BMC Base de Conocimiento Linux
BMC Base de Conocimiento Linux
Supporting
PATROL for Unix and Linux 9.2
March 2005
Copyright 2005 BMC Software, Inc., as an unpublished work. All rights reserved. BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered trademarks or trademarks of BMC Software, Inc. IBM is a registered trademark of International Business Machines Corporation. DB2 is a registered trademark of International Business Machines Corporation. Oracle is a registered trademark, and the Oracle product names are registered trademarks or trademarks of Oracle Corporation. All other trademarks belong to their respective companies. Product Name technology holds U.S. Patent Number number. BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable End User License Agreement for the product and the proprietary and restricted rights notices included in this documentation.
Customer support
You can obtain technical support by using the Support page on the BMC Software website or by contacting Customer Support by telephone or e-mail. To expedite your inquiry, please see Before Contacting BMC Software.
Support website
You can obtain technical support from BMC Software 24 hours a day, 7 days a week at http://www.bmc.com/support_home. From this website, you can
s s s s s s s
read overviews about support services and programs that BMC Software offers find the most current information about BMC Software products search a database for problems similar to yours and possible solutions order or download product documentation report a problem or ask a question subscribe to receive e-mail notices when new product versions are released find worldwide BMC Software support center locations and contact information, including e-mail addresses, fax numbers, and telephone numbers
product information product name product version (release number) license number and password (trial or permanent)
operating system and environment information machine type operating system type, version, and service pack or other maintenance level such as PUT or PTF system hardware configuration serial numbers related software (database, application, and communication) including type, version, and service pack or maintenance level
s s s
sequence of events leading to the problem commands and options that you used messages received (and the time and date that you received them) product error messages messages from the operating system, such as file system full messages from related software
Contents
Chapter 1 Introduction 19 20 20 20 22 25 25 27 29 29 29 29 30 31 33 33 33 34 34 34 35 36 36 36 37 38 38 39 41 42 42 43 44 44 44 45 46 47
5
PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Applications and Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 2 Menu Summary
Location of KM Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Console for Unix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Console for Microsoft Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . Menu Summary Table Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Instance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UNIX OS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COLLECTORS Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMPOSITES Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMPOSITES_COLLECTOR Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CPU Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DCM Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISK Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FILESYSTEM Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HEALTH AT A GLANCE Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . KERNEL Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MEMORY Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NETWORK Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NFS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROLAGENT Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PRINTER Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROCESS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROCESS_PRESENCE (PROCCONT) Application Menu . . . . . . . . . . . . . . . . . . . . . . PROCPRES Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SCHEDULER Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SECURITY Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SMP Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SNMPHealth Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SWAP Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . USERS Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
Chapter 3
Parameter Summary
49
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Object Hierarchies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 COLLECTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 DCM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 DCM Collection Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Data Collection Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Collector Parameters for DCM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 -Ctrl and -Coll Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 DCM Collection Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 PSL Collection Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Collector Parameters for COLLECTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 -Coll Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 PSL Collection Exceptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Managing Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Changing Data Collection Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Activating an Inactive Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Activating an Inactive Collector Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Significant Events Related to Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Chapter 5 Monitoring CPU and Kernel 105
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Object Hierarchy for CPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 CPU and Multiple CPUs (SMP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Viewing CPU Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Viewing CPU Statistics on Interrupts, Switches, and Waits . . . . . . . . . . . . . . . . . 109 Viewing Statistics on CPU Run Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Viewing Statistics on Multiple CPUs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Object Hierarchy for KERNEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 KERNEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Viewing the Kernel Build Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Viewing Kernel Memory Allocation Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Viewing Kernel I-node Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Viewing Kernel System Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Chapter 6 Using Composite Parameters 117
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Object Hierarchy for COMPOSITE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Working with Composite Parameter Expressions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Examples of Composite Parameter Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Syntax Rules for Composite Parameter Expressions . . . . . . . . . . . . . . . . . . . . . . . 120 Setting the Status of a Composite Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Creating Composite Parameter Expressions Using the Wizard . . . . . . . . . . . . . . 121
6 PATROL Knowledge Module for Unix User Guide
Creating Composite Parameter Expressions Manually . . . . . . . . . . . . . . . . . . . . . 124 Editing Composite Parameter Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Deleting Composite Parameter Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Chapter 7 Monitoring Disks 127 128 128 130 130 131 132 133 135 136 137 138 138 139 141 143 144 145 146 146 148 149 150 153 157 158 158 159 159 160 161 162 163 163 164 166 167 167 168 170
7
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Single Disk from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting Disks to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resuming Monitoring Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 8 Monitoring and Managing File Systems
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitoring File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Single File System from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting File Systems to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automating File System Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running Recovery Actions Only with Operator Confirmation . . . . . . . . . . . . . . Preventing File Systems from Being Monitored . . . . . . . . . . . . . . . . . . . . . . . . . . . Working with File System Types and File System Classes . . . . . . . . . . . . . . . . . . Managing File Systems Using PATROL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unmounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Synchronizing File System Cache and Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Searching for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 9 Monitoring Overall System Health
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HEALTH AT A GLANCE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Overall CPU, File System, and Swap Usage . . . . . . . . . . . . . . . . . . . Viewing the Overall Health . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 10 Monitoring and Managing Memory
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy for MEMORY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shared Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Shared-Memory Segments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Shared-Memory Segment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Semaphores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Semaphore Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Semaphore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy for SWAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Viewing the Amount of Swap Space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Viewing the Swap Partition Size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Viewing the Percentage of Used Swap Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Chapter 11 Monitoring and Managing Networks 173
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 Network Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Activating the NETWORK Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Deactivating the NETWORK Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Network Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Viewing a Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Discovering the Name of the Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 179 Establishing Behavior When Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Viewing Memory Buffer Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Viewing Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Listing Host and IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Network Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Listing Protocols Running on the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Viewing Protocol Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Determining the Network Internet Protocol Address . . . . . . . . . . . . . . . . . . . . . . 191 Network Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Viewing the Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Determining the Number of Packets Entering and Exiting the Network . . . . . . 194 Determining the Number of Packet Errors Entering and Exiting the Network . 194 Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Listing TCP/IP Services Running on the Network. . . . . . . . . . . . . . . . . . . . . . . . . 196 Listing Trusted Hosts on the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Copying or Transferring Files by Using FTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Checking for a Network Resource by Using ping. . . . . . . . . . . . . . . . . . . . . . . . . . 199 Logging In Remotely by Using rlogin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Querying the Name Server for the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Address Resolution Protocol (ARP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Viewing the Address Resolution Protocol (ARP) Cache . . . . . . . . . . . . . . . . . . . . 202 Deleting a Host from the ARP Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Adding a Host to the ARP Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Unix to Unix Communication Protocol (UUCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Checking for UUCP Support Files and Directories. . . . . . . . . . . . . . . . . . . . . . . . . 206 Cleaning Up UUCP Files in the Spool Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Copying Files Using UUCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Listing All UUCP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Viewing the UUCP Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Viewing UUCP Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Chapter 12 Monitoring Network File Systems 213
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
8 PATROL Knowledge Module for Unix User Guide
Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network File System (NFS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Network File System (NFS) Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resetting Network File System Counters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Information System (NIS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Network Information System Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Network Information System Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Network Information System Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 13 Monitoring and Managing Printers
214 216 216 217 218 218 219 220 223 224 224 225 225 226 226 227 227 228 228 229 231 231 232 233 234 235 236 237 238 239 241
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printer Activation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Activating the PRINTER Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deactivating the PRINTER Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Printer from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting Printers to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Number of Print Jobs in a Printers Queue . . . . . . . . . . . . . . . . . . . . Stopping a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing All Print Jobs Assigned to a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing All Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Print Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting All Print Jobs from a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Moving a Print Job to Another Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Moving All Print Jobs to Another Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Print Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stopping a Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting a Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 14 Monitoring Processes
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Configuring Multiple Instances of a Process for Monitoring . . . . . . . . . . . . . . . . 247 Configuring a Process to Alarm When the Number of Running Instances Exceeds a Set Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Configuring a Process to Alarm When the Number of Running Instances Falls Below a Set Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Configuring a Process to Restart When PATROL Detects It Has Stopped. . . . . 256 Configuring a Process to Stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring a Process to Alarm When Its Parent Process ID (PPID) is Not 1 . . 262 Configuring a Process to Alarm When It is Owned by an Unauthorized User . 265 Configuring a Process to Suspend Its Alert for N Cycles if Patrol Detects It is Not Running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Modifying the Configuration of a Monitored Process . . . . . . . . . . . . . . . . . . . . . . 270
Contents 9
Monitoring Process Presence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Deleting a Monitored Process from the Monitoring Queue . . . . . . . . . . . . . . . . . 278 Specifying a Flag File Directory for Process Presence Blackout Periods . . . . . . . 278 Suspending Process Monitoring for a Process Instance . . . . . . . . . . . . . . . . . . . . . 280 Resuming Process Monitoring for a Process Instance . . . . . . . . . . . . . . . . . . . . . . 280 Reporting on a Selected Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Process Host Groups in a Cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Rules for Creating Process Host Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Creating a Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Configuring Communication Attributes for a Process Host Group. . . . . . . . . . . 284 Modifying Host Attributes within a Process Group. . . . . . . . . . . . . . . . . . . . . . . . 285 Removing a Host from a Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Querying a Selected Host within a Process Host Group . . . . . . . . . . . . . . . . . . . . 286 Synchronizing the Local Hosts List to a Selected Hosts List for a Process Host Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Synchronizing a Selected Hosts List to the Local Host List for a Process Host Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Viewing the Process List for a Selected Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 Synchronizing the Local Processs List with a Selected Process's List . . . . . . . . . 289 Synchronizing a Selected Process's List with the Local Process's List . . . . . . . . . 290 Viewing the Process Presence List for a Selected Process . . . . . . . . . . . . . . . . . . . 291 Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Viewing the Number of Zombie Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Viewing Zombie Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Viewing the Total Number of Processes Running . . . . . . . . . . . . . . . . . . . . . . . . . 295 Viewing Processes that Use Excessive CPU. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Viewing the Number of Processes Waiting on Resources . . . . . . . . . . . . . . . . . . . 298 Viewing the Total Number of User Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Viewing the Average Number of User Processes . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Reprioritizing a Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Reprioritizing All Processes in a Process Group . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Reprioritizing All Processes Owned by a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Plug-in Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Configuring the Process KM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Chapter 15 Scheduling Tasks 311
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Scheduling a Task for Execution via the Operating System Command Line Processor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Scheduling a Task for Execution Using a PATROL Command Processor . . . . . 315 Scheduling a PSL Task for Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Modifying an Existing Scheduled Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Removing a Scheduled Task from the Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Collecting Debug Data for the Scheduler Application . . . . . . . . . . . . . . . . . . . . . . 322
10 PATROL Knowledge Module for Unix User Guide
Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Specifying a Default Directory for Blackout Scripts. . . . . . . . . . . . . . . . . . . . . . . . Creating a Monitoring Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Information about a Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modifying an Existing Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Blackout Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling a Blackout Script for Execution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Canceling a Scheduled Blackout Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 16 Reviewing Security
326 326 327 330 331 334 335 337 339 340 340 341 341 344 345 345 346 348 351 352 352 353 353 354 354 355 356 357 360 361 362 363 364 364 365 366 367 369 370 373 374 374 375 375
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Files with SUID or SGID Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Files with Global Write Privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Users that Failed to Execute su/msu Commands . . . . . . . . . . . . . . . . . Viewing Users without Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Users with Multiple Sessions Running . . . . . . . . . . . . . . . . . . . . . . . . . . Chapter 17 Monitoring the Health of SNMP
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL SNMP System Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Role of Each Component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SNMP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Changing SNMP Query Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Listing Configuration Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing PATROL SNMP MIB. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Status of SNMP Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting the SNMP Master Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting the SNMP Subagent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stopping the SNMP Subagent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tests SNMP Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Testing the SNMP Master Agents Ability to Receive Traps . . . . . . . . . . . . . . . . Generating Manual SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Querying the PATROL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Querying the SNMP PATROL platform.km . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining if Any SNMP Managers are Listening . . . . . . . . . . . . . . . . . . . . . . . Testing PATROL Event Managers Automated SNMP Traps . . . . . . . . . . . . . . . Chapter 18 Monitoring Users
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Print Jobs that Belong to a User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
11
Viewing Processes that Belong to a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 Viewing the Amount of Disk Space Consumed by a User . . . . . . . . . . . . . . . . . . 377 Numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Viewing the Number of Users on the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Viewing the Number of Sessions Running on the System . . . . . . . . . . . . . . . . . . 380 Appendix A Debugging and Running Diagnostics 381
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Unix Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Capturing DUMP Information for Selected Components . . . . . . . . . . . . . . . . . . . 383 Viewing Installation Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Capturing Log File Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Collector Debug Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Debugging FILESYSTEM Data Collection (DFColl) . . . . . . . . . . . . . . . . . . . . . . . . 388 Debugging NETWORK Data Collection (NETColl) . . . . . . . . . . . . . . . . . . . . . . . . 389 Debugging NFS Data Collection (NFSColl) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Debugging PRINTER Data Collection (PRINTERColl) . . . . . . . . . . . . . . . . . . . . . 391 Debugging PROCESS Data Collection (PSColl) . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Debugging USER and PROCESS Data Collection (USRPROCColl). . . . . . . . . . . 392 Debugging CPU, MEMORY, and KERNAL Data Collection (VMColl) . . . . . . . 393 Debugging DCM Data Collection (DCMColl) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Application Discovery Debug Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 Debugging DISK Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 Debugging FILESYSTEM Discovery Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396 Debugging NETWORK Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397 Debugging PRINTER Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 Debugging SMP Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 Debugging SWAP Discovery Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 Application Class Debug Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Debugging the SCHEDULER Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 Appendix B Loading, Unloading, and Navigating KMs in the PATROL Consoles 401
Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Accessing Online Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Using the Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Using the Mouse to Perform Tasks in PATROL . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Appendix C Regular Expressions 407
Components that Use Regular Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 Conventions for Using Regular Expressions with PATROL Objects . . . . . . . . . . . . . 411 Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411 Appendix D Inclusion and Exclusion Lists 413
Methods for Creating Exclusion and Inclusion Lists . . . . . . . . . . . . . . . . . . . . . . . Storage Location of Exclusion and Inclusion Lists . . . . . . . . . . . . . . . . . . . . . . . . . Benefits and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Benefits of Creating Exclusion Lists Using Menu Commands . . . . . . . . . . . . . . . Inclusion List Limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Index
Contents
13
14
Figures
PATROL KM for Unix Application Class Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 COLLECTORS Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 DCM Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Data Collection Architecture Using PATROL Perform Collector . . . . . . . . . . . . . . . . 91 PSL Collection Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 CPU Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 KERNEL Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 KERNEL InfoBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 COMPOSITE Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 COMPOSITES_COLLECTOR Application Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 COMPOSITES Parameters Container Icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 DISK Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 DISK Exclusion List Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 FILESYSTEM Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 FILESYSTEM Exclusion List Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Edit Recovery Action Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Run Recovery Action Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Automatic Mount Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Manual Mount Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Automatic Unmount Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Manual Unmount Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Find Files Like Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Remove Files Like Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 HEALTH AT A GLANCE Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . 158 MEMORY Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Remove Shared Memory Segment Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Remove Shared Memory Segment Confirmation Dialog Box . . . . . . . . . . . . . . . . . . 166 Remove Semaphores Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Remove Semaphores Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 SWAP Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 NETWORK Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 NETWORK InfoBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Ping Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Rlogin Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Delete Host from Cache Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Delete Host From Cache Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Add Host To Cache Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 UUCP Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 NFS Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215 NFS User Name Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Figures 15
PRINTERS Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Delete Print Job Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Delete All Jobs Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Move Job to Another Printer Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Move Jobs To Another Printer Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . 236 Move All Jobs to Another Printer Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Move Jobs To Another Printer Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . 237 PROCESS Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 PROCESS InfoBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 CPU Hogs Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Renice Process Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Renice Process Confirmation Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 SCHEDULER Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 SECURITY Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 SECURITY User Name and Password Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Find SUID/SGID Files Like Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 SNMPHealth Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 PATROL SNMP System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Change SNMP Query Port Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Walk PATROL SNMP MIB Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 SNMP Query PATROL Master Agent Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 SNMP Query PATROL Platform.km Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 State Change Messages Based on Automated Traps . . . . . . . . . . . . . . . . . . . . . . . . . . 371 USERS Application Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 List Print Jobs Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 USERS InfoBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Select Categories of Diagnostics Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 %DUMP Options Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Select Log Files to Collect Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Mouse Button Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
16
Tables
PATROL KM for Unix and Linux Applications, Icons, and Descriptions . . . . . . . . . 22 Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Menu Summary Table Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Computer Instance Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 UNIX_OS Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 COLLECTORS Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Composites Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 DCM Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 DISK Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 FILESYSTEM Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 MEMORY Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 NETWORK Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 NFS Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 PATROL Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 PATROLAGENT Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 PRINTER Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 PROCESS Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 PROCESS_PRESENCE Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . 42 PROCPRES Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 SCHEDULER Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 SECURITY Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 SNMPHealth Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 USERS Application Menu Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 PATROL KM for Unix and Linux Parameter Summary . . . . . . . . . . . . . . . . . . . . . . . . 50 PATROL KM for Unix and Linux Parameter Defaults . . . . . . . . . . . . . . . . . . . . . . . . . 80 Data Collection Methods and Associated Application Classes . . . . . . . . . . . . . . . . . . 88 Collection Parameters Used By the DCM Collection Method . . . . . . . . . . . . . . . . . . . 92 DCM Deactivated Parameters and their Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Collection Parameters Used By the PSL Collection Method . . . . . . . . . . . . . . . . . . . . 95 Collector Deactivated Parameters and their Platforms . . . . . . . . . . . . . . . . . . . . . . . . . 96 Find Files Like Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Remove Files Like Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 List of Shared-Segment Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 List Network Interface Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 List Memory Buffer Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 List Network Addresses Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . 185 List Hosts Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 List Protocols Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 List Routing Table Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 List Services Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
Tables 17
Show ARP Cache Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 List of NIS Accounts Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 List of NIS Groups Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 List of NIS Groups Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 View All Print Jobs Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Variables for Monitoring Process Presence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 List Zombie Process Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 CPU Hogs Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 PROCTopProcs Text Parameter Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 New Instance Dialog Boxes and Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Process tab properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 Start/Restart tab properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 Alert and Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 Find Files Like Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 List Files With Global Write Command Output Format . . . . . . . . . . . . . . . . . . . . . . . 344 List Failed su/msu logins Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . 346 List Users Without Passwords Command Output Format . . . . . . . . . . . . . . . . . . . . . 347 List Duplicate User ID Entries Command Output Format . . . . . . . . . . . . . . . . . . . . . 349 PATROL SNMP Component Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 Walk PATROL SNMP MIB Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . 360 Process List Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Disk Space Command Output Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Capture Unix Diagnostics %DUMP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Select Log Files to Collect Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Regular Expression Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
18
Chapter
1
20 20 20 22 25 25
Introduction
This chapter provides you with a brief overview of the PATROL Knowledge Module for Unix and Linux (also referred to as the PATROL KM for Unix) component. The following topics are discussed: PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Supported Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Applications and Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 1
Introduction
19
Supported Platforms
For a list of operating system platforms that are supported by the PATROL KM for Unix, see the PATROL for Unix and Linux Release Notes. See the PATROL for Unix and Linux Getting Started guide additional system requirements and platform information. For a list of PATROL for Unix components and PATROL architecture components that are compatible with the PATROL KM for Unix, see the compatibility matrix in the PATROL for Unix and Linux Release Notes.
Object Hierarchy
The PATROL products are organized hierarchically. At the top level of the hierarchy is the computer instance. Beneath it is the Unix operating system object. All the Unix product application classes are subordinate to the Unix object. Many of the application classes contain instances, but not all application classes have instances or parameters. Figure 1 on page 21 illustrates the basic hierarchy. It does not necessarily display all the application classes in the product.
20
Object Hierarchy
Figure 1
Chapter 1
Introduction
21
Object Hierarchy
agent host
COLLECTORS represents the application that you can use to construct a new composite parameter that consists of one or more parameters in a logical relationship that evaluates to true or false COMPOSITES_ COLLECTOR You can use this application to set a warning or alarm condition based on the logical condition and not just on the parameter value. For more information, see Chapter 6, Using Composite Parameters represents the application that displays instances of the composite parameters that you construct with the COMPOSITES_COLLECTOR application COMPOSITES represents the CPU application, which monitors CPU usage This application also contains the SMP application on machines with multiple processors. CPU represents the Data Collection Manager (DCM) application, which controls data collection from PATROL Perform collector to the Data Collection Manager and to associated PATROL parameters DCM represents the DISK application, which monitors and provides information about disks and disk usage
DISK
22 PATROL Knowledge Module for Unix User Guide
Object Hierarchy
Table 1 Icon
PATROL KM for Unix and Linux Applications, Icons, and Descriptions (Part 2 of 4) Definition represents the FILESYSTEM application, which monitors and provides information about file system resources
FILESYSTEM represents the HEALTH AT A GLANCE (HAAG) application, which monitors the general health and well-being of the system by providing an overall view of the systems CPU, file system, and virtual memory usage HEALTH_AT_A GLANCE represents the KERNEL application, which monitors system kernel processes and provides kernel resource-usage information, including i-nodes, the file table, and the process table KERNEL represents the MEMORY application, which monitors memory activity, including paging, I/O caching, and swapping
NETWORK represents the NFS application, which monitors RPC (Remote Procedure Call) and NFS (Network File System) activities
NFS represents the PATROL application, which shows the number of PATROL Consoles currently running
PATROL represents the PATROLAGENT application, which monitors and manages the agent
PATROL AGENT
Chapter 1
Introduction
23
Object Hierarchy
Table 1 Icon
PATROL KM for Unix and Linux Applications, Icons, and Descriptions (Part 3 of 4) Definition represents the PRINTER application, which monitors the print queue and printer activity and with which you can perform printer administration activities
PRINTER represents the PROCESS application, which displays statistics on active and zombie processes
PROCESS represents the application that holds PROCCONT instances You can use this application to specify which processes you want to monitor. PROCESS_ PRESENCE represents the PROCPRES application, which monitors specified processes running on your system This application is a child application of the PROCESS and PROCESS_PRESENCE (PROCCONT) applications and resides in the PROCESS_PRESENCE applications container window. represents the SCHEDULER application, which provides menu commands that enable you to perform tasks or run jobs once or at regular intervals. SCHEDULER The task or jobs are written by you and stored as script files. represents the SECURITY application, which provides security-related menu commands SECURITY represents the SMP application This application displays information for each processor on multiprocessor machines. The prefix for SMP parameters is SMP. SMP parameters appear under SMP instances in the CPU container window for machines that have multiple processors. represents the SNMPHealth application This application displays information on the status of the PATROL SNMP subsystem. It also provides the ability to test various aspects of the system. SNMPHealth
name
SMP
24
Help
Table 1 Icon
PATROL KM for Unix and Linux Applications, Icons, and Descriptions (Part 4 of 4) Definition represents the SWAP application, which monitors and provides information about utilization of system swap files SWAP parameters appear under SWAP instance icons.
SWAP The SWAP application may return different results on different platforms. represents the UNIX_OS application class This application is a container for all other Unix operating system applications. It does not possess any parameters. It does provide menu commands to set debugging for various collectors and to exclude application instances from being monitored. represents the USERS application, which monitors and provides information about user sessions and processes
UNIX_OS
USERS
Help
Help describes the function of the currently displayed window or dialog box and the use of its elements. The tasks in this section describe how to access KM Help topics and context-sensitive Help from the PATROL consoles.
NOTE
If you are trying to access Help from a Unix console, you may want to refer to the PATROL Installation Guide for specific instructions on how to install and set up a browser in the Unix environment.
Chapter 1
Introduction
25
Help
Table 2 Console
Accessing Online Help To access product help From the console menu bar, choose Help => Help Topics => PATROL Knowledge Modules. To access application class help Double-click the application class in the KM tab of the console. Then click the Help tab and Show Help in the Application Properties dialog box. To access parameter help Right-click the parameter icon, and choose Help On from the pop-up menu. Double-click the parameter icon; then click the ? icon or Help button in the parameter display window. Double-click the parameter in the KM tab of the console; then click the Help tab and Show Help in the properties dialog box.
From the console menu bar, choose Help On => Knowledge Modules.
Right-click the Choose Attributes => Application Classes and parameter icon, and click Help On. double-click the application name. Then click Show Help in the Application Definition dialog box. From the Operator tab of the console, expand or collapse the list to find the application class. Click the Whats this? Help button and then Double-click the parameter icon to open its display window. Click the Help button.
PATROL Central - From the console menu Microsoft Windows bar, choose Help => Edition Help Topics. Then double-click the name of your KM.
click the application class name. PATROL Central Web Edition Click the Help link, and Click the link for the Click the link for the then click the link for application class, and parameter, and then your KM. then click the Page Help click the Page Help link. link.
26
Chapter
Menu Summary
This chapter summarizes the application menus and menu commands for the PATROL Knowledge Module for Unix and Linux component. The application menu content is provided in a table for each of the application classes. This chapter describes Knowlege Module (KM) menu commands only. The KM help system provides further details about these menu commands. For descriptions of PATROL Console menu commands, see the appropriate PATROL user guide for your console. The following topics are discussed in this chapter: Location of KM Menu Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Console for Unix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Console for Microsoft Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . Menu Summary Table Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Instance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UNIX OS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COLLECTORS Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMPOSITES Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMPOSITES_COLLECTOR Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CPU Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DCM Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DISK Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FILESYSTEM Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HEALTH AT A GLANCE Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . KERNEL Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MEMORY Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NETWORK Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NFS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROL Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PATROLAGENT Application Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PRINTER Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROCESS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PROCESS_PRESENCE (PROCCONT) Application Menu . . . . . . . . . . . . . . . . . . . . . . PROCPRES Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 29 29 29 30 31 33 33 33 34 34 34 35 36 36 36 37 38 38 39 41 42 42 43
27
SCHEDULER Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 SECURITY Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 SMP Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 SNMPHealth Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 SWAP Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 USERS Application Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
28
Menu Item First-level menu Second-level menu Third-level menu Fourth-level menu
29
30
Table 4
Computer Instance Menu Summary (Part 2 of 2) Action forces an update of the application parameter values displays a menu item to save your current selection of PATROL KMs so that your KMs automatically load the next time you start the PATROL Agent saves your current selection of PATROL KMs so that the KMs automatically load the next time you start the PATROL Agent starts the SNMP Master Agent on Unix platforms only opens an xterm window for logging into a remote host or performing other system functions accesses and edit registered recovery actions
Make Current KM Preloaded Start SNMP Agent Login Configure Recovery Actions
Menu Command Refresh Parameters Knowledge Module Admin Specify PERFORM Home Directory
Toggle PSL/DCM Collection selects the collection method for the PATROL KM for Unix
DISK Application Edit DISK Exclusion List Clear DISK Exclusion List FILESYSTEM Application Edit FILESYSTEM Exclusion List Clear FILESYSTEM Exclusion List PRINTER Application Edit PRINTER Exclusion List
31
Table 5
UNIX_OS Application Menu Summary (Part 2 of 3) Action removes all PRINTER instances from the PRINTER exclusion list activates monitoring all PRINTER instances that are not in the PRINTER exclusion list (monitoring is inactive by default) stops monitoring of all PRINTER instances (monitoring is inactive by default) displays commands for the NETWORK application activates monitoring all NETWORK instances stops monitoring of all NETWORK instances displays commands for monitoring SNMPHealth activates monitoring of SNMPHealth stops monitoring of SNMPHealth (default setting) provides access to a diagnostic report and debug controls for various collectors gathers basic installation information such as the computers OS version, PATROL target, Perform target, PATROL Agent version, PATROL Console version, PATROL_HOME location, BEST1_HOME location, and license information generates a diagnostic report for Support purposes displays a dialog box that offers several debug options for the DCM functions and binary executable displays a dialog box that offers several debug options for the DISK application Clear PRINTER Exclusion List Activate Monitoring Deactivate Monitoring
Menu Command
NETWORK Application Activate Monitoring Deactivate Monitoring SNMPHealth Activate Monitoring Deactivate Monitoring Debug and Diagnostics Capture Unix Diagnostics
FILESYSTEM Debug Admin displays a dialog box that offers several debug options for the FILESYSTEM application NETWORK Debug Admin NFS Debug Admin PRINTER Debug Admin SMP Debug Admin displays a dialog box that offers several debug options for the NETWORK application displays a dialog box that offers several debug options for the NFS application displays a dialog box that offers several debug options for the PRINTER application displays a dialog box that offers several debug options for Symmetric Multi-Processors (SMP) discovery and data collection displays a dialog box that offers several debug options for the SWAP application displays a dialog box that offers several debug options for the PROCESS application
32
Table 5
UNIX_OS Application Menu Summary (Part 3 of 3) Action displays a report containing shared memory usage, semaphores usage, a list of current shared memory segments, and a list of current semaphores for the current host runs the BGS Collect Look utility
Menu Command Refresh Parameters Setup DISK Ping Script Setup PRINTERColl Option
33
Table 7
Composites Application Menu Summary Action creates a composite parameter using a wizard or by entering the information manually edits an existing composite parameter deletes an existing composite parameter
Menu Command Stop Monitoring Edit DISK Exclusion List Clear DISK Exclusion List
34
Automatic Manual Sync Find Files Like Remove Files Like Stop Monitoring Edit FILESYSTEM Exclusion List Clear FILESYSTEM Exclusion List Delete from FILESYSTEM Exclusion List
35
Menu Command List Shared Memory Segments List Semaphores Remove Shared Memory Segments Remove Semaphores
36
Menu Command
Delete Host From Cache deletes hosts from the ARP table
37
Table 12
NETWORK Application Menu Summary (Part 2 of 2) Action displays the routing table and statistics for the network displays the statistics for each protocol layer destroys the network icon or sets an alarm if the network interface is down
Menu Command List Routing Table Show Protocol Statistics Toggle Alarm/Destroy if Down
Menu Command
38
Menu Command View Agent Log Tune Agent Show Tuning Variables Set Agent Variables Set Get Processes Cycle (appl) Set Appl Check Cycle Set Priority Agent Process Cache
Process Cache Schedule sets the priority of the agent run queue User Set Run Queue Delta Delta Increment Maximum Delta Schedule Policy Schedule From End Schedule From Prev Schedule Automatic
Schedule Force Delta The next scheduled execution will occur at the prior execution start time. Reset Agent to Default Setting resets the agents variables to their default settings
39
Table 15
PATROLAGENT Application Menu Summary (Part 2 of 2) Action displays information about the processes running on the agent displays all process information that is in the run queue displays all processes that are currently running displays all the task information that is currently in the queue displays all the applications that are registered by PATROL displays the applications that have been discovered by PATROL displays all the parameters registered by PATROL displays a backward trace of the agent's error log displays the current setting of the agent tuning variables searches the agent's process cache executes a refresh of the parameters and process cache and performs application discovery causes the agent to execute all application discovery scripts forces the PATROL Agent to reload its process cache from the kernel process forces an update of the application parameter values
Menu Command List Agent Information Runable Processes Running Processes Executing Task Commands Registered Applications Discovered App Instances Registered Parameters Error Backtrace List Agent Tuning Variables Search Agent Process Cache Trigger Agent Activities Perform Application Discovery Refresh Process Cache Refresh Parameters
40
Menu Command List Print Jobs List All Print Jobs Delete Job Delete All Jobs Stop Printer Start Printer Stop Queue Start Queue Move Job To Another Printer Move All Jobs to Another Printer Stop Monitoring Edit PRINTER Exclusion List Clear PRINTER Exclusion List
41
Menu Command List Zombie Process CPU Hogs Renice Process Renice Group Renice User Refresh Parameters
For more information about monitoring processes, see Chapter 14, Monitoring Processes.
Menu Command
Manage List of Monitored use to add, modify, and report on monitored processes in your Processes environment Manage Host Group Synchronize Group List use to add, modify, and report on watched hosts in your environment use to synchronize group lists and process lists synchronizes settings between hosts within a group. Also, specifies group communications (such as timeout settings, and whether to accept or send changes made on one host to the rest of the group). synchronizes the list of monitored processes for hosts within a group
Process List
42
Table 18
PROCESS_PRESENCE Application Menu Summary (Part 2 of 2) Action accesses the menu options that allow you to use and configure the ProcSpring Migration Tools provides information about the ProcSpring Migration Tools other ProcSpring menu commands provides options for full or partial migration of ProcSpring log entries removes all related ProcSpring pconfig entries and deactivates ProcSpring restores previous ProcSpring settings and reactivates ProcSpring specifies a directory where PATROL will look for process presence flag files
Menu Command ProcSpring Migration Tools About ProcSpring Migration Tools Migrate ProcSpring Deactivate ProcSpring w/o Migrating Reactivate ProcSpring Identify Flag Directory
43
Menu Command Schedule Tasks Schedule Blackout Set Default Blackout Script Directory Scheduling Debug
Menu Command Administration List SUID and SGID Files List Failed su/msu Logins
List Users Without Password displays all users who do not have a password List Duplicate User Id Entry List Files With Global Write
44
Change SNMP Query Port changes the SNMP Query Port, which is used by external processes to make SNMP queries against the PATROL Agent List Configuration Information Start/Stop SNMP Agent Start SNMP Master Agent displays SNMP-related information that includes PATROL Agent namespace variables relating to SNMP, statuses of the master agent and subagent, and port numbers provides a way to manually start and stop components of the PATROL SNMP system starts the SNMP Master Agent When the PATROL Agent starts, the computer applications SNMPStart parameter automatically starts the SNMP Master Agent. This command is used to restart the master agent after it has been intentionally or unintentionally stopped. starts the SNMP subagent The SNMPHEALTH application classs snmp_subagent_start parameter attempts to start the subagent if it is not running. This command is used to restart the subagent between the snmp_subagent_starts scheduled poll time. stops the SNMP subagent This command changes the state of the SNMPHEALTH application classs snmp_subagent_monitor parameter to ALARM. listens for SNMP traps on the port specified in the agent configuration variable /snmp/trap_port, whose default value is 162 If port 162 is in use and you do not change the configuration variable, this command does not function properly. displays a dialog box that sends a customized trap in which you define the traps host, port, community, and four strings displays a dialog box that queries the PATROL Agent displays a dialog box that queries your computers platform knowledge module
Test PATROL SNMP System provides several ways to test your PATROL SNMP system Listen for SNMP Traps
Generate Manual SNMP Trap SNMP Query PATROL Master Agent SNMP Query PATROL platform.km
45
Table 22
SNMPHealth Application Menu Summary (Part 2 of 2) Action displays a dialog box that enters a host name and object ID (OID) and runs the PSL function snmp_h_get( ) If no SNMP Managers are listening on port 161, the command times out.
Walk PATROL SNMP Mib displays a dialog box that uses BMC systems object ID to view the PATROL Agent SNMP management information base (MIB) if the PATROL Agent is listening on the designated port Test PATROL SNMP System Set SNMPH_testparm OK Set SNMPH_testparm WARN Set SNMPH_testparm ALARM provides a means to test whether automatic SNMP traps are generated when PATROL issues an event and changes an objects state changes the state of the SNMPHEALTH application classs testparm parameter to OK and issues a trap if the SNMP system is set up changes the state of the SNMPHEALTH application classs testparm parameter to WARN and issues a trap if the SNMP system is set up changes the state of the SNMPHEALTH application classs testparm parameter to ALARM and issues a trap if the SNMP system is set up
46
Menu Command List Print Jobs Process List Disk Space List Current Users
47
48
Chapter
Parameter Summary
This chapter provides a summary of parameters for the PATROL KM for Unix and Linux. Refer to the PATROL user guide for your console for additional information about the different types of parameters and their functions. See the PATROL KM for Unix and Linux online Help system for details about KM-specific parameters. The following topics are discussed: Parameter Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Parameter Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
49
Parameter Summary
Parameter Summary
The PATROL KM for Unix and Linux has various parameters that provide statistical information about resources, operating status, and performance. Table 24 lists each application class and its associated parameters. The table also provides information that you can use when selecting or reviewing the appropriate parameters used in monitoring the PATROL KM. Table 24
Parameter ALL_COMPUTERS Application BlockSize converts OS memory to 1-KB blocks Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux BootTime holds a time stamp of the last time the system was rebooted Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux DFBlockSize converts OS disk block values to 1-KB blocks Platforms: Solaris, HP, RS6000, SINIX, Linux Get_700_nproc determines the hardware model (700/800) and HP-UX version on pre-HP-UX 10 model 700 machines Platforms: HP KernelInfo collects information about the kernel, such as when it was last built Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux LPSpoolDirectory maintains a list of possible locations for print queues This parameter is used by PRINTER discovery to limit instance creation to printers that have locally defined queues. Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux MaxConfigValLen contains the maximum number of characters permitted in the value of a variable stored in the agent configuration database and is used for edit checking Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux OSName collects information about the operating system Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux PageSize converts OS page units into 1-KB page units Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux page 84 page 84 page 82 page 82 page 81 page 81 page 81 page 80 page 81
50
Parameter Summary
Table 24
Parameter
SetupClearText
SNMPStart
starts the SNMP Master Agent Platforms: Windows, Solaris, HP, OSF1, RS6000, SINIX, Linux
page 86
TerminalEmulator
sets the terminal emulator that PATROL should use; an xterm window is the default on most platforms Platforms: Solaris, HP, OSF1, RS6000, SINIX, Linux
page 86
COLLECTORS CollectorStatus CollectorStatusText DFColl HAAGColl NETColl generates an alert if the pconfig variable DCMStatusText exists page 80 and saves its contents in the CollectorStatusText parameter receives the contents of the pconfig variable DCMStatusText page 80 executes the df command, collects the output, and then sets the page 81 values of the FILESYSTEM parameters collects data for the HEALTH_AT_A_GLANCE application classes executes the netstat command to collect information about incoming packets, outgoing packets, and errors and sets NETWORK parameters page 81 page 83
NFSColl PRINTERColl
executes the nfsstat command to collect information about NFS page 83 and sets the values of the various NFS parameters executes the lpstat -t command, determines the status of each queue, and displays information about all the local and remote printers you are monitoring collects kernel information on the Linux platform and sets KERFileUsedPercent and KERINodeUsedPercent calculates the top 10 processes that use the most cpu resources and sets the PROCTopProcs parameter executes the sar command and sets various parameters Platforms: AIX, HP-UX Note: On AIX systems, the account that executes the sar command must belong to the adm group. page 84
SMPColl
executes the mpstat command and collects information about each individual CPU on the system This collector is different from the SARColl and VMColl because these parameter look at multiple CPUs as a whole and report a single value. The SMPColl collector then sets the values of the SMP parameters. Platforms: HP-UX, Solaris
page 85
51
Parameter Summary
Table 24
Parameter UPTColl
USRPROCColl VMColl
CPARMExpression
page 80
CPARMGeneratedCodeText
displays the PSL that was generated by the Composites expression generator and used to determine the composite parameter value Collector: CPARMCollector
page 80
CPU Application Class CPUCpuUtil CPUIdleTime CPUInt displays the percentage of time the CPU was being used displays the percentage of time that the CPU was idle displays the number of non-VME device interrupts A non-VME interrupt is an interrupt that does not originate from the backplane. Collector: VMColl Note: When using DCM collection, PATROL deactivates this parameter on all platforms. When using PSL collection, PATROL deactivates this parameter on AIX. CPULoad displays the 1-minute load average from the uptime command Collector: UPTColl CPUProcSwch displays the total number of CPU context switches per second Collector: SARColl or VMColl Note: When using DCM collection, PATROL deactivates this parameter on all platforms. CPURunQSize displays the number of processes in the run queue (RunQ) page 81 page 80 page 80 page 80 page 80 page 80
52
Parameter Summary
Table 24
Parameter
CPUSysTime
CPUUserTime CPUWio
displays the percentage of CPU time currently being spent in user mode executing commands and performing user tasks displays the percentage of CPU time spent waiting for input and output operations Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1) and Solaris.
page 81 page 81
DCM Application Class PATROL creates this application class only if the PATROL KM for Unix is using the DCM collection method. CPUCollStatus CPUCtrl DCMColl DCMMessages indicates whether the CPU data is collected by the DCM or PSL page 80 controls the poll time and status (active or inactive) for DCM collection of CPU application parameter data passes data from the Data Collection Manager binary program (DCM) to many parameters displays status messages for the DCM process Anytime the DCM_Alert parameter goes into alarm, PATROL documents the problem in this parameter. It also records start/stop/restart events for the DCM process. This parameter manages the number of lines in the text so that it keeps the last 'N' messages where 'N' is determined as follows:
s
If the agent namespace variable /DCM/DCM/DCMStatus/maxLength is set, then that value is used. Otherwise, the parameter uses the PCONFIG variable /DCM/DCM/DCMStatus/maxLength if it is available. Otherwise, the parameter will default to 40 lines.
Once the max number of lines is reached, the parameter uses a FIFO mechanism so that the oldest messages are removed to make room for the newest messages.
53
Parameter Summary
Table 24
Parameter
DCMMonitor
DCMStatus DCMUpdateCount
displays the health of the DCM process displays the number of parameter values sent to the PATROL Agent from the DCM process It provides one measure of the performance of the PATROL Agent/DCM interface. The number parameter values varies based on the characteristics of your system (for example, number of hard disks) and the configuration of the DCM application class. Both the polling rate and the active/inactive state of the DCM control parameters have an effect on how many parameters values are updated at any one time. DCMUpdateTime is set each time DCMUpdateCount is set.
page 81 page 81
DCMUpdateTime
displays the number of seconds spent by PATROL Agent processing a data update from the DCM process It provides one measure of the performance of the PATROL Agent/DCM interface. The time varies depending on the number of data values included in one update and the other factors on your system. Particularly, the configuration of the UNIX KM and the PATROL Agent with respect to the parameter history file. Anytime the PATROL Agent writes or flushes a significant amount of data to disk, it is possible that this parameter will record an update time that is much longer than normal.
page 81
executes the df command and collects the output. Then, it then sets the values of the FILESYSTEM parameter. controls the poll time and status (active or inactive) for DCM collection of DISK application parameter data gathers data on the systems overall CPU, File System, and Swap file usage indicates whether kernel data is collected by the DCM or PSL controls the poll time and status (active or inactive) for DCM collection of KERNEL application parameter data
page 81
indicates whether the disk data is collected by the DCM or PSL page 81 page 81 page 81 page 81 page 82
54
Parameter Summary
Table 24
Parameter
MEMORYCtrl NETColl
NFSColl PRINTERColl
executes the nfsstat command to collect information about NFS page 83 and sets the values of the various NFS parameters executes the lpstat -t command, determines the status of each queue, and displays information about all the local and remote printers you are monitoring collects kernel information on the Linux platform and sets KERFileUsedPercent and KERINodeUsedPercent page 84
PROCColl ProcessCollStatus
page 84
indicates whether process data is collected by the DCM or PSL. page 84 Issues an alarm if the method of collecting data automatically changes from DCM to PSL. This indicates that the Perform collector is not collecting data from consumer parameters. controls the poll time and status (active or inactive) for DCM collection of PROCESS application parameter data page 84
calculates the top 10 processes that use the most CPU resources page 85 and sets the PROCTopProcs parameter page 85 executes the sar command and collects the output. Then, it parses the output and performs the necessary data conversions, such as converting page size to a standard 1-K page. Finally, this collector sets the values of the appropriate PATROL parameters executes the mpstat command and collects information about page 85 each individual CPU on the system. The SMPColl collector then sets the values of the SMP parameters indicates whether swap data is collected by the DCM or PSL controls the poll time and status (active or inactive) for DCM collection of SWAP application parameter data executes the uptime command indicates whether user data is collected by the DCM or PSL controls the poll time and status (active or inactive) for DCM collection of USERS application parameter data collects operating system information relating to users. The UserProcess collector calculates the following information:
s s s s
SMPColl
the number of users currently on the system the number of user sessions the total number of user processes on the system the average number of user processes
55
Parameter Summary
Table 24
Parameter VMColl
DSKAvgQueue
average number of requests in the queue Collector: DMColl Platforms: All except AIX and Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1).
page 81
DSKAvgServ
displays the average service time, in milliseconds, for the device page 81 to complete transfer requests For a disk, it includes seek time, rotational latency, and transfer time. Collector: DMColl Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on AIX and Compaq Tru64 (Digital Unix, OSF/1).
DSKAvgWait
displays the average time that transfer requests wait in the queue for the device Collector: VMColl Platforms: HP-UX, Solaris
page 81
DSKBps
displays the number of 1-KB blocks read from or written to the page 81 device per second Collector: DCMColl
DSKMsps
displays the average disk seek time for the device and indicates page 81 the speed of the device Collector: VMColl
56
Parameter Summary
Table 24
Parameter
DSKPercentBusy
DSKRead
displays the number of kilobytes read from disk per second Collector: DCMColl Platforms: AIX, Solaris, Linux Note: When using PSL collection, PATROL deactivates this parameter on Solaris.
page 81
DSKReadWrite
displays the number of read and write pages made to/from the page 81 device per second Collector: DCMColl Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1).
DSKSps
displays the number of disk seeks per second Collector: DCMColl Platforms: Compaq Tru64 (Digital Unix, OSF/1), HP-UX Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1).
page 81
DSKTps
displays the number of disk transfers per second Collector: DCMColl Platforms: AIX, Compaq Tru64 (Digital Unix, OSF/1), HP-UX, Solaris
page 81
DSKWrite
displays the number of kilobytes written to disk per second Collector: DCMColl Platforms: AIX, Linux, Solaris Note: When using PSL collection, PATROL deactivates this parameter on Solaris.
page 81
57
Parameter Summary
Table 24
Parameter
FSAvailableSpaceMB
displays the amount of space available in megabytes for this file page 81 system instance Collector: DFColl
FSCapacity
displays the percentage of the file system storage that is currently in use Collector: DFColl
page 81
FSFreeInodes
displays the number of unused i-nodes on the local file system Collector: DFColl
page 81
FSInodeUsedPercent
page 81
FSMountStatus
page 81
FSUsedSpace
displays the amount of used space for the file system instance Collector: DFColl
page 81
HEALTH AT A GLANCE Application Class HAAGCPUUsage displays whether or not the systems overall CPU usage is satisfactory Collector: HAAGColl HAAGFilesystemUsage displays whether or not the systems overall File System usage is satisfactory. Collector: HAAGColl HAAGHealthSummary reports on the system's overall health based on the other HAAG page 81 parameters: HAAGCPUUsage, HAAGFilesystemUsage, HAAGSwapUsage Collector: HAAGColl HAAGSwapUsage displays whether or not the systems overall swap file usage is satisfactory Collector: HAAGColl page 81 page 81 page 81
58
Parameter Summary
Table 24
Parameter
KERNEL Application Class KERDirBlk displays the number of directory-block reads issued per second page 81 Collector: SARColl Platforms: AIX, HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms. KERFileUsedPercent displays the percentage of kernel file slots being used This parameter monitors file table use. Collector: DCMColl or SARColl Platforms: AIX, HP-UX, Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms except HP-UX. When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1). KERIGet displays the number of files located by an i-node entry Collector: SARColl Platforms: AIX, HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms. KERINodeUsedPercent displays the percentage of kernel i-node slots being used Collector: DCMColl or SARColl Platforms: All except HP, AIX, Linux, and Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms except Compaq Tru64 (Digital Unix, OSF/1) and HP-UX. When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1). KERLgAlloc displays the number of bytes allocated for large memory requests Collector: SARColl KERLgFail displays the number of large memory pool requests that were not satisfied Collector: SARColl page 82 page 82 page 82 page 82 page 81
59
Parameter Summary
Table 24
Parameter
KERLgMem
KERLockUsedPercent
displays the percentage of kernel lock slots being used Collector: SARColl
page 82
KERMsg
displays the number of message operations performed per second You can use this parameter to monitor applications that use message operations to communicate with other processes. Collector: DCMColl or SARColl Platforms: All except Compaq Tru64 (Digital Unix, OSF/1) and Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms except AIX and Compaq Tru64 (Digital Unix, OSF/1). When using PSL collection, PATROL deactivates this parameter on Solaris.
page 82
KERMsgNumQueUsed Percent
displays the percentage of the total number of available message queues being used system-wide Collector: DCMColl Platforms: all except AIX and Compaq Tru64 (Digital Unix, OSF/1)
page 82
KERMsgNumUsedPercent
displays the percentage of the total number of available kernel messages that are being used system-wide Collector: DCMColl Platforms: all except AIX
page 82
KERNameI
displays the number system pathname searches being performed Collector: SARColl Platforms: HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 82
60
Parameter Summary
Table 24
Parameter
KEROvzAlloc
KEROvzFail
displays the number of requests for oversized memory that could not be satisfied Collector: SARColl
page 82
KERProcUsedPercent
displays the percentage of kernel process slot used. This parameter monitors the process table utilization Collector: DCMColl or SARColl Platforms: All except AIX and Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms except Compaq Tru64 (Digital Unix, OSF/1) and HP-UX. When using PSL collection, PATROL deactivates this parameter on Solaris.
page 82
KERSemNumUsedPercent
displays the percentage of the total number of available semaphores used system-wide Collector: DCMColl Platforms: All except AIX and Compaq Tru64 (Digital Unix)
page 82
KERSemNumSetUsedPercent
displays the percentage of the total number of available semaphore sets that are being used system-wide Collector: DCMColl
page 82
KERSemOps
displays the number of semaphore operations per second and monitors applications that use semaphore operations to communicate with other processes Collector: DCMColl or SARColl Platforms: All except Compaq Tru64 (Digital Unix, OSF/1) and Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms except AIX, Compaq Tru64 (Digital Unix, OSF/1), and Solaris. When using PSL collection, PATROL deactivates this parameter on Solaris.
page 82
KERShmNumUsedPercent
displays the percentage of the total number of available shared memory segments that are being used system-wide Collector: DCMColl
page 82
61
Parameter Summary
Table 24
Parameter
KERSmlAlloc
KERSmlFail
displays the number of small memory requests that failed Collector: SARColl
page 82
KERSmlMem
displays the amount of memory in bytes that is available in the page 82 small memory request pool allocated by KERNEL Memory Allocation Collector: SARColl
KERSysCall
displays the number of system calls made per second This number is the total of all read, write, fork, and exec system calls.
page 82
MEMORY Application Class MEMActiveVirPage displays the number of active virtual pages Collector: VMColl Note: When using DCM collection, PATROL deactivates this parameter on all platforms. When using PSL collection, PATROL deactivates this parameter on AIX (32 bit). MEMAddrTransFault displays the number of pages that were not in physical memory page 82 when accessed Collector: SARColl; VMColl for OSF/1 Platforms: Compaq Tru64 (Digital Unix, OSF/1) Note: When using DCM collection, PATROL deactivates this parameter on all platforms. MEMBRead displays the number of physical reads per second from the disk page 82 to the buffer cache Collector: SARColl Platforms: AIX Note: When using DCM collection, PATROL deactivates this parameter on all platforms. page 82
62
Parameter Summary
Table 24
Parameter MEMBWrt
MEMCow
displays the number of page write faults that have occurred Collector: VMColl Platforms: Compaq Tru64 (Digital Unix, OSF/1) Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 82
MEMFreeMem
displays the number of pages of memory available Collector: DCMColl, SARColl or VMColl Note: When using PSL collection, PATROL deactivates this parameter on AIX (32-bit) and Solaris.
page 82
MEMLRead
displays the number of logical blocks read per second from the page 82 system buffer Collector: DCMColl or SARColl Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1) and Solaris.
MEMLWrt
displays the number of writes per second to the system buffer Collector: DCMColl or SARColl Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1) and Solaris.
page 82
MEMPageAnticipated
displays the anticipated short-term memory shortfall in memory pages Collector: VMColl Platforms: HP-UX, Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 82
63
Parameter Summary
Table 24
Parameter
MEMPageFreed
MEMPageIn
displays the number of pages that have been swapped in from secondary memory Collector: SARColl or VMColl Note: When using PSL collection, PATROL deactivates this parameter on AIX (32-bit).
page 82
MEMPageOut
displays the number of pages swapped out of main memory to page 82 secondary memory Collector: SARColl or VMColl Note: When using PSL collection, PATROL deactivates this parameter on AIX (32-bit).
MEMPageScanned
displays the number of pages scanned per second by the pagestealing daemon to find more memory Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1).
page 82
MEMPFault
displays the number of page protection faults that caused pages page 82 to be copied Note: When using PSL collection, PATROL deactivates this parameter on AIX, Compaq Tru64 (Digital Unix, OSF/1), HPUX, and Solaris.
MEMPgFil
displays the number of page faults that have been reclaimed by page 82 bringing the pages in from the file system Collector: SARColl
64
Parameter Summary
Table 24
Parameter
MEMPRead
MEMPWrt
displays the number of raw writes per second to character devices (TTYs) Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1) and Solaris.
page 83
MEMRCache
displays the percentage of read misses in the buffer cache Collector: SARColl Platforms: AIX, HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 83
MEMWCache
displays the percentage of logical blocks written in the buffer cache Indicates the effectiveness of system buffering Collector for group A platforms: DCMColl Collector for group B platforms: SARColl Platforms: All except Linux Note: When using PSL collection, PATROL deactivates this parameter on Compaq Tru64 (Digital Unix, OSF/1) , AIX, and Solaris.
page 83
MEMWire
displays the number of 1-KB memory pages that cannot be paged out of main memory This parameter shows locked memory. Collector: VMColl Platforms: Compaq Tru64 (Digital Unix, OSF/1) Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 83
65
Parameter Summary
Table 24
Parameter MEMZero
NETWORK Application Class NETCollisionPrc displays the percentage of network send collisions Collector: NETColl NETInErrPrc displays the number of incoming data packets containing errors page 83 per second Collector: NETColl NETOutErrPrc displays the number of outgoing data packets containing errors page 83 per second Collector: NETColl NETPacketsIn displays the total number of incoming packets per second Collector: NETColl NETPacketsOut displays the total number of outgoing packets per second Collector: NETColl NETPseudoAddresses displays the virtual address assigned to a network interface Collector: NETWORK Discovery Platforms: All except Linux NFS Application Class NFSCBadCall displays the percentage of all NFS client calls that failed (since the last sample) Collector: NFSColl NFSCCall displays the total number of NFS client calls made (since the last page 83 sample) Collector: NFSColl NFSCCreate displays the percentage of all NFS client calls made to create a new file (since the last sample) Collector: NFSColl page 83 page 83 page 83 page 83 page 83 page 83
66
Parameter Summary
Table 24
Parameter
NFSCFsStat
NFSCGetAttr
displays the percentage of all NFS client calls that are requests to get file attributes (since the last sample) Collector: NFSColl
page 83
NFSCLink
displays the percentage of all NFS client calls made to create hard links (since the last sample) Collector: NFSColl
page 83
NFSCLookUp
displays the percentage of all NFS client calls made to look up directory paths (since the last sample) Collector: NFSColl
page 83
NFSCMkDir
displays the percentage of all NFS client calls that are calls made page 83 to create directories (since the last sample) Collector: NFSColl
NFSCNclGet
displays the number of times that the client had to request a new client handle for an NFS call (since the last sample) Collector: NFSColl
page 83
NFSCNclSleep
displays the number of times that the kernel had to wait to obtain client structure information (since the last sample) Collector: NFSColl Platforms: All except Linux and Solaris
page 83
NFSCNull
displays the percentage of NFS client calls that request no action page 83 other than acknowledgement (since the last sample) Collector: NFSColl
NFSCRead
displays the number of all NFS client calls that are calls to read data from files (since the last sample) Collector: NFSColl
page 83
NFSCReadDir
displays the percentage of all NFS client calls made to read directories (since the last sample) Collector: NFSColl
page 83
NFSCReadLink
displays the percentage of NFS client calls made to read symbolic links (since the last sample) Collector: NFSColl
page 83
67
Parameter Summary
Table 24
Parameter
NFSCRemove
NFSCRename
displays the percentage of all NFS client calls made to rename files (since the last sample) Collector: NFSColl
page 83
NFSCRmDir
displays the percentage of all NFS client calls made to remove directories (since the last sample) Collector: NFSColl
page 83
NFSCRpcBadCall
displays the percentage of all NFS client RPC calls that returned page 83 an error other than time-outs or interruptions (since the last sample) Collector: NFSColl
NFSCRpcBadXid
displays the percentage of client RPC calls for which multiple responses were received (since the last sample) Collector: NFSColl
page 83
NFSCRpcCall
displays the total number of NFS client RPC calls made to the selected server by all clients (since the last sample) Collector: NFSColl
page 83
NFSCRpcNewCred
displays the number of client RPC calls that are calls made to refresh authentication information (since the last sample) Collector: NFSColl Platforms: All except Linux
page 83
NFSCRpcNullRecv
displays the number of empty messages received from TCP or LAN (since the last sample) Collector: NFSColl
page 83
NFSCRpcRetrans
displays the number of NFS client RPC requests that had to be retransmitted (since the last sample) Collector: NFSColl
page 83
NFSCRpcTimeOut
page 83 displays the percentage of all client RPC calls that timed out because no client handles were available (since the last sample) Collector: NFSColl
68
Parameter Summary
Table 24
Parameter
NFSCRpcWait
NFSCSetAttr
displays the percentage of all NFS client calls made to store file page 83 attributes (since the last sample) Collector: NFSColl
NFSCSymLink
displays the percentage of all NFS client calls made to create symbolic links (since the last sample) Collector: NFSColl
page 83
NFSCWrite
displays the number of all NFS client calls made to write files (since the last sample) Collector: NFSColl
page 83
NFSSBadCall
displays the percentage of all NFS server calls that failed (since page 83 the last sample) Collector: NFSColl
NFSSCall
displays the total number of NFS server calls made (since the last sample) Collector: NFSColl
page 84
NFSSCreate
displays the percentage of all NFS server calls made to create a new file (since the last sample) Collector: NFSColl
page 84
NFSSFsStat
displays the percentage of all NFS server calls made to retrieve file attributes or files statistics (since the last sample) Collector: NFSColl
page 84
NFSSGetAttr
displays the percentage of all NFS server calls that are requests page 84 to get file attributes (since the last sample) Collector: NFSColl
NFSSLink
displays the percentage of all NFS server calls made to create hard links (since the last sample) Collector: NFSColl
page 84
NFSSLookUp
displays the percentage of all NFS server calls made to look up directory paths (since the last sample) Collector: NFSColl
page 84
69
Parameter Summary
Table 24
Parameter
NFSSMkDir
NFSSNull
displays the percentage of NFS server calls that request no action other than acknowledgment (since the last sample) Collector: NFSColl
page 84
NFSSRead
displays the percentage of all NFS server calls made to read data from files (since the last sample) Collector: NFSColl
page 84
NFSSReadDir
displays the percentage of all NFS server calls made to read data directories (since the last sample) Collector: NFSColl
page 84
NFSSReadLink
displays the percentage of all NFS server calls made to read symbolic links (since the last sample) Collector: NFSColl
page 84
NFSSRemove
displays the percentage of NFS server calls made to remove files page 84 (since the last sample) Collector: NFSColl
NFSSRename
displays the percentage of all NFS server calls made to rename files (since the last sample) Collector: NFSColl
page 84
NFSSRmDir
displays the percentage of all NFS server calls made to remove directories (since the last sample) Collector: NFSColl
page 84
NFSSRpcBadCall
displays the percentage of all NFS RPC server requests rejected page 84 by the server RPC facility before the request could be passed to the kernel NFS service routines (since the last sample) Collector: NFSColl
NFSSRpcBadLen
displays the total number of server RPC calls that are truncated page 84 and have an invalid length (since the last sample) Collector: NFSColl
NFSSRpcCall
displays the total number of NFS server RPC calls (since the last page 84 sample) Collector: NFSColl
70
Parameter Summary
Table 24
Parameter
NFSSRpcNullRecv
NFSSRpcXdrCall
displays the total number of NFS server RPC calls whose headers could not be XDR-decoded (since the last sample) This network problem occurs mostly on wide area networks (WANs). Collector: NFSColl
page 84
NFSSSetAttr
displays the percentage of all NFS server calls made to store file page 84 attributes (since the last sample) Collector: NFSColl
NFSSSymLink
displays the percentage of all NFS server calls made to create symbolic links (since the last sample) Collector: NFSColl
page 84
NFSSWrite
displays the percentage of all NFS server calls made to write files (since the last sample) Collector: NFSColl
page 84
PATROLAGENT Application Class PADeltaBetweenExecSecs PAHistoryIndexSize PAOutstandingJobs PATotalErrors PAUserErrors PAWorkRateExecsMin PRINTER Application Class PRNQLength displays the number of print jobs waiting in the print queue Collector: PrinterColl PROCCONT Application Class groupMonitorDaemon PROCPPStatus collects data that is gathered and analyzed by the PROCPPStatus parameter lists the status of monitored processes and host groups Collector: groupMonitorDaemon page 81 page 85 page 84 displays the number of seconds between executions. This value page 84 is the RUNQ_DELTA variable displays the size of the PatrolAgent history index file in bytes page 84 displays the number of currently executing jobs on the PATROL page 84 Agent and the time that they were started displays the total number of errors detected by the PATROL Agent displays the total number of errors detected by the PATROL Agent displays the number of instruction executions performed per minute by the PATROL Agent page 84 page 84 page 84
71
Parameter Summary
Table 24
Parameter
PROCExec
displays the number of exec system calls per second Collector: SARColl Platforms: AIX, HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 84
PROCNoZombies
page 84
PROCNumProcs
displays the total number of active processes on the system Collector: DCMColl or USRPROCColl
page 84
PROCProcWait
displays the number of processes that are currently waiting for resources Collector: DCMColl or VMColl Platforms: AIX, Compaq Tru64 (Digital Unix, OSF/1), HP-UX, Solaris Note: When using PSL collection, PATROL deactivates this parameter on AIX (32-bit) and Compaq Tru64 (Digital Unix, OSF/1).
page 85
PROCProcWaitInt
displays the number of processes in an interruptible wait state Collector: VMColl Platforms: Compaq Tru64 (Digital Unix, OSF/1) Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
PROCProcWaitUnint
displays the number of processes in an uninterruptible wait state Collector: VMColl Platforms: Compaq Tru64 (Digital Unix, OSF/1) Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
72
Parameter Summary
Table 24
Parameter
PROCTopProcs
PROCUserProcs
displays the total number of nonroot user processes Collector: DCMColl or USRPROCColl
page 85
PROCPRES Application Class PROCPPCPUPerc displays the percentage of CPU used by the selected process (calculated on the number of active CPUs in the system. Collector: DCMColl PROCPPCount displays the number of processes started with the same command-line string as the selected process Collector: DCMColl PROCPPCountCheck indicates whether the process count is within the acceptable range specified by the user Collector: discovery PROCPPMem displays the amount of virtual memory that the process is using page 85 Collector: DCMColl PROCPPOwnerCheck displays the results of a verification that a process is owned by an authorized user name PATROL issues an alert if it discovers that the process is owned by an unauthorized user name. Collector: discovery PROCPPParentPID1 displays the results of a verification that the parent process ID (PPID) for a designated process is 1 Processes with a PPID of 1 are owned by the Unix scheduler, or init. Collector: discovery page 85 page 85 page 84 page 84 page 84
73
Parameter Summary
Table 24
Parameter
scheduler
displays the PATROL Scheduling Report This report provides information about items in the schedule queue. Collector: scheduler_daemon
page 85
SMP Application Class SMPContextSwitch displays the number of CPU context switches Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms. SMPCrossCalls displays the number of interprocessor cross-calls Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms. SMPIdlePercent displays the percentage of time the CPU was idle Collector: DCMColl Platforms: All except Reliant and Sequent DYNIX/ptx SMPInterrupts displays the number of processor interrupts Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms. page 85 page 85 page 85 page 85
74
Parameter Summary
Table 24
Parameter
SMPIntThread
SMPInvContSwitch
displays the number of processor involuntary context switches Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
SMPMajorFaults
displays the number of major faults Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
SMPMinorFaults
displays the number of minor faults Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
SMPRunQLen1Min
displays the average number of processes in the CPU's run queue during the last minute Collector: SMP discovery Platforms: HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
75
Parameter Summary
Table 24
Parameter
SMPRunQLen5Min
SMPRunQLen15Min
displays the average number of processes in the CPU's run queue during the last 15 minutes Collector: SMP discovery Platforms: HP-UX Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
SMPSpinMutex
displays the number of spins on mutexes, or locks that were not page 85 acquired on the first try Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
SMPSpinRdWr
displays the number of reader and writer locks that were not acquired on the first try Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 85
SMPSystemCalls
displays the number of system calls Collector: SMPColl Platforms: Solaris Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 86
SMPSystemPrcnt
displays the amount of processor time spent on system activities Collector: DCMColl
page 86
76
Parameter Summary
Table 24
Parameter
SMPThMigration
SMPUserPercent
displays the amount of processor time spent on user-requested activities Collector: DCMColl
page 86
SMPWaitPercent
displays the percentage of time the processor spent waiting Collector: DCMColl
page 86
SNMPHealth Application Class SNMPH_diagnostics gathers and displays diagnostic information relating to the PATROL SNMP system In addition to being displayed in the text parameter window, the diagnostic information is also written to the file, SNMPHealth.log in $PATROL_HOME/log. SNMPH_monitorSubAgent monitors the subagent's status If the subagent is running, PATROL sets its value to OK. If the subagent is not running, PATROL sets the value to ALARM. SNMPH_startSubAgent uses the output of snmp_agent_config to determine whether the page 86 SNMP subagent is running If the subagent is not running, PATROL issues the PSL command snmp_agent_start() to start the subagent. SNMPH_testparm performs diagnostics on the PATROL SNMP system Use it to test the automatic SNMP traps that are issued through the event management system when an event is generated. This parameter's test uses Standard Event 11, which is triggered in PATROL when a parameter's value falls within an alarm range. It uses Standard Event 9 when the parameter's value falls within the OK range after having been in the alarm range. Collector: menu command page 86 page 86 page 86
77
Parameter Summary
Table 24
Parameter
SWAP Application Class SWPnPageSizeAvail SWP32PageSizeAvail SWP64PageSizeAvail SWP128PageSizeAvail SWP256PageSizeAvail SWP512PageSizeAvail SWP1024PageSizeAvail SWP2048PageSizeAvail SWPSwapFreeSpace
SWPSwapSize
displays the size of a particular swap area Collector: SWAP Discovery Platforms: All except Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 86
SWPSwapUsedPercent
displays the percentage of swap space used for a particular swap area Collector: SWAP Discovery Platforms: All except Linux Note: When using DCM collection, PATROL deactivates this parameter on all platforms.
page 86
SWPTotSwapFreeSpace
displays the total amount of free swap space Appears under the Summary instance only. Collector: DCMColl, SWAP Discovery or SARColl
page 86
SWPTotSwapSize
displays the size of the entire swap space (On Solaris, this value includes the space used in /tmp.) Appears under the Summary instance only. Collector: DCMColl or SWAP Discovery
page 86
78
Parameter Summary
Table 24
Parameter
SWPTotSwapUsedPercent
USERS Application Class USRNoSession displays the number of active user sessions on this machine (including root sessions) Collector: DCMColl USRNoUser displays the number of unique users that are currently logged on to the system, NOT the number of user sessions Collector: DCMColl page 86 page 86
79
Parameter Defaults
Parameter Defaults
Table 25 lists default values for parameters. Interpret the column headings as follows. Depending on the type of parameter, some information is not applicable.
Parameter Active? Type specifies the parameter name specifies whether the parameter is active or inactive when discovered specifies whether the parameter is a Standard, Consumer, or Collector parameter specifies the thresholds for the first alarm Alarm 1 This information is not applicable to Collectors. specifies the thresholds for the second alarm Alarm 2 Scheduling Icon Units History Level See Also Page This information is not applicable to Collectors. specifies the time interval in the poll cycle specifies whether the icon is a graph, gauge, or text box specifies the type of unit in which the parameter output is expressed, such as a percentage, a number, or bytes specifies the length of time that history is retained specifies other pages in this chapter where you can find more information about the parameter
Table 25
Active?
Alarm1
Alarm2
Parameter
BlockSize BootTime ChangeDiskLabel CollectorStatus CollectorStatusText CPARMCollector CPARMResult CPARMExpression CPARMGeneratedCodeText CPUCollStatus CPUCtrl CPUCpuUtil CPUIdleTime CPUInt CPULoad CPUProcSwch y y y y y y y y y y y y y y y y
standard standard collector collector collector collector consumer consumer consumer consumer standard consumer consumer consumer consumer consumer
und. und. und. 1 to 1 und. und. 1 und. und. und. und. 90 to 95 und. und. und. und.
und. und. und. 2 to 2 und. und. 2 und. und. und. und. 95 to 100 und. und. und. und.
none none none none none none stoplight text text graph none graph graph graph graph graph
80
Units
Type
Icon
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
CPURunQSize CPUSysTime CPUUserTime CPUWio DCMColl DCMMessages DCMMonitor DCMStatus DCMUpdateCount DCMUpdateTime DFBlockSize DFColl DiskCollStatus DISKCtrl DSKAvgQueue DSKAvgServ DSKAvgWait DSKBps DSKMsps DSKPercentBusy DSKRead DSKReadWrite DSKSps DSKTps DSKWrite FSAvailableSpace FSAvailableSpaceMB FSCapacity FSFreeInodes FSInodeUsedPercent FSMountStatus FSUsedSpace Get_700_nproc groupMonitorDaemon HAAGColl HAAGCPUUsage HAAGFilesystemUsage HAAGHealthSummary HAAGSwapUsage KernelCollStatus KernelInfo KERDirBlk KERFileUsedPercent y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y
consumer consumer consumer consumer collector consumer collector consumer consumer consumer standard collector consumer standard consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer standard collector collector consumer consumer consumer consumer consumer standard consumer consumer
und. 90 to 95 90 to 95 und. und. und. NA und. und. und. und. und. und. NA und. und. und. und. und. und. und. und. und. und. und. und. und. 0 to 0 und. und. 1 to 1 und. und. NA NA und. und. und. und. und. und. und. 90 to 95
und. 95 to 100 95 to 100 und. und. und. NA und. und. und. und. und. und. NA und. und. und. und. und. und. und. und. und. und. und. und. und. 0 to 0 und. und. 2 to 2 und. und. NA NA und. und. und. und. und. und. und. 95 to 100
NA NA NA NA 1 min 3 min 1 min NA NA NA 0 2 min 3 min 1 min NA NA none none none none none none none none none none none none none none 2 min none none 10 min 1 min none none none none 3 min 23:59:59 none none
graph graph graph graph none text none graph graph graph none none graph none graph graph graph graph graph gauge graph graph graph graph graph graph graph graph graph graph boolean graph text none none stoplight stoplight text stoplight graph none graph graph
processes percent percent percent NA none NA NA values sent seconds NA NA DCM or PSL NA requests milliseconds milliseconds 1-KB blocks milliseconds percent kilobytes pages per second seeks transfers kilobytes kilobytes megabytes percent i-nodes percent mount status megabytes NA NA NA NA NA NA NA DCM or PSL NA reads percent
Units
Type
Icon
81
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
KERIGet KERINodeUsedPercent KERLgAlloc KERLgFail KERLgMem KERLockUsedPercent KERMsg KERMsgNumQueUsedPercent KERMsgNumUsedPercent KERNameI KERNELCtrl KEROvzAlloc KEROvzFail KERProcUsedPercent KERSemNumSetUsedPercent KERSemNumUsedPercent KERSemOps KERShmNumUsedPercent KERSmlAlloc KERSmlFail KERSmlMem KERSysCall LPSpoolDirectory MaxConfigValLen MEMActiveVirPage MEMAddrTransFault MEMBRead MEMBWrt MemCollStatus MEMCow MEMFreeMem MEMLRead MEMLWrt MEMORYCtrl MEMPageAnticipated MEMPageFreed MEMPageIn MEMPageOut MEMPageScanned MEMPFault MEMPgFill MEMPRead y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y
consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer standard consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer standard standard consumer consumer consumer consumer consumer consumer consumer consumer consumer standard consumer consumer consumer consumer consumer consumer consumer consumer
und. 90 to 100 und. und. und. 90 to 95 und. 90 to 95 90 to 95 und. und. und. und. 90 to 95 90 to 95 90 to 95 80 to 100 90 to 95 und. und. und. und. und. und. und. und. und. und. und. und. 0 to 100 und. und. und. und. 5 to 25 und. 10 to 15 und. und. und. und.
und. und. und. und. und. 95 to 100 und. 95 to 100 95 to 100 und. und. und. und. 95 to 100 95 to 100 95 to 100 und. 95 to 100 und. und. und. und. und. und. und. und. und. und. und. und. 100 to 200 und. und. und. und. 25 to 100 und. 15 to 100 und. und. und. und.
none none none none none none none none none none 1 min none none none none none none none none none none none 23:59:59 10 min (one time) none none none none 3 min none none none none 1 min none none none none none none none none
graph graph graph graph graph gauge graph graph graph graph none graph graph graph graph graph graph graph graph graph graph graph none none graph graph graph graph graph graph graph graph graph none graph graph graph graph graph graph graph graph
files percent kilobytes requests kilobytes percent messages percent percent conversion NA kilobytes requests percent percent percent sem. ops. percent kilobytes requests kilobytes sys calls NA NA pages pages reads/sec writes/sec DCM or PSL number of 1-Kb pages kilobytes reads writes/sec NA number of 1-Kb pages pages pages pages pages page faults pages reads/sec
82
Units
Type
Icon
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
MEMPWrt MEMRCache MEMWCache MEMWire MEMZero NETColl NETCollisionPrc NETInErrPrc NETOutErrPrc NETPacketsIn NETPacketsOut NETPseudoAddresses NFSCBadCall NFSCCall NFSCCreate NFSCFsStat NFSCGetAttr NFSCLink NFSCLookUp NFSCMkDir NFSCNclGet NFSCNclSleep NFSCNull NFSColl NFSCRead NFSCReadDir NFSCReadLink NFSCRemove NFSCRename NFSCRmDir NFSCRpcBadCall NFSCRpcBadXid NFSCRpcCall NFSCRpcNewCred NFSCRpcNullRecv NFSCRpcRetrans NFSCRpcTimeOut NFSCRpcWait NFSCSetAttr NFSCSymLink NFSCWrite NFSSBadCall y y y y y n y y y y y n y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y
consumer consumer consumer consumer consumer collector consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer collector consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer
und. 1 to 10 1 to 10 und. und. und. und. und. und. und. und. und. und. und. 25 to 50 und. und. und. 50 to 60 und. und. und. 2 to 50 und. und. 18 to 30 und. 25 to 50 und. und. 40 to 50 und. und. und. und. und. 20 to 50 und. und. 11 to 50 50 to 75 40 to 50
und. 10 to 20 10 to 20 und. und. und. und. und. und. und. und. und. und. und. 50 to 100 und. und. und. 60 to 100 und. und. und. 50 to 100 und. und. 30 to 100 und. 50 to 100 und. und. 50 to 100 und. und. und. und. und. 50 to 100 und. und. 50 to 100 75 to 100 50 to 100
none none none none none 5 min none none none none none none none none none none none none none none none none none 3 min none none none none none none none none none none none none none none none none none none
graph graph graph graph graph none graph graph graph graph graph text graph graph graph graph graph graph graph graph graph graph graph none graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph
writes/sec percent percent number of 1-KB pages number of 1-KB pages NA percent percent percent packets packets NA percent calls percent percent percent percent percent percent nfs call calls percent NA calls percent percent percent percent percent percent percent calls calls messages calls percent calls percent percent calls percent
Units
Type
Icon
83
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
NFSSCreate NFSSFsStat NFSSGetAttr NFSSCall NFSSLink NFSSLookUp NFSSMkDir NFSSNull NFSSRead NFSSReadDir NFSSReadLink NFSSRemove NFSSRename NFSSRmDir NFSSRpcBadCall NFSSRpcBadLen NFSSRpcCall NFSSRpcNullRecv NFSSRpcXdrCall NFSSSetAttr NFSSSymLink NFSSWrite OSName PADeltaBetweenExecSecs PageSize PAHistoryIndexSize PAOutstandingJobs PATotalErrors PAUserErrors PAWorkRateExecMin PrinterColl PRNQLength PROCAvgUsrProc PROCColl ProcessCollStatus PROCExec PROCESSCtrl PROCNoZombies PROCNumProcs PROCPPCount PROCPPCountCheck PROCPPCPUPerc y y y y y y y y y y y y y y y y y y y y y y y y y y y y y y n y y y y y y y y y y y
consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer standard standard standard standard standard standard standard standard collector consumer consumer collector consumer consumer standard consumer consumer consumer consumer consumer
25 to 50 50 to 75 75 to 100 und. und. 50 to 60 und. 2 to 50 und. 18 to 30 40 to 50 25 to 50 und. und. 40 to 50 und. und. und. und. und. 25 to 50 50 to 75 und. und und. 900000 to 950000 und. und. und. 20 to 25 und. 30 to 100 und. und. 1 to 2 und. und. und. und. und. 1 to 1 und.
50 to 100 75 to 100 und. und. und. 60 to 100 und. 50 to 100 und. 30 to 100 50 to 100 50 to 100 und. und. 50 to 100 und. und. und. und. und. 50 to 100 75 to 100 und. und. und. 950000 to 999999 und. und. und. 25 to 60 und. und. und. und. und. und. und. und. und. und. 2 to 2 und.
none none none none none none none none none none none none none none none none none none none none none none 23:59:59 15 min 0 10 min 5 min 45 min 30 min 2 min 2 min none none 5 min 3 min none 1 min none none NA NA NA
graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph graph none graph none graph graph gauge gauge graph none gauge graph none graph gauge none graph graph graph stoplight graph
percent percent percent calls percent percent percent percent percent percent percent percent percent percent percent calls calls calls calls percent percent percent NA seconds NA NA jobs errors errors execs NA jobs processes NA DCM or PSL calls NA processes processes number of processes NA percentage
84
Units
Type
Icon
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
PROCPPMem PROCPPOwnerCheck PROCPPParentPID1 PROCPPStatus PROCProcWait PROCProcWaitInt PROCProcWaitUnint PROCTopProcs PROCUserProcs PSColl SARColl SetupClearText scheduler scheduler_daemon SMPColl SMPContextSwitch y y y y y y y y y y y y y y y y
consumer consumer consumer consumer consumer consumer consumer consumer consumer collector collector standard consumer collector collector consumer
und. 1-1 1-1 und. und. und. und. und. und. und. und. und. und. und. und. und.
und. 2-2 2-2 und. und. und. und. und. und. und. und. und. und. und. und. und.
NA NA NA none none none none none none 1 min 1 min 10 min (once) none 1 hrs 10 min none
graph stoplight stoplight text graph graph graph text graph none none none text none none graph
kilobytes NA NA NA processes processes processes NA processes NA NA NA NA NA NA number of switches per second number of events per second percent number of interrupts per second number of interrupts per second number of switches per second number of major faults per second number of minor faults per second number of processes per minute number of processes per 5 minutes number of processes per 15 minutes number of events per second number of events per second
SMPCrossCalls
consumer
und.
und.
none
graph
SMPIdlePercent SMPInterrupts
y y
consumer consumer
und. und.
und. und.
none none
gauge graph
SMPIntThread
consumer
und.
und.
none
graph
SMPInvContSwitch
consumer
und.
und.
none
graph
SMPMajorFaults
consumer
und.
und.
none
graph
SMPMinorFaults
consumer
und.
und.
none
graph
SMPRunQLen1Min
consumer
und.
und.
none
graph
SMPRunQLen5Min
consumer
und.
und.
none
graph
SMPRunQLen15Min
consumer
und.
und.
none
graph
SMPSpinMutex
consumer
und.
und.
none
graph
SMPSpinRdWr
consumer
und.
und.
none
graph
Units
Type
Icon
85
Parameter Defaults
Table 25
Active?
Alarm1
Alarm2
Parameter
SMPSystemCalls y
consumer
und.
und.
none
graph
number of system calls per second percent number of migrations per second percent percent NA NA NA NA NA DCM or PSL NA pages pages pages pages pages pages pages number of 1-KB blocks number of 1-KB blocks percent 1-KB blocks 1-KB blocks percent NA NA DCM or PSL NA sessions users NA NA
SMPSystemPrcnt SMPThMigration
y y
consumer consumer
und. und.
und. und.
none none
gauge graph
SMPUserPercent SMPWaitPercent SNMPH_diagnostics SNMPH_monitorSubAgen SNMPH_startSubAgent SNMPH_testparm SNMPStart SwapCollStatus SWAPCtrl SWP1024PageSizeAvail SWP128PageSizeAvail SWP2048PageSizeAvail SWP256PageSizeAvail SWP32PageSizeAvail SWP512PageSizeAvail SWP64PageSizeAvail SWPSwapFreeSpace SWPSwapSize SWPSwapUsedPercent SWPTotSwapFreeSpace SWPTotSwapSize SWPTotSwapUsedPercent TerminalEmulator UPTColl UserCollStatus USERSCtrl USRNoSession USRNoUser USRPROCColl VMColl
y n y y y y y y y y y y y y y y y y y y y y y y y y y y y y
consumer consumer standard standard standard consumer standard consumer standard consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer consumer standard collector consumer standard consumer consumer collector collector
und. und. und. 0 to 0 und. 1 to 1 und. und. und. und. und. und. und. und. und. und. und. und. und. und. und. 90 to 95 und. und. und. und. und. und. und. und.
und. und. und. und. und. 2 to 2 und. und. und. und. und. und. und. und. und. und. und. und. und. und. und. 95 to 100 und. und. und. und. und. und. und. und.
none none 10 min 1 min 1 min none 30 min 1 min 1 min none none none none none none none none none none none none none NA 1 min 3 min 1 min none none 5 min 45 sec
gauge gauge text stoplight none stoplight none graph none graph graph graph graph graph graph graph graph graph gauge graph graph gauge none none graph none graph graph none none
86
Units
Type
Icon
Chapter
87
Introduction
Introduction
Two data collection methods are available to the PATROL Knowledge Module for Unix and Linux. The two methods use separate data collection mechanisms and are controlled by separate application classes. Table 26 lists the collection methods and their application classes. Table 26 Method DCM Collection Method PSL Collection Method Data Collection Methods and Associated Application Classes Application Class DCM Application Class COLLECTORS Application Class
Object Hierarchies
In PATROL, collector parameters are not visually represented by icons. However, the collector application classes are. When their respective data collection methods are employed, PATROL displays the following application class object hierarchies.
COLLECTORS
The COLLECTORS application class governs the PSL data collection method. It does not contain any consumer parameters. When the PSL Collection method is employed, PATROL creates the application class in the UNIX OS container (Figure 2). Figure 2 COLLECTORS Application Object Hierarchy
OS container
UNIX OS
Application class
COLLECTORS
88
Object Hierarchies
DCM
The DCM application class governs the DCM data collection method. The DCM application class contains several parameters that monitor the status of the DCM process as shown in the application class hierarchy represented by Figure 3. Figure 3 DCM Application Object Hierarchy
89
which parameters (-Ctrl and -Coll) are active during DCM data collection which parameters supply information to which application classes which parameters are not supported by the DCM data collection method
90
data collectors that use standard Unix utilities data collectors that read from the kernel
Data collection that uses standard Unix utilities is called PATROL Script Language (PSL) data collection. Data collection that reads directly from the kernel is gathered by the PATROL Perform Agent kernel-reading data collector as shown in Figure 4. The PATROL Perform Agent is not available on all platforms. See the PATROL for Unix Getting Started guide for a list of platforms that support the PATROL Perform Agent. Figure 4 Data Collection Architecture Using PATROL Perform Collector
PATROL Agent Data Path PSL KM Unix-Named Pipe (FIFO) Data Collection Manager (DCM)
Shared Memory
Figure 4 depicts how the PATROL Perform collector fits into the data collection architecture of PATROL. The PATROL Perform collector collects the data and writes it to shared memory. The Data Collection Manager (DCM) of the PATROL KM for Unix and Linux is the control point and data interface between the PATROL Perform collector and the PATROL Agent.
91
Collection Parameters Used By the DCM Collection Method PSL / Perform Perform PSL PSL Perform PSL Perform Perform PSL PSL PSL Perform Perform PSL Perform Active / Inactive Active Active Active Active Active Active Active Inactive Active Inactive Active Active Active Active Consumer Application CPU, SMP DCM FILESYSTEM DISK HEALTH_AT_A_GLANCE KERNEL MEMORY NETWORK NFS PRINTER PROCESS SWAP CPU USERS See Also 53 53 51 54 51 54 55 55 55 55 55 55 55 55
HAAGColl KERNELCtrl MEMORYCtrl NETColl NFSColl PRINTERColl PROCESSCtrl SWAPCtrl UPTColl USERSCtrl
-Ctrl Suffix
Parameters with -Ctrl suffix are standard parameters that interact with the Perform Agent through the DCM application. These parameters control the poll time and status (active or inactive) for data collection of application parameter data.
-Coll Suffix
Parameters with the -Coll suffix are collector parameters that interact directly with Unix utilities. This type of parameter issues the system calls and receives the data without having to interact with another data-gathering application.
92
does not create the parameter does not update the parameter (if the parameter was created by using the PSL collection method).
Restarting PATROL after changing the collection method ensures that parameters that are not updated by the DCM collection method are destroyed. Table 28 CPU CPUInt CPUProcSwch KERNEL KERFileUsedPercent KERInodeUsedPercent KERProcUsedPercent KERMsg KERSemOps KERDirBlk KERNameI KERIGet MEMORY MEMActiveVirPage MEMAddrTransFault MEMBRead MEMBWrt MEMCow MEMPageAnticipated MEMPageFreed MEMRCache MEMWire MEMZero All All All All All All All All All All All except HP-UX All except Compaq Tru64 and HP-UX All except Compaq Tru64 and HP-UX All except AIX and Compaq Tru64 All except AIX and Compaq Tru64 All All All All All DCM Deactivated Parameters and their Platforms (Part 1 of 2) Platforms
Deactivated Parameters
93
Table 28 PROCESS
DCM Deactivated Parameters and their Platforms (Part 2 of 2) Platforms All All All All All All All All All All All All All All All All All All All All
Deactivated Parameters PROCExec PROCProcWaitInt PROCProcWaitUnint SMP SMPContextSwitch SMPCrossCalls SMPInterrupts SMPIntThread SMPInvContSwitch SMPMajorFaults SMPMinorFaults SMPRunQLen1Min SMPRunQLen5Min SMPRunQLen15Min SMPSpinMutex SMPSpinRdWr SMPSystemCalls SMPThMigration SWAP SWPSwapFreeSpace SWPSwapSize SWPSwapUsedPercent
94
which collector parameters are active during PSL data collection which collector parameters supply information to which application classes which parameters are not supported by the PSL data collection method
Active / Inactive Consumer Application Active Active Active Active Inactive Active Inactive Active Active Active Active Active Active Active
95
-Coll Parameters
The PSL data collection method gathers data using only the PATROL PSL collector parameters. The parameters with -Coll suffix are collector parameters that interact directly with Unix utilities. This type of parameter issues the system calls and receives the data without having to interact with another data-gathering application.
does not create the parameter does not update the parameter (if the parameter was created by using the DCM collection method)
Restarting PATROL after changing the collection method ensures that parameters that are not updated by the PSL collection method are deleted. Table 30 CPU CPUInt CPUWio DISK DISKDSKAvgQueue DSKAvgServ DSKPercentBusy DSKRead DSKReadWrite DSKSps DSKWrite KERNEL KERFileUsedPercent KERInodeUsedPercent KERMsg KERProcUsedPercent Compaq Tru64 Compaq Tru64 Solaris Solaris Compaq Tru64 AIX and Compaq Tru64 Compaq Tru64 Solaris Compaq Tru64 Compaq Tru64 Solaris AIX Compaq Tru64 and Solaris Collector Deactivated Parameters and their Platforms (Part 1 of 2) Platforms
Deactivated Parameters
96
Table 30
Collector Deactivated Parameters and their Platforms (Part 2 of 2) Platforms Solaris AIX (32-bit) AIX (32-bit) and Solaris Compaq Tru64 and Solaris Compaq Tru64 and Solaris AIX (32-bit) AIX (32-bit) AIX (32-bit) Compaq Tru64 AIX, Compaq Tru64, HP-UX, Solaris Compaq Tru64 and Solaris Compaq Tru64 and Solaris Compaq Tru64 and Solaris AIX (32-bit) and Compaq Tru64 AIX
Deactivated Parameters KERSemOps MEMORY MEMActiveVirPage MEMFreeMem MEMLRead MEMLWrt MEMPageFreed MEMPageIn MEMPageOut MEMPageScanned MEMPFault MEMPRead MEMPWrt MEMWCache PROCESS PROCProcWait PROCTopProcs
97
Managing Collection
Managing Collection
The DCM application class and its components and the COLLECTORS application class are both installed in a standard PATROL installation. By default, PATROL attempts to use the DCM data collection method associated with the DCM KM. If DCM is either not available or not supported on the managed systems platform, PATROL uses the PSL collection method associated with the COLLECTORS KM. The data collection management tasks are described in detail on the following pages: Task Changing Data Collection Methods Activating an Inactive Application Class Activating an Inactive Collector Parameter Significant Events Related to Data Collection Page 98 100 100 101
98
Managing Collection
Figure 5
NOTE
Neither collection method gathers data for every parameter available in the KM. For a list of parameters that are deactivated for a specific collection method, see DCM Collection Exceptions on page 93 or PSL Collection Exceptions on page 96.
NOTE
Steps 4 and 5 are optional. PATROL will automatically reconnect to the Agent. However, due to various discovery intervals, impatient users can reconnect faster by using the menu command than by using the automated procedure.
99
Managing Collection
To Start Collecting Data for an Application Class 1 Access the application class properties as described in Accessing KM Commands
and InfoBoxes on page 402.
100
Managing Collection
To Start a Collector Parameter 1 Access the application class properties as described in Accessing KM Commands
and InfoBoxes on page 402.
Chapter 4
101
Managing Collection
102
Managing Collection
Defined Process Presence Instance Does Not Exist for pconfig Variable
If the pconfig variable, /PUK/PROCPRES/attach_ps_list", exists and is set to TRUE, the following event is generated when the defined process presence instance does not exist. (This condition is based on a recovery action defined for PROCPPCountCheck parameter.) The following event is logged after using the PSL/DCM toggle and re initializing the PATROL agent. Type of Event Severity Event Class Description INFORMATION 3 41 This event contains a list of top ten processes and monitored processes. It is generated by the recovery action of the PPROCPCountCheck parameter due to an alert condition.
Chapter 4
103
Managing Collection
104
Chapter
5
106 106 108 108 109 109 110 111 112 112 113 114 115
105
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux monitors processors through two applications: CPU and SMP. It monitors the kernel through one: KERNEL.
s
The CPU application monitors such processor statistics as percentage of overall CPU utilization percentage of CPU idle time percentage of CPU time spent on user activities percentage of CPU time spent on system activities percentage of time spent waiting on input and output number of context switches per second number of non-VME device interrupts number of pages in and out per second number of pages scanned per second number of processes in the run queue
The SMP application provides basic CPU utilization statistics for multiple processors on a machine. The KERNEL application provides information such as Kernel Memory Allocation (KMA) statistics for small, large, and oversized memory requests i-node usage kernel usage of system resources
106
Figure 6
OS container
UNIX OS
Application class
Parameters
Application class
Instances
Parameters
107
To View the CPU Utilization Statistics 1 Access the CPU application class so that you can view its parameters. 2 Open the parameters that track the type of CPU utilization that you want to view:
Parameter CPUCpuUtil CPUIdleTime CPUSysTime Description displays the percentage of CPU utilization, which is calculated by subtracting CPU idle time from 100 displays the percentage of CPU time that is spent idle displays the percentage of CPU time that is spent in system mode doing system tasks, including the CPU resources consumed by calls to kernel routines displays the percentage of CPU time that is spent on user mode commands and tasks initiated by users
CPUUserTime
PATROL displays a graph that shows the amount of CPU utilization over time.
108
To View Statistics on Activities That Interfere with the CPU 1 Access the CPU application class so that you can view its parameters. 2 Open the parameters that track the type of CPU information that you want to view:
Parameter CPUInt CPUWio CPUProcSwch Description displays the number of non-VME device interrupts displays the percentage of time that the CPU spends waiting for input and output operations displays the total number of CPU context switches per second.
PATROL displays a graph that shows the requested information over time.
To View the CPU Run Queue Statistics 1 Access the CPU application class so that you can view its parameters. 2 Open the parameters that track and display the run queue information in the form
that you want to view: Parameter CPULoad Description displays the 1-minute load average from the uptime command. Load average is the average number of processes in the kernels run queue during an interval (1 minute in this case). displays the number of processes in the run queue (RunQ)
CPURunQSize
PATROL displays a graph that shows the requested information over time.
109
To View CPU Utilization Statistics for Multiple Processors 1 Access the CPU application class so that you can view its parameters and the SMP
application class.
2 Open the SMP application class so that you can view its instances (one for each
processor).
3 Open an SMP instance so that you can view its parameters. 4 Open the parameters that display the basic CPU utilization statistics that you want
to view: Parameter SMPIdlePercent SMPSystemPrcnt SMPWaitPercent SMPUserPercent Description displays the percentage of time that the CPU was idle displays the amount of processor time that is spent on system activities displays the amount of processor time that is spent waiting displays the amount of processor time that is spent on user-requested activities
PATROL displays a graph that shows the requested information over time.
NOTE
The SMP application class creates four parameters on all the platforms that it monitors. On some platforms such as HP and Solaris, SMP also creates some platform-specific parameters. For more information on these parameters, see the PATROL KM for Unix and Linux Help.
110
OS container
111
KERNEL
KERNEL
The KERNEL application class monitors various aspects of the kernel. This application class does not provide any menu commands because it automatically detects and monitors the kernel. It does gather and store a number of vital statistics in the KERNEL parameters. The KERNEL tasks on how to access information stored in parameters are described in detail on the following pages: Task Viewing the Kernel Build Information Viewing Kernel Memory Allocation Statistics Viewing Kernel I-node Usage Viewing Kernel System Usage Page 112 113 114 115
112
KERNEL
Small memory requesta request for less than 256 bytes of memory Large memory requesta request from 512 bytes to 4 KB of memory Oversized memory requesta request for more than 4 KB of memory that is
allocated dynamically
To View the KMA Statistics 1 Access the KERNEL application class so that you can view its parameters. 2 Open the parameter that records the type of Kernel Memory Allocation
information that you want to view: Parameter KERLgAlloc Description displays the amount of memory in bytes that is allocated for large memory requests by KERNEL Memory Allocation (KMA) in the large memory request pool displays the number of large memory pool requests that failed displays the amount of memory in bytes that is available in the KERNEL Memory Allocation (KMA) large memory request pool displays the amount of memory in bytes that is allocated to the small memory request pool by KERNEL Memory Allocation (KMA) displays the number of small memory requests that failed displays the amount of memory in bytes that is available in the small memory request pool allocated by KERNEL Memory Allocation (KMA) displays the amount of memory that is dynamically allocated for oversized requests displays the number of requests for oversized memory that could not be satisfied
KERSmlFail KERSmlMem
KEROvzAlloc KEROvzFail
PATROL displays a graph that shows the requested information over time.
113
KERNEL
To View the I-node Statistics 1 Access the KERNEL application class so that you can view its parameters. 2 Open the parameters that records the i-node information that you want to view:
Parameter KERIGet KERINodeUsedPercent KERNameI Description displays the number of files that are located by an i-node entry displays the percentage of kernel i-node slots that are used displays the number of file system pathname searches, which are the conversion of filenames to i-nodes
PATROL displays a graph that shows the requested information over time.
114
KERNEL
To View the Kernel System Statistics 1 Access the KERNEL application class so that you can view its parameters. 2 Open the parameter that records the type of kernel system information that you
want to view: Parameter KERDirBlk KERFileUsedPercent KERLockUsedPercent KERMsg KERProcUsedPercent Description displays the number of directory block reads that are issued per second displays the percentage of the kernel file slots that are used in the file table displays the percentage of used kernel lock slots displays the number of message operations that are performed per second displays the percentage of used kernel process slots and monitors the process table utilization Each table entry represents an active process; the number of entries available depends on the number of terminal lines available and the number of processes spawned by each user. KERSemOps KERSysCall displays the number of semaphore operations performed each second displays the total number of system calls, which consists of all read, write, fork, and exec system calls, made per second
PATROL displays a graph that shows the requested information over time.
115
KERNEL
116
Chapter
6
118 118 119 120 120 121 121 124 125 126
Chapter 6
117
Introduction
Introduction
Composite parameters are parameters whose values are dependent on one or more existing PATROL parameters. You can assign PATROL alarm settings and recovery actions on the newly created parameters in the same way that you use alarm settings and recovery actions on other parameters. A composite parameter expression consists of one or more relational clauses joined by Boolean (logical) operators. A relational clause can have one of the following forms:
s s s
parameter (relational operator) constant or string constant or string (relational operator) parameter parameter (relational operator) parameter
A relational operator can be any of the standard PSL relational operators (that is, <, >, ==, <=, >=). Relational clauses can be combined using the logical operators AND (&&) and OR (||). The result of a composite parameter expression is a PATROL parameter condition, such as alarm when true, or warn when false. For example, you can build a composite parameter that triggers a PATROL alarm indicating low memory conditions only when both of the following conditions are true:
s s
See Examples of Composite Parameter Expressions on page 120 for detailed examples.
Figure 9
OS container
UNIX OS
Application class
Instances
Parameters
After you create a composite parameter, the icon for the composite parameter appears in the COMPOSITES container (see Figure 11 on page 120) after the next scheduled update of the parameter.
Chapter 6
119
Figure 11
Example 2
CPUWio is greater than 40 AND MEMPFault is greater than 15
/CPU/CPU_0/CPUWio > 40 && /MEMORY/MEMORY/MEMPFault > 15
Example 3
DSKAvgQueue is greater than or equal to 20 OR DSKBps is greater than 85 and MEMPFault is greater than 15
/DISK/c0t1d0/DSKAvgQueue >= 20 || /DISK/c0t3d0/DSKBps > 85 && /MEMORY/MEMORY/MEMPFault > 15
120
3. Although the expression entry wizard displays all parameters within an application class, including collector parameters, the application cannot use collector parameters in calculations. 4. Expressions cannot contain arithmetic operators. 5. String terms must be enclosed in double quotes ("). 6. You can enclose a double quote (") in a string by escaping it using a backslash, \. A string with an enclosed double quote looks like "this \"string\"" You cannot use the backslash to escape any other special characters. 7. Although the expression entry wizard does not enable you to enter parentheses in an expression, you can enter parentheses manually to control the order of the expression evaluation. If parentheses are not used, expression evaluation is strictly left to right, with the relational operators having higher precedence than the Boolean operators.
Chapter 6
121
To Create a Composite Parameter Expression Using the Expression Entry Wizard 1 From the COMPOSITES_COLLECTOR menu, choose KM Commands => Create
Expressions.
NOTE
To return to the previous dialog box or redisplay the Create Expressions dialog box, you can click Cancel at any time while you are using the expression entry wizard.
3 Click Create.
PATROL displays the Edit Expression dialog box.
A If you do not want the composite parameter to be active when you finish
defining it, deselect the Active checkbox.
NOTE
The active state for the composite parameter does not affect the active state for the parameters used in the definition of the composite parameter.
B Select the Warning state or the Alarm state button to indicate the parameter state
that PATROL sets when the condition specified by the expression occurs.
C Select the True or False button to indicate whether PATROL should set the
condition when the expression is true or false.
If you select PATROL KM Parameter and then click Continue, PATROL displays the Select PATROL application dialog box. Go to Step 6 to continue. If you select Constant value and then click Continue, PATROL displays the Enter Constant Value dialog box. Go to step 8 on page 123 to continue.
122
6 Select the application class that contains the parameter that you want to use in the
expression and then click Continue. The parameters associated with the selected application class are displayed in the parameter list box.
7 Select the application parameter that you want to use in the expression. A If there is more than one instance of the application, select the instance you want
to use in the definition and then click Continue.
B If the application has only one instance, select the PATROL application
parameter you want to use in the expression and then click Continue.
NOTE
Although collector parameters are listed in the dialog box, they cannot be used in composite parameter calculations.
PATROL displays the Select Relational Operator dialog box. Go to step 10 to continue.
8 Enter the constant you want to use in the composite parameter expression.
The constant can be either an integer value or a string expression. See Syntax Rules for Composite Parameter Expressions on page 120 for information about string expressions.
10 Select the relational operator you want to use in the relational clause and then click
Continue.
After you complete entry of the second term, PATROL displays the Expression Complete dialog box.
s
If you do not want to add another relational clause to the expression, click Done. PATROL displays the Save or Discard dialog box. The procedure continues with step 12 on page 124. If you want to add another relational clause to the expression, click More. PATROL displays the Select Boolean Operator dialog box. The procedure continues with step 11 on page 124.
Chapter 6
123
11 Select the Boolean operator you want to use to join relational clauses.
PATROL displays the Select Expression Term Type dialog box. Return to step 5 on page 122 to add another relational clause to the expression.
If the KM detects no errors, the new composite parameter appears in the COMPOSITES container after the next collection cycle. If the KM detects errors in the expression, the Syntax Errors dialog box appears, which contains text identifying the error. Click OK to display the Edit Expression dialog box and correct the error.
To Create a Composite Parameter Expression Manually 1 From the COMPOSITES_COLLECTOR menu, choose KM Commands => Create
Expressions.
2 Enter the parameter expression in the text entry box. 3 Select Done when you have completed your entry.
PATROL displays the Save or Discard dialog box.
4 Click Save to save the composite parameter expression. The KM analyzes your
entry to make sure that all terms are valid.
124
If the KM detects no errors, the new composite parameter appears in the COMPOSITES container after the next collection cycle. If the KM detects errors in the expression, the Syntax Errors dialog box appears, which contains text identifying the error. Click OK to display the Edit Expression dialog box and correct the error.
To Edit a Composite Parameter Expression 1 Choose KM Commands => Edit Expressions from the Composites menu located on
the Composites application icon. PATROL displays the Edit Expressions dialog box.
2 Select the name of the composite parameter you want to edit and click Edit. 3 Edit the expression as follows:
s
To change the relational clause, edit the expression in the text entry dialog box manually. For more information, see Syntax Rules for Composite Parameter Expressions on page 120. To add a relational clause to the expression, click Wizard. You are then prompted to select a Boolean operator to join the clauses.
Chapter 6
125
To Delete a Composite Parameter Expression 1 Choose KM Commands => Delete Expressions from the Composites menu located on
the Composites application icon. PATROL displays the Delete Expressions dialog box.
2 Select the name of the composite parameter you want to delete and click Delete.
PATROL removes the expression from the dialog box and deletes the application instance and its associated parameters.
126
Chapter
7
128 128 130 130 131 132 133
Monitoring Disks
The PATROL Knowledge Module for Unix and Linux gives you the ability to monitor all disk drives mounted on a system. The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Single Disk from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting Disks to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resuming Monitoring Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
127
Introduction
Introduction
The DISK application monitors the disk drives that are mounted on a system for information such as
s s s s s s s s
average number of requests in the queue average service time number of blocks transferred per second percentage of time the device was busy servicing a transfer request number of kilobytes read from disk per second number of read and write pages per second number of disk transfers per second number of kilobytes written to disk per second
By default, the DISK application class discovers and monitors all the disks mounted on the system. You use menu commands to select which drives are monitored and which are not.
Object Hierarchy
The DISK application class contains an instance for each disk that is being monitored. Each disk instance contains parameters on queued requests, service time, block transfer rate, and read and write speeds. Figure 12 on page 129 illustrates the basic hierarchy but does not necessarily display all instances and parameters.
128
Object Hierarchy
Figure 12
OS container
UNIX OS
Application class
Instances
Parameters
129
Disks
Disks
The DISK application class enables you to select which disks PATROL monitors. With this feature, you can exclude from monitoring test disks and other disks that are not vital to your companys day-to-day activities. The DISK tasks are described in detail on the following pages: Task Excluding a Single Disk from Monitoring Selecting Disks to Monitor Resuming Monitoring Disks Page 130 131 132
130
Disks
The exclusion list feature supports regular expressions. To stop monitoring large numbers of disks that have uniform names, use regular expressions. To perform this task, you must be in developer mode. If you attempt to stop monitoring a disk when in operator mode, PATROL displays the following error message in the system output window.
131
Disks
3 In the Monitored Disks list box, select the disk that you want to exclude from
monitoring.
4 Click Apply.
PATROL adds the disk to the list of excluded disks and then removes the disk icon from the PATROL Object Hierarchy.
5 Repeat step 1 through step 4 for each disk that you want to exclude.
3 In the Excluded Disks list box, select the disk that you want to resume monitoring. 4 Click Apply.
PATROL places the disk in the Monitored Disks list box, discovers the disk instance during the next discovery cycle, and resumes monitoring it.
132
Disk Space
To Resume Monitoring All Disks 1 Access the DISK application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
3 Click Yes.
PATROL discovers all the disk instances during the next discovery cycle and resumes monitoring them.
Disk Space
With PATROL, you can monitor disk space by user. For more information, see Chapter 18, Monitoring Users.
133
Disk Space
134
Chapter
8
136 137 138 138 139 141 143 144 145 146 146 148 149 150 153
The PATROL Knowledge Module for Unix and Linux gives you the ability to monitor all file systems in a network. The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitoring File Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Single File System from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting File Systems to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automating File System Cleanup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running Recovery Actions Only with Operator Confirmation . . . . . . . . . . . . . . Preventing File Systems from Being Monitored . . . . . . . . . . . . . . . . . . . . . . . . . . . Working with File System Types and File System Classes . . . . . . . . . . . . . . . . . . Managing File Systems Using PATROL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unmounting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Synchronizing File System Cache and Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Searching for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
135
Introduction
Introduction
The FILESYSTEM application monitors the file systems mounted on a system for information such as
s
disk space number of kilobytes available number of kilobytes used percentage of space used
The application also lets you manage a monitored file system within PATROL. Some of the tasks that you can perform are
s s s
mount and unmount file systems synchronize information stored in the file system cache and disk search for and remove files
By default, the FILESYSTEM application discovers and monitors all the disks mounted on the system. You can use menu commands to select which file systems are monitored and which are not.
136
Object Hierarchy
Object Hierarchy
The FILESYSTEM application class contains an instance for each file system that is being monitored. Each file system instance contains parameters on free and used space, free and used i-nodes, and system capacity. Figure 14 illustrates the basic hierarchy but does not necessarily display all and parameters. Figure 14 FILESYSTEM Application Object Hierarchy
OS container
UNIX OS
Application class
Instances
Parameters
137
138
The exclusion list feature supports regular expressions. To stop monitoring large numbers of file systems that have uniform names, use regular expressions. The exclusion list feature excludes file systems by type. You can stop monitoring all NFS systems, CD-ROM systems, and process control (proc) subsystems. To perform this task, you must be in developer mode. If you attempt to stop monitoring a file system when in operator mode, PATROL displays the following error message in the system output window.
NOTE
If the FILESYSTEM application instance has more than 250 instances, the KM displays a message in the system output window (SOW) similar to the following, 20040616162441 PatrolAgent-W-EUSER: Discovery/ pre discovery proc FILESYSTEM may be in an infinite loop - executed 500029 instructions. To prevent this situation, increase the maximum PSL instruction limit from the 500000 default setting to 5000000 or higher.
139
Figure 15
3 Either in the Excluded Filesystems list box, select the file system that you want to
monitor or in the Monitored Filesystems list box, select the file system that you want to exclude from monitoring.
4 If you want to stop monitoring one of the following file system types, select the
corresponding check box. Ignore Filesystem Type NFS Description excludes all NFS file systems, which means that the PATROL Agent running on this managed system monitors only file systems that reside on the managed system; this option does not exclude SAMBA or AFS shares (types include NFS and CACHEFS) excludes mounted CD-ROMs (types include CDFS, HSFS, and ISO9660) excludes file systems that provide access to the image of each active process in the system (types include PROC, USBDEVFS, and DEVPTS) excludes file systems that you designate (possible types include VFS, SYSV, and UMSDOS)
CD-ROM proc
Custom
140
5 Click Apply.
Based on your selections in step 3 and step 4, PATROL adds the file systems to the respective list box and then either removes or inserts the file system icons from the PATROL Object Hierarchy.
6 Repeat step 3 through step 5 for each file system that you want to exclude. Then
click Done.
You must be root to run this command. For a given FILESYSTEM instance, the FSCapacity parameter must be active. This recovery action applies to all file system types except NFS, CD-ROM, and proc.
To Set Up Automatic File System Cleanup 1 Access the Computer application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
141
5 Select the mode of the recovery action by clicking the corresponding radio button.
s
you
s
Run Attendedprompts you before running the recovery action, and does
Do Not Executedoes not perform the recovery action; this mode is the default
setting
NOTE
If you select Run Attended, use the slide bar to set the amount of time PATROL waits for user input before it cancels the recovery action.
6 Click ACCEPT.
PATROL closes the Edit Recovery Actions dialog box and displays the Recovery Action Instances dialog box.
142 PATROL Knowledge Module for Unix User Guide
7 Click Close.
PATROL closes the Recovery Action Instances dialog box and displays the Registered Recovery Actions dialog box.
8 Click Close.
PATROL closes the Registered Recovery Actions dialog box and enables the recovery action based on the options that you chose.
143
Click Acknowledge to run the recovery action. If you want to disable the recovery action or run the recovery action in the future without user input, select the appropriate option.
s
Do not ask me againswitches the recovery action to unattended mode, which runs the recovery action without any user interaction Disableprevents the recovery action from attempting to run and from
producing this dialog box If you click Cancel, PATROL does not run the recovery action or save any of the options that you selected.
Use the Stop Monitoring command to add the name of the file system to the FILESYSTEM exclusion list. This command will prevent monitoring of the file system without regard to whether the file system is mounted. Edit the /PUK/FILESYSTEM/moniList variable, which established file system persistence, to remove the file system name from the variable. This option only applies to previously discovered file systems that are no longer available.
144
CDFS
CD
PROC
PROC
CUST
CUSTOM
You can edit the appropriate Token in the agent configuration variable to add, delete, or modify file system types for any of these classes. For example, you can add AUTOFS to the variable defining NFS file system types: /UNIX/FILESYSTEM/NFSTokens. This would cause the FILESYSTEM.km to treat file systems with type=AUTOFS as an NFS file system, which, in turn, would result in inclusion or exclusion based upon the NFS file system exclusion rule.
145
You must be root to run this command. To perform this task, you must be in developer mode. If you attempt to mount a file system when in operator mode, PATROL displays the following error message in the system output window.
146
Automatic
PATROL uses the file system table to determine where to mount the file system. It prompts you for the password for the root account (shown in Figure 18). This option is available only if the file system has been unmounted. Figure 18 Automatic Mount Dialog Box
Manual NOTE
You can manually mount a file system on Linux, RS6000, OSF1, and HP platforms only. The manual mount option is not available on the Solaris platform.
PATROL prompts you for the device name, where it should enter the file system, and whether or not it should update the file system table (Figure 19). Figure 19 Manual Mount Dialog Box
147
(machine_name:/path)
s
Enter Mounted Onthe path to be assigned to the file system once it is mounted Update Filesystem Tabledetermine whether or not to make a record of this
mount in the file system table; a record in the file system table ensures that the file system will be automatically mounted when the managed system is rebooted
3 Supply the required information for the type of mount that you are performing
and click on Apply. PATROL mounts the file system to your network and writes the result to the system output window.
You must be root to run this command. To perform this task, you must be in developer mode. If you attempt to unmount a file system when in operator mode, PATROL displays the following error message in the system output window.
148
Figure 20
Manual
PATROL prompts you for the mount location (Figure 21), which is the path assigned to a file system once it has been mounted. Figure 21 Manual Unmount Dialog Box
3 Supply the required information for the type of dismount that you are performing
and click Apply. PATROL unmounts the file system from your network and writes the result to the system output window.
149
You can search for files using a different user name and password from the one under which PATROL is running. You can search for files based upon naming convention owner group change date
You can restrict searches to one or multiple physical disks a location or directory within a file system
3 Type the user name and password and click OK. If you want to use the account
under which the PATROL Agent is currently running, leave both fields blank. PATROL displays the Find Files Like dialog box (Figure 22 on page 151).
150
Figure 22
4 Define the search criteria. The search is a logical AND operation that returns only
files that match all the criteria defined by the following fields. Field
File Name
Description the regular expression pattern for one or more files For more information, see CRegular Expressions on page 407. Leave this field blank to search for any file name.
the owner of the file(s) the group to which the owner of the file(s) belongs current date
File Updated in Last n Days the period in days between the change date and the Limit to one physical disk
restrict the operation to the disk drive on which the file system is mounted
5 Click Find.
PATROL builds a search expression, searches the file system for files that match the criteria, and writes the results to a PATROL task object (Find Files Like) in the FILESYSTEM container.
151
6 Access the Find Files Like task object as described in Accessing KM Commands
and InfoBoxes on page 402 and view the results. Your results should resemble this example:
Begin: find /home/Begin: find /home/3Supvr/patrol_console_cache -name disc* -xdev -exec ls -ld {} \; -rw-r--r-1 Begin: find /home/3Supvr/patrol_console_cache -name disc* -xdev -exec ls -ld {} \; -rw-r--r-1 Begin: find /home/3Supvr/patrol_console_cache -name disc* -xdev -exec ls -ld {} \; -rw-r--r-1 Begin: find /home/3Supvr/patrol_console_cache -name disc* -xdev -exec ls -ld {} \; -rw-r--r-1 3Supvr dev 927 May 4 14:39 /home/3Supvr/patrol_console_cache/disc-1.idx -rw-r--r-1 3Supvr dev 648 May 4 14:39 /home/3Supvr/patrol_console_cache/disc-1.dat -rw-r--r-1 3Supvr dev 829 May 3 13:54 /home/3Supvr/patrol_console_cache/disc_idx-1.idx -rw-r--r-1 3Supvr dev 0 May 3 13:54 /home/3Supvr/patrol_console_cache/disc_idx-1.dat -rw-r--r-1 3Supvr dev 12 May 3 13:55 /home/3Supvr/patrol_console_cache/disc_idx-1
Output Format
The output has the following format. Table 31 defines each expression.
Begin: find /path -name <text*?> -xdev/-mount -exec <ls> -ld {} \; -rw-r--r-- # <username> <group> ### MMM DD hh:mm <path>/<file_name.ext> -------------------- >>>>> DONE <<<<< --------------------
Table 31 Output
Find Files Like Command Output Format Description find command starting point for search file name pattern search for files that reside only on the same file system as path; xdev works only on Solaris and some BSD systems list the contents of the specified directory options for the ls command: -l long format listing, -d list only the directory names and not its contents argument that substitutes current file
Search Expression Begin: find /path - name <text?*> - xdev/-mount -exec ls -ld {}
152
Table 31 Output
Find Files Like Command Output Format Description file permissions number of links to the file owner of the file group of owner size in bytes date-time stamp path and file name end of file list
List of Files -rw-r--r-# username dev ### MMM DD hh:mm location -- >>> DONE <<< --
Removing Files
This task describes how to delete files based upon different file characteristics. With this FILESYSTEM application command, you specify where the file is located in the file system and to define file search criteria. It then builds the search and delete expression. This command returns the search and remove expression.
You can search for files using a different user name and password from the one under which PATROL is running. You can search for and remove files based upon naming convention owner group change date
You can restrict search and remove operations to one or multiple physical disks a location/directory within a file system
153
To Remove Files
On the file system for which you want to remove files, perform the following steps.
3 Type the user name and password and click OK. If you want to use the account
under which the PATROL Agent is currently running, leave both fields blank. PATROL displays the Remove Files Like dialog box (Figure 23). Figure 23 Remove Files Like Dialog Box
154
4 Define the search and remove criteria. The search and remove feature is a logical
AND operation that returns only files that match all the criteria defined by the following fields. Field Name
File Name
Description the regular expression pattern for one or more files For more information, see CRegular Expressions on page 407. Leave this field blank to search for any file name.
the owner of the file(s) the group to which the owner of the file(s) belongs current date
File Updated in Last n Days the period in days between the change date and the Limit to one physical disk
restrict the search to the disk drive on which the file system is mounted
5 Click Find.
PATROL builds a search and remove expression, searches the file system for files that match the criteria, removes the files, and writes the search and remove expression to a PATROL task object (Remove Files Like) in the FILESYSTEM container.
155
Output Format
The output has the following format. Table 32 defines each expression.
Begin: find </path> -name <text?*> -xdev -exec rm {} \; -------------------- >>>>> DONE <<<<< --------------------
Table 32 Output
Remove Files Like Command Output Format Description find command starting point for search file name pattern search for files that reside only on the same file system as path; xdev works only on Solaris and some BSD systems run the Unix OS command remove options for the ls command: -l long format listing, -d list only the directory names and not its contents argument that substitutes current file end of search and remove output
Search Expression Begin: find /path - name <text?*> - xdev/-mount -exec rm -ld {} -- >>> DONE <<< --
156
Chapter
9
158 158 159 159 160
157
Introduction
Introduction
The HEALTH AT A GLANCE application monitors the
s s s
overall CPU usage of the system overall file system usage of the system overall virtual memory of the system
Object Hierarchy
The HEALTH AT A GLANCE application class contains parameters on system-wide CPU, file system, and virtual memory usage. Figure 24 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 24 HEALTH AT A GLANCE Application Object Hierarchy
OS container
UNIX OS
Application class
Parameters
158
HEALTH AT A GLANCE
HEALTH AT A GLANCE
The HEALTH AT A GLANCE application class enables you to monitor the overall health of the system. By reviewing the information provided by the HAAG parameters, you should be able to determine if your system is healthy or not. The HEALTH AT A GLANCE tasks are described in detail on the following pages: Task Viewing the Overall CPU, File System, and Swap Usage Viewing the Overall Health Page 159 160
To View the Systems Overall CPU, File System, and Swap Usage 1 Access the HEALTH AT A GLANCE application class so that you can view its
parameters.
2 Open the parameter that records the type of system information you want to view.
Field Name HAAGCpuUsage HAAGFileSystemUsage HAAGSwapUsage Description displays whether or not the systems overall CPU usage is satisfactory displays whether or not the systems overall file system usage is satisfactory displays whether or not the systems overall swap space usage is satisfactory
PATROL displays a graph that shows the requested information over time.
159
HEALTH AT A GLANCE
To View the Systems Overall Health 1 Access the HEALTH AT A GLANCE application class so that you can view its
parameters.
OK OK WARN ALARM
160
Chapter
10
162 163 163 164 166 167 167 168 170 171 171 172 172
10
161
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux monitors and manages memory through two applications: MEMORY and SWAP.
s
The MEMORY application monitors such memory activity as number of active virtual pages number of pages anticipated number of pages freed per second number of pages in and out per second number of pages scanned per second
The MEMORY application also manages shared-memory segments and semaphores. The SWAP application monitors virtual memory. It provides the following information for the entire system and for each swap area. amount of disk space reserved for swap amount of swap space used percentage of swap space used
162
OS container
UNIX OS
Shared Memory
The MEMORY application class enables you to manage shared-memory segments. With this feature, you can view which segments are shared and who owns them. You can also delete shared segments. The tasks related to shared memory are described in detail on the following pages: Task Viewing Shared-Memory Segments Deleting a Shared-Memory Segment Page 164 166
163
Shared Memory
To View Shared-Memory Segments 1 Access the MEMORY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Access the List Shared Memory Segments task object as described in Accessing
KM Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
IPC status from <running system> as of Tue May 8 HH:MM:SS CDT CCYY T ID KEY MODE OWNER GROUP Shared Memory: m 101 0x1038f476 --rw-rw-rw3supr admin m 102 0x4130f478 --rw-rw-rwNight1 shift m 7703 0x4140f47b --rw-rw-rwbsmith HR_VA m 104 0x4109f479 --rw-rw-rwljohns ACCTG m 205 0x4111f37a --rw-rw-rwvpatel IS_TX m 106 0x4122f52c --rw-rw-rwvpatel IS_TX m 207 0x4103f47e --rw-rw-rwjocruz admin m 908 0x4777f47f --rw-rw-rwodella DISTB -------------------- >>>>> DONE <<<<< --------------------
Output Format
The output has the following format. Table 33 on page 165 defines each expression.
IPC status from <running system> as of Tue May 8 HH:MM:SS CDT CCYY T ID KEY MODE OWNER GROUP Shared Memory: m 101 0x1038f476 --rw-rw-rwuname gname -------------------- >>>>> DONE <<<<< --------------------
164
Shared Memory
Table 33 Field T
List of Shared-Segment Command Output Format Description type of facility qmessage queue mshared-memory segment ssemaphore
ID KEY MODE
the facility entry identifier the key that is used as an argument by various functions [msgget( ), semget( ), and shmget( )] to create the facility entry the facility accesses modes and flags It consists of 11 characters. The first 2 characters are Ra process is waiting on msgrc(2) Sa process is waiting on a msgsnd(2) Dthe shared-memory segment is scheduled to be removed (it will disappear when the last process attached to it detaches) Cshared-memory segment is cleared when the first attach is executed - flag not set The next 9 characters are Unix permissions: owner (first 3), group (second 3), other (third 3). Permissions are rread wwrite aalter - no permission granted
OWNER
the login name of the owner of the facility entry This name identifies the owner of the process that allocated the shared-memory segment.
GROUP
165
Shared Memory
To Delete Shared-memory Segments 1 Access the MEMORY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the numeric ID in the Memory Segment ID field and click either Apply or
Apply To Selected.
PATROL prompts you for a user name and password (Figure 27). Figure 27 Remove Shared Memory Segment Confirmation Dialog Box
166
Semaphores
4 Enter the user name and password of the owner of the shared segment or an
account with privileges to delete it and click OK. PATROL writes a confirmation message to a task window.
Remove shared memory segments --------------- >>>>> DONE <<<<< ---------------
Semaphores
The MEMORY application class enables you to manage semaphores in the same way you manage shared-memory segments. With this feature, you can view which semaphores have been created and who owns them. You can also delete semaphores. The semaphore management tasks are described in detail on the following pages: Task Viewing Semaphore Information Deleting a Semaphore Page 167 168
167
Semaphores
Output Format
The output has the following format. For a description of the content, see Table 33 on page 165.
IPC status from <running system> as of DAY MON DD HH:MM:SS CDT CCYY T KEY MODE OWNER GROUP Semaphores: s 0x1038f476 --ra-ra-rauname gname -------------------- >>>>> DONE <<<<< --------------------
Deleting a Semaphore
This task describes how to delete a specified semaphore based on its numeric ID, which can be discovered through the task, Viewing Semaphore Information on page 167.
168
Semaphores
3 Type the numeric ID in the Semaphore ID field and click either Apply or Apply To
Selected.
PATROL prompts you for a user name and password (Figure 29). Figure 29 Remove Semaphores Confirmation Dialog Box
4 Enter the user name and password of the owner of the semaphore or an account
with privileges to delete it and click OK. PATROL writes a confirmation message to a task window.
Remove semaphores --------------- >>>>> DONE <<<<< ---------------
169
170
Virtual Memory
Virtual Memory
The SWAP application class enables you to monitor virtual memory. With this feature, you can view how much disk space is available for swapping and how much is currently used for swapping. The SWAP tasks are described in detail on the following pages: Task Viewing the Amount of Swap Space Viewing the Swap Partition Size Viewing the Percentage of Used Swap Space Page 171 172 172
To View the Amount of Swap Space in a Swap Area 1 Access the swap area instance in the SWAP application class so that you can view
its parameters.
To View the Amount of Total Swap Space on the System 1 Access the Summary instance in the SWAP application class so that you can view
its parameters.
171
Virtual Memory
To View the Swap Partition Size in a Swap Area 1 Access the swap area instance in the SWAP application class so that you can view
its parameters.
To View the Percentage of Swap Space Used in a Swap Area 1 Access the swap area instance in the SWAP application class so that you can view
its parameters.
To View the Percentage of the Total Swap Space Used on the System 1 Access the Summary instance in the SWAP application class so that you can view
its parameters.
172
Chapter
11
11
NOTE
At installation, the NETWORK application class is set to inactive. To enable it to collect data for its parameters, see Activating the NETWORK Application Class on page 176. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Activating the NETWORK Application Class. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deactivating the NETWORK Application Class. . . . . . . . . . . . . . . . . . . . . . . . . . . Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing a Network Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovering the Name of the Network Interface . . . . . . . . . . . . . . . . . . . . . . . . . . Establishing Behavior When Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Memory Buffer Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Network Addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Listing Host and IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Listing Protocols Running on the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Protocol Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining the Network Internet Protocol Address . . . . . . . . . . . . . . . . . . . . . . Network Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Routing Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Determining the Number of Packets Entering and Exiting the Network . . . . . . Determining the Number of Packet Errors Entering and Exiting the Network. Network Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Listing TCP/IP Services Running on the Network . . . . . . . . . . . . . . . . . . . . . . . . Listing Trusted Hosts on the Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Copying or Transferring Files by Using FTP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Checking for a Network Resource by Using ping . . . . . . . . . . . . . . . . . . . . . . . . . 174 175 176 176 177 177 178 179 180 181 184 184 187 189 189 191 191 192 192 194 194 196 196 198 198 199
Chapter 11
173
Introduction
Logging In Remotely by Using rlogin. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Querying the Name Server for the Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Address Resolution Protocol (ARP). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Viewing the Address Resolution Protocol (ARP) Cache . . . . . . . . . . . . . . . . . . . . 202 Deleting a Host from the ARP Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Adding a Host to the ARP Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Unix to Unix Communication Protocol (UUCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Checking for UUCP Support Files and Directories. . . . . . . . . . . . . . . . . . . . . . . . . 206 Cleaning Up UUCP Files in the Spool Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Copying Files Using UUCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Listing All UUCP Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Viewing the UUCP Log File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Viewing UUCP Statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Introduction
The NETWORK application monitors the network for information on
s
interfaces names of all or individual networks memory buffer addresses local and remote addresses host name and corresponding IP Address protocols available protocols protocol statistics traffic routing tables number of incoming and outgoing packets percentage of incoming and outgoing packets with errors
This application also lets you manage the network by providing you with some standard network utilities, which are accessible from within PATROL. Such management tasks include
s s s s s
copying or transferring files using either ftp or UUCP logging into remote machines using rlogin checking the availability of network resources using ping querying the network name server adding and deleting hosts from the Address Resolution Protocol cache
174
Object Hierarchy
Object Hierarchy
The NETWORK application class contains the instances for networks that are being monitored. Each network instance contains parameters that gather information on packet traffic in and out of the network, on collisions, and on the percentage of errors in and out of the network. Figure 31 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 31 NETWORK Application Object Hierarchy
OS container
UNIX OS
Application class
Instances
Parameters
Chapter 11
175
Network Activation
Network Activation
The NETWORK application and its corresponding collector, NETColl, are installed in an inactive state. They do not automatically gather information when loaded. The NETWORK tasks related to activating and deactivating the NETWORK application class and NETColl collector parameter are described in detail on the following pages: Task Activating the NETWORK Application Class Deactivating the NETWORK Application Class Page 176 177
WARNING
Use the same method to activate and deactivate application classes and their respective collectors. For example, if you use another method to deactivate the NETWORK application class (such as customizing it with a PATROL Console in developer mode), attempting to activate it with the menu command, Knowledge Module Admin => NETWORK Application => Activate Monitoring, will fail.
To Activate the NETWORK Application Class 1 Access the UNIX OS application KM menu commands as described in Accessing
KM Commands and InfoBoxes on page 402.
2 Select Knowledge Module Admin => NETWORK Application => Activate Monitoring.
PATROL begins collecting data for the NETWORK application class.
176
Network Interface
To Deactivate the NETWORK Application Class 1 Access the UNIX OS application KM menu commands as described in Accessing
KM Commands and InfoBoxes on page 402.
Network Interface
The NETWORK application class enables you to view a list of network interfaces available to you, discover the name of individual network interfaces, and get a report on the networks memory buffer. You also can define the behavior of PATROL when a network interface is unavailable. The NETWORK tasks related to the network interface are described in detail on the following pages: Task Viewing a Network Interface Discovering the Name of the Network Interface Establishing Behavior When Unavailable Viewing Memory Buffer Information Page 178 179 180 181
Chapter 11
177
Network Interface
To View a Network Interface 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
178
Network Interface
Output Format
The output has the following format. Table 34 defines each field.
Name Mtu Net/Dest Address Ipkts Ierrs Opkts Oerrs Collis Queue
List Network Interface Command Output Format Description name of the interface maximum transmission unit also known as the maximum packet size network to which the interface is attached For Point-to-Point interfaces, this is the address on the other side of the link. address for each interface number of incoming packets number of incoming packets with errors number of outgoing packets number of outgoing packets with errors number of collisions length of the queue
Chapter 11
179
Network Interface
Figure 32
NETWORK InfoBox
180
Network Interface
To Establish Network Interface Behavior 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Set Alarm
Set Alarm if the network is down
NOTE
To reset the NETWORK to its previous behavior, repeat this procedure.
To View Memory Buffer Information 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
181
Network Interface
1439 Kbytes allocated for streams data -------------------- >>>>> DONE <<<<< --------------------
182
Network Interface
Output Format
The output has the following format. Table 35 defines each field. streams 291 320 333447 0 queues 824 858 869663 0 mblk 1725 3683 448272 0 dblk 1722 3760 74204701 0 linkblk 12 169 55 0 strevent 10 169 554502 0 syncq 25 50 745 0 qband 2 127 2 0 -------------------- >>>>> DONE <<<<< -------------------Table 35 Field streams queues mblk dblk linkblk strevent syncq qband List Memory Buffer Command Output Format Description streams queues allocated streams message block headers data blocks link blocks structures stream events number of messages number of streams queue flow control information structures
Chapter 11
183
Network Addresses
Network Addresses
The NETWORK application class enables you to view both the local and remote addresses for networked resources. It also provides a list of host names for each resource and its corresponding IP address. The NETWORK tasks related to network addresses are described in detail on the following pages: Task Viewing Network Addresses Listing Host and IP Address Page 184 187
To View Network Addresses 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
184
Network Addresses
Swind Send-Q Rwind Recv-Q ----- ------ ----- -----32768 0 32768 0 32768 0 32768 0 32768 0 32768 0 32768 0 32768 0
Active UNIX domain sockets Address Type Vnode Conn Local Addr Remote Addr 30000b8fa08 stream-ord 30000a3d6e8 00000000 /tmp/.X11-unix/X0 30000b8fba8 stream-ord 00000000 00000000 30000b8fd48 stream-ord 30000b5a7f8 00000000 /tmp/jd_sockV6
Output Format
The output has the following format. Table 36 defines each field.
TCP: IPv4 Local Address Remote Address ... Active UNIX domain sockets Address Type Vnode Conn
State
Local Addr
Remote Addr
List Network Addresses Command Output Format (Part 1 of 3) Description the version of TCP/IP local address expressed as a number remote address expressed as a number size of the send window in bytes the count of bytes not acknowledged by the remote host size of the receive window in bytes the count of bytes not copied by the user program connected to this socket
Chapter 11 Monitoring and Managing Networks 185
Network Addresses
List Network Addresses Command Output Format (Part 2 of 3) Description internal state of the socket ESTABLISHEDestablished connection SYN_SENTactively attempting to establish a connection SYN_RECVbeing initialized. FIN_WAIT1closed, and the connection is shutting down FIN_WAIT2closed, and the socket is waiting for a shutdown from the remote end TIME_WAITwaiting after close for remote shutdown retransmission CLOSEDnot being used CLOSE_WAITthe remote end has shut down, waiting for the socket to close LAST_ACKthe remote end shut down, the socket is closed, and waiting for acknowledgement LISTENlistening for incoming connections CLOSINGboth sockets are shut down but all the data sent has not been sent UNKNOWNstate is unknown
186
Network Addresses
List Network Addresses Command Output Format (Part 3 of 3) Description types of socket (values vary based on platform for instance stream may be represented as SOCKET_STREAM on Linux and Stream_ord on Solaris)
s
s s s s s s
dgramthe socket is used in Datagram (connectionless) mode streama stream (connection) socket rawa raw socket rdmserves reliably-delivered messages seqpacketa sequential packet socket packeta RAW interface access socket unknownunable to identify socket type
virtual node connection type the local hostname and port number of the socket remote address
To List Host and IP Addresses 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
187
Network Addresses
3 Access the List Hosts task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### dyn2280234 1D IN dyn2280235 1D IN dyn2280236 1D IN dyn2280237 1D IN dyn2280238 1D IN --------------- >>>>> DONE <<<<<
A A A A A ---------------
Output Format
The output has the following format. Table 37 defines each field.
hostname 1D IN A -------------------- >>>>> DONE <<<<< -------------------IP Address
List Hosts Command Output Format Description the hosts alias information from the NIS map ip address
IP Address
188
Network Protocol
Network Protocol
The NETWORK application class enables you to discover which protocols are currently running on the network and view protocol-specific statistics, such as the number of incoming datagrams for UDP, the number of failed attempts for TCP, and incoming deliveries for IPV4. It also provides you the ability to view the IP Address of an individual host. The NETWORK tasks related to network protocols are described in detail on the following pages: Task Listing Protocols Running on the Network Viewing Protocol Statistics Determining the Network Internet Protocol Address Page 189 191 191
To List Network Protocols 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
189
Network Protocol
RDP XNS-IDP HMP UDP PUP EGP TCP GGP IGMP ICMP IP
# # # # # # # # # # #
"reliable datagram" protocol Xerox NS IDP host monitoring protocol user datagram protocol PARC universal packet protocol exterior gateway protocol transmission control protocol gateway-gateway protocol internet group management protocol internet control message protocol internet protocol, pseudo protocol number
Output Format
The output has the following format. Table 38 defines each field.
pt port PT comment -------------------- >>>>> DONE <<<<< --------------------
List Protocols Command Output Format Description protocol the port number on which the protocol is running protocol description of the protocol
190
Network Protocol
To View Protocol Statistics 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
191
Network Traffic
Network Traffic
The NETWORK application class enables you to view the network routing table. It also provides statistics on the volume of packet traffic going into and coming out of the network and gives the percentage of those packets that contain errors. The NETWORK tasks related to network traffic are described in detail on the following pages: Task Viewing the Routing Table Determining the Number of Packet Errors Entering and Exiting the Network Page 192 194
Determining the Number of Packets Entering and Exiting the Network 194
To View Routing Table Information 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
192
Network Traffic
lo0
Output Format
The output has the following format. Table 39 defines each field.
Routing Table: IPv4 Destination Gateway Flags Ref Use -------------------------------------- ---- ----###.###.###.### xyz.com UGH 11 11 -------------------- >>>>> DONE <<<<< --------------------
Interface --------hme0
Table 39 Field
List Routing Table Command Output Format Description the destination network the router through which packets are forwarded Uthe router is up Gthe route is to a gateway Hthe destination is a host rather than a network number of active uses per route number of packets sent per route the network interface that the route uses
Chapter 11
193
Network Traffic
To View the Number of Packets Over Time 1 Access a NETWORK application instance so that you can view its parameters. 2 Open the parameter that records the type of packet information that you want to
view. Parameter NETPacketsIn NETPacketsOut Description displays the total number of incoming packets during the sample interval displays the total number of outgoing packets during the sample interval
PATROL displays a graph that shows the requested information over time.
Determining the Number of Packet Errors Entering and Exiting the Network
This task describes how to view the percentage of packets that contain errors. The information is separated into packets coming into and going out of the network. These statistics reflect all packet traffic errors since the system was last rebooted.
194
Network Traffic
To View the Number of Packet Errors Over Time 1 Access a NETWORK application instance so that you can view its parameters. 2 Open the parameter that records the type of packet information that you want to
view. Parameter NETInErrPrc NETOutErrPrc Description displays the percentage of incoming data packets that contain packet format errors displays the percentage of outgoing data packets that contain packet format errors
PATROL displays a graph that shows the requested information over time.
Chapter 11
195
Network Management
Network Management
The NETWORK application class enables you to review some TCP/IP services running on the network, determine which hosts are trusted, and perform some standard network management tasks from within PATROL. These tasks include copying files to remote hosts, checking the availability of resources using ping, logging in remotely, and querying the networks name server. The NETWORK tasks related to network management are described in detail on the following pages: Task Listing TCP/IP Services Running on the Network Listing Trusted Hosts on the Network Copying or Transferring Files by Using FTP Checking for a Network Resource by Using ping Logging In Remotely by Using rlogin Querying the Name Server for the Network Page 196 198 198 199 200 201
To List Services Running on the Network 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
196
Network Management
3 Access the List Services task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results. Your results should resemble this example: # PSL Serial No.: ########## <NOT INTERACTIVE> List TCP/IP services NIS is detected example nbiff qip_qdhcp DAServer pmdmgr new-rwho nntp link ftp uucp name 2010/tcp 1950/udp 1097/tcp 987/tcp 696/tcp 550/udp 119/tcp 87/tcp 21/tcp 540/tcp 42/tcp # test port, Frank Ginac #QIP DHCP Lease Update daemon # SQL distributed access # OpenView Postmaster Manager readnews untp ttylink uucpd nameserver # Network News Transfer Protocol # File Transfer Protocol (Control) # uucp daemon
Output Format
The output has the following format. Table 40 defines each field.
service port/prtcl # comments -------------------- >>>>> DONE <<<<< --------------------
List Services Command Output Format Description the name of the service the assigned port number and communication protocol, which is either UDP or TCP a description of the service or a reference to the individual or group that registered the service
Chapter 11
197
Network Management
To List Services Running on the Network 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
198
Network Management
To Transfer Files to a Remote Computer 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
4 Set the data transfer format by typing either ASCII or bin. 5 Navigate to the desired directory (cd, pwd, ls) and transfer files to (put, mput) or
from (get, mget) the remote computer. The ftp utility provides feedback on the success of each command that you enter.
6 When you are done, type close to disconnect, and then type bye or quit to log off.
PATROL closes the PATROL Ftp dialog box.
To Ping a Remote Computer on the Network 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
199
Network Management
3 Type the computer name in the Enter machine name field and click Apply.
PATROL writes the results to a PATROL task object (Ping) in the NETWORK container.
To Logon a Remote Computer on the Network 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the computer name in the Enter machine name field and click Apply.
PATROL writes the results to a PATROL task object (Rlogin) in the NETWORK container.
200
To Query the Name Server for the Network 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
201
To View the ARP Cache 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select TCP/IP => Utilities => ARP => Show ARP cache.
PATROL writes the results to a PATROL task object (Show ARP Cache) in the NETWORK container.
SM
202
Output Format
The output has the following format. Table 41 defines each field.
Device IP Address Mask ----- -------------------- --------------hme0 meridian.xyz.com 255.255.255.255 Flags ----p Phys Addr --------------01:00:b2:83:8c:5b
Show ARP Cache Command Output Format Description device name assigned to the physical address the numerical address or its text string alias subnet mask Ppublish, includes IP address for the machine and the addresses that have been explicitly added using the Add Host to Cache (arp -s) option Sstatic, not learned for the ARP protocol Uunresolved, waiting for ARP response Mmapping, only used for multicast entry for 224.0.0.0
Phys Address
the physical address, also known as the Machine Access Control (MAC) address
Chapter 11
203
To Delete a Host from the ARP Cache 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select TCP/IP => Utilities => ARP => Delete Host From Cache.
PATROL displays the Delete Host From Cache dialog box (Figure 35). Figure 35 Delete Host from Cache Dialog Box
3 Type the computer name in the Enter host name field and click Apply.
PATROL prompts you for the password for the root account (Figure 36). Figure 36 Delete Host From Cache Confirmation Dialog Box
204
To Add a Host to the ARP Cache 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select TCP/IP => Utilities => ARP => Add Host To Cache.
PATROL displays the Add Host From Cache dialog box (Figure 37). Figure 37 Add Host To Cache Dialog Box
3 Type the computer name in the Enter host name field and click Apply.
PATROL writes the results to the PATROL standard output window. Your results should resemble this example:
CCYYMMDDHHMMSS Add Dallas_email_server to ARP Cache
Chapter 11
205
To Check for UUCP Support Files and Directories 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
206
NOTE
This task is not supported on SOLARIS systems.
To Delete Files in the Spool Directory 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
4 Access the UUCP Clean task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results.
Chapter 11
207
To Copy Files 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Specify what file you want to copy, how you want it copied, and where you want it
copied.
Enter optionsthe copy options control how the copy/transfer is performed, provide for user notification via mail, and provide job statistics as well as debug information
Options Description -c -C -d -f do not copy local file to the spool directory for transfer to a remote machine (default) copy local file to spool directory for transfer make all necessary directories for the file copy (default) do not make intermediate directories for the file copy
208
Options Description -gx assign a service grade, x, which is the priority of the data transfer You must use the uuglist command to determine the appropriate format (single letter, number, or alphanumeric string) for the service grade -j -m -nuser -r -sfile -xn print the uucp job identification string on standard output notify, via mail, the user who initiated the transfer that it is complete notify, via mail, user when the file transfer is complete place the job in the file transfer queue but do not start the transfer send transfer status to file (full pathname) set debug level n (0-9); the higher the number the more detail debug information is provided
Enter sourcethe full pathname of the file to be copied Enter destinationthe full pathname to where you want the file copied; it can
be a file or a directory
4 Click Apply.
PATROL prompts you for the password for the root account.
Chapter 11
209
To List All UUCP Servers 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Access the List Server Name task object as described in Accessing KM Commands
and InfoBoxes on page 402 and view the results.
To Display the UUCP Log File 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Access the Show Log task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results.
210
To Display UUCP Statistics 1 Access the NETWORK application instance menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 11
211
212
Chapter
12
214 214 216 216 217 218 218 219 220
12
213
Introduction
Introduction
Together with TCP/IP, the Network File System (NFS) and the Network Information Service (NIS) construct the network on Unix.
s
In a heterogeneous environment, with NFS you can bind various file systems together, regardless of architecture and operating system. It presents the file system to the network as a uniform file hierarchy. Formerly known as Yellow Pages, NIS provides a distributed lookup service that you can use to locate resources anywhere in the network.
The NFS application class monitors these services and provides a means to gather information about which resources (servers, users, and groups) use or are used by these networking components.
Object Hierarchy
The NFS application class contains several parameters with information about network file system activity. Figure 39 on page 215 illustrates the basic hierarchy but does not necessarily display all instances and parameters.
214
Object Hierarchy
Figure 39
215
To View NFS Servers 1 Access the NFS application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
3 Access the List Servers NFS task object as described in Accessing KM Commands
and InfoBoxes on page 402 and view the results. Your results should resemble this example:
List NFS Server Houston_iv Florida_iii --------------- >>>>> DONE <<<<< ---------------
216
To View NFS Servers 1 Access the NFS application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
217
To View NIS Accounts 1 Access the NFS application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
218
Output Format
The output has the following format. Table 42 defines each field. user name:password:accountid:seq:comments
-------------------- >>>>> DONE <<<<< --------------------
List of NIS Accounts Command Output Format Description encrypted password the account identifier, which has a maximum length of eight characters the index of the account id in the group of valid accounts for the username Zero (0) indicates that the account id is the default account for the user.
To View NIS Groups 1 Access the NFS application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
3 Access the List Groups task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results, which should resemble this example:
houston:*:212:aabaal,mhartma dallas:*:709:ccu,wfictes portland:*:4001:bwinsier,jguaglia montreal:*:1717:attack9,nmelcamp,vware,sgd,bbucca,package,skrishna katmandu:*:111:cstevens bayport:*:222:bayport singapore:*:333:njudd,lvandros,jdean,spamar paris:*:4444:oppp,mduchamp,mmarceau --------------- >>>>> DONE <<<<< ---------------
219
Output Format
The output has the following format. Table 43 defines each field.
group_name:password:###:member_1,member_2,member_X -------------------- >>>>> DONE <<<<< --------------------
Table 43 Field
List of NIS Groups Command Output Format Description name of the NIS group encrypted password The field is represented by an asterisk (*) and is usually left blank. numeric group ID (gid) list of user names of the members granted the privilege of group Members are separated by a comma (,).
To View NIS Servers 1 Access the NFS application menu as described in Accessing KM Commands and
InfoBoxes on page 402.
3 Access the List Servers task object as described in Accessing KM Commands and
InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> Print NIS servers zenith zenith titan titan xanadu xanadu patois patois --------------- >>>>> DONE <<<<< ---------------
220
Output Format
The output has the following format. Table 44 defines each field.
server_name NIS_map_key -------------------- >>>>> DONE <<<<< --------------------
Table 44 Field
List of NIS Groups Command Output Format Description name of the NIS master server or NIS slave server the keys for those maps in which the values are null or the key is not part of the value
server_name NIS_map_key
221
222
Chapter
13
13
NOTE
At installation, the PRINTER application class is set to inactive. To activate the PRINTER application class and collect data for its parameters, see Activating the PRINTER Application Class on page 225. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printer Activation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Activating the PRINTER Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deactivating the PRINTER Application Class . . . . . . . . . . . . . . . . . . . . . . . . . . . . Printers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Excluding a Printer from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting Printers to Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Number of Print Jobs in a Printers Queue . . . . . . . . . . . . . . . . . . . . Stopping a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing All Print Jobs Assigned to a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing All Print Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Print Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting All Print Jobs from a Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Moving a Print Job to Another Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Moving All Print Jobs to Another Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Print Queues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stopping a Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting a Print Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 224 225 225 226 226 227 227 228 228 229 231 231 232 233 234 235 236 237 238 239
Chapter 13
223
Introduction
Introduction
The PRINTER application monitors the printers on the system to determine how many jobs are waiting to be processed. It also lets you manage printing functions from within PATROL. Some of the tasks that you can perform are
s s s s
moving print jobs deleting print jobs starting and stopping printers starting and stopping print queues
Object Hierarchy
The PRINTER application class contains an instance for each printer that is being monitored. Each printer instance contains a parameter that monitors the length of its respective print queue. Figure 41 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 41 PRINTERS Application Object Hierarchy
224
Printer Activation
Printer Activation
The PRINTER application and its corresponding collector, PRINTERColl, are installed in an inactive state. They do not automatically gather information when loaded. The PRINTER tasks related to activating and deactivating the PRINTER application class and PRINTERColl collector parameter are described in detail on the following pages: Task Activating the PRINTER Application Class Deactivating the PRINTER Application Class Page 225 226
WARNING
Use the same method to activate and deactivate application classes and their respective collectors. For example, if you use another method to deactivate the PRINTER application class (such as customizing it with a PATROL Console in developer mode), attempting to activate it with the menu command, Knowledge Module Admin => PRINTER Application => Activate Monitoring, will fail.
To Activate the PRINTER Application Class 1 Access the UNIX OS application KM menu commands as described in Accessing
KM Commands and InfoBoxes on page 402.
2 Select Knowledge Module Admin => PRINTER Application => Activate Monitoring.
PATROL begins collecting data for the PRINTER application class.
Chapter 13
225
Printers
To Deactivate the PRINTER Application Class 1 Access the UNIX OS application KM menu commands as described in Accessing
KM Commands and InfoBoxes on page 402.
2 Select Knowledge Module Admin => PRINTER Application => Deactivate Monitoring.
PATROL quits collecting data for the PRINTER application class.
Printers
The PRINTER application class enables you to monitor and manage individual printers. By default, PATROL monitors all printers on the system. The PRINTER tasks related to printers are described in detail on the following pages: Task Excluding a Printer from Monitoring Selecting Printers to Monitor Viewing the Number of Print Jobs in a Printers Queue Stopping a Printer Starting a Printer Page 227 227 228 228 229
226
Printers
By default, the PRINTER application class is inactive. Once you activate the PRINTER application class and collector, PATROL monitors all printers. The exclusion list feature supports regular expressions. To stop monitoring large numbers of printers that have uniform names, use regular expressions. To perform this task, you must be in developer mode. If you attempt to stop monitoring a printer when in operator mode, PATROL displays the following error message in the system output window.
Chapter 13
227
Printers
3 In the Monitored Printers list box, select the name of the printer that you want to
exclude from monitoring.
4 Click the right arrow to move the printer into the Exclued Printers list box 5 Click Apply.
PATROL adds the printer to the list of excluded printers and then removes the printer icon from the PATROL Object Hierarchy.
6 Repeat step 3 through step 5 for each printer that you want to exclude.
To View the Total Number of Print Jobs in a Printer Queue 1 Access the PRINTER application so that you can view its parameters. 2 Open the PRNQLength parameter.
PATROL displays a gauge that shows the number of print jobs assigned to the printers queue.
Stopping a Printer
This task describes how to disable a selected printer so that the printer cannot process print jobs.
228
Printers
You must be root to run this command. Because the print manager will continue to add print jobs to the print queue while the printer is unavailable, use this command only if the printer will be unavailable for a short time. If the printer will be unavailable for long periods of time, stop the printers queue. For more information on this task, see Stopping a Print Queue on page 238 command.
To Stop a Printer
On the printer that you want to stop so that it cannot process any more print jobs, perform the following steps.
If the print queue is enabled when you stop the printer, PATROL changes the state of the PRINTER instance to ALARM. If the print queue is disabled or stopped when you stop the printer, PATROL changes the state of the PRINTER instance to OFFLINE.
PATROL changes the printer icon to OFFLINE. To restart the printer from within PATROL, see Starting a Printer on page 229.
Starting a Printer
This task describes how to enable a selected printer so that the printer can process print jobs.
You must be root to run this command. Make sure that the print queue associated with this printer is running.
Chapter 13
229
Printers
To Start a Printer
On the printer that you want to start, perform the following steps.
If the print queue is enabled or started when you start the printer, PATROL changes the state of the PRINTER instance to OK. If the print queue is disabled or stopped when you start the printer, PATROL changes the state of the PRINTER instance to WARN.
PATROL changes the printer icon to OK and the printer begins processing any jobs that have collected in its queue. To stop the printer from within PATROL, see Stopping a Printer on page 228.
230
Print Jobs
Print Jobs
The PRINTER application class enables you to monitor and manage print jobs. With this feature, you can delete and move print jobs from busy or out-of-service printers. The tasks related to print jobs are described in detail on the following pages: Task Viewing All Print Jobs Assigned to a Printer Viewing All Print Jobs Deleting a Print Job Deleting All Print Jobs from a Printer Moving a Print Job to Another Printer Moving All Print Jobs to Another Printer Page 231 232 233 234 235 236
To view a list of all print jobs owned by a particular user, see Viewing Print Jobs that Belong to a User on page 375. To view a list of all print jobs assigned to a printer, see Viewing All Print Jobs on page 232
3 Access the List Print Jobs task object as described in Accessing KM Commands
and InfoBoxes on page 402 and view the results.
Chapter 13 Monitoring and Managing Printers 231
Print Jobs
To view a list of all print jobs owned by a particular user, see Accessing KM Commands and InfoBoxes on page 402. To view a list of all print jobs assigned to a printer, see Viewing All Print Jobs Assigned to a Printer on page 231
3 Access the List All Print Jobs task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
Display printer job list for all printer(s) lp4-0 lysander!root 182 lp4-3 wenchell!tmavis 4182 Epson2-1 logger!dpatel 3750 Epson2-3 sandhill!whill 005 Epson3-5 hp-dev!jjjones 7431 --------------------- >>>>> DONE <<<<< MMM DD MM:SS MMM DD MM:SS MMM DD MM:SS MMM DD MM:SS MMM DD MM:SS ---------------------
Output Format
The output has the following format. Table 45 on page 233 defines each field.
printer-# system_name!user job_# MMM DD MM:SS
232
Print Jobs
View All Print Jobs Command Output Format Description the printer to which the job is assigned and its position in the print queue
system_name!user the name of the system from which the print job originated and the user who created it The exclamation point (!) is a delimiter. job_# MMM DD MM:SS the print job ID number the time at which the print job was created
You must be root to run this command. To perform this task, you must be in developer mode. If you attempt to stop monitoring a printer when in operator mode, PATROL displays the following error message in the system output window.
Chapter 13
233
Print Jobs
3 Type the print job number in the Enter Job ID field and click on Apply. To learn the
number of a print job, see Viewing All Print Jobs on page 232. PATROL prompts you for the password for the root account.
234
Print Jobs
3 Type the print job number in the Enter Job Id field. To learn the number of a print
job, see Viewing All Print Jobs on page 232.
Chapter 13
235
Print Jobs
4 Type the name of the printer to which you want to move the job and click Apply.
PATROL prompts you for the password for the root account (Figure 45). Figure 45 Move Jobs To Another Printer Confirmation Dialog Box
236
Print Queues
3 Type in the Enter New Destination field the name of the printer to which you want
to move the job and click Apply. PATROL prompts you for the password for the root account (Figure 47). Figure 47 Move Jobs To Another Printer Confirmation Dialog Box
Print Queues
The PRINTER application class enables you to monitor and manage print queues. With this feature, you can start and stop queues so that the system print manager will not assign print jobs to printers that are down. The PRINTER tasks related to print queues are described in detail on the following pages: Task Stopping a Print Queue Starting a Print Queue Page 238 239
Chapter 13
237
Print Queues
You must be root to run this command. Use this command if the printer will be unavailable for long periods of time. If the printer will only be unavailable for a short period of time, stop the printer. For more information on this task, see Stopping a Printer on page 228 command. You can also disable spooling to this printer.
If the printer is enabled or online when you stop the print queue, PATROL changes the state of the PRINTER instance to WARN. If the printer is disabled or stopped when you stop the print queue, PATROL changes the state of the PRINTER instance to OFFLINE.
To restart the print queue from within PATROL, see Starting a Print Queue on page 239.
238
Print Queues
If the printer is enabled or online when you start the print queue, PATROL changes the state of the PRINTER instance to OK. If the printer is disabled or stopped when you start the print queue, PATROL changes the state of the PRINTER instance to ALARM.
To stop a print queue from within PATROL, see Stopping a Print Queue on page 238.
Chapter 13
239
Print Queues
240
Chapter
14
14
Monitoring Processes
The PATROL Knowledge Module for Unix and Linux gives you the ability to monitor and manage processes on a system. The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Configuring Multiple Instances of a Process for Monitoring . . . . . . . . . . . . . . . . 247 Configuring a Process to Alarm When the Number of Running Instances Exceeds a Set Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Configuring a Process to Alarm When the Number of Running Instances Falls Below a Set Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Configuring a Process to Restart When PATROL Detects It Has Stopped. . . . . 256 Configuring a Process to Stop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring a Process to Alarm When Its Parent Process ID (PPID) is Not 1 . . 262 Configuring a Process to Alarm When It is Owned by an Unauthorized User . 265 Configuring a Process to Suspend Its Alert for N Cycles if Patrol Detects It is Not Running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Modifying the Configuration of a Monitored Process . . . . . . . . . . . . . . . . . . . . . . 270 Monitoring Process Presence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Deleting a Monitored Process from the Monitoring Queue . . . . . . . . . . . . . . . . . 278 Specifying a Flag File Directory for Process Presence Blackout Periods. . . . . . . 278 Suspending Process Monitoring for a Process Instance . . . . . . . . . . . . . . . . . . . . 280 Resuming Process Monitoring for a Process Instance . . . . . . . . . . . . . . . . . . . . . . 280 Reporting on a Selected Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 Process Host Groups in a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Rules for Creating Process Host Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 Creating a Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283 Configuring Communication Attributes for a Process Host Group . . . . . . . . . . 284 Modifying Host Attributes within a Process Group . . . . . . . . . . . . . . . . . . . . . . . 285 Removing a Host from a Host Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 Querying a Selected Host within a Process Host Group . . . . . . . . . . . . . . . . . . . . 286 Synchronizing the Local Hosts List to a Selected Hosts List for a Process Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Synchronizing a Selected Hosts List to the Local Host List for a Process Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Viewing the Process List for a Selected Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Chapter 14 Monitoring Processes 241
Synchronizing the Local Processs List with a Selected Process's List . . . . . . . . . 289 Synchronizing a Selected Process's List with the Local Process's List . . . . . . . . . 290 Viewing the Process Presence List for a Selected Process . . . . . . . . . . . . . . . . . . . 291 Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Viewing the Number of Zombie Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Viewing Zombie Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Viewing the Total Number of Processes Running . . . . . . . . . . . . . . . . . . . . . . . . . 295 Viewing Processes that Use Excessive CPU. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 Viewing the Number of Processes Waiting on Resources . . . . . . . . . . . . . . . . . . . 298 Viewing the Total Number of User Processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Viewing the Average Number of User Processes . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Reprioritizing a Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Reprioritizing All Processes in a Process Group . . . . . . . . . . . . . . . . . . . . . . . . . . . 301 Reprioritizing All Processes Owned by a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Plug-in Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Configuring the Process KM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
242
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux monitors and manages processes through the PROCESS and PROCESS_PRESENCE applications and the Process KM Configuration Plug-in for the PATROL Configuration Manager (PCM). With these application classes, you can
s s
designate specific processes for monitoring review the overall status of processes on the system such as total number of processes total number of zombie processes list of all zombie processes list of all processes consuming excessive CPU total number of processes waiting for resources total number of user (nonroot) processes average number of processes per user reprioritize process by individual process user ownership process group membership
a single process on a single computer a local process across multiple computers within a process host group (this feature is helpful when you are monitoring processes in a clustered environment) several running instances of a process on a single computer several running instances of a process across multiple computers within a process host group (this feature is helpful when you are monitoring processes in a clustered environment)
restart a process that has stopped stop a process alarm when an unauthorized User ID owns a process alarm when the number of processes running in a host group drops below a specified minimum number
Chapter 14 Monitoring Processes 243
Object Hierarchy
alarm when the number of processes running in a host group exceeds a specified maximum number alarm when a process does not have a parent process ID (PPID) of 1 (a PPID of 1 indicates that a process is owned by init)
You can use the plug-in for PCM to configure process monitoring without using a console. See Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux on page 304 for details.
Object Hierarchy
The PROCESS application class contains the PROCESS_PRESENCE application class and process parameters. The PROCESS_PRESENCE application class contains instances for individual processes that are being monitored at your request. Each instance contains parameters with information on the individual processs memory and CPU usage. Figure 48 on page 245 illustrates the basic hierarchy but does not necessarily display all instances and parameters.
244
Object Hierarchy
Figure 48
PROCESS_PRESENCE Instances
PROCESS_PRESENCE Parameters
Chapter 14
Monitoring Processes
245
Processes
Processes
The PROCESS application class monitors processes on the operating system level by default and provides general information, such as averages and totals, for all processes running on a managed system. This feature enables you to designate specific processes for monitoring. The PROCESS tasks that relate to individual processes are described in detail on the following pages: Task Configuring Multiple Instances of a Process for Monitoring Configuring a Process to Alarm When the Number of Running Instances Exceeds a Set Limit Configuring a Process to Alarm When the Number of Running Instances Falls Below a Set Limit Configuring a Process to Restart When PATROL Detects It Has Stopped Configuring a Process to Stop Configuring a Process to Alarm When It is Owned by an Unauthorized User Page 247 250 253 256 259 265
Configuring a Process to Alarm When Its Parent Process ID (PPID) is Not 1 262
Configuring a Process to Suspend Its Alert for N Cycles if Patrol Detects It is 268 Not Running Modifying the Configuration of a Monitored Process Monitoring Process Presence Deleting a Monitored Process from the Monitoring Queue Specifying a Flag File Directory for Process Presence Blackout Periods Suspending Process Monitoring for a Process Instance Resuming Process Monitoring for a Process Instance Reporting on a Selected Process 270 274 278 278 280 280 280
246
Processes
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. To monitor multiple instances of the same process, this value must be set to 2 or above. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
Chapter 14
Monitoring Processes
247
Processes
step 9 through step 18 are optional when you are configuring multiple instances of a process for monitoring. If you do not want to set values for the fields as indicated in these steps, you do not have to.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
14 In the Stop Command field, type the command string that will stop the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
248 PATROL Knowledge Module for Unix User Guide
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
Chapter 14
Monitoring Processes
249
Processes
Configuring a Process to Alarm When the Number of Running Instances Exceeds a Set Limit
This task describes how to configure PATROL to alarm when the number of running instances for a process exceeds a set limit.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Blackout field, enter a blackout beginning and ending time (use 24-hour
time).
6 In the Process Instance Label field, type a name for the monitored process icon. 7 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous.
8 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. This field is optional.
9 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. You must type a value of 1 or greater in this field in order for PATROL to alarm when the process instance count is exceeded. When the number of running process instances exceeds the value you type in this field, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
250
Processes
step 10 through step 19 are optional when you are configuring a process to alarm if the number of running instances exceeds a set limit. If you do not want to set values for the fields as indicated in these steps, you do not have to.
10 In the Acceptable Process Owners field, type the user IDs for the accounts that can
own the process. Separate multiple user IDs with spaces.
11 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
12 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in this dialog box for PATROL to automatically restart a process.
13 In the Execution Attempts field, type a value to set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
14 In the Start Command field, type the command string that will start the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
15 In the Stop Command field, type the command string that will stop the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Stop command.
16 In the Command Execution User Name field, type the user ID under which the
command will be executed.
Chapter 14
Monitoring Processes
251
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
18 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
19 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
20 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
21 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
252
Processes
Configuring a Process to Alarm When the Number of Running Instances Falls Below a Set Limit
This task describes how to configure PATROL to alarm when the number of running instances for a process falls below a set limit.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert. step 8 through step 18 are optional if you are configuring a process to alarm when the number of running instances falls below a set limit. If you do not want to set values for the fields as indicated in these steps, you do not have to.
Chapter 14
Monitoring Processes
253
Processes
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
14 In the Stop Command field, type the command string that will stop the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
254
Processes
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
Chapter 14
Monitoring Processes
255
Processes
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
step 7 through step 10 are optional when you are configuring PATROL to restart a process. If you do not want to set values for the fields as indicated in these steps, you do not have to.
256
Processes
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
14 In the Stop Command field, type the command string that will stop the process
instance. This field is optional if you are configuring PATROL to restart a process that has stopped.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
Chapter 14
Monitoring Processes
257
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
258
Processes
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
step 7 through step 13 are optional when you are configuring PATROL to stop a process. If you do not want to set values for the fields as indicated in these steps, you do not have to.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
Chapter 14
Monitoring Processes
259
Processes
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 Leave the Start Command field blank. 14 In the Stop Command field, type the command string that will stop the process
instance.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
260
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
step 17 and step 18 are optional if you are configuring PATROL to stop a process. If you do not want to set values for the fields as indicated in these steps, you do not have to.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
Chapter 14
Monitoring Processes
261
Processes
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
step 7 through step 9 are optional when you are configuring PATROL to alarm when the PPID for a process is not 1. If you do not want to set values for the fields as indicated in these steps, you do not have to.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
262
Processes
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
14 In the Stop Command field, type the command string that will stop the process
instance.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
Chapter 14
Monitoring Processes
263
Processes
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
264
Processes
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
step 7 and step 8 are optional when you are configuring PATROL to alarm when a process is owned by an unauthorized user. If you do not want to set values for the fields as indicated in these steps, you do not have to.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
Chapter 14
Monitoring Processes
265
Processes
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler. Step 11 through step 18 are optional when you are configuring PATROL to alarm when a process is owned by an unauthorized user. If you do not want to set values for the fields as indicated in these steps, you do not have to.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
14 In the Stop Command field, type the command string that will stop the process
instance.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
266
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
Chapter 14
Monitoring Processes
267
Processes
Configuring a Process to Suspend Its Alert for N Cycles if Patrol Detects It is Not Running
This task describes how to configure a process to suspend its alert for a designated number of cycles when PATROL detects that the process is not running. This feature gives the system time to detect that a process has died and restart the process before PATROL issues an alarm. Delaying an alert also helps by giving the host group time to restart a process that died on an alternate host.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select Add New Process, and click OK.
The Add New Process dialog box is displayed.
5 In the Process Instance Label field, type a name for the monitored process icon. 6 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
step 7 through step 17 are optional when you are configuring PATROL to delay an alert for a process that has died. If you do not want to set values for the fields as indicated in these steps, you do not have to.
7 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. If the number of running process instances falls below the value set in this field, PATROL will issue an alert.
268
Processes
8 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
9 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
10 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
11 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
12 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
13 In the Start Command field, type the command string that will start the process
instance.
14 In the Stop Command field, type the command string that will stop the process
instance.
15 In the Command Execution User Name field, type the user ID under which the
command will be executed.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
16 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
Chapter 14 Monitoring Processes 269
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts.
18 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
19 Select one of the following option buttons to indicate whether PATROL should
monitor the process on one host computer, or across a group of hosts: Option Monitor Only On This Host Monitor Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
20 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
270
Processes
4 In the Process List group box, select the process you want to modify. 5 In the Actions group box, select Modify Selected Process, and click OK.
The Modify Selected Process dialog box is displayed. Use the instructions in step 6 through step 19 to modify the monitoring attributes you would like to change.
6 In the Process Instance Label field, type a name for the monitored process icon. 7 In the Monitored Process String field, type the command or a unique command
string for the process that is being monitored.
NOTE
s
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous. You must specify a single process if you want to use the PATROL feature that allows you to restart a process automatically.
8 In the Minimum Count field, type a value to set the minimum number of process
instances that must be running on the local computer or in the host group. For example, if you want at least three instances of the process to run at all times, type 3 in this field. If the number of running process instances falls below this value, PATROL will issue an alert.
9 In the Maximum Count field, type a value to set the maximum number of process
instances that may be running on the local computer or in the host group. If the number of running process instances exceeds this value, PATROL will issue an alert. The value of the Maximum Count field must be greater than the value of the Minimum Count field.
10 In the Acceptable Process Owners field, type the user IDs for the accounts that may
own the process. Separate multiple user IDs with spaces.
11 Select the Parent Process ID Must Be 1 option button if the parent process ID (PPID)
must be 1. A process with a PPID of 1 is owned by init, or the Unix scheduler.
Chapter 14
Monitoring Processes
271
Processes
12 Select the Restart Automatically option button if you want the KM to automatically
restart a process when it detects that the process count is less than the set minimum. If you select this option button, the KM will attempt to restart the process when it detects that the process instance count has fallen below the specified minimum threshold. The KM uses the value in the Command Execution Attempts field to determine how many times it will try to restart a process.
NOTE
You must specify a start command and a command execution user name in the appropriate fields on this dialog box if you want PATROL to automatically restart a process.
13 In the Execution Attempts field, type a value set the number of times the host will
attempt to run a Start Process or Stop Process command before it stops trying to run the command.
14 In the Start Command field, type the command string that will start the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
15 In the Stop Command field, type the command string that will stop the process
instance.
NOTE
You must specify a command execution user account and password if you want to use the Start command.
16 In the Command Execution User Name field, type the user ID under which the
command will be executed.
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
17 In the Command Execution Password field, type the password for the user ID under
which the command will be executed. You can leave this field blank. The KM will accept a NULL value.
272
Processes
NOTE
You must specify a command execution user account and password if you want to use the Start and Stop commands.
18 In the Alert Delay Count field, type a value to set the number of collection intervals
that this host will defer an alert while it waits for the process count to be reestablished on a host or across a group of hosts. If you delay the alert, the system has time to detect that a process has died and restart it automatically before PATROL issues an alarm.
19 Click the drop-down list button in the Alert State field and select the state change
that will occur when the process count either falls below the minimum threshold or exceeds the maximum threshold and the alert delay count reaches 0. The state change will apply to the following parameters:
s s s
20 From the Monitoring Scope drop-down list, select whether you want PATROL to
monitor the process on one host computer or across a group of hosts: Option Only On This Host Across Host Group Description PATROL will only monitor the process on the selected local host computer. PATROL will monitor the process across a group of host computers. Select this option if you want to monitor a process in a clustered environment.
21 In the Blackout Period fields, enter a beginning and ending blackout time (use
24-hour clock).
22 Click OK.
The dialog box closes, and the Manage List of Monitored Processes dialog box is displayed. The process that you just added to the monitored queue is listed in the Process List group box.
Chapter 14
Monitoring Processes
273
Processes
To define Process Presence entries for PATROL for Unix and Linux 1 Drill down into the PROCESS container instance. 2 Select the PROCESS_PRESENCE icon and right-click to open its menu. 3 Select Manage List of Monitored Processes from the menu. NOTE
If the DCM collector is in use, it can take a while to create the PROCESS instance after which there may be another wait for the PROCESS_PRESENCE container instance to be created. If the PATROL Script Language (PSL) data collector is in use, the PROCESS_PRESENCE container will not be created.
274
Processes
/PUK/PROCCONT/daemonObjectList Created automatically. If deleted, it will be automatically recreated Internal use only. PCM configuration is not recommended. /PUK/PROCPRES/INSTANCE/info Defines individual processes to be monitored. The following instances are created by default: ==> amd, defined by the REGEXP standard (REGEX, bind, cron, sendmail, and ypbind. Mirrors all hosts in the host group if the monitoring scope is across all hosts. When a new instance definition is discovered, a new PROCPRES instance is created and monitoring begins. Before using PCM to apply a configuration change to an existing definition, restart the Patrol Agent to reflect the change. One per instance. PCM configuration is allowed. PUK/Process/Default/Created Created automatically. Internal use only. PCM configuration is not recommended. /UNIX/PROCCONT/processStamp Automatically created when you add a new process using the Manage List of Monitored Processes menu. If deleted, it is not recreated until the next use of Manage List of Monitored Processes to add another new process. Internal use only. PCM configuration is not recommended.
Chapter 14
Monitoring Processes
275
Processes
Table 46 Variable
Variables for Monitoring Process Presence (Part 2 of 2) Description Use of this option involves synchronization of several hosts and incorporates an encrypted password. Created when
s
/UNIX/PROCCONT/nodeList
you choose the Manage Host Group menu option. Defines list of hosts in host group. a host group is established and mirrored on all hosts added to the host group. Must be consistent across all hosts in the Group Host List. If this variable is deleted from one or more of the hosts: It is not automatically recreated. The host will not respond to requests from any of the other hosts in the host group. Attempts to use Synchronize=>Host Group will result in No Response. When a new process is added to one of the other nodes in the Group Host List that has Monitoring Scope set to Across All Hosts, the process definition is mirrored on the host. However, the group host list is not automatically mirrored.
PCM configuration is not recommended. /UNIX/PROCCONT/nodeStamp Created when the Manage Host Group menu option is used to define a host group. Internal use only. PCM configuration not recommended.
276
Processes
Maximum Count Acceptable Process Owners Parent Process ID Must Be 1 Restart Automatically Start Command Stop Command Command Execution User Name Alert Delay Count Alert State Monitoring Scope Blackout Period start Blackout Period end
Command Execution Password blank 1 ALARM (WARN = 1, ALARM = 2) Only on This Host (Only on This Host = 1, Across Host Group = 2) 0 (Hours) 0 (Hours) 0 (Minutes) 0 (Minutes)
You can apply the following example ruleset can by using Patrol Configuration Manager or pconfig to define two processes (newproc1 and newproc2). PATROL_CONFIG "/PUK/PROCPRES/newproc1/info" = { REPLACE = "newproc1^Bnewproc1^B1^B1^B^B2^B2^B5^B^B^B^B^B1^B2^B1^B0^B0^B0^B0" }, "/PUK/PROCPRES/newproc2/info" = { REPLACE = "newproc2^Bnewproc2^B1^B1^B^B2^B2^B5^B^B^B^B^B1^B2^B1^B0^B0^B0^B0" } The field separator is CTRL-B. On a Unix system, use the vi editor to enter the CTRL-B character. Be careful when you manually edit configuration entries. You may want to start with a configuration that was generated by KMs with Process Presence for PATROL for Unix. For example, use a ruleset captured from an existing configuration generated by using Process Presence to monitor KMs.
Chapter 14
Monitoring Processes
277
Processes
host1*portnumber*username*password@host2*portnumber*username*password@host3*portnum ber*username*pasword@. The host1 value must be the local host which runs the Patrol Agent.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Process List group box, select the process you want to delete. 5 In the Actions group box, select Delete Selected Process, and click OK.
A confirmation message appears.
278
Processes
You can use flag files to create the equivalent of a PATROL blackout for specific process presence instances, suspending warnings and alarms during regular system maintenance. To create a blackout period for a process presence instance, move a flag file for the process presence instance into the designated flag file directory. When PATROL finds a flag file in the specified directory, it will ignore any alarms or warnings generated for the process.
the directory must exist on the system the PATROL Agent must have read permissions on the flag directory
flag files must reside in the designated flag file directory flag files must be named ignore_ProcessName, where ProcessName is the name assigned to the monitored process
NOTE
Flag files do not expire after a specified time period. You must manually remove flag files from the specified flag file directory before PATROL will resume monitoring for a process presence instance.
To Specify a Flag File Directory 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
3 Select Identify Flag Directory from the pop-up menu. 4 Type the full path of the flag file directory in the Enter Full Path field. NOTE
Do not store flag files in the /tmp directory; many Unix systems automatically clear this directory upon system reboot.
5 Click Apply.
Chapter 14
Monitoring Processes
279
Processes
NOTE
Flag files do not expire after a specified time period. You must manually remove flag files from the specified flag file directory before PATROL will resume monitoring for a process presence instance.
To Report on a Selected Process 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Process List group box, highlight the process for which you want to run a
report.
280
Processes
5 In the Actions group box, select the Report on Selected Process option button, and
click OK. The Report on Process Name dialog box is displayed. This dialog box displays the monitoring attributes that were set for the process. In addition, the dialog box displays the number of process instances running on the local host, and the total number of process instances running within the host group.
6 Click Close.
The Report on Process Name dialog box closes, and the Manage List of Monitored Processes dialog box is displayed.
Chapter 14
Monitoring Processes
281
Synchronizing the Local Hosts List to a Selected Hosts List for a Process 288 Host Group Synchronizing a Selected Hosts List to the Local Host List for a Process Host Group Viewing the Process List for a Selected Host Synchronizing the Local Processs List with a Selected Process's List Synchronizing a Selected Process's List with the Local Process's List Viewing the Process Presence List for a Selected Process 288 289 289 290 291
The local host from which you are creating the group must be the first host added to the group. In other words, the PATROL Agent for the local host computer must be the first PATROL Agent added to the group. Hosts may only be added to the group by a member of the host group. Any host within the group can add another member; you do not have to add all hosts from the original host. A host computer may only belong to one group at a time.
282
To Create a Process Host Group 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Actions group box, select the Add option button and click OK.
The Add Host to Watched Hosts dialog box is displayed.
5 In the Host Name field, type the name of the host on which the PATROL Agent is
installed and running.
6 In the Agent Port field, type the port number of the PATROL Agent that is installed
on the host.
7 In the User Name field, type the user name for the PATROL Agent account that is
installed on the host.
8 In the Password field, type the password for the PATROL Agent that is installed on
the host.
9 Click Add.
The dialog box closes, and the Manage Host Group dialog box is displayed. The new host is listed in the Host Group Members group box.
Chapter 14
Monitoring Processes
283
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Group Lists group box, highlight a host. 5 Click the Configure Group Communication Options for host option button, and click
OK.
6 In the Timeout Group Communications After ___ Seconds field, type a value in the
field to specify the number of seconds that the local host will wait for a response from a remote host. The valid range for this field is 1-60 seconds. The default value is 10 seconds.
7 In the Check Response of Group Every ___ Intervals field, type a value in the field to
indicate the number of polling cycles that this host will allow to lapse between attempts to contact the PATROL Agent for each host within the group. The valid range for this field is 0-99 intervals. The default value for this field is 0, which means that the host is not performing the check.
NOTE
In larger host groups, this check can consume a significant amount of system resources. Do not turn this feature on unless you need to use it.
8 Select the Send Local Process Changes to Group option button to allow the PATROL
Agent to propagate process presence instance changes for the local host to hosts within the group that are set up to receive local host changes from other members of the group.
284
9 Select the Accept Local Process Changes from Group option button to allow the
PATROL Agent to receive process presence instance changes marked local from other hosts within the group that are set up to propagate changes to members of the host group.
10 Click OK.
The dialog box closes, and the communication setting for the group are changed.
You can modify the following information about a host: Agent port number User name Password
You must comply with the rules for creating process host groups.
To Modify a Host within a Process Group 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Host Group Members group box, highlight the host you want to modify. 5 In the Actions group box, select the Modify Selected Host option button and click
OK.
6 In the Agent Port field, type the port number of the PATROL Agent that is installed
on the host.
Chapter 14
Monitoring Processes
285
7 In the User Name field, type the user name for the PATROL Agent account that is
installed on the host.
8 In the Password field, type the password for the PATROL Agent that is installed on
the host.
9 Click Modify.
The dialog box closes, and the Manage Host Group dialog box is displayed. Changes to the PATROL Agent port number and account user name are displayed in the Host Group Members group box. PATROL does not display the password for the PATROL Agent.
To Delete a Host from a Process Group 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Host Group Members group box, highlight the host you want to delete. 5 In the Actions group box, select the Delete Selected Host option button and click OK.
The dialog box refreshes, and the selected host is deleted from the Host Group
Members group box.
286
To Query a Host within a Process Host Group 1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Host Group Members group box, highlight the host you want to query. 5 In the Actions group box, select the Query Selected Host option button and click OK.
The Status group box will display the following information:
s s s s s
local host name the last host that sent an update within the group the date and time that the last update was sent to the group whether or not the selected host responded when PATROL tried to query it the following diagnostic messages No sessiondisplays when the host was unable to open a session on the remote PATROL Agent Event faileddisplays when the session was opened on the remote PATROL Agent, but sending an event to the remote PATROL Agent failed No responsedisplays when the PATROL Agent timed out while waiting for a response to the event that was sent to the remote PATROL Agent Bad return datadisplays when the message that is received seems to be from a PATROL Agent other than the one with which the session was opened Unknown OS typedisplays when the PATROL Agent did not return a known OS type string Non-UNIX OSdisplays when the remote PATROL Agent is not running on a supported Unix operating system OKdisplays when the PATROL Agent responded correctly
Chapter 14
Monitoring Processes
287
Synchronizing the Local Hosts List to a Selected Hosts List for a Process Host Group
This task describes how to replace the local host list with the host list from the selected host. You can use this option to copy host group settings from the selected host to your local host.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Group Lists group box, highlight a host. 5 Select the Replace Local Host List with Selected option button and click OK.
The dialog box refreshes, and the local host list is replaced with the information from the selected host list.
Synchronizing a Selected Hosts List to the Local Host List for a Process Host Group
This task describes how to replace the selected host list with the host list from the local host. You can use this option to copy host group settings from the local host to the selected host.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Group Lists group box, highlight a host. 5 Select the Replace Selected Host List with Local option button and click OK.
288
The dialog box refreshes, and the selected host list is replaced with the information from the local host list.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Group Lists group box, highlight a host. 5 Select the View Host List from Selected Host option button and click OK.
The Process Presence Host List for Host dialog box is displayed.
6 Click Close.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
Chapter 14
Monitoring Processes
289
4 In the Summary of Process Lists group box, select a host name. 5 Click the Replace Local Process List with Selected option button and click OK.
The dialog box refreshes, and the process list for the local host is replaced by the process list for the selected host.
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Process Lists group box, select a host name. 5 Click the Replace Selected Process List with Local option button and click OK.
The dialog box refreshes, and the process list for the local host is replaced by the process list for the selected host.
290
1 Double-click the PROCESS application container. 2 Access the PROCESS_PRESENCE application menu as described in Accessing
KM Commands and InfoBoxes on page 402.
4 In the Summary of Process Lists group box, highlight a host. 5 Select the View Process List from Selected Host option button and click OK.
The Process Presence Process List for Host dialog box is displayed.
6 Click Close.
Chapter 14
Monitoring Processes
291
Status
Status
The PROCESS application class enables you to monitor processes based on their status. This feature allows you to view which and how many processes are running on the system. It also enables you to view processes based on characteristics such as state and CPU usage. The PROCESS tasks related to status are described in detail on the following pages: Task Viewing the Number of Zombie Processes Viewing Zombie Processes Viewing the Total Number of Processes Running Viewing Processes that Use Excessive CPU Viewing the Number of Processes Waiting on Resources Viewing the Total Number of User Processes Viewing the Average Number of User Processes Page 292 293 295 295 298 298 299
292
Status
Figure 49
PROCESS InfoBox
To View the Number of Processes Recently in Zombie Mode 1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCNoZombies parameter.
PATROL displays a graph that shows the number of Zombie processes that occurred over the last couple of hours.
To View Zombie Processes 1 Access the PROCESS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
Chapter 14
Monitoring Processes
293
Status
Output Format
The output has the following format. Table 47 defines each field. pidppiduserssizecputcmd namecmd line
List Zombie Process Command Output Format Description the process ID of the process the process ID of the parent process the name of the user that owns the process the status of the process Iintermediate 0nonexistent Rrunning Ssleeping Tstopped Wwaiting Xgrowing Zzombie, terminated
the total size of the process in virtual memory, in blocks the first word of the command line that started the process the complete command line (command and arguments up to 80 characters) that started the process; note that the command line can be modified during the process execution
294
Status
To View the Total Number of Processes Recently Running 1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCNumProcs parameter.
PATROL displays a graph that shows the total number of processes running on the system over the last couple of hours.
The menu command allows you to define excessive CPU utilization through a dialog box when you execute the command. The parameter compares each processes CPU utilization against the other processes and lists the processes that consume the most CPU. The cputhreshold value has a default value of 80 percent.
Chapter 14
Monitoring Processes
295
Status
To View the Processes that Use Excessive CPU as Defined by You 1 Access the PROCESS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Select the threshold by moving the slider bar to the right (maximum value of 100)
or the left (minimum value of 0) and click Accept. PATROL surveys the system for 30 seconds and then writes the information to a PATROL task object, CPU Hogs Process, in the UNIX OS container.
296
Status
Output Format
The output has the following format. Table 48 defines each field. pid cpu% user cmd line
CPU Hogs Command Output Format Description the process ID of the process the percentage of CPU that the process consumed during the survey interval the name of the user that owns the process the complete command line (command and arguments up to 80 characters) that started the process; note that the command line can be modified during the process execution
1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCTopProcs parameter.
PATROL displays the information in a text parameter. Your result should resemble this example: # PSL Serial No.: ######### %TIME PID PPID TOT SECS 0.00 0 0 18 0.00 1 0 1 0.00 2 0 0 0.00 3 0 588 0.00 315 1 0
SIZE 0 96 0 0 217
UID COMMAND root sched root /etc/init root pageout root fsflush root /usr/lib/saf/sac
Chapter 14
Monitoring Processes
297
Status
PROCTopProcs Text Parameter Format Description the percentage of cpu time that the process consumes the process ID of the process the process ID of the parent process the total number of seconds the process consumed CPU resources the total size of the process in virtual memory, in blocks
uid command the complete command line (command and arguments up to 80 characters) that started the process; note that the command line can be modified during the process execution
To View the Number of Processes Waiting for Resources 1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCProcWait parameter.
PATROL displays a graph that shows the number of processes that are currently waiting for resources and have been over the last couple of hours.
298
Priority
To View the Total Number of User (non-root) Processes Running on the System 1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCUserProcs parameter.
PATROL displays a graph that shows the number of user (non-root) processes that are running on the system.
To View the Average Number of Processes Per User 1 Access the PROCESS application class so that you can view its parameters. 2 Open the PROCAvgUsrProcs parameter.
PATROL displays a graph that shows the average number of processes running on the system per user.
Priority
The PROCESS application class enables you to manage process execution priority based on the individual process, the owner of the process, and the group to which the process belongs. From within PATROL, it enables you to decrease a processs priority. The PROCESS tasks are described in detail on the following pages: Task Reprioritizing a Process Reprioritizing All Processes in a Process Group Reprioritizing All Processes Owned by a User Page 300 301 302
Chapter 14
Monitoring Processes
299
Priority
Reprioritizing a Process
This task describes how to reprioritize an individual process. Reprioritizing a processs execution is commonly referred to as renicing. Priorities, or nice values, range from -20 (highest) to 20 (lowest: process will run when no other process attempts to run). To lower a processs priority, you must raise its nice value. To raise a processs priority you must lower its nice value.
At a Unix command prompt, use the Unix list active processes command with the long option (ps -l) to find the process ID and current priority of the process whose execution priority you want to change. The execution priority, also referred to as the nice value, is stored in the NI column. Only privilege users can decrease the nice value. Other users can only increase the nice value within the range 0 to 20.
To Reprioritize a Process 1 Access the PROCESS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Type the Process ID number in the Enter Process ID field. 4 Type an integer value for the amount you want to lower or raise the priority in the
Enter Priority field of the dialog box. Negative values are valid. The larger the number that you enter is, the lower the resulting priority of the process; the smaller the number is, the higher the priority.
EXAMPLE
To raise the priority from 8 to 6, type a value of -2 in the Enter Priority field.
300
Priority
5 Click Apply.
PATROL prompts you for a user name and password (Figure 52). Figure 52 Renice Process Confirmation Dialog Box
6 Enter the user name and password of the owner of the process or an account with
privileges to reprioritize it, and click OK. PATROL writes a confirmation message to the system output window. Your result should resemble this example: CCYY0614153103 PROCESS: Renice process 333 to priority: 6
At a Unix command prompt, use the Unix list active processes command with the long j option (ps -lj) to find the group process ID and current priorities of the processes that belong to the group. The group ID is stored in the PGID column. The execution priority, also referred to as the nice value, is stored in the NI column. Only privileged users can decrease the nice value. Other users can only increase the nice value within the range 0 to 20.
Chapter 14
Monitoring Processes
301
Priority
To Reprioritize a Process 1 Access the PROCESS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Type the Group ID number in the Enter Group ID field. 4 Type an integer value for the amount you want to lower or raise the priority in the
Enter Priority field of the dialog box. Negative values are valid. The larger the number that you enter is, the lower the resulting priority of the process; the smaller the number is, the higher the priority.
EXAMPLE
To lower the priority from 8 to 10, type a value of 2 in the Enter Priority field.
5 Click Apply.
PATROL prompts you for a user name and password.
6 Enter the user name and password of the owner of the group or an account with
privileges to reprioritize it, and click OK. PATROL writes a confirmation message to the system output window. Your result should resemble this example: CCYY0614153103 PROCESS: Renice group suprvizr to priority: 10
302
Priority
At a Unix command prompt, use the Unix list active processes command with the long option (ps -l) to find the processes that belong to a specific user, indicated by user ID, and the current priorities of the processes that belong to the user. The user ID is stored in the UID column. The execution priority, also referred to as the nice value, is stored in the NI column. Only privileged users can decrease the nice value. Other users can only increase the nice value within the range 0 to 20.
To Reprioritize a Process 1 Access the PROCESS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Type the user ID number in the Enter User ID field. 4 Type an integer value for the amount you want to lower or raise the priority in the
Enter Priority field of the dialog box. Negative values are valid. The larger the number that you enter is, the lower the resulting priority of the process; the smaller the number is, the higher the priority.
EXAMPLE
To lower the priority from 10 to 15, type a value of 5 in the Enter Priority field.
5 Click Apply.
PATROL prompts you for a user name and password.
6 Enter the user name and password of the user or an account with privileges to
reprioritize the process owned by the user, and click OK. PATROL writes a confirmation message to the system output window. Your result should resemble this example: CCYY0614153103 PROCESS: Renice user 3Supvr to priority: 15
Chapter 14
Monitoring Processes
303
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
The PATROL Configuration Manager includes the Process KM Configuration Plug-in that allows you to configure the Process KM to monitor specific processes. The plug-in provides three tabs. Each tab enables you to specify certain monitoring criteria.
s
The Process tab designates a process or processes to be monitored by the PATROL Knowledge Module for Unix. The Start/Restart Options tab controls the number of instances of a process that is being monitored. You can configure the knowledge module to automatically stop an instance of a monitored process if it exceeds the maximum process count or automatically start a process if the number of process instances falls below the minimum count. The Alert and Monitor Options tab specifies what type of alert is generated by the knowledge module and the time frame in which the alert is generated when the monitored process falls below the minimum count or rises above the maximum.
Plug-in Actions
The plug-ins interact with PATROL Configuration Manager based upon the task that you are performing. When adding rulesets to establish and configure monitoring, you use the Agent tree view pane. When updating or deleting rulesets, you use the RuleSets tree view pane.
To Add an Object Instance 1 In the Agent tree view pane, select an agent by clicking on it. 2 Right-click the agent and select the plug-in and its option such as either Process KM
Configuration => Processes.
304
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
3 Click Add.
The plug-in displays a dialog box for creating instances.
4 Type the required information in the appropriate fields, which are described in
Table 50. Table 50
Fields Process Instance New Instance Label Monitored Process Type the name of the process as you want it to appear in PATROL Type the process command of the process that you want to monitor
5 Click OK. 6 Select each tab and provide the relevant information in the configuration dialog
box. For more information about the Process KM Configuration dialog box, see Configuring the Process KM on page 307.
7 Click either Apply to save your changes and leave the dialog box open or OK to
save the changes and close the dialog box.
1 In the RuleSet tree view pane, expand the RuleSet folder. 2 Navigate to the backup ruleset of the agent whose object instance monitoring you
want to update. Expand PCM => backup => backup_container => agent => ccyymmdd-hhmmss_ruleset.
3 Right-click the ruleset and select the plug-in and its option such as either Process
KM Configuration => Processes.
NOTE
If no object instances have been added for monitoring, the menu command will be inactive. For more information about adding an object instance for monitoring, see Adding Object Instances to Monitor on page 304.
Chapter 14
Monitoring Processes
305
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
4 Select one instance from the instance list and click Update. 5 Select the appropriate tab and edit the relevant information in the configuration
dialog box. For more information about the Process KM Configuration dialog box, see Configuring the Process KM on page 307.
6 Click either Apply to save your changes and leave the dialog box open or OK to
save the changes and close the dialog box.
1 In the RuleSet tree view pane, expand the RuleSet folder. 2 Navigate to the backup ruleset of the agent whose object instance monitoring that
you want to update. Expand PCM => backup => backup_container => agent => ccyymmdd-hhmmss_ruleset.
3 Right-click the ruleset and select the plug-in and its option such as either Process
KM Configuration => Processes.
NOTE
If no object instances have been added for monitoring, the menu command will be inactive. For more information about adding an object instance for monitoring, see Adding Object Instances to Monitor on page 304.
4 Select one instance from the instance list. 5 Click Delete. 6 Click either Apply to save the deletion and leave the dialog box open or OK to save
the deletion and close the dialog box.
306
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
To Configure Process Monitoring from PATROL Configuration Manager 1 Add a new PATROL object instance to monitor a process as described in Adding
Object Instances to Monitor on page 304 or select a ruleset created to monitor a process as described in Updating Monitored Object Instances on page 305.
2 Select an Instance from the Process Instance List. 3 Select the Process tab and specify how many process instances should run
simultaneously and who can own the process. Table 51 describes the process properties used to define the criteria. Table 51 Field
Process Instance List
PATROL monitors all processes that match the string you type in this field. When you enter text in this field, you may end up monitoring multiple processes. For example, if you type vi in this field, PATROL will monitor processes named vi, view, and previous.
Minimum Count Use the spinner buttons, or type a value in this field to set the minimum number of process instances that may be running on the local computer or in the host group. Use the spinner buttons, or type a value in this field to set the maximum number of process instances that may be running on the local computer or in the host group. The value in the Maximum Count field must be equal to or greater than the value in the Minimum Count field.
Maximum Count
Chapter 14
Monitoring Processes
307
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
Table 51 Field
4 Select the Start/Restart Options tab and specify if a process should be restarted
automatically, commands for starting and stopping a process, and credentials for accounts to start and stop passwords. Table 52 describes the process properties used to define the criteria. Table 52
Field Restart Automatically
Type a value in this field to set the number of times the host will attempt to run a Start Process or Stop Process command before it stops trying to run the command. The value that you enter in this field must be a 1 or greater.
Start Command
Type the command string that will start the process instance. You must specify a command execution user account and password if you want to use the Start command.
308
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
Table 52
Field
Stop Command
Type the user ID under which the command will be executed. You must specify a command execution user account and password if you want to use the Start and Stop commands.
Type the password for the user ID under which the command will be executed. You can leave this field blank; the KM will accept a null password. You must specify a command execution user account and password if you want to use the Start and Stop commands.
5 Select the Alert and Monitor Options tab and specify the location of the processes
running and the conditions under which an alert is issued. Table 53 describes the process properties used to define the criteria. Table 53
Field Alert Delay Count
Alert State
From the drop list select a state (ALARM or WARNING) change for the following parameters: PROCPPCountCheckPROCPPCountCheck_parameter PROCPPOwnerCheckPROCPPOwnerCheck_parameter PROCPPParentPID1PROCPPParentPID1_parameter PATROL sets these parameter to the selected state when the Action Deferral Count reaches zero and the process count across the range is out of range.
Chapter 14
Monitoring Processes
309
Using the PATROL Configuration Manager to Configure the PATROL KM for Unix and Linux
Table 53
Field Scope
Blackout Period
You have the option of setting a blackout period during which you do not want to monitor the selected process. To set the blackout period: In the Start drop boxes, enter the time (in 24-hour clock format) to begin the blackout period in hours (first drop list) and minutes (second drop list). In the End drop boxes, enter the time that you want the blackout period to end in hours (first drop list) and minutes (second drop list). For example, if you wanted the blackout period to occur between 11:00 PM and 5:00 AM, in the Start fields you would enter 23 and 00. In the End fields you would enter 05 and 00.
If you are adding a new object instance for monitoring (working in the Agent tree view pane), click the Apply button to apply the ruleset and begin monitoring. If you are updating an object instance for monitoring, (working in the RuleSet tree view pane) assign the updated rulesets to the desired agent(s), and then click the Apply button to apply the ruleset and begin monitoring with the new settings.
310
Chapter
15
312 312 313 313 315 318 321 321 322 326 326 327 330 331 334 335 337
15
Scheduling Tasks
The PATROL Knowledge Module for Unix and Linux gives you the ability to schedule processes and to schedule monitoring blackout periods in your environment.The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling a Task for Execution via the Operating System Command Line Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling a Task for Execution Using a PATROL Command Processor . . . . . Scheduling a PSL Task for Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modifying an Existing Scheduled Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Removing a Scheduled Task from the Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collecting Debug Data for the Scheduler Application . . . . . . . . . . . . . . . . . . . . . Blackouts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Specifying a Default Directory for Blackout Scripts. . . . . . . . . . . . . . . . . . . . . . . . Creating a Monitoring Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Information about a Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modifying an Existing Blackout Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting a Blackout Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling a Blackout Script for Execution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Canceling a Scheduled Blackout Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 15
Scheduling Tasks
311
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux schedules processes and establishes monitoring blackout periods in your environment through the SCHEDULER application.
NOTE
You can change settings in the PATROL SCHEDULER application class using the PATROL Operator Console. Set up access control lists (ACLs) to prevent users from making changes to SCHEDULER settings through a PATROL Operator Console. With this application class, you can
s
write a script to perform a task or job and then schedule that task to run at once or at regular intervals suspend monitoring of applications during routine maintenance or other activities that generate false alarms
Object Hierarchy
The SCHEDULER application class contains SCHEDULER parameters. You can use the SCHEDULER application class to schedule processes and programs to run at specified times. In addition, you can use the SCHEDULER application class to suspend PATROL event generation during specified time periods. Figure 53 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 53 SCHEDULER Application Object Hierarchy
OS container
Application class
Parameter
312
Tasks
Tasks
The SCHEDULER application class gives you the ability to write a script to perform a task or job and then schedule that task to run at regular intervals. This feature enables you to designate which script runs when. The SCHEDULER tasks that relate to scheduling scripts are described in detail on the following pages: Task Scheduling a Task for Execution via the Operating System Command Line Processor Scheduling a PSL Task for Execution Modifying an Existing Scheduled Script Removing a Scheduled Task from the Queue Collecting Debug Data for the Scheduler Application Page 313
Scheduling a Task for Execution Using a PATROL Command Processor 315 318 321 321 322
Scheduling a Task for Execution via the Operating System Command Line Processor
This task describes how to schedule a script for execution via the operating system command line.
The PATROL Agent must have read and execute permissions for the script that is being scheduled for execution. The PATROL Agent must have write permissions for the output file, if you are creating a script with an output file.
To Schedule a Task for Execution Using the Command Line Processor 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 15
Scheduling Tasks
313
Tasks
3 In the Actions group box, select Schedule New Task and click Accept.
The Schedule New Task dialog box is displayed.
4 Select the Schedule an Operating System Script option button and click Accept.
The Schedule an Operating Script dialog box is displayed.
5 In the Execute Script at: group box, use the spinner buttons or type a value in the
following fields to schedule the script: Field Month Day Year hh Description indicate the month in which the script should execute indicate the date on which the script should execute indicate the year in which the script should execute indicate at which hour of the day the script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the script should execute indicate at which second the script should execute
6 If you want to set the script to occur at regularly scheduled intervals, use the
spinner buttons or type values in the following fields of the Repeat Execution: group box: Field Days hh mm ss Description indicate the number of days that should pass between script executions indicate the number of hours that should pass between script executions indicate the number of minutes that should pass between script executions indicate the number of seconds that should pass between script executions
7 Select the Execute Once Immediately option button if you want the script to execute
now.
314
Tasks
NOTE
If you do not select this option and you are scheduling a script that was supposed to run in the past, it will not run again until the repeated execution runtime. For example, if you have a backup script that is supposed to run every Sunday evening, but you fill out this dialog box on a Monday morning, PATROL will not run the script until the next scheduled execution. You must toggle the Execute Once Immediately button on to run the script now.
8 In the Script File Name field, type the full path and file name for the script. NOTE
The PATROL Agent account must have read and execute permissions for the script. The PATROL Agent account must also have read permissions for the directory in which the script resides.
9 In the Execution Instance field, type the name of the PATROL instance against
which the command should be executed. This field is optional.
10 In the Write Output To field, type the full path and file name for the output file. This
field is optional.
NOTE
If you specify an output file name in this field, the PATROL Agent must have write permissions for the output file.
11 Click Accept.
The dialog box closes, and PATROL schedules the script for execution.
The PATROL Agent must have read and execute permissions for the script that is being scheduled for execution.
Chapter 15
Scheduling Tasks
315
Tasks
The PATROL Agent must have write permissions for the output file, if you are creating a script with an output file.
WARNING
If you schedule a script with incorrect information (for example, a non-existent script, or one that resides in a directory that is different from the one you specified) for execution, PATROL will attempt to execute it at the scheduled time. However, the execution will fail, and the script will not run.
To Schedule a Task for Execution Via an Interpreter 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 In the Actions group box, select Schedule New Task and click Accept.
The Schedule New Task dialog box is displayed.
5 In the Execute Script at: group box, use the spinner buttons or type a value in the
following fields to schedule the blackout script: Field Month Day Year hh Description indicate the month in which the script should execute indicate the date on which the script should execute indicate the year in which the script should execute indicate at which hour of the day the script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the script should execute indicate at which second the script should execute
6 If you want to set the script to occur at regularly scheduled intervals, use the
spinner buttons or type values in the following fields of the Repeat Execution: group box:
316
Tasks
Field Days hh mm ss
Description indicate the number of days that should pass between script executions indicate the number of hours that should pass between script executions indicate the number of minutes that should pass between script executions indicate the number of seconds that should pass between script executions
7 Select the Execute Once Immediately option button if you want the script to execute
now.
NOTE
If you do not select this option and you are scheduling a script that was supposed to run in the past, it will not run again until the repeated execution runtime. For example, if you have a backup script that is supposed to run every Sunday evening, but you fill out this dialog box on a Monday morning, PATROL will not run the script until the next scheduled execution. You must toggle the Execute Once Immediately button on to run the script now.
8 In the PATROL Command Processor field, type the name of the program that should
be used to interpret the script you have written. The command processor must be one that is defined to the PATROL Agent on which you are running the script before you can use it. For more information on defining command interpreters to the PATROL Agent, look up the PSL built-in function named execute() in the PATROL Script Language Reference Manual Volume 2PSL Functions.
9 In the Script File Name field, type the full path and file name for the script. NOTE
The PATROL Agent account must have read and execute permissions for the script. The PATROL Agent account must also have read permissions for the directory in which the script resides.
10 In the Execution Instance field, type the name of the PATROL instance against
which the command should be executed. This field is optional.
11 In the Write Output To field, type the full path and file name for the output file. This
field is optional.
Chapter 15
Scheduling Tasks
317
Tasks
NOTE
If you specify an output file name in this field, the PATROL Agent must have write permissions for the output file.
The PATROL Agent must have read and execute permissions for the script that is being scheduled for execution. The PATROL Agent must have write permissions for all output files, if you are creating a script with output files.
WARNING
If you schedule a script with incorrect information (for example, a non-existent script, or one that resides in a directory that is different from the one you specified) for execution, PATROL will attempt to execute it at the scheduled time. However, the execution will fail, and the script will not run.
318
Tasks
To Schedule a PSL Script for Execution 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 In the Actions group box, select Schedule New Task and click Accept.
The Schedule New Task dialog box is displayed.
4 Select the Schedule a PATROL PSL Script option button and click Accept. 5 In the Execute Script at group box, use the spinner buttons or type a value in the
following fields to schedule the script: Field Month Day Year hh Description indicate the month in which the script should execute indicate the date on which the script should execute indicate the year in which the script should execute indicate at which hour of the day the script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the script should execute indicate at which second the script should execute
6 If you want to set the script to occur at regularly scheduled intervals, use the
spinner buttons or type values in the following fields of the Repeat Execution group box: Field Days hh mm ss Description indicate the number of days that should pass between script executions indicate the number of hours that should pass between script executions indicate the number of minutes that should pass between script executions indicate the number of seconds that should pass between script executions
7 Select the Execute Once Immediately option button if you want the script to execute
now.
Chapter 15
Scheduling Tasks
319
Tasks
NOTE
If you do not select this option and you are scheduling a script that was supposed to run in the past, it will not run again until the repeated execution runtime. For example, if you have a backup script that is supposed to run every Sunday evening, but you fill out this dialog box on a Monday morning, PATROL will not run the script until the next scheduled execution. You must toggle the Execute Once Immediately button on to run the script now.
8 In the Internal PSL Process Name field, type the name of the PSL process that will be
run with the script. For more information on PSL process names, look up the PslEexecute() function in the PATROL Script Language Reference Manual Volume 2PSL Functions.
9 In the Script File Name field, type the full path and file name for the script. NOTE
If you enter an incorrect file name and path, the PATROL Scheduler File Name dialog box will display when you click Accept. This dialog box prompts you to correct the file name and path, or schedule the task as-is. If you schedule a script with incorrect information (for example, a non-existent script, or one that resides in a directory that is different from the one you specified) for execution, PATROL will attempt to execute it at the scheduled time. However, the execution will fail, and the script will not run.
10 In the Write Compile Errors To field, type the full path and file name for the error
output file. This field is optional.
NOTE
If you specify an error output file name in this field, the PATROL Agent must have write permissions for the output file.
11 In the Write Compile Warnings To field, type the full path and file name for the
warning output file. This field is optional.
NOTE
If you specify a warning output file name in this field, the PATROL Agent must have write permissions for the output file.
12 Click Accept.
The dialog box closes, and PATROL schedules the script for execution.
320
Tasks
The PATROL Agent must have read and execute permissions for the script that is being scheduled for execution. The PATROL Agent must have write permissions for all output files, if you are creating a script with output files.
To Modify an Existing Task 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 In the Scheduled Tasks group box, highlight the task you want to modify. 4 In the Actions group box, select Modify Selected Task and click OK.
The Select Function to Execute Script dialog box is displayed.
Chapter 15
Scheduling Tasks
321
Tasks
To Remove a Scheduled Task from the Queue 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 In the Scheduled Tasks group box, highlight the task you want to modify. 4 In the Actions group box, select Remove Selected Task and click OK. 5 Click OK.
PATROL removes the scheduled task from the queue and refreshes the dialog box.
To Collect PSL Debugger Data for the Scheduler Application 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 In the Scheduling Debug dialog box, select the check box next to each selection that
you want to turn on. Debug data will be collected for that option.
4 For the Scheduler Daemon Debugger group box item, select the check box next to
each selection that you want to turn on for run-time checks and traces. When a debugging selection is turned on, debug data is collected for that option.
322
Tasks
Check Box Run-Time Checks Arithmetic operations with NULL strings Arithmetic operations with non-numeric operands
Description checks to ensure that numeric variables are explicitly initialized to 0, instead of defaulting to a NULL string. checks for arithmetic operations that involve non-numeric operands An expression that attempted to numerically add "mary" + "john" would generate this warning.
checks for illegal or undefined arithmetic operations An operation that attempted to divide by zero would generate this warning.
Uninitialized variables checks for variables that were not explicitly initialized If you attempt to use a variable before explicitly equating it to a value, this warning is generated. PSL Version 2.0 built-in allows you to suppress warning messages that were not functions suppressible in PSL Version 2.0 PSL Version 3.0 built-in allows you to perform an error check of built-in functions functions that were not in PATROL Version 2.0 This option detects the following errors: s passing non-numeric arguments when a numeric value is required s passing a bad argument s passing the wrong number of arguments to a printf() function Note: BMC Software recommends enabling PSL Version 2.0 and PSL Version 3.0 built in functions. Traces Function call tracing reports which functions are called, but does not return information about the arguments. Function call tracing captures both user-defined and built-in functions. reports the arguments passed to all user-defined or built-in functions Function call tracing must also be enabled if you want to use this debugger option. Function return value tracing Variable assignment tracing reports the value returned by calls to all user-defined or built-in functions reports the variable name (if available), and the value assigned to it
Chapter 15
Scheduling Tasks
323
Tasks
Description reports any nonzero values stored in the PSL errno variable reports the interprocess actions that occur during lock() and unlock() function processing This option reports back the granting, denying, and releasing of locks.
5 For the Scheduler Facility Debugger group box item, select the check box next to
each selection that you want to turn on for run-time checks and traces. When a debugging selection is turned on, debug data is collected for that option. Check Box Run-Time Checks Arithmetic operations with NULL strings Arithmetic operations with non-numeric operands checks to ensure that numeric variables are explicitly initialized to 0, instead of defaulting to a NULL string. checks for arithmetic operations that involve non-numeric operands An expression that attempted to numerically add "mary" + "john" would generate this warning. Illegal or undefined arithmetic operands checks for illegal or undefined arithmetic operations An operation that attempted to divide by zero would generate this warning. Uninitialized variables checks for variables that were not explicitly initialized If you attempt to use a variable before explicitly equating it to a value, this warning is generated. PSL Version 2.0 built-in allows you to suppress warning messages that were not functions suppressible in PSL Version 2.0 PSL Version 3.0 built-in allows you to perform an error check of built-in functions functions that were not in PATROL Version 2.0 This option detects the following errors: s passing non-numeric arguments when a numeric value is required s passing a bad argument s passing the wrong number of arguments to a printf() function Note: BMC Software recommends enabling PSL Version 2.0 and PSL Version 3.0 built in functions. Description
324
Tasks
Description reports which functions are called, but does not return information about the arguments. Function call tracing captures both user-defined and built-in functions. reports the arguments passed to all user-defined or built-in functions Function call tracing must also be enabled if you want to use this debugger option.
Function return value tracing Variable assignment tracing PSL errno tracking PSL lock tracing
reports the value returned by calls to all user-defined or built-in functions reports the variable name (if available), and the value assigned to it reports any nonzero values stored in the PSL errno variable reports the interprocess actions that occur during lock() and unlock() function processing This option reports back the granting, denying, and releasing of locks.
6 To complete the PATROL Scheduler PSL Debugger dialog box, choose one of the
following options:
s
Click Accept to toggle the debugger data collection on for the items that you selected. Click Cancel to close the dialog box without saving your changes.
NOTE
s
The left side of the dialog box controls debug options for the scheduler daemon. The right side of the dialog box controls debug options for the graphical user interface (GUI). Debug information is only sent to the PATROL Agent Console window when the area being debugged is active. The PATROL KM for Unix does not generate debug data when the scheduler daemon is sleeping, or the GUI is not being used. In the left side PATROL begins collecting debug data for the options that you selected. Debug information is displayed in the System Output Window.
Chapter 15
Scheduling Tasks
325
Blackouts
Blackouts
The SCHEDULER application class gives you the ability to suspend monitoring of applications, which is also known as blacking out PATROL objects. This feature enables you to designate which instances are blacked out or hidden from monitoring and when they are. The SCHEDULER tasks that relate to blacking out instances from monitoring are described in detail on the following pages: Task Specifying a Default Directory for Blackout Scripts Creating a Monitoring Blackout Script Viewing Information about a Blackout Script Modifying an Existing Blackout Script Deleting a Blackout Script Scheduling a Blackout Script for Execution Canceling a Scheduled Blackout Script Page 326 327 330 331 334 335 337
The blackout script directory must exist on the system. The PATROL default account must have read and execute permissions for the blackout script directory.
NOTE
If you do not specify a default directory for blackout scripts, blackout scripts will be saved in the PATROL_HOME directory (the directory specified in the PATROL Agent /home variable).
326
Blackouts
To Specify the Blackout Script Directory 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Set Default Blackout Script Directory from the pop-up menu.
The Identify Default Blackout Script Directory dialog box is displayed.
3 Type the full path of the blackout script directory in the Enter Full Path field and
click Apply.
NOTE
Do not store blackout script files in the /tmp directory; many Unix systems automatically clear this directory upon system reboot.
To Create a Blackout Script for Immediate Execution 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 15
Scheduling Tasks
327
Blackouts
4 Type a file name (and path, if desired) in the Blackout Script Full File Path field and
click OK.
NOTE
The PATROL default account must have read and execute permissions on the directory in which the script is stored.
5 Use the following table to perform the actions necessary to select application
instances for a blackout period. To Achieve this Result Perform the Following Action(s)
suspend monitoring for all Click the Select All Instances option button and application class instances on a click Select. computer suspend monitoring for all application instances within selected application classes 1. In the Application List group box, select all the application classes for which you want to suspend monitoring. 2. Click the Select All Instances in the Highlighted Classes option button and click Select. suspend monitoring for selected application instances 1. In the Application List group box, select the application class for which you want to suspend monitoring. 2. Click the Select Only the Highlighted Instances option button and click Select. The application class expands to list all instances within the application class. 3. Highlight the instances for which you want to suspend monitoring and click Select. clear all of your instance Click the Clear All Selections option button and selection choices and start over click Select.
NOTE
If you want to remove an application class or instance from the script, highlight it in the Selected Instances group box and click Select.
6 Click Done.
The Add New Blackout Script dialog box is displayed.
328
Blackouts
NOTE
The Blackout Script Status dialog box is also displayed. This dialog box provides information about the status of the blackout script; you cannot enter data into it.
8 Perform one of the following actions to set monitoring blackout periods: A If you want to set the same blackout period for all instances in the blackout
script, click the Apply period to all remaining instances button.
B If you want to set different blackout periods for each application instances, do
not select the Apply period to all remaining instances button. If this button is not selected, the Blackout Period dialog box will display for each instance in the script, allowing you to set different blackout time periods for each instance.
9 Click Apply.
The Add New Blackout Script Name Summary dialog box is displayed.
10 Click Continue.
A confirmation dialog box displays, asking if you want to schedule the script for execution now.
11 Perform one of the following actions: A Click Yes if you want to schedule the blackout script for execution now. B Click No if you do not want to schedule the blackout script for execution now. If
you click No, you must perform the steps in Scheduling a Blackout Script for Execution on page 335 before the blackout script will execute. If you clicked Yes, the Schedule PATROL PslExecute() Action dialog box is displayed. Proceed to step 14.
Chapter 15
Scheduling Tasks
329
Blackouts
12 In the Execute Script at: group box, use the spinner buttons or type a value in the
following fields to schedule the blackout script: Field Month Day Year hh Description indicate the month in which the blackout script should execute indicate the date on which the blackout script should execute indicate the year in which the blackout script should execute indicate at which hour of the day the blackout script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the blackout script should execute indicate at which second the blackout script should execute
13 If you want to set the blackout script to occur at regularly scheduled intervals, use
the spinner buttons or type values in the following fields of the Repeat Execution: group box: Field Days hh mm ss Description number of days that should pass between blackout script executions number of hours that should pass between blackout script executions number of minutes that should pass between blackout script executions number of seconds that should pass between blackout script executions
14 Click Accept.
The dialog box closes, and PATROL schedules the blackout script for execution.
2 Select Schedule Blackouts from the SCHEDULER application menu. 3 Select a blackout script from the Blackout Script Files group box.
330
Blackouts
4 Select View Selected Script from the Actions group box and click OK.
The View Selected Script dialog box is displayed. This dialog box provides the following information about the selected blackout script:
s s s
full path and file name of the blackout script date and time that the blackout script was last modified instances that are included in the blackout script, and their scheduled blackout times
5 Click Done.
The dialog box closes.
To Modify an Existing Blackout Script 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Select a blackout script from the Blackout Script Files group box. 4 Select Modify Selected Script from the Actions group box and click OK.
The Blackout Instance Selection dialog box is displayed.
Chapter 15
Scheduling Tasks
331
Blackouts
5 Use the following table to perform the actions necessary to select application
instances for a blackout period. To Achieve this Result Perform the Following Action(s)
suspend monitoring for all Click the Select All Instances option button and click application class instances Select. on a computer suspend monitoring for all 1. In the Application List group box, select all the application instances application classes for which you want to suspend within selected application monitoring. classes 2. Click the Select All Instances in the Highlighted Classes option button and click Select. suspend monitoring for selected application instances 1. In the Application List group box, select the application class for which you want to suspend monitoring. 2. Click the Select Only the Highlighted Instances option button and click Select. The application class expands to list all instances within the application class. 3. Highlight the instances for which you want to suspend monitoring and click Select. clear all of your instance selection choices and start over Click the Clear All Selections option button and click Select.
NOTE
If you want to remove an application class or instance from the script, highlight it in the Selected Instances group box and click Select.
6 Click Done.
The Add New Blackout Script dialog box is displayed.
332
Blackouts
8 Perform one of the following actions to set monitoring blackout periods: A If you want to set the same blackout period for all instances in the blackout
script, click the Apply period to all remaining instances button.
B If you want to set different blackout periods for each application instances, do
not select the Apply period to all remaining instances button. If this button is not selected, the Blackout Period dialog box will display for each instance in the script, allowing you to set different blackout time periods for each instance.
9 Click Apply.
The Add New Blackout Script Name Summary dialog box is displayed.
10 Click Continue.
A confirmation dialog box displays, asking if you want to schedule the script for execution now.
11 Perform one of the following actions: A Click Yes if you want to schedule the blackout script for execution now. B Click No if you do not want to schedule the blackout script for execution now. If
you click No, you must perform the steps in Scheduling a Blackout Script for Execution before the blackout script will execute. If you clicked Yes, the Schedule PATROL PslExecute() Action dialog box is displayed. Proceed to step 15.
12 In the Execute Script at: group box, use the spinner buttons or type a value in the
following fields to schedule the blackout script: Field Month Day Year hh Description indicate the month in which the blackout script should execute indicate the date on which the blackout script should execute indicate the year in which the blackout script should execute indicate at which hour of the day the blackout script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the blackout script should execute indicate at which second the blackout script should execute
Chapter 15
Scheduling Tasks
333
Blackouts
13 If you want to set the blackout script to occur at regularly scheduled intervals, use
the spinner buttons or type values in the following fields of the Repeat Execution: group box: Field Days hh mm ss Description number of days that should pass between blackout script executions number of hours that should pass between blackout script executions number of minutes that should pass between blackout script executions number of seconds that should pass between blackout script executions
14 Select the Execute Once Immediately option button if you want the script to execute
now.
NOTE
If you do not select this option and you are scheduling a script that was supposed to run in the past, it will not run again until the repeated execution runtime. For example, if you have a blackout script that is supposed to run every Sunday evening, but you fill out this dialog box on a Monday morning, PATROL will not run the script until the next scheduled execution. You must toggle the Execute Once Immediately button on to run the script now.
15 Click Accept.
The dialog box closes, and PATROL schedules the blackout script for execution.
334
Blackouts
To Delete a Blackout Script 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Schedule Blackouts from the SCHEDULER application menu. 3 Select a blackout script from the Blackout Script Files group box. 4 Select Delete Selected Script from the Action group box and click OK.
The blackout script is deleted.
WARNING
If you have created other blackout scripts outside of PATROL, you must use the procedure documented in Scheduling a Task for Execution via the Operating System Command Line Processor to schedule them for execution.
To Schedule an Existing Blackout Script for Execution 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Highlight a script in the Blackout Script Files group box. 4 Select Schedule Selected Script from the Action group box and click OK.
The Schedule PATROL PslExecute() Action dialog box is displayed.
Chapter 15 Scheduling Tasks 335
Blackouts
5 In the Execute Script at: group box, use the spinner buttons or type a value in the
following fields to schedule the blackout script: Field Month Day Year hh Description indicate the month in which the blackout script should execute indicate the date on which the blackout script should execute indicate the year in which the blackout script should execute indicate at which hour of the day the blackout script should execute Enter hours in military time. For example, if you want to schedule a script to execute at 4 P.M., enter 16 in this field. mm ss indicate at which minute the blackout script should execute indicate at which second the blackout script should execute
6 If you want to set the blackout script to occur at regularly scheduled intervals, use
the spinner buttons or type values in the following fields of the Repeat Execution: group box: Field Days hh mm ss Description number of days that should pass between blackout script executions number of hours that should pass between blackout script executions number of minutes that should pass between blackout script executions number of seconds that should pass between blackout script executions
7 Select the Execute Once Immediately option button if you want the script to execute
now.
NOTE
If you do not select this option and you are scheduling a script that was supposed to run in the past, it will not run again until the repeated execution runtime. For example, if you have a blackout script that is supposed to run every Sunday evening, but you fill out this dialog box on a Monday morning, PATROL will not run the script until the next scheduled execution. You must toggle the Execute Once Immediately button on to run the script now.
8 Click Accept.
The dialog box closes, and PATROL schedules the blackout script for execution.
336
Blackouts
To Cancel an Existing Blackout Script 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Schedule Blackouts from the SCHEDULER application menu. 3 Select a blackout script from the Blackout Script Files group box. 4 Select Cancel Existing Blackout (Selected Script) from the Actions group box and click
OK.
The blackout period is canceled, and PATROL resumes propagating state changes for the instances that were part of the script.
Chapter 15
Scheduling Tasks
337
Blackouts
338
Chapter
16
340 340 341 341 344 345 345 346 348
16
Reviewing Security
The PATROL Knowledge Module for Unix and Linux gives you the ability to monitor various aspects of the Unix operating system security. With it, you determine which files were created by super users, which files have global write permissions, and which users have no passwords or have multiple user accounts. The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Files with SUID or SGID Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Files with Global Write Privileges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Users that Failed to Execute su/msu Commands . . . . . . . . . . . . . . . . . Viewing Users without Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Users with Multiple Sessions Running . . . . . . . . . . . . . . . . . . . . . . . . . .
339
Introduction
Introduction
PATROL Knowledge Module for Unix and Linux monitors various aspects of the operating system that affect its security. The KM monitors characteristics of files such as whether or not the file has
s s
The KM also monitors characteristics of user accounts and user activity that pose a potential threat to security such as which users
s s s
failed to execute a set user (su or msu) command have no or blank passwords are running multiple sessions
NOTE
This chapter discusses how PATROL monitors the Unix operating system. It does not discuss the security features employed by PATROL. For that information, see the getting started guide for your product and the PATROL Security User Guide.
Object Hierarchy
Figure 54
UNIX OS
The SECURITY application class does not possess any instances or contain any parameters. Figure 54 illustrates the basic hierarchy. SECURITY Application Object Hierarchy
OS container
UNIX OS
Application class
340
Files
Files
The SECURITY application class enables you to monitor files with potentially dangerous permissions and privileges. With this feature, you can determine if a file has set user or group permissions and if a file can be written to by any user. The SECURITY tasks related to files are described in detail on the following pages: Task Viewing Files with SUID or SGID Permissions Viewing Files with Global Write Privileges Page 341 344
To View a List of Files with SUID and/or SGID Permissions 1 Access the SECURITY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
341
Files
3 Type the appropriate user name and password and click OK.
PATROL displays the Find SUID/SGID Files Like dialog box (Figure 56). Figure 56 Find SUID/SGID Files Like Dialog Box
4 Define the search criteria. The search is a logical AND operation that returns only
files that match all the criteria defined by the following fields. Field Start find at File Name Description the directory structure from which to begin the search. The default is root (/). the regular expression pattern for one or more files. For more information, see CRegular Expressions on page 407. Leave this field blank to search for any file name. the owner of the file(s) the group to which the owner of the file(s) belongs the period in days between the change date and the current date restricts the operation to the disk drive on which the directory defined in the Start find at field resides
File Owner File Group File Updated in n days ago Limit to one physical disk
5 Click Find.
PATROL builds a search expression, searches the system for files that match the criteria, and writes the results to a PATROL task object (List SUID and SGID Files) in the UNIX OS container.
342
Files
6 Access the List SUID and SGID Files task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> List SUID and SGID Files Begin: find /oracle/empdata/payroll \( -perm -004000 -o -perm -002000 \) -exec ls -ld {} \; -rwsr-sr-x 1 3Supvr admin 129 Jun 20 14:38 /oracle/empdata/payroll/may_2001 -------------------- >>>>> DONE <<<<< --------------------
Output Format
The output has the following format. Table 54 describes each expression.
Begin: find /path -name <text> \( -perm -004000 -o -perm -002000 \) -exec <ls> -ld {} \; -rwsr-sr-- # <username> <group> ### MMM DD hh:mm <path>/<file_name.ext> -------------------- >>>>> DONE <<<<< --------------------
Table 54
Find Files Like Command Output Format find command starting point for search file name pattern
- perm -00400 -o -perm defines the permissions of files that the find command looks for -002000 -exec ls -ld {} List of Files -rwsr-sr-# username dev ### MMM DD hh:mm location file permissions number of links to the file owner of the file group of owner size in bytes date-time stamp path and file name lists the contents of the specified directory options for the ls command: -l long format listing, -d list only the directory names and not its contents argument that substitutes current file
343
Files
To View a List of Files that Any User Can Write To 1 Access the SECURITY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the appropriate user name and password and click OK.
PATROL writes the results to a PATROL task object (List Files with Global Write) in the UNIX OS container.
4 Access the List Files with Global Write task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### /usr/openwin/lib/locale/libs /var/ntb/tmp /var/ntb/appcnfg/appmngr/System_Admin /etc/PERL /dev/stty
Output Format
The output has the following format. Table 55 describes each field.
directory/filename -------------------- >>>>> DONE <<<<< --------------------
Table 55 Field
directory/filename path and filename of file or directory with global write permissions
344
User Activity
User Activity
The SECURITY application class enables you to monitor user activity that could compromise your systems security. With this feature, you can determine which users have no or blank passwords, which users are running multiple sessions, and which users attempted to perform a set user command and failed. The SECURITY tasks related to users are described in detail on the following pages: Task Viewing Users that Failed to Execute su/msu Commands Viewing Users without Passwords Viewing Users with Multiple Sessions Running Page 345 346 348
To View a List of Users that Failed to Execute su/msu Commands 1 Access the SECURITY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the appropriate user name and password and click OK.
PATROL writes the information to a PATROL task object (List Failed su/msu logins) in the UNIX OS container.
345
User Activity
4 Access the List Failed su/msu logins task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> List Failed su/msu logins SU 01/02 15:56 - pts/8 dpallet-ssp SU 01/17 09:39 - pts/8 rabby-root SU 01/18 17:45 - pts/17 mmoulin-root SU 01/23 15:13 - pts/13 nedned-root
Output Format
The output has the following format. Table 56 describes each field.
cmd mm/dd hh:mm - pts/# acct_from-acct_to
List Failed su/msu logins Command Output Format Description the unsuccessful command subecome super user (root) or other user msua variant of su that is no longer supported by platforms on which PATROL KM for Unix and Linux runs month and date on which the failed login attempt occurred time at which the failed login attempt occurred pseudo tty subsystem slave terminal name the user account from which the command was executed the user account to which the acct_from user attempted to switch
346
User Activity
To View a List of Users that Do Not Have a Password or Have a Blank Password 1 Access the SECURITY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the appropriate user name and password and click OK.
PATROL writes the information to a PATROL task object (List Users Without Password) in the UNIX OS container.
4 Access the List Users Without Password task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results.Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> List users with-out password ------------------ >>>>> NIS LIST <<<<< -----------------guest2 admin_request larryking ADMIN-NEW ------------------ >>>>> LOCAL LIST <<<<< ----------------------------------- >>>>> DONE <<<<< --------------------
Output Format
The output has the following format. Table 57 describes each field.
------------------ >>>>> LIST SEPARATOR <<<<< -----------------username
Table 57 Field
List Users Without Passwords Command Output Format Description a line that separates and categorizes the accounts based on their location in the system NISNIS accounts without passwords LOCALaccounts on the local machine without passwords the user name of an account that either does not have a password or has a blank password
list separator
username
347
User Activity
To View a List of Users with Multiple Sessions Running 1 Access the SECURITY application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Type the appropriate user name and password and click OK.
PATROL writes the information to a PATROL task object (List Duplicate User ID Entry) in the UNIX OS container.
4 Access the List Duplicate User ID Entry task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> List users with duplicate user id user id: 9351 -- vdolor, tg1_a, tg1_b, tg2_a, tg1_b, pdolor, user id: 4262 -- mhartman, ldap, user id: 923 -- 3Supvr, 4Supvr, user id: 1092 -- r45, r46, user id: 2784 -- nots, yesman, -------------------- >>>>> DONE <<<<< --------------------
348
User Activity
Output Format
The output has the following format. Table 58 describes each field.
user id: 4262 -- <username_#>, <username_#+1>,
Table 58 Field
List Duplicate User ID Entries Command Output Format Description the user ID the user name under which an additional session is run
349
User Activity
350
Chapter
17
352 352 353 353 354 354 355 356 357 360 361 362 363 364 364 365 366 367 369 370
17
Chapter 17
351
Introduction
Introduction
The SNMPHealth application monitors the PATROL SNMP system. This application class also provides the ability to
s s s s s s
change the SNMP query port list PATROL SNMP system configuration information view PATROL SNMP MIB database information start SNMP Master Agent start and stop SNMP subagent test SNMP functionality
For information on how to configure the PATROL SNMP system, see the chapters on SNMP in the PATROL Agent Reference Manual.
Object Hierarchy
The SNMPHealth application class contains parameters with information on the PATROL SNMP system configuration, status of the SNMP subagent, and results from test run against the system. Figure 57 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 57 SNMPHealth Application Object Hierarchy
OS container
UNIX OS
Application class
Parameters
352
Architecture
Figure 58 shows the relationships between the PATROL SNMP Master Agent, the PATROL Agent, PATROL SNMP subagents, SNMP subagents, and the SNMP manager. It also lists their default port numbers. Figure 58 PATROL SNMP System Architecture
SNMP Manager 1. generates/sends requests to master or subagent 2. listens for traps
PA
PATROL Agent
resides on each remote machine PATROL Event Manager
SNMP Subagent
Makes PATROL KMs available via SNMP and sends traps to SNMP managers
Table 59 describes the role that each component plays in the PATROL SNMP architecture.
NOTE
Port 161 is an industry standard, while port 8161 is a PATROL standard. By running on port 8161, you can avoid possible conflicts with operating system vendors who are already using port 161 for an SNMP agent.
Chapter 17
353
SNMP Configuration
PATROL SNMP Subagent responds to SNMP queries by going into internal data structures and sending information back SNMP subagents can also generate or send PATROL traps directly to the SNMP Manager. PATROL SNMP Manager Functionality (PSL Functions) receives traps and issues queries to an SNMP agent The manager controls the agent by making SNMP requests of the agent and by setting variables in the agents management information base (MIB).
SNMP Configuration
The SNMPHealth application class enables you to review the PATROL SNMP system settings and change the most crucial setting, the query port number. With this application, you can also examine the information stored in the SNMP Management Information Base (MIB) by the PATROL Agent. SNMP configuration tasks are described in detail on the following pages: Task Changing SNMP Query Port Listing Configuration Information Viewing PATROL SNMP MIB Page 355 356 357
354
SNMP Configuration
NOTE
For the change to take effect, you must stop and restart the PATROL SNMP Master Agent.
To Change the SNMP Query Port 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 17
355
SNMP Configuration
3 Delete the existing port number and type in a new one. 4 Click Accept.
PATROL closes the dialog box and changes the value in the snmpmagt.cfg file. To force the PATROL SNMP Master Agent to use the new port, you must stop and restart the snmpmagt process. For information on starting and stopping the master agent, see Starting the SNMP Master Agent on page 361.
the PATROL SNMP variables and their values stored in the PATROL Agent configuration database the status of the SNMPStart parameter the status of the snmpmagt Query Port the status of the snmpmagt process the status of the SNMP subagent the contents of the configuration file, snmpmagt.cfg
For additional information on the PATROL SNMP system, see the PATROL Agent Reference Manual.
To View Configuration Information 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
356
SNMP Configuration
2 Enter the filename and location where you want to save this information. 3 Click OK.
PATROL writes the configuration information to the designated file and location. For additional information on specific configuration settings, see the PATROL Agent Reference Manual.
Chapter 17
357
SNMP Configuration
To View the SNMP Management Information Base for PATROL 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => Walk PATROL SNMP MIB.
PATROL displays the Walk PATROL SNMP MIB dialog box (Figure 60). Figure 60 Walk PATROL SNMP MIB Dialog Box
3 Define the portion of the PATROL SNMP MIB that you want to view.
Field Description
Host to Query the machine whose SNMP MIB you want to view Listening Port the port on which the master agent is listening Community
the SNMP community string defines the relationship between an SNMP server system and the client systems and acts like a password to control the clients' access to the server the amount of time PATROL waits before exiting; the default is set in the PATROL Agent Configuration variable /SNMP/default_timeout
Timeout
358
SNMP Configuration
Field
Retries
Description the number of times PATROL attempts to access the hosts MIB; the default is set in the PATROL Agent Configuration variable /SNMP/default_timeout the object ID
OID
4 Click OK.
PATROL writes the information to a PATROL task object (Walk PATROL SNMP MIB) in the UNIX OS container.
5 Access the Walk PATROL SNMP MIB task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
snmp_get returned: 2.1.2.1.2.1.2121.1.1.1.2.0 1 string / 2.1.2.1.2.1.2121.1.1.1.3.1.1.8.80.82.79.67.67.79.78.84 8 string PROCCONT 2.1.2.1.2.1.2121.1.1.1.3.1.1.6.75.69.82.78.69.76 6 string KERNEL 2.1.2.1.2.1.2121.1.1.1.3.1.1.3.76.79.71 3 string LOG 2.1.2.1.2.1.2121.1.1.1.3.1.1.9.66.108.111.99.107.83.105.122.101 9 string BlockSize 2.1.2.1.2.1.2121.1.1.1.3.1.1.14.83.101.116.117.112.67.108.101.97.114.84.101.120. 116 14 string SetupClearText 2.1.2.1.2.1.2121.1.1.1.3.1.1.10.67.79.77.80.79.83.73.84.69.83 10 string COMPOSITES 2.1.2.1.2.1.2121.1.1.1.3.1.1.9.78.84.95.72.69.65.76.84.72 9 string NT_HEALTH 2.1.2.1.2.1.2121.1.1.1.3.1.1.8.80.82.79.67.80.82.69.83 8 string PROCPRES 2.1.2.1.2.1.2121.1.1.1.3.1.1.10.70.73.76.69.83.89.83.84.69.77 10 string FILESYSTEM 2.1.2.1.2.1.2121.1.1.1.3.1.1.4.68.73.83.75 4 string DISK 2.1.2.1.2.1.2121.1.1.1.3.1.1.6.76.79.71.77.79.78 6 string LOGMON 2.1.2.1.2.1.2121.1.1.1.3.1.1.11.68.70.66.108.111.99.107.83.105.122.101 11 string DFBlockSize 2.1.2.1.2.1.2121.1.1.1.3.1.1.8.83.69.67.85.82.73.84.89 8 string SECURITY 2.1.2.1.2.1.2121.1.1.1.3.1.1.9.83.78.77.80.83.116.97.114.116 9 string SNMPStart 2.1.2.1.2.1.2121.1.1.1.3.1.1.3.83.77.80 3 string SMP <continued>
Chapter 17
359
Output Format
The output has the following format. Table 60 describes each expression.
name type length value
Walk PATROL SNMP MIB Command Output Format Description name of an SNMP MIB variable represented by its numeric object ID (OID) the data type of the value Valid data types include: string integer length of the value if its data type is string If the data type is integer, this field is empty. the value of the variable If the variable does not have a value, this field is empty.
length value
NOTE
The PATROL KM for Unix and Linux does not provide the ability to stop the SNMP Master Agent. This action requires root access.
The SNMPHealth start and stop tasks are described in detail on the following pages: Task Starting the SNMP Master Agent Starting the SNMP Subagent Stopping the SNMP Subagent Page 361 362 363
360
Check to see that the master agent has stopped running. You can verify the agents status by using one of the following methods: view the SNMPHealth capture diagnostic text parameter run the SNMP List Configuration menu command search the process table for the snmpmagt process
This command will fail if the SMUX port (tcp port 199) or the SNMP query port (defined in PATROL_HOME/lib/snmpmagt.cfg) is used by some other process.
To Start the Master Agent 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 17
361
To Start the subagent 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
362
the PATROL SNMP system will not function properly until the SNMP subagent is restarted PATROL changes the snmp_subagent_monitor parameter state to ALARM the snmp_subagent_start parameter attempts to restart the subagent within 60 seconds
NOTE
If you want to stop the SNMP subagent for an extended period of time (more than 60 seconds), you must disable the snmp_subagent_start parameter.
To Stop the Subagent 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
Chapter 17
363
The trap port is stored in the agent configuration variable /snmp/trap_port. The default value is 162. You might need to change this port setting if some other process already uses this port. This task will fail if the port is used by another process. This task should be performed in conjunction with the task, Generating Manual SNMP Traps on page 365. This task provides a mechanism (a PATROL task object) with which to view the manually generated traps.
To Test the Master Agents Ability to Receive Traps 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => Listen for SNMP Traps.
PATROL writes the information to a PATROL task object (Listen for SNMP Traps) in the UNIX OS container.
364
3 Access the Listen for SNMP Traps task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
SNMP Listen Running...
NOTE
While the task object is executing, it displays any SNMP traps received at the trap port.
To Generate Manual Traps 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => Generate Manual SNMP Trap.
PATROL displays the Generate a Manual SNMP Trap dialog box.
Chapter 17
365
4 Click OK.
PATROL closes the dialog box and sends the trap to the SNMP listening process started in step 2.
5 Access the Listen for SNMP Traps task object. Your results should resemble this
example:
SNMP Listen Running... From: 27.137.19.172 (2.1.2.1.2.1.2121) Enterprise Specific (1) Uptime: 2 day(s) 4:22:11 (1) 2.1.2.1.2.1.2121.1 6 string test 1 2.1.2.1.2.1.2121.2 6 string test 2 2.1.2.1.2.1.2121.2 6 string test 2 2.1.2.1.2.1.2121.2 6 string test 2
To Test the Master Agents Ability to Receive Traps 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => SNMP Query PATROL Master Agent.
PATROL displays the SNMP Query PATROL Master Agent dialog box.
366
Figure 61
3 Click OK.
PATROL writes the information to a PATROL task object (SNMP Query PATROL Master Agent) in the UNIX OS container.
4 Access the SNMP Query PATROL Master Agent task object as described in
Accessing KM Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
host: listening_port: community: timeout: retries: oid: <accounting_db_3> <1161> <public> <> <> <.1.3.6.1.2.1.1.1.0>
111 string
Chapter 17
367
To Test the Ability of the Platform.km to Receive Traps 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => SNMP Query PATROL platform.km.
PATROL displays the SNMP Query platform.km dialog box. Figure 62 SNMP Query PATROL Platform.km Dialog Box
3 Click OK.
PATROL writes the information to a PATROL task object (SNMP Query PATROL platform.km) in the UNIX OS container.
368
4 string
To determine if any SNMP managers are listening 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => SNMP Query Using snmp_h_get( ).
PATROL displays the SNMP Query Using snmp_h_get( ) dialog box.
3 Click OK.
Chapter 17 Monitoring the Health of SNMP 369
PATROL writes the information to a PATROL task object [SNMP Query Using snmp_h_get( )] in the UNIX OS container.
NOTE
If an SNMP manager is not listening on port 161, PATROL times out and returns an error (errorno=95).
To Test the Event Managers Automated SNMP Traps 1 Access the SNMPHealth application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
2 Select Test PATROL SNMP System => Test SNMP Traps from PEM.
PATROL creates a task object entitled Test SNMP Traps from PEM. PATROL writes the information to a PATROL task object (Test SNMP Traps from PEM) in the UNIX OS container.
370
3 Access the Listen for SNMP Traps task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results. Your results should resemble this example:
SNMP Listen Running...
4 Select one of the following tests: Test PATROL SNMP System =>
s s s
Set testparm Parameter OKtest PATROL standard event class 9 Set testparm Parameter Alarmtest PATROL standard event class 11 Set testparm Parameter Warntest PATROL standard event class 11
PATROL changes the state of testparm in the SNMPHealth application. PATROL also sends a message to the message area. Figure 63 State Change Messages Based on Automated Traps
NOTE
If you attempt to run a test and the testparm is already in that state (for example, select Set testparm Parameter OK when testparm is already in the OK state), PATROL recognizes this fact and does not send a message to the message area.
5 Access the Listen for SNMP Traps task object. Your results should resemble this
example, a trap for Set testparm parameter to Warn command:
From: 27.137.19.172 (2.1.2.1.2.1.2121.1.1.2) Enterprise Specific (4) Uptime: 0 day(s) 20:17:29 (7304900) 2.1.2.1.2.1.2121.1.1.2.1.0 93 string Alarm #1 of global parameter 'testparm' triggered on 'SNMPHealth.SNMPHealth'. 1 <= 1.00 <= 1 2.1.2.1.2.1.2121.1.1.2.2.0 31 string /SNMPHealth/SNMPHealth/testparm 2.1.2.1.2.1.2121.1.1.2.3.0 0 string
Chapter 17
371
372
Chapter
18
374 374 375 375 376 377 378 379 380
18
Monitoring Users
The PATROL Knowledge Module for Unix and Linux gives you the ability to monitor resource consumption by individual users. With it, you can also track the number of users and sessions running on the system. The following sections appear in this chapter. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Object Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Print Jobs that Belong to a User. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing Processes that Belong to a User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Amount of Disk Space Consumed by a User . . . . . . . . . . . . . . . . . . Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Number of Users on the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing the Number of Sessions Running on the System . . . . . . . . . . . . . . . . . .
Chapter 18
Monitoring Users
373
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux monitors the resource consumption of individual users as well as the number of users and sessions that run on the system. For individual users, it monitors
s s s
the number of print jobs issued by a user the amount of disk space consumed by a user the number of processes owned by a user
Object Hierarchy
The USERS application class contains several parameters with information about the number of users logged onto the system and the number of sessions running. Figure 64 illustrates the basic hierarchy but does not necessarily display all instances and parameters. Figure 64 USERS Application Object Hierarchy
OS container
UNIX OS
Application class
Parameters
374
Resources
Resources
The USERS application class enables you to monitor an individual users resource consumption. With this feature, you can discover how many resources (CPU, disk space, printer) an individual user is consuming. The USERS tasks are described in detail on the following pages: Task Viewing Print Jobs that Belong to a User Viewing Processes that Belong to a User Viewing the Amount of Disk Space Consumed by a User Page 375 376 377
To List a Users Print Jobs 1 Access the USERS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
Chapter 18
Monitoring Users
375
Resources
4 Access the List Print Jobs Users task object as described in Accessing KM
Commands and InfoBoxes on page 402 and view the results.
To List a Users Processes 1 Access the USERS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
weights
376
Resources
Output Format
The output has the following format. Table 61 defines each field.
pid ppid user s size cput cmd name cmd line
Process List Command Output Format Description the process ID of the process the process ID of the parent process the name of the user that owns the process the status of the process Iintermediate 0nonexistent Rrunning Ssleeping Tstopped Wwaiting Xgrowing Zzombie, terminated the total size of the process in virtual memory, in blocks the first word of the command line that started the process the complete command line (command and arguments up to 80 characters) that started the process; note that the command line can be modified during the process execution
To List the Amount of Disk Space Consumed by a User 1 Access the USERS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
Chapter 18
Monitoring Users
377
Numbers
4 Access the Disk Space Users task object as described in Accessing KM Commands
and InfoBoxes on page 402 and view the results. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> show user: 3Suprv disk space information Processing, this might take a while, please wait ... NIS is detected, get information from NIS database Disk usage for user: 3Suprv 20 /home/3Suprv/pcache/tmp 68 /home/3Suprv/pcache/knowledge 16 /home/3Suprv/pcache/psl 16 /home/3Suprv/nsmail ---------------- >>>>> DONE <<<<< ----------------
Output Format
The output has the following format. Table 62 defines each field.
size /path/
Disk Space Command Output Format Description the amount of space allocated to a file File size is written in 512-byte units, rounded up to the next 512-byte unit. For example, a 513-byte file is reported as using 2 units, 1024 bytes. the directory path in which files owned by the user are stored
/path/
Numbers
The USERS application class enables you to monitor the amount of usage in terms of users and sessions. With this feature, you can discover how many users are on the system and how many sessions are running. You can view the information for the present moment in time or in the recent past. The USERS tasks are described in detail on the following pages: Task Viewing the Number of Users on the System Viewing the Number of Sessions Running on the System Page 379 380
378
Numbers
To View the Total Number of Users Recently on the System 1 Access the USERS application so that you can view its parameters. 2 Open the USRNoUser parameter.
PATROL displays a graph that shows the number of users on the system over time.
Chapter 18
Monitoring Users
379
Numbers
To View the Total Number of Sessions Recently Running on the System 1 Access the USERS application so that you can view its parameters. 2 Open the USRNoSessions parameter.
PATROL displays a graph that shows the number of sessions running on the system over time.
380
Appendix
A
382 382 383 385 386 388 388 389 390 391 392 392 393 394 395 396 396 397 398 398 399 400 400
Appendix A
381
Introduction
Introduction
The PATROL Knowledge Module for Unix and Linux provides diagnostic and debugging utilities to help pinpoint errors if and when they occur. The capabilities include
s s
Viewing installation statistics Capturing DUMP information for selected components Log file diagnostics Debugging Collectors for the following application classes: CPU FILESYSTEM KERNEL MEMORY NETWORK NFS PRINTER PROCESS USERS Debugging Discovery for the following application classes: DISK FILESYSTEM NETWORK PRINTER SMP SWAP
Unix Diagnostics
This PATROL Knowledge Module for Unix and Linux gathers installation and configuration information as well as monitor important operating system log files. The UNIX OS tasks related to the diagnostic procedures are described in detail on the following pages: Task Capturing DUMP Information for Selected Components Page 383
382
Unix Diagnostics
To Capture Unix Diagnostic Information 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Select the %DUMP Options check box. 4 Place the cursor in the Output File for Diagnostics field and type the path and
filename to which you want the diagnostic information written.
Appendix A
383
Unix Diagnostics
5 Click Accept.
PATROL displays the DUMP Options dialog box (Figure 68 on page 384). Figure 68 %DUMP Options Dialog Box
6 Select the check boxes of the components for which you want PATROL to provide
information. Table 63 lists the options in alphabetic order. Table 63 Options ALL APP_INSTS APPS CONSOLES ERRORS GLOBALS KM_LIST LIBRARIES PARAMS RTLIST Capture Unix Diagnostics %DUMP Options Description information about PATROL Agent data structure information about each application instances list of applications list of connected consoles list of PSL errors that have occurred since the last reboot list of global channels list of loaded KMs list of loaded libraries list of PATROL Agent parameters information about processes in the PATROL Agent run-time queue
CHANNELS list of open PSL global file channels and open process channels
384
Unix Diagnostics
Capture Unix Diagnostics %DUMP Options Description list of items scheduled in the run queue provides a list of current tasks provides a list of current PSL processes
7 Click Accept.
PATROL writes the information to the file that you specified in step 4 and to a task object (Capture Unix Diagnostics) in the UNIX OS container.
To Capture Installation Diagnostic Information 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Select the Installation Diagnostics check box. 4 Place the cursor in the Output File for Diagnostics field and type the path and
filename to which you want the diagnostic information written.
5 Click Accept.
PATROL writes the information to a task object (Capture Unix Diagnostics) in the UNIX OS container. Your results should resemble this example:
# PSL Serial No.: ######### <NOT INTERACTIVE> The remaining diagnostics will be written to the diagnostic log file but will not be displayed in the task window.
Appendix A
385
Unix Diagnostics
Capturing Agent Configuration Variables. Capturing Default Agent Configuration Variables. Capturing Non-Default/Overridden Agent Configuration Variables. Capturing diagnostics related to the PATROL installation and environment. Capturing list of symbolic links under PATROL installation. Capturing setuid and setgid files that exist under PATROL installation. Capturing information about apidll, dcm, and bgscollect. BEST1_HOME directory = /local/Patrol35/Solaris-2-8-sparc-64/best1
Capturing setuid and setgid files that exist under BEST1_HOME installation. Capturing license details for PATROL installation. Capturing df -k. Capturing ls -ld on all directores under /local/Patrol35. Capturing ls -lRu /local/Patrol35. Capturing ls -lR /local/Patrol35. Closing OutputDiagFile: /tmp/PDiag.log
To Capture Unix Diagnostic Information 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
3 Select the Log Files check box. 4 Place the cursor in the Output File for Diagnostics field and type the path and
filename to which you want the diagnostic information written.
5 Click Accept.
PATROL displays the Select Log Files to Collect dialog box (Figure 69 on page 387).
386 PATROL Knowledge Module for Unix User Guide
Unix Diagnostics
Figure 69
6 Select the check boxes of the log files that you want PATROL to capture. Table 64
lists the options in the order that they appear in the dialog box. Table 64 Options Select Log Files to Collect Options Description
All Logs Contained in gathers log information from all the log files stored in the $PATROL_HOME/log PATROL log directory Agent Error Log DCM Debug Log apidll Log gathers log information the PATROL Agent gathers log information from the Data Collection Manager executable used in the DCM collection method gathers log information from the C library loaded by the PATROL Agent during runtime so that it can read and write to FIFO gathers log information from the bgscollect executable, which accesses the kernel, retrieves the requested data, and writes it to the shared memory segment gathers log information from the MrConsumer library, which is used by DCM to read the data from the shared memory segment written by bgscollect executable
bgscollect Log
MrConsumer Log
7 Click Accept.
PATROL writes some of the information to a task object (Capture Unix Diagnostics) in the UNIX OS container. PATROL writes the entire contents of all the log files that you selected to the .tar file that you specified.
Appendix A
387
388
rule state of all instances the debug command used to collect information the information returned by the command for each instance file system blocks file system block size file system blocks available total blocks available blocks used blocks file system block capacity represented as an integer and a decimal number of files in the file system number of used i-nodes file system i-node capacity represented as an integer and a decimal
To Turn Debugging On/Off for DFColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
Appendix A
389
To Turn Debugging On/Off for NETColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
s s s s
call information for server rpc: connectionless and connection-oriented server nfs: versions 2 and 3 server nfs_acl: versions 2 and 3 client rpc: connectionless and connection-oriented server nfs_acl: version 2 and 3 values of the last nfs_stat command cross-reference list between file systems delta data values of the current nfs_stat command
390
To Turn Debugging On/Off for NFSColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
To Turn Debugging On/Off for PRINTERColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
Appendix A
391
machine type and operating system level the Unix list active processes (ps) command output results from previous Unix active process command list of process by process ID size of the processes runtime of the processes number of total processes number of shared processes
To Turn Debugging On/Off for PSColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
392
nonroot logins nonroot users with processes user process statistics number of user processes average number of processes per user total number of processes number of zombie processes
To Turn Debugging On/Off for USRPROCColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
Appendix A
393
the number of running, blocked, and waiting processes swap and free memory sizes paging statistics disk statistics faults statistics cpu statistics
To Turn Debugging On/Off for VMColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
When the debug feature is turned on, PATROL writes the debug information to the system output window when the collector runs.
NOTE
This task does not provide debugging information for the DCM collection method. Rather, it provides debugging information for the PSL collector that monitors the DCM collection method and that populates the DCM parameters.
394
To Turn Debugging On/Off for DCMColl 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
Appendix A
395
access rates reads per second writes per second amount of data processed kilobytes read per second kilobytes written per second transactions service average number of transactions waiting for service average number of transactions actively being serviced average service time in milliseconds
To Turn Debugging On/Off for DISK Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
2 Select Knowledge Module Admin => DISK Application => Toggle DISK Disc. Debug.
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 DISK debug set to TRUE CCYY0621151414 DISK debug set to FALSE
396
mounted systems file system instances name PATROL object labels PATROL object rule state file system type machine type options
To Turn Debugging On/Off for FILESYSTEM Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 FILESYSTEM debug set to TRUE CCYY0621151414 FILESYSTEM debug set to FALSE
To Turn Debugging On/Off for NETWORK Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
2 Select Knowledge Module Admin => NETWORK Application => Toggle NETWORK
Disc. Debug.
Appendix A
397
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 NETWORK debug set to TRUE CCYY0621151414 NETWORK debug set to FALSE
To Turn Debugging On/Off for PRINTER Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
2 Select Knowledge Module Admin => PRINTER Application => Toggle PRINTER Disc.
Debug.
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 PRINTER debug set to TRUE CCYY0621151414 PRINTER debug set to FALSE
To Turn Debugging On/Off for SMP Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
2 Select Knowledge Module Admin => SMP Application => Toggle SMP Disc. Debug.
398
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 SMP debug set to TRUE CCYY0621151414 SMP debug set to FALSE
To Turn Debugging On/Off for SWAP Discovery 1 Access the UNIX OS application menu as described in Accessing KM Commands
and InfoBoxes on page 402.
2 Select Knowledge Module Admin => SWAP Application => Toggle SWAP Disc.
Debug.
Depending upon the current debug state, PATROL writes one of the following messages to the system output window. TRUE means that debug is turned on. FALSE means that debug is turned off.
CCYY0621151414 SWAP debug set to TRUE CCYY0621151414 SWAP debug set to FALSE
Appendix A
399
To Collect PSL Debugger Data for the SCHEDULER Application 1 Access the SCHEDULER application menu as described in Accessing KM
Commands and InfoBoxes on page 402.
3 Select the check boxes for the PSL debug options that you want to turn on, and
click Accept.
NOTE
The left side of the dialog box controls debug options for the scheduler daemon. The right side of the dialog box controls debug options for the graphical user interface (GUI). Debug information is only sent to the PATROL Agent Console window when the area being debugged is active. The PATROL KM for Unix does not generate debug data when the scheduler daemon is sleeping, or the GUI is not being used. The left side PATROL begins collecting debug data for the options that you selected. Debug information is displayed in the System Output Window.
400
Appendix
BMC Software, Inc. offers several PATROL consoles from which you can view a PATROL Knowledge Module (KM). Due to the environments in which these consoles run, each one uses different methods to display and access information in the KM. This appendix provides instructions on how to access the KM menu commands and InfoBoxes, and how to access the online Help for the KM using each of the PATROL consoles. Accessing KM Commands and InfoBoxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Online Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Mouse. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Mouse to Perform Tasks in PATROL . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 402 404 405
Appendix B
401
PATROL Console for Microsoft Right-click the application icon Windows and choose KM Commands. PATROL Console for Unix PATROL Central - Microsoft Windows Edition
Right-click the application icon. Click MB2 on the instance icon. From an applications page, click KM Commands.
PATROL Central - Web Edition Right-click the application icon From the Monitored Systems and choose Knowledge Module page, click the system that you Commands. want, and click the Infobox tab to view the InfoBox for that system. To view the InfoBox for an application, drill down into a Monitored System until you can click the application instance that you want, and click the Infobox tab.
NOTE
If you are trying to access Help from a Unix console, you may want to refer to the PATROL Installation Guide for specific instructions on how to install and setup a browser in the Unix environment.
402
Table 66 Console
Accessing Online Help (Part 1 of 2) To access product help Right-click the PATROL for Unix and Linux application icon and choose KM Commands => Product Help. From the console menu bar, choose Help => Help Topics => PATROL Knowledge Modules. To access application class help Double-click the application class in the KM tab of the console. Then click the Help tab and Show Help in the Application Properties dialog box. To access parameter help Right-click the parameter icon, and choose Help On from the pop-up menu. Double-click the parameter icon; then click the ? icon or Help button in the parameter display window. Double-click the parameter in the KM tab of the console; then click the Help tab and Show Help in the properties dialog box.
Right-click the PATROL for Unix and Linux application icon and choose KM Commands => Product Help. From the console menu bar, choose Help On => Knowledge Modules.
Right-click the Choose Attributes => Application Classes and parameter icon, and click Help On. double-click the application name. Then click Show Help in the Application Definition dialog box.
Appendix B
403
Table 66 Console
Accessing Online Help (Part 2 of 2) To access product help To access application class help From the Operator tab of the console, expand or collapse the list to find the application class. Click the Whats this? Help button and then To access parameter help Double-click the parameter icon to open its display window. Click the Help button.
PATROL Central - From the console menu Microsoft Windows bar, choose Help => Edition Help Topics. Then double-click the name of your KM.
click the application class name. PATROL Central Web Edition Click the Help link, and Click the link for the Click the link for the then click the link for application class, and parameter, and then your KM. then click the Page Help click the Page Help link. link.
404
Push-buttons are activated by clicking the left mouse button (MB1). InfoBoxes are displayed by clicking the left and right mouse buttons simultaneously, or by clicking the middle mouse button (MB2) on a three-button mouse. Menus are activated by clicking the right mouse button (MB3).
NOTE
PATROL creates menus dynamically, so there may be a delay when you access menus. Click and hold down MB3 until the pop-up menu is displayed.
Appendix B
405
406
Appendix
C
408 409 410 411 411 410
Regular Expressions
This appendix describes how to use regular expressions in the context of the PATROL Knowledge Module for Unix and Linux. Not all components of the PATROL KM for Unix and Linux support regular expressions. This appendix lists the components that support regular expressions, defines the regular expression character set for PATROL KM for Unix and Linux, and provides some examples. The following sections appear in this appendix. Components that Use Regular Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Characters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Conventions for Using Regular Expressions with PATROL Objects . . . . . . . . . . . . . Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix C
Regular Expressions
407
PRINTER exclusion list SECURITY List SUID and SGID Permission s File Name field s File Owner field s File Group field
408
Characters
Characters
You can use the following special characters when creating a regular expression.
NOTE
In PATROL KM for Unix and Linux, the parenthesis ( ) and pipe | characters are paired with a backslash \. This pairing varies from the standard regular expression character set.
Regular Expression Characters Description matches any single character matches zero or more instances of the previous pattern item matches one or more instances of the previous pattern item matches zero or one instances of the previous pattern item
\(\ ) (backslash and groups a sub-pattern parenthesis) The repetition and alternation operators apply to the whole proceeding subpattern. \| (backslash and vertical bar or pipe) [ ] (brackets) provides an alternative This character functions similarly to a logical OR. delimits a set of characters Ranges are specified as [x-y]. If the first character in the set is ^, then there is a match if the remaining characters in the set are not present. ^ (caret) anchor the pattern to the beginning of the string This character applies only when first. $ (dollar sign) anchor the pattern to the end of the string This character applies only when last.
Appendix C
Regular Expressions
409
Characters
Examples
The following examples illustrate how to use regular expressions.
exclusion
[^a-zA-Z]matches anything except uppercase and lowercase letters.
repeated sequences
\(st\)+matches a string that has one or more sequences of st.
anything
.*matches anything.
410
Format
For a file, the format for a regular expression is
directory-subdirectory-subdirectory-file
For a PATROL object, such as a parameter, the format for a regular expression is
computer:-application-instance-parameter
EXAMPLE
The file system /app/oracle/usr would be represented as app-oracle-usr in a regular expression.
Examples
The following examples illustrate how to use regular expressions with PATROL objects and pathnames.
a directory or object
tmpmatches tmp directory
Appendix C
Regular Expressions
411
subdirectories
etc-testmatches directory or file system /etc/test
412
Appendix
D
414 414 415 415 415 416
Appendix D
413
the Stop Monitoring menu command from DISK, FILESYSTEM, or PRINTER instances (exclusion list only) the Edit <application> Exclusion List menu command from DISK, FILESYSTEM, or PRINTER instances (exclusion list only) pconfig tool
NOTE
When using xpconfig or wpconfig to create an exclusion list, add both entries (pathname-instance and /pathname/instance) for each instance that you intend to exclude. For more information, see Benefits of Creating Exclusion Lists Using Menu Commands on page 415.
414
/AgentSetup/application.filterListcontains the list of instances to include or exclude depending upon the value of application.filterType
The format is a comma-separated list of instances or regular expressions. The variable has a limit of 1024 characters. Regular Expressions can be used to alleviate this limitation. The error: Exclusion list too long. Please use regular expression exclusion. is generated when a filter exceeds the maximum size allowed for an Agent configuration variable.
s
inclusion If application.filterType does not exist, the list defaults to exclude. Valid values are exclude include
Appendix D
415
The menu commands add two entries into the /AgentSetup/application.filterList for each instance excluded.
s
The first entry is in the form pathname-instance, where slashes are replaced by dashes and the initial slash is omitted.
EXAMPLE
mnt-hpserv-users indicates the file system /mnt/hpserv/users.
EXAMPLE
/mnt/hpserv/users indicates the file system /mnt/hpser/users.
This entry is used to display the instance in the <application> Exclusions dialog box. If you omit this entry, the instance will not appear in the dialog box.
NOTE
The user assumes full responsibility for maintaining this list.
The Stop Monitoring menu command on an application will not work. Initially, the instance will disappear from the list of monitored instances. However, the instance reappears during the next discovery cycle.
416
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Index
Symbols
/snmp/default_port variable 369 /SNMP/default_r_community variable 366 /snmp/piV1m_list variable 369, 370 /snmp/trap_port variable default value 364
A
accessing InfoBoxes 405 menu commands 405 push-buttons 405 accounts Network Information System (NIS), listing 218 activating application classes 100 parameters 100 PRINTER application class 225 Address Resolution Protocol (ARP) cache, adding hosts 205 cache, deleting hosts 203 cache, viewing 202 addresses host, listing 187 host, output format 188 internal state 184 IP, listing 187 IP, output format 188 Network IP, determining 191 network, output format 185 network, viewing 184 remote, viewing 184 ALL_COMPUTERS application class parameters 50 application classes activating 100 COMPOSITE, hierarchy 118 description 22 HEALTH AT A GLANCE 158 icons 22 NFS 214 PRINTER, activating 225 PRINTER, object hierarchy 224 PROCESS, object hierarchy 244 PROCESS_PRESENCE, object hierarchy 244 SCHEDULER, object hierarchy 312 SECURITY, object hierarchy 340 SNMPHealth, object hierarchy 352 application menus
COLLECTOR 33 COMPOSITES 33 COMPOSITES_COLLECTOR 33 Computer Instance 30 CPU 34 DCM 34 DISK 34 FILESYTEM 35 HEALTH AT A GLANCE 36 KERNEL 36 MEMORY 36 NETWORK 37 NFS 38 PATROL 38 PATROLAGENT 39 PRINTER 41 PROCCONT 42 PROCESS_PRESENCE (PROCCONT) 42 PROCPRES 43 SMP 44 SNMPHealth 45 SWAP 46 UNIX OS 31 USERS 47
B
bang path, Unix to Unix Communication Protocol (UUCP) 206 blackout cancelling a scheduled script 337 creating a script 327 deleting a script 334 modifying a script 331 specifying a script default directory 326 viewing a script 330 BMC Software, contacting 2 build date viewing, kernel 112
C
cache Address Resolution Protocol (ARP), adding hosts 205 Address Resolution Protocol (ARP), deleting hosts 203 Address Resolution Protocol (ARP), viewing 202 CD-ROM systems exclusion from file system monitoring 140 collecting PSL debug data 322325 COLLECTORS application class data collection methods 88 icons 22 menus 33
Index
417
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
object hierarchy 88 parameters 51 commands File Transfer Protocol (ftp), supported by PATROL 198 msu attempts, listing failed 345 Ping, using in PATROL 199 rlogin 200 set user (su) attempts, listing failed 345 Stop Monitoring 144 COMPOSITE application class object hierarchy 118 composite parameters creating 118 creating expressions 119 creating expressions manually 124 creating expressions with the wizard 121 expressions, deleting 126 expressions, editing 125 expressions, examples 120 expressions, syntax rules 120 icon 119 instances 118 object hierarchy 118 relational operators 118 setting the status 121 COMPOSITES application class menus 33 object hierarchy 118 parameters 52 COMPOSITES_COLLECTOR application class icons 22 menus 33 parameter icons 22 parameters 52 Computer Instance application class icons 22 menus 30 computer systems trusted 198 configuration mouse 404 PATROL SNMP, listing 356 PATROL SNMP, saving in ASCII file 357 configuring activating application classes 100 activating parameters 100 context switches, CPU statistics 109 counters, resetting for NFS servers 217 CPU detection 108 hogs, list output format 297 hogs, viewing 295 multi-processor, viewing statistics 110 processes using excessive amounts, viewing 295 viewing, top ten processes using 297 CPU application class icons 22 menus 34 object hierarchy 106 parameters 52 CPU usage monitoring, overall system usage 159 CPU utilization idle time, viewing 108 interrupts, viewing data 109 monitoring 106 monitoring, detection 108 multi-processor, statistics 110 percentage used 108 run queue, viewing 109 switches, viewing 109 system mode, viewing 108 user time, viewing 108 viewing 108 waits, viewing 109 cross-platform monitoring 216 customer support 3
D
Data Collection Manager (DCM) data collection methods 91 data collection methods application classes 88 changing 98 COLLECTORS application class 88 Data Collection Manager (DCM) 91 DCM 90, 92 DCM application class 89 DCM, parameters 91 determining which is used 98 kernel-level data 91 managing 98 object hierarchies 88 PATROL Perform Collection 91 PATROL Perform collector 91 PATROL PSL 95 PSL parameters, activated 95 Unix utilities 92, 95 dblk statistics, viewing 181 DCM collection method 90 DCM application class data collection methods 89 icons 22 menus 34 object hierarchy 89 parameters 53 DCM collection method gathering data 92 DCM data collection deactivated parameters 93
418
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
parameters 91 selecting 98 deactivated parameters DCM data collection 93 PSL data collection 95 debug data 322 deleting files, by characteristics 153 files, by date updated 155 files, by group 155 files, by name 155 files, by owner 155 files, on single physical disk 155 files, output format 156 semaphores 168 shared-memory segments 166 destination networks, listing 192 device names, file system mounting 148 devices network, obtaining information 202 directories Unix to Unix Communication Protocol (UUCP) 206 discovery mounted disks 128 network interface, name 179 DISK application class icons 22 menus 34 object hierarchy 128 parameters 56 disk monitoring excluding 130 exclusion list 414 inclusion list 414 resuming 132 resuming monitoring 131 resuming on all disks 133 selecting disks 131 disks discovery 128 files, removing on single disk 155 synchronizing file system cache 149 composite parameters, syntax 120 composite parameters, syntax rules 120 creating manually, composite parameters 124 deleting, composite parameters 126 regular, disk monitoring 131 regular, file searches 151 regular, file system monitoring 139
F
file system capacity managing 141 file system cleanup automating 141 recovery actions, attended mode 143 file system monitoring CD-ROM exclusion 140 exclusion by type 140 exclusion list 414 exclusion lists 138 inclusion 139 inclusion list 414 NFS systems, excluding 140 process control systems, exclusion 140 regular expressions 139 file system searches output format 152 File Systems exclude from being monitored 144 monitoring 144 file systems cache, synchronizing to disk 149 device names, mounting 148 monitoring, overall usage 159 mounting 146 mounting, automatic 147 mounting, manual 147 mounting, paths 148 NFS servers, listing 216 NFS, resetting counters 217 searching 150 searching, on single physical disk 151 unmounting 148 unmounting, automatically 148 unmounting, manually 149 File Transfer Protocol (ftp) commands, supported by PATROL 198 using with PATROL 198 files copying, File Transfer Protocol (ftp) 198 copying, Unix to Unix Communication Protocol (UUCP) 208 deleting based on characteristics 153 deleting, based on name 155 deleting, by date updated 155 deleting, by group 155
E
entries viewing statistics 114 exclusion list 414 file systems 138 exclusion lists disks, monitoring 130 expressions composite parameter wizard 121 composite parameters, creating 119 composite parameters, editing 125 composite parameters, examples 120
Index
419
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
deleting, by owner 155 deleting, on single physical disk 155 global-write privilege, viewing 344 locating 150 locating, by date updated 151 locating, by file name 151 locating, by group 151 locating, by owner 151 locating, on single physical disk 151 locating, output format 152 locating, SGID-protected 341 locating, SUID-protected 341 removing, output format 156 SGID-protected, listed output format 343 SGID-protected, listing 341 SUID-protected, listed output format 343 SUID-protected, listing 341 transferring, File Transfer Protocol (ftp) 198 Unix to Unix Communication Protocol (UUCP) 206 Unix to Unix Communication Protocol (UUCP) log, viewing 210 Unix to Unix Communication Protocol (UUCP), deleting 207 FILESYSTEM application class icons 23 menus 35 object hierarchy 137 parameters 58 filesystem table, recording mounts 148 hosts adding to Address Resolution Protocol (ARP) cache 205 deleting from Address Resolution Protocol (ARP) cache 203 trusted, listing 198 Unix to Unix Communication Protocol (UUCP), listing 210
I
I/O operations CPU statistics, waiting 109 icons application classes 22 composite parameter instance 119 inclusion list 414 InfoBoxes accessing with the mouse 405 i-nodes entries, viewing files located 114 slots, viewing used 114 slots,viewing statistics 114 viewing conversions 114 interrupts, CPU statistics 109 IP address obtaining 202 IP addresses determining 191 listing 187 output format 188 IPV4 protocol, viewing statistics 191
G
global write privilege files, listing 344 group process ID listing nice value of processes 301 groups Network Information System (NIS), list output 220 Network Information System (NIS), listing 219
J
job modifying a scheduled script 321 removing a scheduled script 321 scheduling a command interpreter script 315 scheduling a PSL script 318 scheduling an operating system command script 313 jobs print, viewing for one printer 231 printer, deleting all from a print queue 234 printer, moving all jobs 236 printer, moving one job 235 printers, listing for system 232
H
HEALTH AT A GLANCE application class 158 icons 23 menus 36 object hierarchy 158 parameters 58 help accessing in a PATROL Console for Windows 26 accessing in PATROL Central - Web Edition 26 accessing in PATROL Central - Windows Edition 26 accessing in PATROL Console for Unix 26 online 25 host addresses listing 187 output format 188
K
kernel build date, viewing 112 dynamically allocated memory 113 memory allocation, viewing 113 memory requests 113
420
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
monitoring resources 106 monitoring, detection 112 viewing system usage 115 KERNEL application class icons 23 menus 36 object hierarchy 111 parameters 59 kernel data active semaphores 115 directory block reads 115 message operations per second 115 percentage of file slots used 115 percentage of used lock slots 115 percentage of used process slots 115 system calls 115 kernel memory allocation (KMA), viewing 113 kernel-level data collection methods 91 km plug-in 304 knowledge module plug-in 304 memory See also virtual memory semaphores, viewing statistics 167 MEMORY application class icons 23 menus 36 object hierarchy 163 parameters 62 memory buffer allocation failures, viewing 181 memory buffers statistics, output format 183 statistics, viewing 181 memory requests categories 113 large, viewing allocated amount 113 large, viewing available amount 113 large, viewing failed amounts 113 oversized, viewing allocated amounts 113 small, viewing allocated amounts 113 small, viewing available amounts 113 small, viewing failed amounts 113 viewing failed amounts 113 menu commands accessing with the mouse 405 menus COLLECTOR application 33 COMPOSITES application 33 COMPOSITES_COLLECTOR application 33 Computer Instance application 30 CPU application 34 DCM application 34 DISK application 34 FILESYTEM application 35 HEALTH AT A GLANCE application 36 KERNEL application 36 location of KM commands 29 MEMORY application 36 NETWORK application 37 NFS application 38 PATROL application 38 PATROLAGENT application 39 PRINTER application 41 PROCCONT application 42 PROCESS_PRESENCE (PROCCONT) application 42 PROCPRES application 43 SECURITY application 44 SMP application 44 SNMPHealth application 45 SWAP application 46 UNIX OS application 31 USERS application 47 modifying a scheduled task defined by a script 321 monitoring blackout cancelling a scheduled script 337
L
large memory requests viewing allocated amounts 113 viewing available amounts 113 viewing failed amounts 113 linkblk statistics, viewing 181 locating files, by date updated 151 files, by group 151 files, by owner 151 files, on single physical disk 151 files, search output format 152 locating, files 150 log files Unix to Unix Communication Protocol (UUCP), viewing 210 logins remote, using with PATROL 200
M
Machine Access Control (MAC) obtaining 202 Management Information Base (MIB) checking SNMP information 357 managing data collection 98 file system capacity 141 semaphores 167 mblk statistics, viewing 181
Index
421
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
creating a script 327 deleting a script 334 modifying a script 331 specifying a default directory for scripts 326 viewing a script 330 CPU usage, overall for system 159 CPU utilization 106 CPU utilization, viewing statistics 108 cross-platform 216 disks, excluding 130 disks, resuming for all 133 disks, selecting 131 file system usage, overall for system 159 file systems, excluding 138 file systems, selecting 139 kernel resources 106 kernel, detection 112 network data, activating 176 overall system health 158 poll time, parameters 92 printers, excluding 227 printers, including 227 printers, jobs in queue 228 processes waiting on resources 298 processes, configuring a process to alarm when its PPID is not 1 262 processes, configuring a process to alarm when its PPID is owned by unauthorized user 265 processes, configuring a process to alarm when number exceeds set limit 250 processes, configuring a process to alarm when number falls below set limit 253 processes, configuring a process to stop 259 processes, configuring a process to suspend alert for n cycles if not running 268 processes, configuring communication for a process host group 284 processes, configuring multiple instances of 247 processes, configuring to restart a process when it dies 256 processes, creating a host group 283 processes, deleting a process from the monitoring queue 278 processes, modifying host attributes in a process host group 285 processes, modifying the configuration of a process 270 processes, non-root 298 processes, querying a host within a process host group 286 processes, removing a host from a process host group 286 processes, reporting on monitored processes 280 processes, resuming monitoring for a suspended process 280 processes, specifying a flag file directory 279 processes, suspending monitoring for a process 280 processes, synchronizing a local hosts list to a selected hosts list for a process host group 288 processes, synchronizing a local processs list with a selected processs list 289 processes, synchronizing a selected hosts list to a local hosts list for a process host group 288 processes, synchronizing a selected processs list with the local processs list 290 processes, using most CPU 295 processes, viewing the process list for a selected host 289 processes, viewing the process presence list for a selected process 291 resuming for a single disk 132 status, parameters 92 suspend cancelling a scheduled blackout script 337 creating a blackout script 327 deleting a blackout script 334 modifying a blackout script 331 specifying a default directory for blackout scripts 326 viewing a blackout script 330 swap space usage, overall for system 159 total processes running 295 zombie processes, viewing total on system 292 mounting file systems 146 automatically 147 device names 148 filesystem table 148 manually 147 mouse usage 404 accessing InfoBoxes 405 accessing menu commands 405 accessing push-buttons 405 msu command failed execution, list of users 345 multiple sessions running, listing users 348 multi-processor CPUs, viewing statistics 110
N
name server, querying 201 NETWORK application class activating 176 icons 23 menus 37 object hierarchy 175 parameters 66 Network File System (NFS) application class 214 counters, resetting 217 object hierarchy 215 servers, listing 216 Network Information System (NIS)
422
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
accounts, listing 218 accounts, output format 219 groups, list output 220 groups, listing 219 servers, list output format 221 servers, listing 220 network instance destroying when unavailable 181 network instances alarming when unavailable 181 PATROL behavior when unavailable 180 network interfaces name discovery 179 output format 179 viewing 178 Network IP addresses, determining 191 networks active uses per route 192 addresses, internal state 184 addresses, output format 185 addresses, viewing 184 dblk statistics, viewing 181 destination, listing 192 devices, obtaining information 202 gateways, listing 192 interface used 192 IP address, obtaining 202 linkblk statistics, viewing 181 listing trusted hosts 198 mblk statistics, viewing 181 node, physical address 202 packets sent per route 192 packets, errors 194 packets, statistics 194 protocol version, viewing 184 protocol, viewing 191 protocols, listing 189 protocols, output format 190 qband statistics, viewing 181 querying name server 201 queue statistics, viewing 181 receive queue size, viewing 184 receive window size, viewing 184 remote address, viewing 184 route designation, viewing 192 router status, viewing 192 send queue size, viewing 184 send window size, viewing 184 sockets, viewing data 184, 185 statistics, viewing 192 stream statistics, viewing 181 strevent statistics, viewing 181 subnet mask, obtaining 202 synq statistics, viewing 181 NFS application class icons 23 menus 38 parameters 66 NFS systems exclusion from file monitoring 140 nice values changing for a process 300 node physical address, obtaining 202 non-VME device interrupts, viewing 109
O
oversized memory requests viewing allocated amounts 113 viewing failed amounts 113
P
packets errors, monitoring 194 network, viewing sent 192 statistics 194 parameters activating 100 COLLECTORS application class 51 composite, creating 118 COMPOSITES application class 52 COMPOSITES_COLLECTOR application class 52 COMPUTERS application class 50 CPU application class 52 DCM application class 53 DCM collection method 91 deactivated, DCM collection method 93 deactivated, DCM data collection 93 deactivated, PSL data collection 95 default settings 8086 DISK application class 56 FILESYSTEM application class 58 HEALTH AT A GLANCE application class 58 KERNEL application class 59 MEMORY application class 62 NETWORK application class 66 NFS application class 66 PATROLAGENT application class 71 PRINTER application class 71 PROCCONT application class 71 PROCESS application class 72 PROCPRES application class 73 PSL data collection 95 SCHEDULER application class 74 SMP application class 74 SNMPHealth application class 77 SWAP application class 78 USERS application class 79 partitions, swap area size 172 passwords
Index
423
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
listing users without a password 346 paths file system mounting 148 PATROL File Transfer Protocol (ftp), supported commands 198 mouse usage 404 ping, supported commands 199 rlogin, supported commands 200 SNMP architecture 353 PATROL Agent port number, default 353 querying 366 receiving SNMP queries, testing 367 SNMP queries, testing 366 system role 354 PATROL application class icons 23 menus 38 PATROL Console for Microsoft Windows menu command location 29 PATROL Console for Unix menu command location 29 PATROL Event Manager automated SNMP traps, testing 370 PATROL Perform Agent -Ctrl parameters 92 data collection methods 91 PATROL PSL collectors -Coll parameters 92 PATROL SNMP configuration information, listing 356 configuration, saving in ASCII file 357 PATROL SNMP Manager system role 354 PATROL SNMP Master Agent port number, default 353 starting 361 system role 354 PATROL SNMP Sub-agent system roles 354 PATROLAGENT application class icons 23 menus 39 parameters 71 permissions semaphores, viewing 167 ping using with PATROL 199 plug-ins knowledge module 304 poll time monitoring parameters 92 port numbers PATROL Agent, default 353 PATROL SNMP Master Agent, default 353 ports SNMP Query, changing 355 print jobs deleting jobs
print, deleting 233 deleting all jobs in queue 234 listing for entire system 232 listing, output 232 moving all jobs 236 moving single job 235 output format 232 print queues spooling, disabling 238 starting 239 stopping 238 viewing number of jobs 228 PRINTER application class activating 225 icons 24 menus 41 object hierarchy 224 parameters 71 printer monitoring exclusion list 414 inclusion list 414 printers deleting all jobs 234 deleting jobs 233 excluding one from monitoring 227 jobs, moving all jobs 236 listing all jobs in system 232 monitoring, including 227 moving one job 235 queues, starting 239 queues, stopping 238 spooling, disabling 238 starting 229 stopping 228 viewing assigned jobs 231 PROCCONT application class menus 42 parameters 71 PROCESS application class icon 24 object hierarchy 244 parameters 72 process control subsystems excluding from monitoring 140 process groups renicing processes within 301 Process KM 304 PROCESS_PRESENCE application class icons 24 menus 42 object hierarchy 244 processes See also zombie processes active, listing 300
424
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
active, listing with group process ID 301 listing, by user ID 303 monitoring, configuring a process to alarm when its PPID is not 1 262 monitoring, configuring a process to alarm when its PPID is owned by unauthorized user 265 monitoring, configuring a process to alarm when number exceeds set limit 250 monitoring, configuring a process to alarm when number falls below set limit 253 monitoring, configuring a process to stop 259 monitoring, configuring a process to suspend alert for n cycles if not running 268 monitoring, configuring communication for a process host group 284 monitoring, configuring multiple instances of a process 247 monitoring, configuring to restart a process when it dies 256 monitoring, creating a host group 283 monitoring, deleting a process from the monitoring queue 278 monitoring, modifying host attributes in a process host group 285 monitoring, modifying the configuration of a process 270 monitoring, querying a host within a process host group 286 monitoring, removing a host from a process host group 286 monitoring, reporting on monitored processes 280 monitoring, resuming monitoring for a suspended process 280 monitoring, specifying a flag file directory 279 monitoring, suspending monitoring for a process 280 monitoring, synchronizing a local hosts list to a selected hosts list for a process host group 288 monitoring, synchronizing a local processs list with a selected processs list 289 monitoring, synchronizing a selected hosts list to a local hosts list for a process host group 288 monitoring, synchronizing a selected processs list with the local processs list 290 monitoring, viewing the process list for a selected host 289 monitoring, viewing the process presence list for a selected process 291 non-root, viewing average 299 non-root, viewing average number 299 renicing 300 reprioritizing 300 reprioritizing all within a process group 301 reprioritizing by owner 302 using excessive CPU, output format 297 using excessive CPU, viewing 295 viewing, processes waiting on resources 298 viewing, top ten consumers of CPU 297 viewing, total non-root processes running 298 viewing, total running on system 295 viewing, total user processes running 298 PROCPRES application class icons 24 parameters 73 PROCTopProcs parameter, output 298 product support 3 protocol version, viewing 184 protocols network, listing 189 network, output format 190 statistics, viewing 191 TCP/IP services, listing 196 PSL data collection -Coll parameters 96 exceptions 96 selecting 98 PSL data collection parameters, deactivated by platform 97 PSL data collection parameters, deactivated by platform 96 push-buttons, selecting 405
Q
qband statistics, viewing 181 queues deleting all jobs for single printer 234 printer, deleting a print job 233 printer, starting 239 printer, stopping 238 printer, viewing all jobs on a system 232 printer, viewing jobs 228 printer, viewing jobs for single printer 231 receive 184 send, size 184 statistics, viewing 181
R
RAWIP protocol, viewing statistics 191 receive queue size, viewing 184 receive window size, viewing 184 recovery actions attended mode 143 file system cleanup 141 regular expressions disk monitoring 131 file system monitoring 139 file systems, searching 151 relational clauses, composite parameters 118 relational operators, composite parameters 118 remote addresses viewing 184
Index
425
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
removing a scheduled task defined by a script 321 files by characteristics 153 files, by date updated 155 files, by group 155 files, by name 155 files, by owner 155 files, on single physical disk 155 files, output format 156 semaphores 168 shared memory segments 166 renicing processes 300 processes for a process group 301 processes, by owner 302 single process 300 requirements composite parameters, expression syntax 120 file systems, unmounting 148 mounting file systems 146 rlogin using with PATROL 200 route designation viewing 192 router status, viewing 192 routing table output format 193 viewing 192 run queue, viewing 109 displaying active 115 group, viewing 167 managing 167 memory types, viewing 167 numeric ID, viewing 167 owner, viewing 167 permissions, viewing 167 statistics, output format 168 statistics, viewing 167 send queue size viewing 184 send window size, viewing 184 server name, querying 201 servers Network File System (NFS), listing 216 Network Information System (NIS), list output format 221 Network Information System (NIS), listing 220 services TCP/IP, listing 196 Unix to Unix Communication Protocol (UUCP), listing 210 sessions multiple, listing users 348 set user (su) command failed execution, list of users 345 SGID-protected files, listing 341 shared memory segments statistics, output format 164 viewing statistics 164 shared memory segments, deleting 166 small memory requests viewing allocated amounts 113 viewing available amounts 113 viewing failed amounts 113 SMP application class icons 24 menus 44 parameters 74 SNMP architecture, PATROL 353 configuration tasks 354 listening for traps, testing 364 viewing information in a Management Information Base (MIB) 357 SNMP Managers determining whether listening 369 SNMP Master Agent PATROL, starting 361 traps, ability to receive 364 SNMP queries received by PATROL Agent, testing 367 SNMP Query Port changing 355 SNMP sub-agent starting 362
S
SCHEDULER application class icons 24 menus 44 object hierarchy 312 parameters 74 scheduling task defined by a command interpreter script 315 task defined by a PSL script 318 task defined by an operating system command script 313 security files with global write privilege, viewing 344 files, listing SUID-protected files 341 listing failed msu command attempts 345 listing failed set user (su) command attempts 345 listing SGID-protected files 341 listing users with multiple running sessions 348 listing users without a password 346 SECURITY application class icons 24 menus 44 object hierarchy 340 semaphores deleting 168
426
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
stopping 363 SNMP traps manual, generating 365 PATROL Event Manager, testing 370 SNMPHealth application class icons 24 menus 45 object hierarchy 352 parameters 77 sockets network, viewing data 184, 185 Solaris systems Unix to Unix Communication Protocol (UUCP) 207 spooling, disabling for a printer 238 statistics active semaphores 115 CPU interrupts, viewing 109 CPU run queue, viewing 109 CPU switches, viewing 109 CPU utilization 106 CPU utilization, viewing 108 CPU waits, viewing 109 CPU, viewing for multi-processors 110 dblk, viewing 181 kernel resources 106 linkblk, viewing 181 mblk, viewing 181 memory buffer 181 network packets 194 network protocol 191 network, viewing 192 overall CPU usage 159 overall file system usage 159 overall swap usage 159 packets with errors 194 qband, viewing 181 semaphores 167 semaphores, viewing 167 shared memory segments 164 strevent, viewing 181 swap partition size, viewing 172 swap partition space 172 swap space 171 swap space used, viewing 172 swap space, in a swap area 171 swap space, total 171 synq, viewing 181 system calls 115 viewing entries 114 viewing kernel system usage 115 viewing tables 114 viewing, i-node slots 114 virtual memory, viewing 171 status monitoring, parameters 92 setting for composite parameters 121 streams, statistics 181 strevent statistics, viewing 181 subnet mask, obtaining 202 SUID-protected files, listing 341 support, customer 3 suspend monitoring cancelling a scheduled blackout script 337 creating a blackout script 327 deleting a blackout script 334 modifying a blackout script 331 specifying a default directory for blackout scripts 326 viewing a blackout script 330 SWAP application class icons 25 menus 46 object hierarchy 170 parameters 78 swap partition, size 172 swap space overall usage, monitoring 159 percentage used, swap area 172 percentage used, total 172 percentage used, viewing 172 viewing 171 viewing, for a swap area 171 viewing, total swap space 171 swap space size swap area, viewing 172 switches, CPU statistics 109 synchronizing, file system cache and disk 149 synq statistics, viewing 181 syntax rules composite parameter expressions 120 system calls kernel data 115 system health monitoring 158 overall, viewing 160 system roles PATROL Agent 354 PATROL SNMP Manager 354 PATROL SNMP Master Agent 354 PATROL SNMP Sub-agent 354 system settings ports, SNMP Query 355 system usage viewing kernel data 115 systems copying files, File Transfer Protocol (ftp) 198 transferring files, File Transfer Protocol (ftp) 198
T
tables routing, viewing 192
Index
427
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
viewing statistics 114 task collecting debug data 322 modifying a scheduled script 321 removing a scheduled script 321 scheduling a command interpreter script 315 scheduling a PSL script 318 scheduling an operating system command script 313 TCP protocol, viewing statistics 191 TCP/IP name, listing 196 port, listing 196 protocol, listing 196 services, listing 196 services, output format 197 technical support 3 testing SNMP Master Agent, receiving traps 364 traps listening for SNMP, testing 364 manual, generating 365 PATROL Event Manager SNMP, testing 370
V
variables /PUK/FILESYSTEM/moniList 144 /snmp/default_port 369 /SNMP/default_r_community 366 /snmp/piV1m_list 369, 370 /snmp/trap_port 364 viewing 108 files, with global write privilege 344 non-root processes, average 299 PATROL SNMP configuration 356 processes waiting on resources 298 processes, non-root 298 processes, using excessive CPU 295 PROCTopProcs parameter, output format 298 SGID-protected files 341 SUID-protected files 341 system health, overall 160 top ten CPU hogs 297 top ten CPU hogs, output format 298 users without passwords 346 zombie processes on system 293 virtual memory monitoring 171 percentage used, swap area 172 percentage used, viewing 172 swap area, viewing 171, 172 swap partition size, viewing 172 swap space, total 172 total swap space, viewing 171 viewing 171
U
UDP protocol, viewing statistics 191 Unix to Unix Communication Protocol (UUCP) bang path emails 206 copying files 208 copying files, specifying source 209 deleting files, Solaris systems 207 directories 206 files, copying options 208 files, specifying destination 209 hosts, listing 210 log file, viewing 210 services, listing 210 verifying support files 206 Unix utilities data collection 92 data collection methods 95 UNIX_OS application class icons 25 menus 31 unmounting file systems, automatically 148 file systems, manually 149 users listing duplicate user ID entries 348 without passwords, listing 346 USERS application class icons 25 menus 47 parameters 79
W
waits, CPU statistics 109
Z
zombie processes listing 293 viewing total on system 292 viewing, output format 294
428
Notes
*54130*