IBM Tivoli Monitoring > Version 6.3 Fix Pack 2 > Installation Guides > Installation Guide
IBM Tivoli Monitoring, Version 6.3 Fix Pack 2
Prepare for installation
The sections in this chapter provide an overview of the installation process and information to help you prepare to install the IBM Tivoli Monitoring environment.
- Assess your monitoring needs to determine the best deployment of IBM Tivoli Monitoring components.
- Ensure you have the required hardware and software.
- Install database servers for the portal server database and Tivoli Data Warehouse.
- Gather information required for successful installation (See Installation worksheets)
- Install the Tivoli Enterprise Monitoring Server.
- Install the Tivoli Enterprise Portal Server.
- Install the monitoring agent software. (See also: Self-describing agent installation)
- Setup event forwarding to Netcool/OMNIbus or Tivoli Enterprise Console.
- Install the portal desktop client on any system where you want to use it.
- Start the portal client to verify that you can view the monitoring data.
- Install and setup the Tivoli Data Warehouse
- Install and setup a dashboard environment (optional)
- Install and setup a reporting environment with Tivoli Common Reporting (optional)
- Install and setup OSLC linked data integration using the OSLC Performance Monitoring service provider (optional)
- Cross Product Integration scenarios
If you are upgrading from IBM Tivoli Monitoring V6.1, see Upgrade from a previous installation before installing any IBM Tivoli Monitoring components.
If you are upgrading from Tivoli Distributed Monitoring or IBM Tivoli Monitoring V5.x to V6.3, see IBM Tivoli Monitoring Upgrading from Tivoli Distributed Monitoring.
If you plan to use firewalls in your environment, see Firewalls for an overview of the IBM Tivoli Monitoring implementation of firewalls.
See
- Specific information to have ready
- Required order of installation or upgrade of IBM Tivoli Monitoring component products
- Windows installation considerations
- Linux or UNIX installation considerations
- Security options