders, should be excluded.
Select Exclude for all servers, except for specified servers. Select Include for specified servers only. • Use Servers to specify the servers. The administrators can enter groups (nested groups), OU structures and/or explicit server names. Users Figure 71 Users • Use User specification to specify which users are to use the restriction. Select All to specify all users. Select Exclude for all users, except for specified users. Select Include for specified users only. • Use Users to specify the users.
• Dialog box messages • Email notifications • Log messages The error messages that Email Miner generates are categorized within the appropriate message method. If an error is reported by Email Miner and is NOT in any of the lists, contact HP technical support. Dialog box messages Different messages can appear within a dialog box while using Email Miner.
Log message number Log message Cause Action ERR0013 Could not find view ’Mail Users Information By Server’ The Mail Users Information By Server view cannot be found within the Email Miner database. Contact HP technical support. ERR0014 Could not find view ’Server Definitions’ The Server Definitions view cannot be found within the Email Miner database. Contact HP technical support.
Log message number Log message Cause Action ERR0026 ’xxx’ could not set quota for ’yyy’ (zzz). Check ’Server’ document (within Public Name and Address Book) for ’Administrators’ value The agent signer does not have administrator rights for the servers. Update the administrators value in the server document. ERR0027 Stopped processing folder ’xxx’ (Error encountered) A Bad document ID/key error occurred while processing a folder during Content processing. Contact HP technical support.
Email Miner version P2.
C Collecting held messages for HP technical support The Get Held Messages Notes application recovers mail.box messages that are in the Hold state, so they can be used for RISS and RIM diagnostics. After the application recovers a held message from mail.box, it resubmits the message to the router several times, giving it another chance to be delivered. The number of retries can be configured. After the maximum number of retries, the message is saved in Get Held Messages and is not returned to mail.box.
Using the application The following steps should be taken after messages have accumulated: 1. Open Get Held Messages. 2. Examine the Held Mail views, looking for undeliverable messages that were found in mail.box. 3. Use the command File/Database/New Copy to create a complete copy of the database. The copy of the get_held_messages database (get_held_messages.nsf) can be sent to HP for diagnosis of the held messages.
Index Symbols status conditions definition, 25 A Account Error Recovery view, 58 Account Manager, 49 See also AM Account Manager Service, 28 account synchronization See DAS Account Synchronization view, 43 accounts, user, 51 address book, Email Miner, 163 administrative privileges, RISS, 54 agents, Email Miner, 168 AM, 49 See also Account Manager about AM, 49 Account Manager window, 49 adding repositories, 54 adding users, 51 definition, 49 group panel, 54 user accounts, 51 Appliance Control view, 33 app
E email Lotus Notes, 144 Microsoft Exchange, 113 email log files, 77 Email Miner about, 147 address book, synchronizing, 163 administration guide, 157 agents, 168 archiving, 164 description, 18 Document options, 166 error messages, 154, 168 frequently asked questions, 148 importing users, 162 installing, 151 mail server configuration, 158 processing options, 161 restrictions, 165 security, 157 Server Definition, 158 Server options, 167 Server Status, 161 upgrading, 150, 153 user configuration, 161 User opt
M Mail Attender for Exchange description, 18 mailbox mining, 113, 119 Manual Account Loader view, 57 memory host machines, 31 MIB, RISS, 74 Microsoft Exchange journal mining, 118 mailbox mining, 119 non-sticky ports, 123 publishing forms, 119 stub support, 119 user accounts, 113 Microsoft Outlook plug-in, installing, 114 Mining RIM Management, 79 Mining Overview view, 79 monitoring reports, 76, 76 monitoring, PCC, 25 N non-sticky ports, configuring, 123 notifications detailed email reports, 76 SNMP event
PST Importer about, 85 Archive Request file, 85, 93 Archive Request Loader, 87 description, 18 features, 85 FileSpec tag, 94 Header tags, 93 installing, 86 logs, 92, 92 process, 85 PST Import Monitor, 90 sample file, 95 Status Monitor report, 92 Q querying data, 17 R RAID controller, 31 registry keys Microsoft Exchange, 118 Outlook plug-in, 114 regulatory compliance, 54, 68, 97 related documentation, 13 Remote Authorization, RISS, 54 replicating smart cells, 61 replication suspending and resuming, 63 Re
SUSPENDED smart cell state, 26 symbols in text, 14 SYNC_WAIT smart cell state, 26 synchronization, 43 synchronization errors, 28 repairing, 58 synchronizing address book, Email Miner, 163 system requirements Email Miner, 150 OWA RISS, 140 PST Importer, 86 System Status view, 31 T technical support HP, 14 text symbols, 14 thread count, 29, 31 Tombstone agent, Email Miner, 168 tombstone, definition, 85 troubleshooting Email Miner administration, 168 Email Miner installation, 154 U UNKNOWN smart cell state