Document 279676

StealthCollect For SQL Server Local
Server Installation
StealthCollect SQL Server Local Server Installation
About StealthCollect................................................................................................................. 3
StealthCollect Architecture ........................................................................................................ 4
Multi-Tier or Single-Tier Installation......................................................................................... 5
Supported Platforms and Versions ........................................................................................... 7
Before You Install .................................................................................................................... 8
StealthCollect Installation Wizard ............................................................................................. 10
StealthCollect Setup Wizard - Installation Type ....................................................................... 10
StealthCollect Setup Wizard - Agents Framework Installation.................................................... 10
StealthCollect Setup Wizard - StealthCollect Installation .......................................................... 10
StealthCollect Setup Wizard - Monitored SQL Server Instance................................................... 11
StealthCollect Setup Wizard - SQL Server Authentication Details ............................................... 11
StealthCollect Setup Wizard - ERP Applications ....................................................................... 11
StealthCollect Setup Wizard - Performance Repository Installation Decision................................ 11
StealthCollect Setup Wizard - Performance Repository Instance and Authentication Method ......... 12
StealthCollect Setup Wizard - Performance Repository Database Files Directory .......................... 12
StealthCollect Setup Wizard - Installation Complete................................................................. 12
Configuring PeopleSoft ........................................................................................................... 13
Restoring Original PeopleSoft Configuration ......................................................................... 13
Copyright 2005 Quest Software, Inc. All Rights Reserved.
2
StealthCollect SQL Server Local Server Installation
About StealthCollect
StealthCollect™ is a server-based agent that samples and collects (multiple times
per second) performance data from the SQL Server monitored instance memory
and from the operating system APIs. The collected metrics are made available as
data, either as a present activity stream or as historical activity.
By going directly to the monitored instance memory and the operating system
APIs, StealthCollect gathers session data samples from the SQL Server server in
a non-intrusive manner, without incurring the overhead of using queries against
the database and without affecting the currently running SQL Server processes.
The raw samples are combined into high-level performance data. The data and
statistics are made available in a number of easily navigable formats for efficient
analysis, troubleshooting, and tuning of both historical and current session
activities.
The StealthCollect technology has the ability to non-intrusively operate 24 hours
a day, seven days a week and collect every beat of the database. This gives you
the ability to find out what happened on a particular day at a particular time (for
example, two days ago at 2:00 P.M.).
Copyright 2005 Quest Software, Inc. All Rights Reserved.
3
StealthCollect SQL Server Local Server Installation
StealthCollect Architecture
StealthCollect consists of both server agents and client components. The client
component establishes communication with a server agent, requests appropriate
data from the server agent, and presents SQL Server operational information to
the user in an intuitive manner.
The server agent component contains the following key processes, each
performing an operational function of the product:




Quest Agent Manager (QAM)— Manages access to and creation of all
server agent processes.
Collector — A process which Gathers operational information directly from
SQL Server's memory structures.
Middle tier processes — Processes which aggregate and store the data
collected by the collector. The data is stored in files or in a performance
repository instance.
Performance Repository instance – A performance warehouse instance
which contains the data collected and aggregated by the Middle-tier
processes.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
4
StealthCollect SQL Server Local Server Installation
Multi-Tier or Single-Tier Installation
StealthCollect can be installed as a single- or multi-tier installation. In a singletier installation, all processes, except for the repository database, run on the
monitored instance host. In a multi-tier installation only the data collector runs on
the monitored host while all the other processes run on the middleware host. The
multi-tier installation is the preferred installation as it removes load from the
monitored host to the middleware host.
Note: Regardless of the middle tier configuration, the Performance
Repository can and should be placed on a host other than that of the
monitored instance.
The following pictures represent the single-tier and multi-tier installations.
Single-Tier Topology
The single-tier topology is simple but at a cost of imposing additional overhead on
the host and your monitored instance.
Choose this configuration under any of the following circumstances:



You are monitoring a non-critical environment (for example, test or nonproduction environments).
Your host can handle additional resource demands.
An additional middle tier host is not available.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
5
StealthCollect SQL Server Local Server Installation
Multi-Tier Topology
In a multi-tier installation, the middle tier layer is installed on a host other than
that of the monitored instance, providing for optimal performance. The middle
tier and monitored host platforms are independent of one another. For example,
you can have a middle tier running on WIN2K and a SQL Server instance running
on Windows 2003.
The advantages of such a configuration include the following:


The CPU and I/O load on the monitored instance is reduced and passed
onto the middle tier. The middle tier computer capacity should be adjusted
to the amount and load of instances it is to serve.
A site monitoring several instances can employ a single middle-tier host to
contain the middle tier for all the monitored instances. This lightens the
administrative and maintenance burdens. The repository can reside on the
middle tier host or another host in the network depending on your
configuration and needs.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
6
StealthCollect SQL Server Local Server Installation
Supported Platforms and Versions
Information about supported platforms and versions is available at:
http://www.quest.com/performance_analysis/index.asp
Copyright 2005, Quest Software, Inc. All Rights Reserved.
7
StealthCollect SQL Server Local Server Installation
Before You Install
Before you install the StealthCollect Agent on a local host, several installation
tasks should be performed:
Verify that StealthCollect supports your SQL Server version.
Verify that StealthCollect supports your operating system.
Decide whether you want a single- or multi-tier installation. For more
information see Multi-Tier or Single-Tier installation.
Ensure that the Windows user that runs the installation wizard is either a
local administrator on the installation server or is a Windows domain
administrator.
Verify that your Windows user has the SQL Server administrator role or
that you have a database authentication user with such a role on the
monitored instance.
Verify that the monitored and middle tier hosts have sufficient available
space.
Ensure that all hosts and clients involved in the installation are visible to
one another through the network.
Verify that the port (default 3566) which is to channel client-host
communication is not being used.
Verify that the monitored host database instance is up and available.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
8
StealthCollect SQL Server Local Server Installation
Monitored host specific requirements
Verify that the target installation directory has at least 500 MB of free
space for single-tier installation or 2 GB of disk space for multi-tier
installation.
Verify that the monitored instance is running and accessible from other
hosts.
Middleware host specific requirements in a multi-tier
installation
Verify that the target installation directory has at least 2 GB of disk space.
Performance Repository specific requirements:
Verify that your windows user has the SQL Server administrator role or
that you have a database authentication user with such a role on the
performance repository instance.
Verify that the target installation directory for the repository instance has
at least 2 GB of free space if this is the first installation which uses this
repository instance.
Note: The exact amount of required disk space will be determined during
installation once the historical collection is configured.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
9
StealthCollect SQL Server Local Server Installation
StealthCollect Installation Wizard
The StealthCollect Installation wizard guides you through the process of installing
the agent and configuring it to monitor a given SQL Server instance.
StealthCollect architecture supports both single- and multi-tier installations.
Changing from one to another requires a re-installation and results in data loss.
All installation-related actions must be performed from the host on which
the StealthCollect agent software is to be installed (locally).
To begin the StealthCollect Wizard:
 Read the Wizard Introduction screen and click Next to Continue.
StealthCollect Setup Wizard - Installation Type
Use this screen to define the installation type on the local server. First, enter the
Agent Communication port number that permits communication between the
client and the monitored host. This port must be available and the same for both
the middle tier and monitored instance hosts.
If Single-Tier, the middle tier will reside on this same database server and you
need to run the installation only once. If two-tier is specified, first run the setup
wizard on the middle tier host (unless you will be connecting to an existing
middle-tier). Afterwards, run it on the monitored host. While installing the
monitored host you will be prompted for the middle tier host.
StealthCollect Setup Wizard - Agents Framework Installation
In this screen, specify the directory in which the Quest Agent Manager and
StealthCollect software are to be installed, or accept the default. If a Quest Agent
Framework already exists on this host's port, this step does not occur.
To complete the Quest Agent Manager Installer Directory page of the
setup wizard

Either accept the default installation directory location or specify the
Installation Directory that is to serve as the root directory under which all
Quest agents using this specified port and StealthCollect software are to be
installed. You are advised to choose a directory with sufficient free space, as
this directory will contain the agent binaries and data files. For more
information, see Multi-Tier or Single-Tier installation.
If this local server is a member of a Windows cluster the selected installation
directory must reside on a shared drive.
If the server is protected by a firewall, select the appropriate checkbox.
StealthCollect Setup Wizard - StealthCollect Installation
This screen is displayed during the installation and configuration of the
StealthCollect program files.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
10
StealthCollect SQL Server Local Server Installation
StealthCollect Setup Wizard - Monitored SQL Server Instance
In this screen, specify the name of the SQL Server Instance to be monitored. The
Instance Name should include both server and instance name
(<server>\<instance>), for example zeus\PLeno. If the installation is to be in
the default instance, only the server name needs to be provided. In most
cases, the default instance will be displayed. If the displayed instance is not the
monitored instance, either choose another instance name or enter the correct
value.
In the case of a cluster installation, please specify the instance network name.
StealthCollect Setup Wizard - SQL Server Authentication Details
In this screen, specify the SQL Server connection method. This is done by
selecting the authentication type, and supplying the connection details. SQL
Server supports two types of authentication, Windows authentication and
Database authentication. This authentication will be used for connecting from the
middleware processes to the monitored instance.


Windows Authentication (default)—uses your current Windows logon
user account. This account must have the SQL Server administrator role.
Database Authentication—requires a SQL Server account name and
password. This authentication method requires you to enter a SQL Server
account which has the Administrator role in the Login name and
Password entry boxes.
StealthCollect Setup Wizard - ERP Applications
StealthCollect incorporates Enterprise Resource Planning (ERP) product views for
PeopleSoft. Product views associate SQL statements from PeopleSoft with a
specific program, form, and user name by displaying values from the Context
Infos column. This can be useful because PeopleSoft Applications categorize all
system users under a super username.
Specify here if PeopleSoft is installed on this host.
Refer to the Configuring PeopleSoft section for instructions on the subsequent
necessary procedures for this installation.
Note: ERP product views are available for PeopleSoft version 8.0 or later.
StealthCollect Setup Wizard - Performance Repository Installation
Decision
The Quest Performance Repository offloads historical data from the short-term
storage resources, enabling both a more efficient middle tier performance and
access to advanced features, including:


Historical data retention for more than 90 days
Change tracking.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
11
StealthCollect SQL Server Local Server Installation
Specify here if a performance repository is to be installed.
The performance repository can be installed subsequently if not installed during
this installation from within the Performance Analysis client. In order to install the
performance repository from within Performance Analysis, access the
"StealthCollect Administration" screen, "StealthCollect Agent" node, "Performance
Repository" tab and press the "Create Repository Manager" button.
StealthCollect Setup Wizard - Performance Repository Instance and
Authentication Method
Use this screen to specify the location of the SQL Server instance which is to
serve as the performance repository. The Instance Name should include both
server and instance name (<server>\<instance>), for example zeus\PLeno. If
the installation is to be in the default instance, only the server name needs to be
provided. If the repository database does not exist, it will be created.
The performance repository is a dedicated database that hosts performance data.
Each repository can serve several monitored instances. If the repository instance
does not have the repository database, it will be created.
Additionally, specify the SQL Server connection method. This is done by selecting
the authentication type, and supplying the connection details. SQL Server
supports two types of authentication, Windows authentication and Database
authentication.


Windows Authentication (default)—uses your current Windows logon
user account. This account must have the SQL Server administrator role.
Database Authentication—requires a SQL Server account name and
password. This authentication method requires you to enter a SQL Server
account with Administrator role in the Login name and Password entry
boxes.
StealthCollect Setup Wizard - Performance Repository Database Files
Directory
Enter here an existing performance repository directory on the server in which
the repository database files are to be created.
This screen appears only if this is the first installation using this Performance
Repository instance.
The specified directory must have more than 2 GB of free disk space.
StealthCollect Setup Wizard - Installation Complete
This screen informs you of your successful installation.
If you have installed the middle tier host, you are instructed to now perform the
installation locally, from the monitored instance host and to designate this middle
tier, when prompted.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
12
StealthCollect SQL Server Local Server Installation
Configuring PeopleSoft
In a PeopleSoft environment when slowdowns, performance problems, or errors
occur, it is difficult to know with which PeopleSoft users are experiencing
problems.
When reviewing collected performance metrics and related tables, it is difficult to
associate those metrics back to the appropriate active PeopleSoft user session,
making it difficult to track PeopleSoft user and program activity for problem
resolution, historical performance consumption, and trend analysis reporting.
To configure PeopleSoft for StealthCollect, set the EnableDbMonitoring flag to
'1' in the PeopleSoft configuration file for each of the application server domains.
After this change, PeopleSoft will populate the CONTEXT_INFO column in the
master..sysprocesses system table. This lets StealthCollect monitor clients
connected to the database server from multi-tier workstations.
To configure PeopleSoft for StealthCollect
1. Login as the PeopleSoft user administrator.
2. Run the psadmin.exe in the PeopleSoft Server Administration directory.
3. Choose 1) Application Server
4. From the displayed PeopleSoft Application Server Administration menu,
choose
1) Administer a domain.
5. From the Tuxedo domain list, select the domain which you want to
administer.
6. From the PeopleSoft Domain Administration menu, select
6) Edit configuration/log files menu.
7. From the PeopleSoft Edit Configuration/Log Files Menu, select
1) Edit psappsrv.cfg (current configuration file).
8. In the displayed file, set EnableDBMonitoring=1.
9. Re-run steps 4-8 for each domain you want StealthCollect to monitor.
Restoring Original PeopleSoft Configuration
To remove the StealthCollect PeopleSoft configuration, set the
EnableDbMonitoring flag to '0' in the PeopleSoft configuration file for each of the
application server domains. In accordance with the above sample procedure:
1. Re-run steps 1-7.
2. In the displayed file, set EnableDBMonitoring=0.
3. Re-run the previous steps for each domain that you no longer want to
monitor using StealthCollect.
Copyright 2005 Quest Software, Inc. All Rights Reserved.
13