Troubleshooting
Transcription
Troubleshooting
Troubleshooting If you have problems with a SolarWinds product, the causes are usually related to an incorrect configuration or corrupted files. The suggestions listed in this section can often clear up these problems. Additionally, you can visit our knowledge base repository for articles to help remedy specific issues. The address is: http://knowledgebase.solarwinds.com/kb/ You can also talk to other users as well as the SolarWinds staff by logging on to thwack.com Back Up Your Data As a first step in any troubleshooting procedure, you should back up your SolarWinds database. For more information, see “Creating Database Backups” on page 903. Verify Program Operation SolarWinds runs many components at the same time to deliver a view of your network status. Confirm that the following components are running on your SolarWinds server: Services: l l l l l l l l l l l l l Message Queuing Net.Tcp Port Sharing Service SNMP Trap Service SolarWinds Alerting Engine service SolarWinds Collector Data Processor, Management Agent, and Polling Controller services SolarWinds Information Service SolarWinds Job Engine and Job Engine v2 SolarWinds Job Scheduler SolarWinds Network Performance Monitor Service. All SolarWinds products use this service. It is not exclusive to SolarWinds SAM. SolarWinds Product services SolarWinds Information Service SolarWinds Module Engine SolarWinds Syslog and Trap Services 1319 Troubleshooting SQL Server Internet Information Service (IIS) l l Stop and Restart Many problems disappear when programs are restarted. Stopping and restarting Internet Information Service (IIS) may eliminate web page problems. Problems with polling or data gathering may be eliminated by stopping and restarting the SolarWinds Network Performance Monitor Service using the available shutdown tool that you can locate as follows: 1. Click Start > All Programs > SolarWinds > Advanced Features > Orion Service Manager. For a complete refresh of the system, reboot the computer. Run the Configuration Wizard Running the Configuration Wizard, which refreshes files on the web server and performs checks on the structure of your database, may solve many problems. Note: Before you run the Configuration Wizard, you should close all open applications and stop the SolarWinds Network Performance Monitor Service in the Windows Services Control Panel. It will be restarted by the Wizard at the end of its process. Using Full Variable Names If you are having difficulty acquiring expected values from a selected variable, using the ${VariableName}format, it may be helpful to include the database table name within the variable name, as in ${Nodes.IP_Address}. Why do my SAM WMI Monitors Show Status Unknown? To monitor SAM applications containing WMI component monitors, the following conditions must be true: l l WMI on the remote server is enabled and functioning properly. The remote server is accessible through a RPC connection in order to run the WMI queries. If these conditions cannot be met, the WMI component monitors in SAM show an Unknown status. Examples of some issues that can prevent these conditions from being met include, but are not limited to: 1320 Working with Temporary Directories l l l l Trying to connect to a remote computer where you do not have local Administrator rights. A firewall blocking the WMI traffic. An operating system that is not configured for WMI. Mistyping the credential password in the SAM component monitor. To help diagnose and fix these issues and others, we can test the WMI services, the remote WMI connections, and the SolarWinds SAM component configuration to discover and correct the issues that can prevent your WMI component monitors from functioning correctly. The topics in this guide are as follows: l l l l WMI Troubleshooting Flowchart for SolarWinds SAM. Provides a flowchart of the troubleshooting decisions described in this guide. Testing Local WMI Services. Ensures WMI is running correctly on the target computer. Testing Remote WMI Connections. Ensures the WMI connection to the target computer is not being blocked, ignored, or rejected. Testing SolarWinds SAM Component Configuration. Ensures you are properly configuring the WMI component credentials in SolarWinds SAM. Working with Temporary Directories The following sections provide procedures for moving Windows and SQL Server temporary directories to optimize SolarWinds server performance and resources. Moving the SQL Server Temporary Directory The SQL Server temporary directory, tempdb, where temporary database objects generated during table creation and sorting are stored, is typically created in the same location on your SolarWinds database server as the master, model, and msdb databases. Moving the tempdb database to a physical drive separate from your SolarWinds database can significantly improve overall system performance. l l For more information about moving the SQL Server 2005 temporary directory, tempdb, for see “Moving System Databases – Example A: Moving the tempdb Database.” For more information about moving the SQL Server 2008 temporary directory, tempdb, for see “Moving System Databases – Example A: Moving the tempdb Database.” 1321 Troubleshooting Redefining Windows System Temporary Directories Following established Windows standards, the SolarWinds installer may use Windows User and System TEMP and TMP variable directories as temporary scratch spaces for file expansion and execution. If you do not have the required scratch space available in the default User or System TEMP and TMP directories, use the following procedure to redefine your default locations. Note: Regardless of where you actually install SolarWinds, some common files may be installed where the operating system of your SolarWinds server are located. To Redefine Default System Temporary Directories: 1. 2. 3. 4. Log on to your SolarWinds server as a user with administrative rights. Right-click My Computer, and then click Properties. Click Advanced, and then click Environment Variables. Select the variable name representing the directory you want to redefine, click Edit, and then provide a new path as the Variable value for the selected temporary directory variable. Slow Performance on Windows Server 2008 If SolarWinds is installed on Windows Server 2008 or Windows Vista and there are any devices on your network, between your SolarWinds server and your database server, that do not support RFC 1323, “TCP Extensions for High Performance,” the TCP window size auto-tuning feature of Windows Server 2008 and Windows Vista may prevent your SolarWinds server from successfully connecting with your SolarWinds database. This TCP auto-tuning feature is intended as a network-sensitive restriction, applied by the receiver—your SolarWinds server—on the amount of data it is allowed or able to receive. If any devices along the network path between your SolarWinds server and your SolarWinds database do not support the TCP window scaling detailed in RFC 1323, the allowed size of the TCP window in packets sent to your SolarWinds server may not match the TCP window size reported by packets sent from your SolarWinds server. This mismatch may lead to failed connections between your SolarWinds server and your SolarWinds database. The following procedure disables this TCP auto-tuning feature, resetting the TCP receive window to 64kB. 1322 To Disable TCP Auto-tuning: To Disable TCP Auto-tuning: 1. Click Start > All Programs > Accessories. 2. Right-click Command Prompt, and then click Run as administrator. 3. If you are prompted by User Account Control, click Continue to open the elevated command prompt. Note: In some cases, having User Account Control (UAC) enabled on Windows Server 2008 and Windows Vista (evaluation-only) can lead to installation errors. For more information about disabling UAC, see the article, “Disabling User Account Control (UAC)” in the SolarWinds Knowledge Base. 4. At the prompt, enter the following: netsh interface tcp set global autotuninglevel=disabled 5. Close the command prompt window, and then restart your SolarWinds server. 1323 Troubleshooting WMI Troubleshooting Flowchart for SolarWinds SAM 1324 Testing Local WMI Services Note: The following Microsoft article describes how to set permissions in a workgroup after an upgrade from Microsoft Windows 2000 Professional to Microsoft Windows XP Professional. http://support.microsoft.com/?kbid=290403 Testing Local WMI Services Testing the local WMI services helps us isolate any faults on the target server we are trying to monitor. The testing program is a Microsoft program named WBEMTest that comes already installed on Microsoft Windows operating systems. Test WMI on the Target Server Complete the following procedure to check whether WMI on the target server is functioning correctly: 1. Log on to the target server with an administrator account. 2. Click Start > Run, enter wbemtest.exe and then click OK. 3. Click Connect on the Windows Management Instrumentation Tester window. 1325 Troubleshooting 4. Enter root\cimv2 in the field at the top of the dialog box next to the Connect button. 5. Click Connect. 6. Click Enum Classes. 1326 Test WMI on the Target Server 7. Select the Recursive radio button without entering a superclass name, and then click OK. 8. If the WMI class you are querying appears in this list, local WMI services are functioning correctly. Skip to the next topic and test remote WMI. 9. If the list does not appear or does not contain the desired WMI class, WMI is not functioning correctly. Continue reading this section for guidance on repairing WMI services on the target server. 10. Click Close, and then click Exit. 1327 Troubleshooting Reset the WMI Counters At times, the WMI performance counters may not get transferred to WMI because services were delayed or started out of order (http://support.microsoft.com/kb/820847). To manually reset the WMI counters: 1. 2. 3. 4. 5. 6. Stop the Windows Management Instrumentation service. Click Start, click Run, type cmd, and then click OK. At the command prompt, type winmgmt /resyncperf, and then press Enter. At the command prompt, type wmiadap.exe /f, and then press Enter. Type exit, and then press Enter to close the command prompt. Start the Windows Management Instrumentation service. After resetting the WMI counters, retest WMI. If resetting the WMI counters did not solve your problem, see “WMI is Still Not Working. Now What?” Testing Remote WMI Connectivity Testing the remote WMI connectivity of the target server helps us isolate faults that could prevent the target server from receiving or responding to our remote WMI requests. The testing program is a Microsoft program named WBEMTest that comes already installed on Microsoft Windows operating systems. Remotely Test WMI on the Target Server Complete the following procedure to check whether the target server is responding appropriately to remote WMI requests that originate from the SolarWinds SAM server: 1. Log on to the SolarWinds SAM server with an administrator account. 2. Click Start > Run, enter wbemtest.exe and then click OK. 3. Click Connect on the Windows Management Instrumentation Tester window. 1328 Remotely Test WMI on the Target Server 4. Enter \\Target_Primary_IP_Address\root\cimv2 in the field at the top of the dialog box. Replace Target_Primary_IP_Address in the above example with the actual Hostname or Primary IP Address of the target server. 5. Enter the user name in the User field, the password in the Password field, and NTLMDOMAIN:NameOfDomain in the Authority field. Replace NameOfDomain with the domain of the user account specified in the User field. 6. Click Connect. 7. Click Enum Classes. 1329 Troubleshooting 8. Select the Recursive radio button without entering a superclass name, and then click OK. 9. If the WMI class list appears, remote WMI is functioning correctly. Skip to the next topic and test your SAM credentials. 10. If the list does not appear, remote WMI is not functioning correctly. Continue reading this topic for guidance on restoring remote WMI connections on the target server, and retest remote WMI after completing each troubleshooting step. 11. Click Close, and then click Exit. 1330 Verify Administrator Credentials Verify Administrator Credentials Only a credential that has administrator rights on the target server has the necessary permissions to access the target server’s WMI services. Make sure that the username and password you are using belongs to an administrator on the target server. If the administrator credential is a domain member, be sure to specify both the user name and the domain in the standard Microsoft syntax. For example: DOMAIN\Administrator. Enable Remote Procedure Call (RPC) Remote WMI connections use RPC as a communications interface. If the RPC service is disabled on the target server, remote WMI connections cannot be established. To enable the RPC service: 1. 2. 3. 4. Log on to the target server with an administrator account. Click Start, click Run, type services.msc, and then press Enter. Scroll the list to Remote Procedure Call (RPC) Right-click Remote Procedure Call (RPC), and then click Start on the shortcut menu. Configure Distributed Component Object Model (DCOM) and User Account Control (UAC) If the target computer is running Windows Vista or Windows Server 2008, you may be required to make settings changes to allow remote WMI requests (http://msdn.microsoft.com/en-us/library/aa822854(VS.85).aspx). Item Need l DCOM l l l l l Default and Limits permissions edited to allow the following actions: Local launch (default permission) Remote launch (default permission) Local activation (limits permission) Remote activation (limits permission) For more information, see “Enabling DCOM” 1331 Troubleshooting WMI Namespaces User Account Control l l Modify the CIMV2 security to enable and remote enable the account used to access the server or workstation through WMI. You must ensure the security change applies to the current namespace and sub-namespaces. For more information, see “Enabling Account Privileges in WMI” Remote UAC access token filtering must be disabled when monitoring within a workgroup environment. For more information, see “Disabling Remote User Account Control for Workgroups” Enabling DCOM WMI uses DCOM to communicate with monitored target computers. Therefore, for Server & Application Monitor to use WMI, DCOM must be enabled and properly configured. To enable DCOM permissions for your Server & Application Monitor credentials: 1. Log on to the target server with an administrator account. 2. Navigate to Start > Control Panel > Administrative Tools > Component Services. You need to switch to the Classic View of the Control Panel to use this navigation path. You can also launch this console by double-clicking comexp.msc in the /windows/system32 directory. 3. Expand Component Services > Computers. 4. Right-click My Computer, and then select Properties. 5. Select the COM Security tab, and then click Edit Limits in the Access Permissions grouping. 6. Ensure the user account you want to use to collect WMI statistics has Local Access and Remote Access, and then click OK. 7. Click Edit Default, and then ensure the user account you want to use to collect WMI statistics has Local Access and Remote Access, 8. Click OK. 9. Click Edit Limits in the Launch and Activation Permissions grouping. 10. Ensure the user account you want to use to collect WMI statistics has Local Launch, Remote Launch, Local Activation, and Remote Activation, and then click OK. 1332 Enabling Account Privileges in WMI 11. Click Edit Default, and then ensure the user account you want to use to collect WMI statistics Local Launch, Remote Launch, Local Activation, and Remote Activation. 12. Click OK. Enabling Account Privileges in WMI The account you specify in the Credentials Library must possess security access to the namespace and sub-namespaces of the monitored target computer. To enable these privileges, complete the following procedure. To enable namespace and sub-namespaces privileges: 1. Log on to the computer you want to monitor with an administrator account. 2. Navigate to Start > Control Panel > Administrative Tools > Computer Management > Services and Applications. You need to switch to the Classic View of the Control Panel to use this navigation path. 3. Click WMI Control, and then right-click and select Properties. 4. Select the Security tab, and then expand Root and click CIMV2. 5. Click Security and then select the user account used to access this computer and ensure you grant the following permissions: Enable Account Remote Enable 6. Click Advanced, and then select the user account used to access this computer. 7. Click Edit, select This namespace and subnamespaces in the Apply to field, and then click OK. 8. Click OK on the Advanced Security Settings for CIMV2 window. 9. Click OK on the Security for Root\CIMV2 window. 10. Click Services in the left navigation pane of Computer Management. 11. Select Windows Management Instrumentation in the Services result pane, and then click Restart. Disabling Remote User Account Control for Workgroups If you are monitoring a target in a workgroup, you need to disable remote User Account Control (UAC). This is not recommended but it is necessary when monitoring a workgroup computer. Disabling remote user account control does not disable local user account control functionality. Warning: The following procedure requires the modification or creation of a registry key. Changing the registry can have adverse effects on your computer 1333 Troubleshooting and may result in an unbootable system. Consider backing up your registry before making these changes. To disable remote UAC for a workgroup computer: 1. 2. 3. 4. Log on to the computer you want to monitor with an administrator account. Click Start > Accessories > Command Prompt. Enter regedit. Expand HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System. 5. Locate or create a DWORD entry named LocalAccountTokenFilterPolicy and provide a DWORD value of 1. Note: To re-enable remote UAC, change this value to 0. Add a Windows Firewall Exception for Remote WMI Connections If the target computer has Windows Firewall enabled, it must have a Remote WMI exception to allow remote WMI traffic through (http://msdn.microsoft.com/enus/library/aa389286(VS.85).aspx). To add this exception: 1. Click Start, click Run, type cmd and then press Enter. 2. At the command prompt, type netsh firewall set service RemoteAdmin enable, and then press Enter. 3. At the command prompt, type exit, and then press Enter. If adding the firewall exception did not solve your problem, see “WMI is Still Not Working. Now What?” Do You Need an Additional Polling Engine? Symptoms that may indicate you need an additional polling engine include, but are not limited to, the following: l l l Polling completion rates are lower than expected which leads to gaps in data. Sporadic component monitor timeouts usually resulting in component monitors showing an "Unknown" status, reporting the error, "Connection timeout. Job cancelled by scheduler." Resource exhaustion on the SQL server. For more information, see "Additional Polling Engine and Web Console" on page 930. 1334 Verify SAM Component Configuration Verify SAM Component Configuration Make sure that the credential you are using for remote WMI is the same credential that you are using in the SAM component. After you click Set Component Credentials to set the component credentials, you must also click Submit at the bottom of the page. Service reporting, "Invalid Class" There are various possibilities for this to occur. Read the following section to help troubleshoot this issue. In APM v4 and higher, services can be polled via RPC or WMI. Ensure the correct service is running by navigating to Edit Application > RPC or WMI. Repair the WMI Repository according to this KB article: http://knowledgebase.solarwinds.com/kb/questions/633/Error+message+%22Inva lid+Class%22+when+using+WMI+monitors 1335 Troubleshooting Note: Vista and Windows 2008 have a built-in method for repairing the WMI repository. Open an Administrator command prompt and run: winmgmt /salvagerepository If you are using APM prior to version 4 and using WMI, try the following: There are three required WMI queries for service monitoring to work: SELECT * FROM Win32_Service SELECT * FROM Win32_Process SELECT * FROM Win32_PerfRawData_PerfProc_Process You can test these by going to Start > Run > WBEMTEST on the SolarWinds server. 1. 2. 3. 4. 5. 6. 7. Click on Connect. In the whitespace at the top, you should have \\ipaddress\root\CIMV2 For user and password, fill in the credentials used in APM. For Authority, type in NTLMDOMAIN: and enter your domain. Click Connect. Click Query Enter the above three queries, one at a time. More often than not, the culprit is the last query. If your problem still exists, try the following: 1. Re-sync the counters by opening a command prompt and typing: winmgmt /resyncperf 2. Check to make sure performance counters are not disabled: http://thwack.com/forums/68/application--server-management/21/application-performance-monitor/23124/win32perfrawdataperfprocpro/ Note: WMI is an operating system component. If the previous steps do no work, you may need to contact Microsoft for further information. WMI is Still Not Working. Now What? This guide depicts only the most common scenarios that can cause WMI services to fail. If you are unable to get WMI services to work at this point, it is time to consult Microsoft on this topic. l “WMI Troubleshooting.” Microsoft Developer Network. http://msdn.microsoft.com/en-us/library/aa394603.aspx 1336 Troubleshooting Hardware Health Troubleshooting Hardware Health This section describes possible causes and solutions concerning hardware resources either not being reported or being reported incorrectly. Hardware Prerequisite Checklist If the following conditions cannot be met, the Hardware Health resources will not be displayed. To monitor hardware in SAM, the following must be true: l l l l The monitored node must be HP Proliant, Dell PoweEdge, IBM X-Series, HP C7000, HP C3000, or Dell M1000e. The node must be monitored using one of the following protocols: o SNMP o WMI o ICMP nodes are allowed for VMWare when the Poll for VMware option is selected. The Hardware Monitoring Agent software, (provided by the vendor), is installed on the remote server. This applies for both SNMP and WMI. Required software can be found at "Monitoring Hardware Health" on page 834. For VMware, the minimum requirements are as follows: ESX server version 3.5, 4.0, 4.1, ESXi version 5.0, vCenter version 4.0, 4.1, 5.0. The following systems have been verified to work properly with SAM's hardware monitoring features. Note: Other systems may work as well. l l l l l Dell PowerEdge M610, R210, R610, R710, R900, 1950, 2850, 2950, 2970, 6850 HP ProLiant DL320 G4, DL360 G3, DL360 G4, DL380 G4, DL380 G6, ML570 G3 IBM IBM System x3550, System x3550 M2, System x3550 M3, System x3650, System x3650 M2, System x3650 M3, x3850, eServer 306m HP C7000, HP C3000 Dell M1000e. Note: IBM's ServeRAID Manager software must be installed on IBM X-Series servers for storage hardware health information to be displayed in SolarWinds SAM. HP’s WBEM providers are required for HP servers polled via WMI. Installation instructions can be at "Monitoring Hardware Health" on page 834. 1337 Troubleshooting Hardware Troubleshooting Flowchart 1338 Troubleshooting an SNMP Node Note: Dell does not make array and hard disk health information visible from WMI managed nodes. To monitor storage health on Dell servers, use SNMP. Troubleshooting an SNMP Node The most common issue customers face is that hardware information is not available via SNMP because the Hardware Monitoring Agent software was installed before SNMP was installed. This means MIBs were never installed and/or configured correctly. The easiest solution is to uninstall and then re-install the Hardware Monitoring Agent software after installing SNMP on the server. If this is not the case, follow the troubleshooting steps as outlined below: Verify the node was successfully added using SNMP: 1. Verify the polling method on the Node Details page as shown below: 2. Verify the Hardware Monitoring Agent software is installed on the remote server and running. For verification instructions, see "Accessing Hardware Monitoring Agent Software" on page 836. 3. Determine if SNMP responds for the proper OID. Below are the correct OIDS for each vendor: For HP:1.3.6.1.4.1.232.2.2.2.1.0 For Dell:1.3.6.1.4.1.674.10892.1.300.10.1.8.1 For IBM:1.3.6.1.4.1.2.6.159.1.1.60.3.1 l To determine if the remote server responds to the correct OID, you can use the MIB browser from SolarWinds Engineer’s Toolset, which can be downloaded from http://www.solarwinds.com/downloads/. Additionally, you can use other applications capable of making SNMP requests. If you do not have a tool for checking OIDs on the remote server, you can create an SNMP walk by using the SNMPWalk.exe installed with SAM, normally located at 1339 Troubleshooting C:\Program Files (x86)\SolarWinds\Orion\SnmpWalk.exe. SNMPWalk.exe will be used in this demonstration. Using SNMPWalk.exe: 1. Start SNMPWalk.exe and type in the IP address of the remote server and the community string for SNMP. 2. Click Scan. 3. After completing the scan, save the SNMP walk in a text file. 4. Open the text file and manually search for the OIDs. If the Remote Server does not respond on this OID, the Hardware Monitoring Agent software may not be properly configured. Check to see if the Hardware Monitoring Agent software has imported the correct MIBs as outlined in the following table. For information on verifying Hardware Monitoring Agent software, see "Accessing Hardware Monitoring Agent Software" on page 836. HP Dell IBM CPQSTDEQMIB MIB-Dell-10892 IBM-SYSTEM-HEALTH-MIB CPQSINFOMIB StorageManagementMIB IBM-SYSTEM-ASSETID-MIB 1340 Troubleshooting a WMI Node CPQIDA-MIB IBM-SYSTEM-LMSENSOR-MIB CPQHLTHMIB IBM-SYSTEM-MEMORY-MIB CPQSTSYSMIB IBM-SYSTEM-POWER-MIB CPQIDE-MIB IBM-SYSTEM-PROCESSOR-MIB IBM-SYSTEM-RAID-MIB ADAPTEC-UNIVERSALSTORAGE-MIB Troubleshooting a WMI Node The following conditions must be met before you can proceed troubleshooting WMI nodes: l l l The node has successfully been added via WMI. WMI is working properly on the remote server. The Hardware Monitoring Agent software is installed on the remote server and running. Using Wbemtest.exe to troubleshoot WMI: 1. Open wbemtest.exe, usually located at C:\Windows\System32\wbem\wbemtest.exe. 2. Connect from the problematic node (either the SAM server or the additional poller server) to the remote server using wbemtest.exe. 3. Click Connect. 4. In the Namespace field enter: For IBM and HP enter: \\RemoteServerIpAddress\root For Dell enter: \\RemoteServerIpAddress\root\cimv2 1341 Troubleshooting 5. Enter administrator credentials. 6. Click Connect. 7. Once connected, click Query… from the main screen. The Query dialog appears. 1342 Troubleshooting a VMWare Node 8. Enter: select * from __Namespace 9. Replace Namespace with the following: l For HP nodes, replace Namespace with HPQ l For Dell nodes, replace Namespace with Dell l For IBM nodes, replace Namespace with IBMSD 10. If the proper Namespace is found, connect to this Namespace. l \\RemoteServerIpAddress\root\IBMSD for IBM. l \\RemoteServerIpAddress\root\HPQ for HP. l \\RemoteServerIpAddress\root\cimv2\Dell for Dell. 11. Run a Query for specific information: Select Manufacturer, Model, SerialNumber from CIM_Chassis 12. If the test was not successful, re-install the platform or Hardware Monitoring Agent software on the remote server with the latest release. Troubleshooting a VMWare Node VMWare nodes can be polled for Hardware information either through the vCenter or directly by using the CIM protocol. Polling through the vCenter uses 1343 Troubleshooting VMWare's native API interface. Polling the ESX server directly uses the CIM protocol to get Hardware information. To determine if a node is polled through the vCenter or directly: 1. From the web console, navigate to Settings > Virtualization Settings 2. Listed will be table of all the currently polled VMWare nodes. This table contains the Polling Through column. Note: This column may be hidden. If the column is hidden, unhide it by clicking the dropdown menu of an adjacent column and check the Polling Through option: 3. Use the illustration below to determine how your VMWare is being polled. 1344 Troubleshooting AppInsight for Exchagne Troubleshooting AppInsight for Exchagne The following sections will help you identify and correct AppInsight for Exchange errors concerning configuration and performance counters: l l Troubleshooting Error Codes in AppInsight for Exchange Troubleshooting Exchange Performance Counters Troubleshooting Permissions The following information will help you troubleshoot issues with the following: l l l l Non-Domain Accounts Adding Local Administrative privileges to Active Directory Account Exchange Access Mailbox Exchange Access Non-Domain Account Local accounts (Non-Domain) cannot access Exchange Management interfaces and therefore are not supported by AppInsight for Exchange. Please select an Active Directory account or create a new one to use with AppInsight for Exchange. Add Local Administrative privileges to Active Directory Account 1. On the server where you want to grant local administrative privileges, open a Computer Management console. 2. Navigate to System Tools > Local Users and Groups > Groups and then double click the Administrators group. 3. Click Add and type in the Active Directory username of the account you want to grant administrative privileges to, and then press Enter. (Ensure the location is set to either the domain where the account is located or Entire Directory.) 4. Click Apply and then click OK. 5. Alternatively, you can add an Active Directory group to the Local Administrators group and then add the AD user accounts to that group. 6. To verify the account and local group membership has been configured properly, run the following in a PowerShell session: $Recurse = $true $GroupName = 'Administrators' Add-Type -AssemblyName System.DirectoryServices.AccountManagement $ct = [System.DirectoryServices.AccountManagement.ContextType]::Machine 1345 Troubleshooting $group = [System.DirectoryServices.AccountManagement.GroupPrincipal]::FindByIdentity ($ct,$GroupName) $LocalAdmin = $group.GetMembers($Recurse) | select @{N='Domain'; E= {$_.Context.Name}}, samaccountName, @{N='ObjectType'; E={$_.StructuralObjectClass}} -Unique $LocalAdmin = $LocalAdmin | Where-Object {$_.ObjectType -eq "user"} Exchange Access Granting Least Privilege access to the Exchange Organization can be accomplished using Active Directory Users and Computers (ADUC) 1. From the Start Menu open ADUC and navigate to the Microsoft Exchange Security Groups OU. 2. Double click on the View-Only Organization Management group. 3. After the window opens, click the Members tab and then click Add. 4. Type the username of the account you want to grant access to the Exchange organization, and then click OK. 1346 Troubleshooting Permissions 5. Click Apply and then click OK . 6. Close the ADUC window. Access can also be granted using the Exchange Management Shell with the following command: ${USER} = Username of service account Add-RoleGroupMember -Identity "View-Only Organization Management" -Member "$USER" To verify the management role is properly assigned, use the following commands: Get-RoleGroupMember -Identity "View-Only Organization Management" | Where-Object {$_.SamAccountName -eq "$USER"} Get-RoleGroupMember -Identity "Organization Management" | Where-Object {$_.SamAccountName -eq "$USER"} or Get-ManagementRoleAssignment -RoleAssignee “${USER}” | Where-Object {$_.RoleAssigneeName -eq "View-Only Organization Management" -or $_.RoleAssigneeName -eq "Organization Management"} Mailbox Search Access Mailbox Search access is required to determine attachment counts and sizes. It can be granted using the Exchange Management Shell (EMS). 1. From the Start Menu, open the EMS. 2. Type: New-ManagementRoleAssignment -Role "Mailbox Search" -User "${USER}" and press Enter. To verify the management role has been properly assigned, use the following command: Get-ManagementRoleAssignment -RoleAssignee “${USER}” Role "Mailbox Search" | Where-Object {$_.RoleAssignmentDelegationType -eq "Regular"} Note: Exchange Management Roles can be assigned to role assignees using either regular or delegating role assignments. l Regular role assignments enable the role assignee to access the permissions provided by the management role entries on this 1347 Troubleshooting l role. Delegating role assignments give the role assignee the ability to assign this role to Role Groups, Users, or Universal Security Groups. For more information, see: l l http://technet.microsoft.com/en-us/library/dd876958(v=exchg.150).aspx http://www.powershellmagazine.com/2013/05/23/pstip-retrieve-group-membership-of-an-active-directory-group-recursively/ Troubleshooting Exchange Performance Counters Occasionally, you may encounter an Exchange server which is missing some of the expected performance counters. If this happens, you need to verify whether the counters are simply disabled or if they are completely missing. The simplest way to do this is through the registry. 1. Navigate to the service with the missing performance counters. Note: Individual services are listed under HKLM\SYSTEM\CurrentControlSet\Services. 2. Expand the service and click on the Performance key. The important values we want to ensure exist are listed below and displayed in Figure 1. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\<ServiceName>\Performance] Example: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ESE\Performance] "Close"="ClosePerformanceData" "Collect"="CollectPerformanceData" "Library"="<Path to performance counter DLL file>" Example: "Library"="C:\\Program Files\\Microsoft\\Exchange Server\\V15\bin\\perf\\%PROCESSOR_ARCHITECTURE%\\eseperf.dll" "Open"="OpenPerformanceData" "PerfIniFile"="<Name of performance counter INI file>" Example: "PerfIniFile"="eseperf.ini" The "Library" file path is typically "C:\Program Files\Microsoft\Exchange 1348 Troubleshooting Exchange Performance Counters Server\%ExchangeVersion%\Bin\perf\%Processor_ Architecture%\%DLLFileName%" Figure 1. 3. Verify the counters have not been disabled by expand the service and then clicking on the "Performance" key. 4. Check for the value Disable Performance Counters (See Figure 2.) If this value exists, ensure the data value is 0. Any other value will disable the counters. 5. Once the value is confirmed to be set to 0, close all PerfMon windows and then reopen them. Note: The performance counters should be visible at this time. If the performance counters are not visible, proceed to the next step. Figure 2. 1349 Troubleshooting 6. If the values First Counter, First Help, Last Counter, and Last Help are listed (See Figure 3), it is highly recommended to unload the performance counters prior to reloading them. Figure 3. To Unload Performance Counters: (See Figure 4) 1. Close all PerfMon windows and stop any services which may be using these counters. 2. Open the Exchange Management Shell (EMS) in the Run as Administrator context. 3. Type: Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Setup and then press Enter. 4. Type: Remove-PerfCounters -DefinitionFileName "<Path to counter definition XML file> and then press Enter. a. The default location for Exchange counter definition files is: C:\Program Files\Microsoft\Exchange Server\%ExchangeVersion%\Setup\perf\%XMLFileName% To Reload Performance Counters: (See Figure 4) 1. Close all PerfMon windows and stop any services which may be using these counters. 2. Open the Exchange Management Shell (EMS) in the Run As Administrator context. 3. Type: Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Setup and then press Enter. 4. Type: New-PerfCounters -DefinitionFileName "<Path to counter definition XML file> and then press Enter. 1350 Troubleshooting Error Codes in AppInsight for Exchange a. The default location for Exchange counter definition files is: C:\Program Files\Microsoft\Exchange Server\%ExchangeVersion%\Setup\perf\%XMLFileName% 5. Check the application log to verify the counters were properly loaded and no PerfLib errors exist. Reopen PerfMon to ensure the counters are available. Figure 4. Troubleshooting Error Codes in AppInsight for Exchange Following are the possible error messages associated with AppInsight for Exchange. Included are possible causes and solutions. Configuration Errors Error Message, Information, and Remediation Error message: Remote configuration was unsuccessful due to the following: "The deployment service executable was not found on the Orion server." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: Internal error. The Remote Installation Service.exe file was not found. (Default file location: C:\Program Files (x86)\SolarWinds\Orion\APM). This can be caused by an incorrect SAM installation or Remote Installation Service.exe was deleted or modified. Remediation: Add the Remote Installation Service.exe file to the following folder: C:\Program Files (x86)\SolarWinds\Orion\APM. 1351 Troubleshooting Error message: Remote configuration was unsuccessful due to the following: "The configurator executable was not found on the Orion server." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: Internal error. SolarWinds.APM.RemoteWinRmConfiguratorFull.exe file was not found (Default file location: C:\Program Files (x86) \SolarWinds\Orion\APM). This can be caused by an incorrect SAM installation or SolarWinds.APM.RemoteWinRmConfiguratorFull.exe was deleted or modified.. Remediation: Add SolarWinds.APM.RemoteWinRmConfiguratorFull.exe to the following folder: C:\Program Files (x86)\SolarWinds\Orion\APM. 1352 Troubleshooting Error Codes in AppInsight for Exchange Error message: Remote configuration was unsuccessful due to the following: "Access denied." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: The provided user account does not have access to the Administrator share on the remote Exchange server. Remediation: Connect to the Administrator share with \\ExchangeComputerName\<drive letter>$\ from the Orion server. 1353 Troubleshooting Error message: Remote configuration was unsuccessful due to the following: "The configurator executable has an invalid signature." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: The configuration executable cannot be started on the remote Exchange server due to any of the following: n n n The high level of User Account Control settings The provided user account does not have privileges high enough to run *.exe files SolarWinds.APM.RemoteWinRmConfiguratorFull.exe is not signed with a Solarwinds certificate. Remediation: n Reduce User Account Control settings on the remote Exchange server; 1354 Troubleshooting Error Codes in AppInsight for Exchange n Ensure the user's account has privileges to run *.exe files Error message: Remote configuration was unsuccessful due to the following: "The network path was not found." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: This is a Windows error indicating that a networking component is malfunctioning. Remediation: l l Ensure you have access to the Shared Storage drive. 1. In Windows Explorer, navigate to My Network Places > Entire Network > Microsoft Windows Network > (workgroup name) > (Shared Storage drive name). Firewalls can block traffic to the network which could generate this message. Try temporarily disabling any software or hardware firewalls to isolate the problem. 1355 Troubleshooting l Anti-spyware tools can block network traffic. Try temporarily disabling any anti-spyware programs and restart the computer to isolate the problem. Error message: Remote configuration was unsuccessful due to the following: "Executable configuration file was not found on the Orion server." For details, see the log on the Orion server: ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RemoteExecutableStarter.log). Description: Internal error. was not found (Default file location: C:\Program Files (x86)\SolarWinds\Orion\APM.) This can be caused by an incorrect SAM installation or SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config was deleted or modified. SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config Remediation: Add SolarWinds.APM.RemoteWinRmConfiguratorFull.exe.config to the following location: C:\Program Files (x86)\SolarWinds\Orion\APM. 1356 Troubleshooting Error Codes in AppInsight for Exchange For information about Microsoft error codes, see: http://msdn.microsoft.com/enus/library/cc231199.aspx 1357 Troubleshooting Error message: Remote configuration was unsuccessful due to the following: "PowerShell 2.0 was not detected on the Exchange server." Learn how to correct this. For details, see the log on the remote computer. ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log). Description: PowerShell 2.0 is not installed on the remote Exchange server. Remediation: PowerShell 2.0 should be installed on Exchange server. Installing PowerShell 2.0 on Server 2008: For Server 2008, download the installation file for PowerShell 2.0 at http://support.microsoft.com/kb/968929/en-us and install it on the server. Note: PowerShell 2.0 is automatically installed on Server 2008 R2 and therefore no additional installation is required. Installing PowerShell 2.0 on Server 2012: 1. Open Server Manager. 1358 Troubleshooting Error Codes in AppInsight for Exchange 2. Click on the Manage menu, and the select Add Roles and Features. 3. After the wizard opens, click Next until you get to the Installation Type page. 4. Select Role-based or feature-based installation. 5. Click Next until you reach the Features page. 6. Scroll down to Windows PowerShell. It will likely show itself as partially installed (square inside box). 7. Check the box next to Windows PowerShell 2.0 Engine. 8. Click Next and then Install. 9. When the installation finishes, click Close. Error message: Remote configuration was unsuccessful due to the following: "This account must be an Active Directory account with local administrative 1359 Troubleshooting privileges." Learn how to correct this. For details, see the log on the remote computer. ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log). Description: The provided user account does not have Local Administrative privileges. Remediation: Add Local Administrative privileges to Active Directory Account: 1. On the server where you wish to grant local administrative privileges, open a Computer Management console. Note: On Windows 2012, add this privilege using the Active Directory console. 2. Navigate to System Tools > Local Users and Groups > Groups and double click the Administrators group. 3. Click Add and type in the Active Directory username of the account you want to grant administrative privileges, and then press Enter. (Ensure the location is set to either the domain where the account is located or Entire Directory.) 4. Click Apply and then click OK. Note: Alternatively, you can add an Active Directory group to the local administrators group and add the Active Directory user accounts to that group. Error message: Remote configuration was unsuccessful due to the following: "This account must be an Active Directory account with organization wide Exchange access (View-Only-Organization Management and Mailbox Search Management Role)." Learn how to correct this. For details, see the log on the remote computer. ([ALLUSERSPROFILE] \ProgramData\Solarwinds\Logs\APM\RunWinRMConfigurator.log). Description: The provided user account does not have View-Only-Organization Management or Mailbox Search Management privileges. Remediation: Grant View-Only-Organization Management privileges: Granting Least Privilege access to the Exchange Organization can be accomplished using Active Directory Users and Computers (ADUC). To accomplish this, take the following steps: 1360 Troubleshooting Error Codes in AppInsight for Exchange 1. From the Start Menu, open ADUC and navigate to the Microsoft Exchange Security Groups OU. 2. Double click on the View-Only Organization Management group. 3. After the window opens, click the Members tab and then click Add. 4. Type the username of the account you want to grant access to the Exchange organization, and then click OK. 5. Click Apply, and then click OK. 6. Close the ADUC window. Grant Mailbox Search Access: Mailbox Search access is required to determine attachment counts and sizes. This can be granted using the Exchange Management Shell (EMS). 1. From the Start Menu, open the EMS. 2. Type: New-ManagementRoleAssignment -Role "Mailbox Search" User <Username of account being granted access> and then press Enter. 3. To verify the management role has been properly assigned, enter the following command: Get-ManagementRoleAssignment -RoleAssignee <Username of account> 1361 Troubleshooting 1362