Chapter 5. The ITSO EWLM scenario 123
Figure 5-1 EWLM domain name in title bar of browser window
We recommend that you create a picture of your server topology for a better understanding of
your environment, like what we did for our environment as shown in Figure 5-2. Note that we
do not illustrate the logical relationship between the servers because EWLM creates it
automatically as described at 4.4, β€œMonitor” on page 104.
We do not include the firewall, router, proxy server, DNS server, and laptops shown in
Figure 5-2 in our EWLM domain because we do not want to monitor this hardware. We are
interested in the workflow and a breakdown of transactions between the Web server,
Application server and Database server.
Figure 5-2 Topology of our lab environment
5.2.2 Identifying all servers and middleware
The next step of the assessment phase is to obtain more detailed information about the
servers, such as IP address, operating system, and middleware that is running on each
server. You have to collect operating system and middleware information carefully since
current EWLM implementation depends on it. Refer to 1.3, β€œEWLM supported platforms and
applications” on page 16 for supported operating system and middleware information.
The servers and middleware list includes the following attributes:
? Host name
? IP address
IBM DNS server
9.12.6.7
Laptop
9.x.x.x
IBM Router
9.12.11.1
9.12.11.3
9.12.4.149
10.2.1.1
10.2.2.1
EWLMFW
10.2.1.2
10.2.2.2
HTTP Plugin
Server
EWLM1
9.12.11.2
Proxy Server
StoneGate
Management/Log
Server
EWLM2
9.12.4.140
EWLM4
9.12.4.138
EWLM3
9.12.4.139
EWLMDM1
9.12.4.142
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset