IBM Tivoli Monitoring UNIX OS Agent User's Guide
IBM Tivoli Monitoring UNIX OS Agent User's Guide
Version 6.1.0
User’s Guide
SC32-9446-00
Tivoli Monitoring: UNIX OS Agent
®
Version 6.1.0
User’s Guide
SC32-9446-00
Note
Before using this information and the product it supports, read the information in Appendix H, “Notices,” on page 125.
Use the requirements chapter in this guide along with the IBM Tivoli Monitoring
Installation and Setup Guide to install and set up the software.
Use the information in this guide along with the IBM Tivoli Monitoring User’s Guide
to monitor UNIX resources.
Publications
This section lists publications relevant to the use of the Monitoring Agent for UNIX
OS. It also describes how to access these publications online and how to order
these publications.
Prerequisite publications
To use the information in this guide effectively, you must have some knowledge of
IBM Tivoli Monitoring products, which you can obtain from the following
documentation:
v IBM Tivoli Monitoring Administrator’s Guide
v IBM Tivoli Monitoring Installation and Setup Guide
v IBM Tivoli Monitoring Problem Determination Guide
Related publications
The following documents also provide useful information:
v IBM Tivoli Enterprise Console Adapters Guide
v IBM Tivoli Enterprise Console Event Integration Facility User’s Guide
v IBM Tivoli Enterprise Console Reference Manual
v IBM Tivoli Enterprise Console Rule Developer’s Guide
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/ibm/terminology
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window that allows Adobe Reader to print letter-sized
pages on your local paper.
Ordering publications
You can order many Tivoli publications online at the following Web site:
http://www.elink.ibmlink.ibm.com/public/applications/
publications/cgibin/pbi.cgi
http://www.ibm.com/software/tivoli/education/
Support information
“Support information” on page 117 describes the following options for obtaining
support for IBM products:
v “Searching knowledge bases” on page 117
v “Obtaining fixes” on page 118
v “Contacting IBM Software Support” on page 119
Typeface conventions
This guide uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
v Keywords and parameters in text
Italic
v Words defined in text
v Emphasis of words
v New terms in text (except in a definition list)
v Variables and values you must provide
Monospace
v Examples and code examples
v File names, programming keywords, and other elements that are difficult
to distinguish from surrounding text
v Message text and prompts addressed to the user
The names of environment variables are not always the same in Windows and
UNIX. For example, %TEMP% in Windows is equivalent to $TMPDIR in UNIX.
Note: If you are using the bash shell on a Windows system, you can use the UNIX
conventions.
The Tivoli Enterprise Portal is the interface for IBM Tivoli Monitoring products. By
providing a consolidated view of your environment, the Tivoli Enterprise Portal
permits you to monitor and resolve performance issues throughout the enterprise.
The Monitoring Agent for UNIX OS lets you easily collect and analyze
server-specific information, such as the following:
v Operating system and CPU performance
v UNIX disk information and performance analysis
v Process status analysis
v Network performance
This chapter provides information about how to use the Monitoring Agent for
UNIX OS to perform the following tasks:
v “View real-time data about UNIX”
v “Investigate an event” on page 8
v “Recover the operation of a resource” on page 8
v “Customize your monitoring environment” on page 9
v “Monitor with custom situations that meet your requirements” on page 10
v “Collect and view historical data” on page 11
For each of these tasks, there is a list of procedures that you perform to complete
the task. For the procedures, there is a cross-reference to where you can find
information about performing that procedure. Information about the procedures is
located in subsequent chapters and appendixes of this user’s guide and in the IBM
Tivoli Monitoring documentation.
Table 2 contains a list of the procedures for viewing the real-time data about UNIX
that the monitoring agent collects. The table also contains a cross-reference to
where you can find information about each procedure.
Table 2. Viewing real-time data about UNIX
Procedure Where to find information
View the hierarchy of your monitored IBM Tivoli Monitoring User’s Guide:
resources from a system point of view ″Navigating through workspaces″ (in
(Navigator view organized by operating ″Monitoring: real-time and event-based″
platform, system type, monitoring agents, chapter)
and attribute groups).
View the indicators of real or potential
problems with the monitored resources
(Navigator view).
View changes in the status of the resources IBM Tivoli Monitoring User’s Guide: ″Using
that are being monitored (Enterprise workspaces″ (in ″Monitoring: real-time and
Message Log view). event-based″ chapter)
View the status of the agents in the Chapter 4, “Workspaces reference,” on page
managed enterprise that you are monitoring 13 in this guide
(Monitoring Agent Status view).
Investigate an event
When the conditions of a situation have been met, an event indicator is displayed
in the Navigator. When an event occurs, you want to obtain information about that
event so you can correct the conditions and keep your enterprise running
smoothly. The situation must be associated with a Navigator Item in order to
appear.
Table 4 on page 9 contains a list of the procedures for recovering the operation of a
resource and a cross-reference to where you can find information about each
procedure.
Note: When you create and run a situation, an IBM Tivoli Enterprise Console
event is created. For information on how to define event severities from
forwarded IBM Tivoli Monitoring situations and other event information,
see the IBM Tivoli Monitoring Administrator’s Guide.
Table 6 contains a list of the procedures for monitoring your resources with custom
situations that meet your requirements and a cross-reference to where you can find
information about each procedure.
Table 6. Monitoring with custom situations
Procedure Where to find information
Create an entirely new situation. IBM Tivoli Monitoring User’s Guide: ″Creating
a new situation″ (in ″Situations for
event-based monitoring″ chapter, ″Creating a
situation″ section)
Table 7 contains a list of the procedures for collecting and viewing historical data
and a cross-reference to where you can find information about each procedure.
Table 7. Collecting and viewing historical data
Procedure Where to find information
Configure and start collecting short-term IBM Tivoli Monitoring User’s Guide:
data (24 hours). ″Historical reporting″ (in ″Table and chart
views″ chapter)
Configure and start collecting longer-term
data (more than 24 hours). IBM Tivoli Monitoring Administrator’s Guide
View historical data in the Tivoli Enterprise
Portal. “Disk capacity planning for historical data”
on page 51 in this guide
Create reports from historical data using
third-party reporting tools.
Filter out unwanted data to see specific
areas of interest.
About workspaces
A workspace is the working area of the Tivoli Enterprise Portal application
window. At the left of the workspace is a Navigator that you use to select the
workspace you want to see.
As you select items in the Navigator, the workspace presents views pertinent to
your selection. Each workspace has at least one view. Some views have links to
workspaces. Every workspace has a set of properties associated with it.
This monitoring agent provides predefined workspaces. You cannot modify the
predefined workspaces, but you can create new workspaces by editing them and
saving the changes with a different name.
For a list of the predefined workspaces for this monitoring agent and a description
of each workspace, refer to the Predefined workspaces section below and the
information in that section for each individual workspace.
Predefined workspaces
The Monitoring Agent for UNIX OS provides the following predefined workspaces,
which are organized by Navigator item:
v UNIX OS
– Enterprise UNIX System Summary
– UNIX Detail
– UNIX Summary (default)
v Disk Usage
– Disk Usage
– Disk Usage Details
v File Information
v Network
v NFS Activity
v Process
v RPC Performance
v System Information
– Solaris System CPU Workload Summary
– System Details
– System Information
© Copyright IBM Corp. 2005 13
v Users
UNIX OS workspaces
This section describes the workspaces related to the UNIX OS Navigation item.
The UNIX OS workspaces provide data on general system performance of servers
and networks in your UNIX environment. Monitored data includes information on
hardware configuration, software activity, and performance statistics. Use the UNIX
OS workspaces to obtain a quick at-a-glance view of your UNIX systems.
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
The File Information navigator item provides access to the following workspaces:
v All Files workspace
This workspace provides the following views:
– File Size – Top Ten chart
– All Files table
v Specific File Information workspace
This workspace provides the following views:
– File Information for file_name table
– Take Action
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
Network workspace
The Network workspace provides data about various aspects of the network, such
as network input and output errors, whether network interfaces are operational,
and how much data your network interfaces transmit and receive. This workspace
includes the following views:
v Errors and Collisions chart
v Frames Transfer Data chart
v Network table
The Network table contains numerical attributes that view the changing
workload for an interface throughout each work day.
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
Note: The Network table and the network attributes display frame counts. Frames
and packets are not necessarily the same. System administrators might
define the interface so that multiple frames are sent or received in a packet.
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
Process workspace
This section describes the workspaces related to the Process Navigator item.
Note: The CPU Utilization value is computer-dependent and also varies according
to the version of the UNIX operating system that is running.
The Process Navigator item also provides access the following workspaces:
v Application for Process
This workspace provides the following views:
– Application for Process ID table
– Take Action
v Child Processes
This workspace provides the following views:
– Child Processes for Process ID table
– Take Action
v Command for Process
This workspace provides the following views:
– Command for Process ID table
– Take Action
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
You can access the Solaris System CPU Workload Summary workspace from the
System CPU table.
Based on the information that this workspace provides, you can make changes, set
up situations, and verify that changes are improving performance.
Users workspace
This section describes the workspaces related to the Users Navigator item.
Users workspace
The Users workspace provides data to help you monitor various aspects of user
activity. By viewing the monitored user data collected by the Monitoring Agent for
UNIX OS on remote systems, you can do the following:
v Troubleshoot problems and solve them quickly using reliable, real-time
information about users and the programs they use.
v Use this information to pinpoint problem processes, and the user or users
responsible for them. You can then eliminate the process, contact the user
responsible for the problem, and take corrective action.
About attributes
Attributes are the application properties being measured and reported by the
Monitoring Agent for UNIX OS, such as the amount of memory usage or the
message ID.
Attributes are organized into groups according to their purpose. The attributes in a
group can be used in the following two ways:
v Chart or table views
Attributes are displayed in chart and table views. The chart and table views use
queries to specify which attribute values to request from a monitoring agent.
You use the Query editor to create a new query, modify an existing query, or
apply filters and set styles to define the content and appearance of a view based
on an existing query.
v Situations
You use attributes to create situations that monitor the state of your operating
system, database, or application. A situation describes a condition you want to
test. When you start a situation, the Tivoli Enterprise Portal compares the values
you have assigned to the situation attributes with the values collected by the
Monitoring Agent for UNIX OS and registers an event if the condition is met.
You are alerted to events by indicator icons that appear in the Navigator.
Some of the attributes in this chapter are listed twice, with the second attribute
having a ″(Unicode)″ designation after the attribute name. These Unicode attributes
were created to provide access to globalized data. Use the globalized attribute
names because this is where the monitoring agent is putting the data. If you were
using a previous Candle® OMEGAMON® release of this monitoring agent, you
must run the Application Migration Tool to create globalized attributes for your
customized queries, situations, and policies. Refer to the IBM Tivoli Monitoring
Installation and Setup Guide for more information.
For a list of the attributes groups, a list of the attributes in each attribute group,
and descriptions of the attributes for this monitoring agent, refer to the Attribute
groups and attributes section in this chapter.
The following sections contain descriptions of these attribute groups, which are
listed alphabetically. Each description contains a list of attributes in the attribute
group.
Inodes Free [INODEFREE]: The number of inodes currently available on your file
system. Use this attribute to avoid a pending crisis. Corrective action might include
freeing up unneeded space or deleting temporary files. Valid entries are numeric
values in the range 0 to 99999999, including the use of *AVG, *MAX, *MIN, *SUM,
Count, and Value functions.
Inode Size [INODESIZE]: The number of inodes allocated on a file system. For
example, a value of 163817 indicates that the number of inodes allocated is 163
817. Valid values are numeric values in the range 0 to 2147483647, including the
use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Mount Point [MOUNTPT]: The path name of the directory to which a file system
is mounted. This is the virtual name for the directory. Valid entries are strings up
to 32 letters or numbers that represent a directory path.
Mount Point (Unicode) [UMOUNTPT]: The path name of the directory to which a
file system is mounted. This is the virtual name for the directory. Valid entries are
strings up to 768 bytes that represent a directory path. This attribute is globalized.
Name (Unicode) [UDSKNAME]: The name of the physical disk partition where
the file system is mounted. This is the physical location of the disk. Valid entries
are strings up to 96 bytes. This attribute is globalized.
Size [DSKSIZE]: The total size of a file system, expressed in KB. For example,
1000000 represents one GB. Valid entries are numeric values in the range in the
range 0 to 99999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and
Value functions.
Space Used [SPCUSED]: The amount of disk space currently in use on a file
system, expressed in KB. Valid entries are numeric values in the range 0 to
99999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions.. For example, 5000 represents 5 MB.
Space Used Percent [PCTSPCUSED]: The space currently used on the file system,
expressed as a percentage of the sum of used and available space. The Space Used
Percent attribute reflects the percentage of disk space which is available to
non-superusers. A high value in this column alerts you to critical disk space
conditions. Valid entries are whole numbers in the range 0 to 100, such as 80 for 80
percent, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Avg Serv [AVGSERV]: Average amount of disk time used in milliseconds over the
sampling period. For example, in terms of a bank teller queue, it is the time spent
at the teller’s window. Valid entries are numeric values in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Busy Percent [DSKBUSY]: The percentage of time a disk has been busy
transferring data. Valid entries are whole numbers in the range 0 to 100, such as 35
for 35 percent, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions. Use the Busy Percent attribute to check whether a process is I/O bound.
Values greater than 30 percent usually indicate excessive paging out to disk, or that
a process is I/O bound. If the Busy Percent value is high (greater than 30 percent)
and CPU utilization is also high (greater than 80 percent), your system is probably
overloaded and experiencing degradation of performance.
Disk Name [DSKNAME]: The name of the physical disk that might be
partitioned. Valid entries are simple text strings up to 32 letters or numbers.
Disk Name (Unicode) [UDSKNAME]: The name of the physical disk that might
be partitioned. Valid entries are simple text strings up to 96 bytes. This attribute is
globalized.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Transfer Rate [DSKXFERRAT]: The number of data transfers per second during a
monitoring interval. Valid entries are numeric values in the range 0 to 2147483647,
including the use of *AVG, *MAX, *MIN, or *SUM functions.
Access [ACCESS]: This attribute defines a four-digit octal number representing the
access rights for a file. You specify access rights using a four-digit number that
represents the permissions associated with a file. Each digit is the decimal
equivalent of a binary three-bit string. Valid entries are numeric strings in the
range 0000 to 7777. From left to right, each digit has the following meaning:
1st digit
Determines whether, upon execution, the file takes on the ID of the user or
group that owns the file. This permission assignment applies to users who
neither own the file they are trying to run nor belong to the group that
owns the file.
From right to left, the bits for the first digit have the following meanings:
1st bit The meaning if this bit depends on the type of UNIX operating system you
are monitoring.
2nd bit
If the value of this bit is 1, the system runs the file with the group ID of
the group that owns the file. If the value of this bit is 0, the system runs
the file with the group ID of the user that ran the file. If the file is a
directory and this bit is 1, all files created in that directory inherit the
group ID of that directory.
File [FILE]: The name of a file or directory. If the file is a symbolic link, the link
name is shown in the Link Name attribute. Valid entries are simple alphanumeric
text strings with a maximum length 768 characters.
File (Unicode) [UFILE]: The name of a file or directory. If the file is a symbolic
link, the link name is shown in the Link Name attribute. Valid entries are simple
alphanumeric text strings with a maximum length 256 bytes. This attribute is
globalized.
Group [GROUP]: The name of the logical group to which a file owner belongs.
Valid entries are simple alphanumeric text strings with a maximum length 16
characters
Group (Unicode) [UGROUP]: The name of the logical group to which a file owner
belongs. Valid entries are simple alphanumeric text strings with a maximum length
48 bytes. This attribute is globalized.
Last Accessed Time [ACCESSEDTM]: The date and time of the last file access.
Last Changed Time [CHANGEDTM]: The date and time of the last change to a
file.
Links [LINKS]: The number of links to a file. Valid entries are numeric values in
the range 0 to 64535, including use of the *AVG, *MAX, *MIN, or *SUM functions.
Link Name [LINKNAME]: The name of the file for which this file is a symbolic
link. If this field is blank, the file is not a link. Valid entries are simple
alphanumeric text strings, with a maximum length of 256 characters.
Link Name (Unicode) [ULINKNAME]: The name of the file for which this file is a
symbolic link. If this field is blank, the file is not a link. Valid entries are simple
alphanumeric text strings, with a maximum length of 768 bytes. This attribute is
globalized.
Owner [OWNER]: The name of the file owner. Valid entries are simple
alphanumeric text strings with a maximum length 16 characters.
Path [PATH]: The full path that contains a particular file or directory. Valid entries
are alphanumeic text strings that represent the full path of the file with a
maximum length of 256 characters.
Path (Unicode) [UPATH]: The full path that contains a particular file or directory.
Valid entries are alphanumeic text strings that represent the full path of the file
with a maximum length of 768 bytes. This attribute is globalized.
Size [SIZE]: The size of a file in bytes. Valid entries are numeric values in the
range 0 to 2147483647, including the use of *AVG, *MAX, *MIN, *SUM, Count, and
Value functions.
Size MB [SIZEMB]: The size of a file in MB. Valid entries are numeric values in
the range 0 to 2147483647.
System Name [ORIGINNODE]: The name of the managed system that the agent
is monitoring. Valid entries are simple alphanumeric text strings with a maximum
length of 64 characters.
Timestamp [TIMESTAMP] The date and time the agent collects information as set
on the monitored system.
Type [TYPE]: The type of file. Valid entries for this attribute are as follows:
Dir Directory
File File
Sock Socket
Link Link
Spec Special File
Note: The Received Count (frames) and Transmitted Count (frames) show the raw
frame counts for the interface. Frames and packets are not necessarily the
same thing. System administrators might define the interface so that
multiple frames are sent or received in a packet. The network report and the
network attributes display frame counts.
Avg Coll Rate 1 [AVCOL1]: The average number of collisions on all network
interfaces during the last minute. Valid entries are integers in the range 0 to
99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than one minute.
Avg Coll Rate 5 [AVCOL5]: The average number of collisions on all network
interfaces during the last five minutes. Valid entries are integers in the range 0 to
99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than five minutes.
Avg Coll Rate 60 [AVCOL60]: The average number of collisions on all network
interfaces during the 60 minutes. Valid entries are integers in the range 0 to
99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than 60 minutes.
Avg In Rate 1 [AVGINS1]: The average number of frames received on all network
interfaces during the last minute. Valid entries are integers in the range 0 to
99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than one minute.
Avg In Rate 5 [AVGINS5]: The average number of frames received on all network
interfaces during the last five minutes. Valid entries are integers in the range 0 to
99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than five minutes.
Avg InErr Rate 1 [AVGINERR1]: The average number of frames with errors that
were received on all network interfaces during the last minute. Valid entries are
integers in the range 0 to 99999999. N/C (not collected) is displayed if the
monitoring agent has been running for less than one minute.
Avg InErr Rate 5 [AVGINERR5]: The average number of frames with errors that
were received on all network interfaces during the last five minutes. Valid entries
are integers in the range 0 to 99999999. N/C (not collected) is displayed if the
monitoring agent has been running for less than five minutes.
Avg InErr Rate 15 [AVGINERR15]: The average number of frames with errors that
were received on all network interfaces during the last 15 minutes. Valid entries
are integers in the range 0 to 99999999. N/C (not collected) is displayed if the
monitoring agent has been running for less than 15 minutes.
Avg InErr Rate 60 [AVGINERR60]: The average number of frames with errors that
were received on all network interfaces during the last 60 minutes. Valid entries
are integers in the range 0 to 99999999. N/C (not collected) is displayed if the
monitoring agent has been running for less than 60 minutes.
Avg Out Rate 1 [AVGOUT1]: The average number of frames transmitted on all
network interfaces during the last minute. Valid entries are integers in the range 0
to 99999999. N/C (not collected) is displayed if the monitoring agent has been
running for less than one minute.
Avg Out Rate 15 [AVGOUT15]: The average number of frames transmitted on all
network interfaces during the last 15 minutes. Valid entries are integers in the
range 0 to 99999999. N/C (not collected) is displayed if the monitoring agent has
been running for less than 15 minutes.
Avg Out Rate 60 [AVGOUT60]: The average number of frames transmitted on all
network interfaces during the last 60 minutes. Valid entries are integers in the
range 0 to 99999999. N/C (not collected) is displayed if the monitoring agent has
been running for less than 60 minutes.
Avg OutErr Rate 1 [AVGOERR1]: The average number of frames with errors that
were transmitted on all network interfaces during the last minute. Valid entries are
integers in the range 0 to 99999999. N/C (not collected) is displayed if the
monitoring agent has been running for less than one minute.
Avg OutErr Rate 5 [AVGOERR5]: The average number of frames with errors that
were transmitted on all network interfaces during the last five minutes. Valid
entries are integers in the range 0 to 99999999. N/C (not collected) is displayed if
the monitoring agent has been running for less than five minutes.
Avg OutErr Rate 15 [AVGOERR15]: The average number of frames with errors
that were transmitted on all network interfaces during the last 15 minutes. Valid
entries are integers in the range 0 to 99999999. N/C (not collected) is displayed if
the monitoring agent has been running for less than 15 minutes.
Avg OutErr Rate 60 [AVGOERR60]: The average number of frames with errors
that were transmitted on all network interfaces during the last 60 minutes. Valid
entries are integers in the range 0 to 99999999. N/C (not collected) is displayed if
the monitoring agent has been running for less than 60 minutes.
Collisions [FCOLLSNS]: The number of times during the sampling period that a
frame transmitted by the network interface collided with another frame. This
occurs when another interface on the same local network transmits a frame at
nearly the same time. Valid entries are integers in the range 0 to 99999999. Use this
attribute to determine if a network interface has an unacceptable number of frame
collisions. Frame collisions cause the interface to retransmit the frame. With this
increased traffic, the likelihood of future collisions increases. This can result in a
steady increase of network traffic to critical levels.
Input Errors [FIERRORS]: The number of frames with errors received by the
interface during the sampling period. Valid entries are integers in the range 0 to
99999999.
Network Interface Name [FNAME]: Identifies the network interface adapter. Valid
entries are simple alphanumeric text strings, comprised of Interface Name, Unit
Number, where:
Interface Name
Is a two-character representation of the adapter, based on the hardware,
operating system, and installation procedure.
Unit Number
represents the physical adapter number installed in the system with a
typical range of 0-7.
Network Packet Collision Rate: The total number of packet collisions per minute
on all interfaces during a specified sampling period. Use this attribute to monitor
excessive packet collisions. Valid entries are 1, 5, 15, or 60. The default sample
period is 1 minute.
Network Packet Input Rate: The total number of packets received per minute on
all interfaces during a specified sampling period. Use this attribute to monitor
network activity. Valid entries are 1, 5, 15, or 60. The default sample period is 1
minute.
Network Packet Input Error Rate: The total number of input packet errors per
minute on all interfaces during a specified sampling period. Valid entries are 1, 5,
15, or 60. The default sample period is 1 minute.
Network Packet Output Rate: The total number of packets transmitted per minute
on all interfaces during a specified sampling period. Valid entries are 1, 5, 15, or
60. The default sample period is 1 minute.
Network Packet Output Error Rate: The total number of output packet errors per
minute on all interfaces during a specified sampling period. Valid entries are 1, 5,
15, or 60. The default sample period is 1 minute.
Received Count [FIBYTES]: The number of frames received since the network
interface was configured. Valid entries: numeric values in the range 0 to 99999999,
including use of the *AVG, *MAX, *MIN, or *SUM functions.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Transmission Unit Maximum [FMTU]: The maximum packet size (in bytes) for
the specified network interface. This is a fixed value. Valid entries are numeric
values in the range 0 to 99999999, including the use of *AVG, *MAX, *MIN, *SUM,
Count, and Value functions. Use this attribute to determine the minimum,
maximum, or average packet size used by a network interface. This information
can help you determine the size used by a network interface.
NFS / RPC Statistics attribute group is a single-instance attribute group. You can
mix these attributes with those of any other single-instance group.
NFS Client Calls [NCCALLS]: The number of calls made to a server during a
monitoring interval. Valid entries are integers in the range 0 to 99999999. Use this
attribute to show the amount of NFS traffic. If the value is high, it might mean that
a client is flooded with call requests.
NFS Client Calls Rejected [NCBAD]: The number of calls rejected by a server
during a monitoring interval. Valid entries are integers in the range 0 to 99999999.
NFS Client File Creates [NCCREATE]: The number of File Creates calls made to a
server during the monitoring interval. Valid entries are integers in the range 0 to
99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Client File System Statistics Calls [NCFSSTAT]: The number of file statistics
calls made within the monitoring interval. Valid entries are integers in the range 0
to 99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Client Get Attribute Calls [NCGETATT]: The number of calls made to
determine what type of file is being called. For example, a text file or an executable
file. Valid entries are integers in the range 0 to 99999999. Use this attribute with
other Call-type attributes to analyze NFS traffic and correct problems on your
network.
NFS Client Link Calls [NCLINK]: The number of hard link reports made by a
server during a predefined time interval. Valid entries are integers in the range 0 to
99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Client Make Directory Calls [NCMKDIR]: The number of calls made to a
server during a monitoring interval. Valid entries are integers in the range 0 to
99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Client Null Calls [NCNULL]: The number of calls generated for checking
connectivity to a server. Valid entries are integers in the range 0 to 99999999. Use
this attribute with other Call-type attributes to analyze NFS traffic and correct
problems on your network.
NFS Client Read Calls [NCREAD]: The number of Read Directory calls read by a
server during a monitored interval. Valid entries are integers in the range 0 to
99999999. Use this attribute to determine how many call requests to read a file
were received by an NFS server over a period of time.
NFS Client Read Directory Calls [NCRDDIR]: The number of Read Directory
calls made to a server during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Client Read Link Calls [NCRDLINK]: The number of calls received by an
NFS server to read a linked file during the monitoring interval. Valid entries are
integers in the range 0 to 99999999. Use this attribute to determine how many
link-call requests an NFS server received over a period of time.
NFS Client Rejected Call Percentage [NCPERC]: The percentage of NFS calls
rejected by a server during a monitoring interval. Valid entries are integers in the
NFS Client Remove File Calls [NCREMOVE]: The number of Remove File calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Client Rename File Calls [NCRENAME]: The number of Rename File calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Client root Calls [NCROOT]: The number of NFS calls made to the server by
the root during a monitoring interval. Valid entries are integers in the range 0 to
99999999. Use this attribute to determine the number of calls made by the root
(superaccount) account versus calls made by all users.
NFS Client Set Attribute Calls [NCSETATT]: The number of NFS calls made to
set the attributes of a file during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Client Symbolic Link Calls [NCSYMLINK]: The number of Symbolic Link
calls made to a server during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Client Write Cache Calls [NCWRCACH]: The number of write cache calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Client Writes [NCWRITE]: The number of Writes calls made to a server
during a monitoring interval. Valid entries are integers in the range 0 to 99999999.
Use this attribute to determine how many write requests an NFS server received
over a pre-specified period of time.
NFS Server Calls [NSCALLS]: The number of made from an NFS server during a
monitoring interval. Valid entries are integers in the range 0 to 99999999. Use this
attribute to show the amount of NFS traffic. If the value is high, it might mean a
server is flooded with call requests.
NFS Server File Creates [NSCREATE]: The number of File Creates calls made to a
server during the monitoring interval. Valid entries are integers in the range 0 to
99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Server File System Statistics Calls [NSFSSTAT]: The number of file statistics
calls made within the monitoring interval. Valid entries are integers in the range 0
to 99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Server Get Attribute Calls [NSGETATT]: The number of calls made to
determine what type of file is being called, such as a text file or an executable file.
Valid entries are integers in the range 0 to 99999999. Use this attribute with other
Call-type attributes to analyze NFS traffic and correct problems on your network.
NFS Server Link Calls [NSLINK]: The number of hard link reports made by a
server during a predefined time interval. Valid entries are integers in the range 0 to
99999999. Use this attribute with other Call-type attributes to analyze NFS traffic
and correct problems on your network.
NFS Server Make Directory Calls [NSMKDIR]: The number of Make Directory
calls made to a server during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Server Null Calls [NSNULL]: The number of calls generated for checking
connectivity to a server. Valid entries are integers in the range 0 to 99999999. Use
this attribute with other Call-type attributes to analyze NFS traffic and correct
problems on your network.
NFS Server Read Calls [NSREAD]: The number of Read Directory calls read by a
server during a monitored interval. Valid entries are integers in the range 0 to
99999999. Use this attribute to determine how many call requests to read a file
were received by an NFS server over a period of time.
NFS Server Read Directory Calls [NSRDDIR]: The number of Read Directory
calls made to a server during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Server Read Link Calls [NSRDLINK]: The number of calls received by an
NFS server to read a linked file during the monitoring interval. Valid entries are
integers in the range 0 to 99999999. Use this attribute to determine how many
link-call requests an NFS server received over a period of time.
NFS Server Rejected Call Percentage [NSPERC]: The percentage of NFS calls
rejected by a server during a monitoring interval. Valid entries are integers in the
range 0 to 100. Use this attribute to monitor unacceptable rates of NFS call
NFS Server Remove File Calls [NSREMOVE]: The number of Remove File calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Server Rename File Calls [NSRENAME]: The number of Rename File calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Server root Calls [NSROOT]: The number of NFS calls made to server root
during a monitoring interval. Valid entries are integers in the range 0 to 99999999.
Use this attribute to determine the number of calls made by the root (superuser)
account versus calls made by all users.
NFS Server Set Attribute Calls [NSSETATT]: The number of NFS calls made to
set the attributes of a file during a monitoring interval. Valid entries are integers in
the range 0 to 9999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Server Symbolic Link Calls [NSSYMLNK]: The number of Symbolic Link
calls made to a server during a monitoring interval. Valid entries are integers in
the range 0 to 99999999. Use this attribute with other Call-type attributes to
analyze NFS traffic and correct problems on your network.
NFS Server Write Cache Calls [NSWRCACH]: The number of Write Cache calls
made to a server during a monitoring interval. Valid entries are integers in the
range 0 to 99999999. Use this attribute with other Call-type attributes to analyze
NFS traffic and correct problems on your network.
NFS Server Writes [NSWRITE]: The number of Writes calls made to a server
during a monitoring interval. Valid entries are integes in the range 0 to 99999999.
Use this attribute to determine how many write requests an NFS server received
over a specified period of time.
RPC Client Calls Rejected by Server [RCBAD]: The number of calls made by a
client to a server that the server rejected during a monitoring interval. Valid entries
are integers in the range 0 to 99999999. Use this attribute in conjunction with the
Calls attribute to determine the proportion of calls rejected by the RPC server. If
the value is high, it might mean that there is excessive noise on the network,
which causes bad datagrams to occur, or a server might be flooded with call
requests.
RPC Client Calls Timed Out [RCTIMOUT]: The number of times an RPC call
from the managed system timed out before the RPC server replied. Valid entries
are integers in the range 0 to 99999999. Use this attribute to determine if the server
is failing to acknowledge calls that are received. If the server is overworked, you
might need to reroute network traffic.
RPC Client Replies Not Matching Calls [RCBADXID]: The number of times the
managed system received replies from an RPC server that did not match calls.
Valid entries are integers in the range 0 to 99999999. Use this attribute to determine
if a reply or acknowledgment from the server matches a request made by a client.
A failure to match the request might mean that there is noise on the network.
RPC Client Times Authentication Refreshed [RCAREF]: The number of times the
managed system had to resend the authentication information for an RPC call
during the monitoring interval. Valid entries are integers in the range 0 to
99999999. Use this attribute to count the number of times an authorization is
refreshed. This attribute helps you verify client authorization for making a request
by periodically requesting an electronic handshake from the client.
RPC Client Times Call Wait On Busy [RCWAIT]: The number of times the initial
bind for an RPC call from the managed system had to wait because of a busy
server. Valid entries are integers in the range 0 to 99999999. Use this attribute to
show the amount of NFS traffic. When a client sends a call request to a server, it
gives the server a certain amount of time to respond before resending the call. The
amount of time varies from system to system. If the Times Call Wait On Busy
value is high, it might indicate that the server is overworked. You might want to
reroute call requests to another server.
RPC Server Calls Rejected [RSBAD]: The number of RPC calls from the managed
system that were rejected by a server during a monitoring interval. Valid entries
are integers in the range 0 to 99999999. Use this attribute to determine if the server
is rejecting a large number of calls. If only a few calls are being rejected, it might
be a client-specific problem. If many calls are being rejected, it might be a problem
with your server.
RPC Server Packets Too Short [RSBADLEN]: The number of incomplete RPC
packets that were too short in length that were received by a server during a
monitoring interval. Valid entries are integers in the range 0 to 99999999. Use this
attribute to determine if the server is having problems processing packet data. If
the packet size does not match the size stated in the packet header, there might be
noise on the system.
RPC Server Packets with Malformed Header [RSBADHDR]: The number of RPC
packets that had malformed headers and were received by the server during a
monitoring interval. Valid entries are integers in the range 0 to 99999999. Use this
attribute to determine if there is noise on the system. The server cannot validate a
packet or where it came from if, because of a malformed header, it cannot
acknowledge the sender. This decreases the efficiency of the network. Try checking
server connections. Another cause might include extraneous network noise.
System Name [ORIGINNODE]: The name of the RPC system you are monitoring.
Valid entries are simple alphanumeric text strings with a maximum length 64
characters.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Child User CPU Time [CHILDUTIME]: The time spent in user mode by the child
of this process. Valid entries are numeric time strings with a format of
DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Child System CPU Time [CHILDSTIME]: The time spent in system and user
mode by the child of this process. Valid entries are numeric time strings with a
format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Command [CMD]: The command that initiated a process. Valid entries are simple
alphanumeric text strings with a maximum length of 32 characters. Use this
attribute to determine which command initiated a process.
Command (Unicode) [UCMD]: The command that initiated a process. Valid entries
are simple alphanumeric text strings with a maximum length of 96 bytes. Use this
attribute to determine which command initiated a process. This attribute is
globalized.
For AIX and Solaris: Context Switch [CONTSWITCH]: The number of CPU
context switches for this process. A context switch occurs when a process
voluntarily gives up the processor before its time slice was completed. This usually
occurs while the process waits for a resource. Valid entries are numeric values in
For AIX and HP-UX: CPU ID [CPUID]: The ID of the processor on which the
process is running. Valid entries are integers in the range 0 to 999. Use this
attribute to determine the processor on which a process is running.
CPU Pct [CPUPERCENT]: The percentage of CPU used by this process. Valid
entries are numeric values in the range 0 to 10000 to two decimal places, including
the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use this
attribute to determine which processes are using the most CPU time. High CPU
percent might indicate a runaway or long running process.
CPU Time [CPUTIME]: The time the CPU has been utilized. Valid entries are
integers in the range 0 to 999999.
CPU Utilization [CPU]: The numerical value indicating the relative CPU intensity
of a process. The CPU Utilization attribute represents the number of times a
process uses the CPU over a period of 20 system clock ticks. The system decays
this value after each 20 clock-tick period by dividing the number by 2. The system
uses the CPU Utilization attribute to determine process priority. Large values
indicate a CPU intensive process and result in lower process priority. Small values
indicate an I/O intensive process and result in a more favorable priority. Valid
entries are numeric values in the range 0 to 9999, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to check a
process if you suspect it is using the CPU so much that the CPU is not available to
anything else. This can cause network response time to be sluggish.
Effective Group ID [EGID]: The effective group ID. Valid entries are integers in
the range 0 to 999999. Use this attribute to determine the effective group ID for this
process.
Effective User ID [EUID]: The effective user ID. Valid entries are integers in the
range 0 to 999999. Use this attribute to determine the effective user ID for this
process. Available on all platforms
Elapsed Time [ELAPTIME]: The elapsed time for the process. Valid entries are
numeric time strings with a format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Entry Address [ADDR]: The virtual memory address of a process. This address
corresponds to the segment number of the process stack. Valid entries are
hexadecimal strings with a maximum string length of 8. Check with you local
System Administrator for information on how to use this attribute.
Note: On 64-bit systems, only the low-order part of the address is used.
Flag [FLAG]: The hexadecimal value associated with a process. Valid entries are
hexadecimal values with a maximum string length of 8. The meaning of a flag
depends upon the type of UNIX system you are monitoring.
Note: The Flag field of the UNIX Process report contains hexadecimal and additive
flags. These flags are available for historical purposes only and contain no
information regarding the current status of your monitored process. These
fields are not relevant on Solaris systems. For additional information about
the Flag field, refer to the man pages for your operating system.
For Solaris: Heap Size [HEAP]: The size of the heap for this process expressed in
KB. Valid entries are numeric values in the range 0 to 99999999, including the use
of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to
determine the heap size for a process. Excessive heap size might indicate a
memory leak.
For AIX and Solaris: Involuntary Context Switch [INVCONTSWT]: The number
of involuntary context switches for the process. An involuntary context switch
occurs when a higher priority process ran or because the current process exceeded
its time slice. Valid entries are numeric values in the range 0 to 9999, including the
use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to
monitor for involuntary context switches. Excessive involuntary context switches
might indicate function problems in a process.
Minor Fault [MINORFAULT]: The number of minor faults per second for this
process. A minor fault is caused when pages that are faulted are located in
memory, usually on the inactive list for the entire system. Valid entries are numeric
values in the range 0 to 99999999, including the use of *AVG, *MAX, *MIN, *SUM,
Count, and Value functions.
Priority [PRIORITY]: The current execution priority value. Valid entries are
integers in the range 0 to 999. The priority equals the nice value of the process plus
the minimum priority value assigned to all user processes. The higher the priority
value, the lower the priority of the command.
Process Group Leader ID [PGID]: The process group leader PID. Valid entries are
integers in the range 0 to 999999. Use this attribute to determine the process group
leader ID for this process.
Process ID [PID]: The numerical process ID assigned to a process. Valid entries are
integers in the range 0 to 999999. Use this attribute to determine the process ID for
this process. Process ID values vary from system to system.
For AIX and Solaris: Real Group ID [GID]: The real group ID for this process.
Valid entries are integers in the range 0 to 999999. Use this attribute to determine
the real group ID for this process.
Session ID [SESSIONID]: The real session ID for this process. Valid entries are
integers in the range 0 to 999999.
Size [SIZE]: The resident set size of the process in KB. Valid entries are numeric
values in the range 0 to 99999, including the use of *AVG, *MAX, *MIN, *SUM,
Count, and Value functions. Use this attribute to determine which processes are
using too much memory. Excessive resident set size might lead to memory
shortage and cause system performance problems.
Stack Size [STACK]: The size of the stack for this process. Valid entries are
integers in the range 0 to 99999999. Use this attribute to determine which processes
are using too much stack size.
System CPU Time: The system time spent executing this process. Valid entries are
numeric time strings with a format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Terminal Device [TTY]: The name of the terminal device that started a process.
Valid entries are simple text strings with a maximum 8 characters. Terminal names
vary from system to system. Check with your local system administrator for a
complete list of all terminals in your system.
For AIX and Solaris: Thread Count [THREADCNT]: The total number of threads
for the process. Valid entries are numeric values in the range 0 to 99999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Time [TIME]: The total amount of CPU time that a process has consumed. A large
value might indicate a runaway or long-running process. Valid entries are numeric
time strings with a format of MMMMM:SS, where:
MMMMM
Minute
SS Second
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Total CPU Percent [TOTCPUPERC]: The percentage of CPU used since the process
was started. Valid entries are numeric values in the range 0 to 10000 to two
decimal places, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions. Use this attribute to identify which processes are using the most CPU
time. Excessive total CPU percent might indicate a runaway or long running
process.
Total CPU Time [TOTALTIME]: The total CPU time (user plus system) spent on
the process. Valid entries are numeric time strings with a format of
DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
User CPU Time [USERTIME]: The user CPU time spent running the process. Valid
entries are numeric time strings with a format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
User ID [UID]: The numerical user ID of the owner of a process. Valid entries are
integers in the range 0-999999. Use this attribute to identify the owner of a process.
User Name [USERNAME]: The login name of the user based on the UID. Valid
entries are simple text stings with a maximum of 32 characters. Use this attribute
to identify the owner of a process.
User Name (Unicode) [UUSERNAME]: The login name of the user based on the
UID. Valid entries are simple text stings with a maximum of 96 bytes. Use this
attribute to identify the owner of a process. This attribute is globalized.
Virtual Size [VSIZE]: The size of the virtual memory used by this process, in KB.
Valid entries are numeric values in the range 0 to 9999999, including the use of
*AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to
Wait CPU Time [WAITCPUTIM]: The time spent waiting for the CPU. Valid
entries are numeric time strings with a format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Wait Lock Time [WAITLTIME]: The time spent waiting for locks to release. Valid
entries are numeric time strings with a format of DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Avg CPU Busy 1 [AVCPUBIZ1]: The average CPU busy time during the last
minute. Valid entries are integers in the range 0 to 99999999.
Avg CPU Busy 5 [AVCPUBIZ5]: The average CPU busy time during the last five
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Busy 15 [AVCPUBIZ15]: The average CPU busy time during the last 15
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Busy 60 [AVCPUBIZ60]: The average CPU busy time during the last 60
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Sys 1 [AVCPUSYS1]: The average CPU system time during the last
minute. Valid entries are integers in the range 0 to 99999999.
Avg CPU Sys 5 [AVCPUSYS5]: The average CPU system time during the last five
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Sys 15 [AVCPUSYS15]: The average CPU system time during the last 15
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Sys 60 [AVCPUSYS60]: The average CPU system time during the last 60
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Usr 5 [AVCPUUSR5]: The average user CPU time during the last five
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Usr 15 [AVCPUUSR15]: The average user CPU time during the last 15
minutes. Valid entries are integers in the range 0 to 99999999.
Avg CPU Usr 60 [AVCPUUSR60]: The average user CPU time during the last 60
minutes. Valid entries are integers in the range 0 to 99999999.
For Solaris: Context Switches [CSW]: CPU context switches rate per second
during the sampling interval. Valid entries are integers in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use
this attribute to determine system workload or per processor workload of the SMP
system.
CPU Busy [CPUBUSY]: The sum of the System CPU and User CPU attributes in
percent. Valid entries are numeric values in the range 0 to 100, including the use of
*AVG, *MAX, *MIN, *SUM, Count, and Value situation editor functions. Use this
attribute to determine system workload or per processor workload of the SMP
system.
CPU ID [CPUID]: The processor ID. Valid entries are integers in the range 0 to
999. Use this attribute to determine the processor ID. In an SMP computer with
more than one processor, the CPU report shows CPU ID as aggregate on the first
row. This means the data row return aggregated CPU statistics.
CPU Status [CPUSTAT]: The current status of the processor. Valid entries are as
follows:
0 offline
1 online
CPU Time [CPUUVS]: The time that the CPU has been utilized. Valid entries are
integers.
For Solaris: Cross Calls [XCALLS]: Interprocessor cross-calls rate per second
during the sampling period. Valid entries are in the range 0 to 999999, including
the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use this
attribute to determine the interprocessor cross reference call rate of the system or
per processor of the SMP system.
Idle CPU [IDLECPU]: Percentage of idle CPU time during the sampling period.
Valid entries are numeric values in the range 0 to 100, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to determine
how efficiently the entire system or each processor of the SMP system is operating.
The Idle CPU value should be low if the system load is heavy and high if the
system load is light. If the system load is heavy and the Idle CPU value is high, an
I/O problem might exist. If the Idle CPU value is small or zero and the User
percentage is larger (greater than 30 percent), the system might be compute-bound
or in a loop.
For Solaris: Interrupts [INTRRUPT]: Interrupts rate per second over the sampling
interval. Valid entries are numeric values in the range 0 to 999999, including the
For Solaris: Major Faults [MAJF]: Major faults rate per second during the
sampling period. Valid entries are numeric values in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use
this attribute to determine the rate of page faults that need disk access of the
system or of each processor of the SMP system.
For Solaris: Minor Faults [MINF]: Minor faults rate per second during the
sampling period. Valid entries are numeric values in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use
this attribute to determine the rate of page faults where the pages faulted is
located in memory, usually on the inactive list for the entire system or for each
processor of the SMP system.
For Solaris: Spins On Mutexes [SMTX]: Spins on mutexes (locks not acquired on
try) rate per second during the sampling period. Valid entries are numeric values
in the range 0 to 999999, including the use of *AVG, *MAX, *MIN, *SUM, Count,
and Value functions. Use this attribute to determine the spins on mutexes rate of
the system or of each processor of the SMP system.
For Solaris: System Calls [SYSCALL]: System calls rate per second during the
sampling period. Valid entries are numeric values in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions. Use
this attribute to determine the system calls rate of the system or of each processor
of the SMP system.
System CPU [SYSCPU]: Percent of system CPU time during the sampling period.
Valid entries are numeric values in the range 0 to 100, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions. Use this attribute to determine
the percentage of system or per processor CPU time devoted to running UNIX
system kernel code. System CPU time includes time spent running system calls
and performing administrative functions.
System Name [ORIGINNODE]: Name of the host system. Valid entries are simple
alphanumeric text strings with a maximum length 64 characters.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
User CPU [USRCPU]: Percent of user CPU time during the sampling period. Valid
entries are numeric values in the range 0 to 100, including the use of *AVG, *MAX,
*MIN, *SUM, Count, and Value functions. Use this attribute to determine the
percentage of system or per processor CPU time devoted to user processes. User
CPU time includes time spent executing both user program and library functions.
It does not include CPU time spent executing system calls. The ratio between user
and system CPU time varies, depending on the kinds of programs that are
running. If user CPU is extremely high and adversely affecting system
performance, you might want to determine which user programs are preventing
the CPU from functioning at its normal speed.
Wait I/O [WAITIO]: Percent of wait I/O CPU time during the sampling period.
Valid entries are numeric values in the range 0 to 100, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions. Use the Wait I/O attribute to
indicate how effectively the system or a processor is using disks.
Available Swap Space: The amount of swap space, in megabytes, that each
subscriber is using. Swap space is usually a disk partition on which page-outs are
written. Valid entries are integers in the range ???
Avg PageIns 1 [AVPGINS1]: The average rate of pages that were paged in from
disk to system memory during the last minute. Valid entries are integers in the
range 0 to 99999999.
Avg PageIns 5 [AVPGINS5]: The average rate of pages that were paged in from
disk to system memory during the last five minutes. Valid entries are integers in
the range 0 to 99999999.
Avg PageIns 15 [AVPGINS15]: The average rate of pages that were paged in from
disk to system memory during the last 15 minutes. Valid entries are integers in the
range 0 to 99999999.
Avg PageIns 60 [AVPGINS60]: The average rate of pages that were paged in from
disk to system memory during the last 60 minutes. Valid entries are integers in the
range 0 to 99999999.
Avg PageOut 5 [AVPGOUT5]: The average rate of page-out requests during the
five minutes. Valid entries are integers in the range 0 to 99999999.
Avg PageOut 15 [AVPGOUT15]: The average rate of page-out requests during the
last 15 minutes. Valid entries are integers in the range 0 to 99999999.
Avg PageScan 1 [AVPGSCAN1]: The average rate of pages examined during the
last minute. Valid entries are integers in the range 0 to 99999999.
Avg PageScan 5 [AVPGSCAN5]: The average rate of pages examined during the
last five minutes. Valid entries are integers in the range 0 to 99999999.
Avg PageScan 15 [AVPGSCAN15]: The average rate of pages examined during the
last 15 minutes. Valid entries are integers in the range 0 to 99999999.
Avg PageScan 60 [AVPGSCAN60]: The average rate of pages examined during the
last 60 minutes. Valid entries are integers in the range 0 to 99999999.
Block Reads [BREAD]: The number of physical block reads over a specified
sampling period. Valid entries are integers in the range 0 to 999999.
Block Writes [BWRITE]: The number of physical block writes (sync plus async)
over a specified sampling period. Valid entries are integers in the range 0 to
999999.
Boot Time [BOOTTIME]: The system boot time on the monitored system.
CPU Busy [CPUBUSY]: The sum of the System and User CPU attributes in
percent. Valid entries are numeric values in the range 0 to 100, including the use of
*AVG, *MAX, *MIN, *SUM, Count, and Value functions.
CPU Context Switches [PSWITCH]: The number of CPU context switches over the
sampling interval. Valid entries are numeric values in the range 0 to 999999.
CPU Usage [CPUUSAGE]: The sum of the percent user and percent sys time of
the CPU averaged over the specified sampling period. Valid entries are 1, 5, 15, or
60. The default sample period is 1 minute.
Device Interrupts [DEVINT]: The number of non-clock device interrupts over the
sampling interval. Valid entries are numeric values in the range 0 to 999999.
Execs Executed [SYSEXEC]: The number of execs that were run over a specified
sampling period. Valid entries are integers in the range 0 to 999999.
Idle CPU [UNIXIDLCPU]: The percentage of time that the CPU is not processing
instructions. Valid entries are numeric values in the range 0 to 100.
Load Average 1 Min [NETLOAD1]: The average number of processes in the UNIX
kernel run queue during the last minute. Valid entries are numeric values in the
range 0 to 999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and
Value functions.
Load Average 5 Min [NETLOAD2]: The average number of processes in the UNIX
kernel run queue during the last five minutes. Valid entries are numeric values in
the range 0 to 999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and
Value functions.
Logical Block Reads [LREAD]: The number of logical block reads of system
buffers during the sampling interval. Valid entries are numeric values in the range
0 to 999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions.
Logical Block Writes [LWRITE]: The number of logical block writes of system
buffers during the sampling interval. Valid entries are numeric values in the range
0 to 999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions.
NonBlock Writes [PHWRITE]: The number of raw I/O writes over a specified
sampling period. Valid entries are integers in the range 0 to 999999.
Page Faults [VMPGFAULTS]: The average rate of page faults per second. Valid
entries are numeric values in the range 0 to 999999, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions.
Page Ins [VMPGSIN]: The average rate per second of page-in requests over a
specified sampling period. A page-in request can include multiple pages and gives
an indication of the I/O rate on the paging file. Valid entries are integers in the
range 0 to 999999.
Page Scan Rate [VMSCAN]: The average rate per second of pages examined over
the sampling interval. Valid entries are numeric values in the range 0 to 999999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Page Scanning [PGSCANRATE]: The number pages that the virtual memory
manager pages scans per second in KB. Valid entries are integers.
Pages Paged In [VMPGIN]: The average rate per second of pages that were
paged-in from disk to system memory during the monitoring interval. Valid entries
are numeric values in the range 0 to 999999, including the use of *AVG, *MAX,
*MIN, *SUM, Count, and Value functions.
Pages Paged Out [VMPGOUT]: The average rate per second of pages paged-out
from system memory to disk during the monitoring interval. Valid entries are
numeric values in the range 0 to 999999, including the use of *AVG, *MAX, *MIN,
*SUM, Count, and Value functions.
Peak Disk IO Rate KB/sec: The highest number of the total KB per second written
to and read from all local disks during a specified sampling period. Valid entries
are 1, 5, 15, or 60. The default sampling period is 1 minute.
Peak Disk Transfers/sec: The highest number of transfers per second on all local
disks. Valid entries are 1, 5, 15, or 60. The default sampling period is 1 minute.
Processes Idle [PIDLE]: The number of processes that are currently in idle state.
Valid entries are numeric values in the range 0 to 9999, including the use of *AVG,
*MAX, *MIN, *SUM, Count, and Value functions.
Processes Zombie [PZOMBIE]: The number of zombie processes. Valid entries are
numeric values in the range 0 to 9999, including the use of *AVG, *MAX, *MIN,
*SUM, Count, and Value functions.
System Calls [SYSCALL]: The number of system calls made during the sampling
interval. Valid entries are numeric values in the range 0 to 999999, including the
use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
System Read [SYSREAD]: The number of read() and readv() system calls during
the sampling interval. Valid entries are numeric values in the range 0 to 9999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
System Write [SYSWRITE]: The number of write() and writev() system calls over
the sampling interval. Valid entries are numeric values in the range 0 to 9999,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
Up Time [SYSUPTIME]: The number of seconds that a monitored system has been
running continuously. Valid entries are numeric values in the range 0 to
2147483647, including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value
functions.
UpTime [UPTIME]: The system up time of the monitored system. Valid entries are
in the format DDDdHH:MM:SS, where:
DDD Days to a maximum of 999
HH Hours
MM Minute
SS Second
Valid entries are numeric values in the range 0 to 100.0 to one decimal place.
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Valid entries are numeric values in the range 0 to 1000 to one decimal place,
including the use of *AVG, *MAX, *MIN, *SUM, Count, and Value functions.
Wait I/O [UNIXWAITIO]: The percentage of time that the CPU spends waiting for
I/O operations. Valid entries are numeric values in the range 0 to 100, including
the use of *AVG, *MAX, *MIN, or *SUM functions.
Idle Time [USERIDLE]: The number of minutes that have passed since a user last
entered a command. Valid entries are numeric values expressed as minutes in the
range 0 to 99999999, including the use of *AVG, *MAX, *MIN, *SUM, Count, and
Value functions. Use this attribute to check idle time.
Location [USERSITE]: Information provided by the user about their location. Valid
entry is a simple alphanumeric text string with a maximum length 16 characters.
This information varies from location to location and might not be available for all
users or for all UNIX operating systems. Check with your local System
Administrator for additional information about this attribute.
Login Name [USERLOGIN]: The login name of a user. Valid entry is a simple
alphanumeric text string, with a maximum length of 16 characters. Use this
attribute to include or exclude specific user login names in the situation.
Login Name (Unicode) [UUSERLOGIN]: The login name of a user. Valid entry is
a simple alphanumeric text string, with a maximum length of 48 bytes. Use this
attribute to include or exclude specific user login names in the situation. This
attribute is globalized.
Login Time [USERWHEN]: The date and time a user logged in.
System Name [ORIGINNODE]: The host name of the monitored system. Valid
entry is a simple alphanumeric text string with a maximum length 64 characters.
Timestamp [TIMESTAMP]: The date and time the agent collects information as set
on the monitored system.
User ID [UID]: The numeric ID that the system assigned to a user. Valid entries
are numeric values in the range 0 to 999999, including the use of *AVG, *MAX,
*MIN, *SUM, Count, and Value functions. Use to include or exclude a particular
user in the situation. On AIX, you need a patch from IBM to get the user ID. The
numeric identification number varies from system to system and user to user. An
example of a user ID is 48765.
For more information about historical data collection, see the IBM Tivoli Monitoring
Administrator’s Guide.
About situations
A situation is a logical expression involving one or more system conditions.
Situations are used to monitor the condition of systems in your network. You can
manage situations from the Tivoli Enterprise Portal by using the Situation editor.
The IBM Tivoli Monitoring agents that you use to monitor your system
environment are shipped with a set of predefined situations that you can use as-is
or you can create new situations to meet your requirements. Predefined situations
contain attributes that check for system conditions common to many enterprises.
Using predefined situations can improve the speed with which you can begin
using the Monitoring Agent for UNIX OS. You can examine and, if necessary,
change the conditions or values being monitored by a predefined situation to those
best suited to your enterprise.
Note: The predefined situations provided with this monitoring agent are not
read-only. Do not edit these situations and save over them. Software updates
will write over any of the changes that you make to these situations.
Instead, clone the situations that you want to change to suit your enterprise.
You can display predefined situations and create your own situations using the
Situation editor. The left frame of the Situation editor initially lists the situations
associated with the Navigator item that you selected. When you click a situation
name or create a new situation, the right frame opens with the following tabs:
Formula
Condition being tested
Distribution
List of managed systems (operating systems, subsystems, or applications)
to which the situation can be distributed.
Expert Advice
Comments and instructions to be read in the event workspace
Action
Command to be sent to the system
Until Duration of the situation
For a list of the predefined situations for this monitoring agent and a description
of each situation, refer to the Predefined situations section below and the
information in that section for each individual situation.
For additional information about the situations for this monitoring agent, see
Appendix B, “Situations,” on page 69.
Predefined situations
This monitoring agent contains the following predefined situations, which are
organized by the workspace that the situations are associated with.
v Disk Usage workspace situations
– UNIX_Disk_Availability
– UNIX_CMD_Disk_Inodes_Critical
– UNIX_CMD_Disk_Space_Warning
– UNIX_Filemount_Critical
– UNIX_HD_Config_Critical
– UNIX_scratch_tmp_Disk_Full
v File Information workspace situation
– UNIX_User_File_Exists
v Network workspace situation
– UNIX_Network_Collsns_Critical
– UNIX_Network_Collsns_Warning
– UNIX_Network_Errors
– UNIX_Network_Interface_Busy
– UNIX_Network_Interface_Idle
v NFS Activity workspace situation
– UNIX_NFS_RPC_Rejects
v Process workspace situations
– UNIX_CMD_Process_Critical
– UNIX_CMD_Runaway_Process
– UNIX_CPU_Critical
– UNIX_CPU_Warning
– UNIX_Process_Memory_Critical
– UNIX_Process_Memory_Leak
– UNIX_Process_Memory_Warning
– UNIX_Process_MISSING_inetd
v System Information workspace situations
– UNIX_Active_Virtual_Memory
– UNIX_CPU_Busy_Critical
– UNIX_CPU_Busy_Warning
– UNIX_HD_Excessive_IO_Wait
– UNIX_System_Busy_Critical
UNIX_CMD_Disk_Inodes_Critical situation
Monitors the /tmp and /var free inodes for critical space.
UNIX_CMD_Disk_Space_Warning situation
Monitors any mounted file system with space usage greater than 90 percent.
UNIX_Filemount_Critical situation
Checks for the existence of a specific mount point on a specific system.
UNIX_HD_Config_Critical situation
Monitors hard disk space or free inodes that are going critical.
UNIX_scratch_tmp_Disk_Full situation
Monitors file mount /scratch or /tmp with space usage greater than 90 percent.
UNIX_Network_Collsns_Warning situation
Indicates a small number of network collisions.
UNIX_Network_Errors situation
Monitors whether the received or transmitted error limit has been exceeded.
UNIX_Network_Interface_Busy situation
Monitors whether the frames transmitted or received has exceeded the limit.
UNIX_Network_Interface_Idle situation
Monitors whether the frames transmitted or received is less than the limit.
UNIX_CMD_Runaway_Process situation
Reports processes with high CPU utilization.
UNIX_CPU_Critical situation
Monitors for processes with CPU utilization that is greater than or equal to 85
percent.
UNIX_CPU_Warning situation
Monitors processes with CPU utilization that is greater than or equal to 70 percent
and less than 85 percent.
UNIX_Process_Memory_Critical situation
Reports process with high memory usage that have reached a critical state.
UNIX_Process_Memory_Leak situation
Reports process with high virtual memory usage.
UNIX_Process_Memory_Warning situation
Reports processes with high memory usage before they become critical.
UNIX_Process_MISSING_inetd situation
Monitors whether the inetd Internet services daemon is up and running.
UNIX_CPU_Busy_Critical situation
Monitors whether the CPU workload is high (greater than 90 percent).
UNIX_CPU_Busy_Warning situation
Monitors whether the CPU workload is greater than 70 percent and less than or
equal to 90 percent.
UNIX_HD_Excessive_IO_Wait situation
Monitors a typical I/O bound processor (NSF).
UNIX_System_Busy_Critical situation
Monitors for a critical state of I/O wait, low free memory, and CPU idle.
UNIX_System_Busy_Warning situation
Monitors for system CPU, idle, I/O wait, and load average for busy state.
UNIX_System_Capacity_Critical situation
Monitors system capacity using a process number and CPU usage.
UNIX_System_Paging_Critical situation
Monitors if the virtual memory manager is working too hard to find free pages.
UNIX_System_Virtual_Memory_Warning situation
Monitors if the available virtual memory is running low.
When included in a situation, the command executes when the situation becomes
true. A Take Action command in a situation is also referred to as reflex automation.
When you enable a Take Action command in a situation, you automate a response
to system conditions. For example, you can use a Take Action command to send a
command to restart a process on the managed system or to send a text message to
a cell phone.
Sample_kill_Process
The remaining section of this chapter contains a description of this Take Action
command. The following information is provided about the Take Action command:
Description
Which actions the command performs on the system to which it is sent
Arguments
List of arguments, if any, for the Take Action with a short description and
default value for each one
Destination systems
Where the command is to be executed: on the Managed System
(monitoring agent) where the agent resides or on the Managing System
(Tivoli Enterprise Monitoring Server) to which it is connected
Usage notes
Additional relevant notes for using the Take Actions
Arguments
Process ID
The Process ID (PID) of the process you would like to kill.
Destination systems
Managed system
Usage notes
The kill command is executed directly by the remote Monitoring Agent for UNIX
OS. Because it is easy to kill processes unintentionally, you need to exercise caution
if the monitoring agent is run as superuser (root).
About policies
Policies are an advanced automation technique for implementing more complex
workflow strategies than you can create through simple automation.
A policy is a set of automated system processes that can perform actions, schedule
work for users, or automate manual tasks. You use the Workflow Editor to design
policies. You control the order in which the policy executes a series of automated
steps, which are also called activities. Policies are connected to create a workflow.
After an activity is completed, Tivoli Enterprise Portal receives return code
feedback and advanced automation logic responds with subsequent activities
prescribed by the feedback.
Note: The predefined policies provided with this monitoring agent are not
read-only. Do not edit these policies and save over them. Software updates
will write over any of the changes that you make to these policies. Instead,
clone the policies that you want to change to suit your enterprise.
For information about using the Workflow Editor, see the IBM Tivoli Monitoring
Administrator’s Guide or the Tivoli Enterprise Portal online help.
For a list of the policies for this monitoring agent and a description of each policy,
refer to the Predefined policies section below and the information in that section
for each individual policy.
Predefined policies
This monitoring agent contains the following predefined policies:
v UNIX_CPU_Busy
v UNIX_Disk_Space_Full
v UNIX_Virtual_Memory_High
The remaining sections of this chapter contain descriptions of these policies, which
are listed alphabetically.
UNIX_CPU_Busy policy
When the Runaway_Process and CPU_Critical situations are both true, you can
choose to send a message or to terminate the runaway process (after confirmation
from an administrator, if possible).
v If the termination fails, the administrator is informed, and the policy completes.
UNIX_Disk_Space_Full policy
When the Disk_Space_Warning and the scratch-tmp Disk Full situations are both
true, you can choose to perform the following actions:
v Compress all files that reside at mount point /scratch or /tmp.
v Remove all files which reside at mount point /scratch or /tmp.
v After a timeout with no user choice, echo a message.
UNIX_Virtual_Memory_High policy
When the Virtual_Memory_Warning and the Process Memory Leak situations are
both true, the process identified in the Process Memory Leak event is terminated.
v If the termination fails, the administrator is informed, and the policy completes.
v If the termination succeeds, the policy waits and reevaluates the
Virtual_Memory_Warning situation.
v If the Virtual_Memory_Warning situation is still true, the administrator is
informed.
You can use the Monitoring Agent for UNIX OS attributes to build situations that
monitor the performance of your UNIX network managed resources. When the
values of the selected attributes in a situation exceed their threshold settings, the
Monitoring Agent for UNIX OS systems post an alert, notifying you of a problem.
Overview
An attribute is a characteristic of a managed object (node). For example, Disk
Name is an attribute for a disk, which is a managed object.
You can use the Monitoring Agent for UNIX OS attributes to build situations that
monitor the performance of your UNIX network managed resources. When the
values of the selected attributes in a situation exceed their threshold settings, the
Monitoring Agent for UNIX OS systems post an alert, notifying you of a problem.
The Monitoring Agent for UNIX OS provides the following types of attributes:
single-instance
Single-instance attributes are attributes that gather only one set of data. For
example, the local time attributes are single-instance attributes because
there is only one set of values for local time at any one time.
multiple-instance
multiple-instance attributes are attributes that can gather multiple sets of
data. For example, the Avg_Queue attribute is a multiple-instance attribute
because it can return one set of data for each queue that exists on the
system.
You cannot use attributes from more than one multiple-instance group in
the same situation. Examples of multiple-instance groups are
Disk_Performance, System, and User.
*ACTION
echo UNIX_CMD_Disk_Space_Warning
&Disk.System_Name Filemount:
&Disk.Mount_Point
Space_Used: &Disk.Space_Used_Percent
UNIX_CMD_Process_Critical No Checks for existence of process
*IF *VALUE Process.Command *EQ FOO
UNIX_CMD_Runaway_Process Yes Report High CPU processes
*IF *VALUE Process.CPU_Utilization *GT 95
&Process.System_Name
Processid: &Process.Process_ID
Command: &Process.Command
*AND
Appendix B. Situations 71
Table 9. UNIX situations (continued)
Activate at
Name startup Description, logic, and values
UNIX_System_Busy_Warning Yes Checks for System CPU, Idle, I/O Wait, and Load Avg.
for Busy State.
*IF *VALUE System.System_CPU *GT 50
*AND
The provided situations are assigned to states in the templates. The assigned state
is associated with an alert icon that displays when monitoring situations.
Default template
The UNIX System template is the default template. It is assigned to the
*ALL_UNIX managed resource list managed object when starting the Tivoli
Enterprise Portal.
Four of the situations that are assigned to the UNIX System template are set to
activate at startup so that you can begin monitoring your UNIX systems
immediately.
Situations are assigned to managed resources through the Distribution page of the
Settings notebook of the situation. The assignment list of a situation indicates all of
the managed resources on which the situation runs when it is started.
Generic event mapping provides useful event class and attribute information for
situations that do not have specific event mapping defined. Each event class
corresponds to an attribute group in the monitoring agent. For a description of the
event slots for each event class, see Table 12 on page 78. For more information
about mapping attribute groups to event classes, see the IBM Tivoli Monitoring
Administrator’s Guide.
BAROC files are found on the Tivoli Enterprise Monitoring Server in the
installation directory in TECLIB (that is, install_dir/cms/TECLIB for Windows
systems and install_dir/tables/TEMS_hostname/TECLIB for UNIX systems). IBM
Tivoli Enterprise Console event synchronization provides a collection of
ready-to-use rule sets that you can deploy with minimal configuration. Be sure to
install IBM Tivoli Enterprise Console event synchronization to access the correct
Sentry.baroc, which is automatically included during base configuration of IBM
Tivoli Enterprise Console rules if you indicate that you want to use an existing
rulebase. See the IBM Tivoli Monitoring Installation and Setup Guide for details.
Table 11. Overview of Distributed Monitoring migrated situations
Situation IBM Tivoli Enterprise Console event class
UX_USInodes* Sentry2_0_inodes
Sentry2_0_inodesused
UX_USIUsPct* Sentry2_0_inodesusedpct
UX_USDkUPct* Sentry2_0_diskusedpct
UX_USDskAva* Sentry2_0_diskavail
UX_USDskUsd* Sentry2_0_diskused
UX_USDIORtK* Sentry2_0_diskioratek
UX_USPDskRt* Sentry2_0_peakdiskrate
UX_USPkDkXf* Sentry2_0_peakdiskxfer
UX_USSpcUtl* Sentry2_0_spaceutil
UX_USSpcUtK* Sentry2_0_spaceutilkb
UX_USReqWt* Sentry2_0_reqwait
UX_USReqTm* Sentry2_0_reqtime
UX_USRPCTmO* Sentry2_0_rpctmout
UX_USBadNFS* Sentry2_0_badnfs
UX_USBadRPC* Sentry2_0_badrpc
UX_USNtInEr* Sentry2_0_netinerr
UX_USNtInEX* Sentry2_0_netinerrx
UX_USNetIn* Sentry2_0_netinerr
UX_USNetInX* Sentry2_0_netinx
Each of the event classes is a child of KUX_Base. The KUX_Base event class can be
used for generic rules processing for any event from the Monitoring Agent for
UNIX OS.
Table 13 lists the historical table column heads alphabetically and the
corresponding SMP CPU attributes.
Table 13. UNIXCPU table column heads and the corresponding SMP CPU attributes
Historical table column head Attribute name
CPUBUSY CPU_Busy
CPUID CPU_ID
CPUSTAT CPU_Status
CSW Context_Switches
ICSW Involuntary_Context_Switches
IDLECPU Idle_CPU
INTRRUPT Interrupts
INTRTHRD Interrups_As_Threads
MAJF Major_Faults
MINF Minor_Faults
ORIGINNODE System_Name
SMTX Spins_On_Mutexes
SRWLOCKS Spins_On_RW_Locks
SYSCALL System_Calls
SYSCPU System_CPU
THRDMIGR Thread_Migrations
TIMESTAMP Timestamp
USRCPU User_CPU
WAITIO Wait_I/O
XCALLS Cross_Calls
ZATTRIB Parameter
Table 14 lists the historical table column heads alphabetically and the
corresponding Disk group attributes.
Table 14. UNIXDISK table column heads and the corresponding Disk Information attributes
Historical table column head Attribute name
DSKNAME Name
DSKSIZE Size
FSTYPE FS_Type
Table 15 lists the historical table column heads alphabetically and the
corresponding Disk Performance attributes.
Table 15. UNIXDPERF table column heads and the corresponding Disk Performance
attributes
Historical table column head Attribute name
AVGSERV Avg_Serv
Table 16 lists the historical table column heads alphabetically and the
corresponding File Information attributes.
Table 16. UNIXFILE table column heads and the corresponding File Information attributes
Historical table column head Attribute name
ACCESS Access
ACCESSEDTM Last_Accessed_Time
CHANGEDTM Last_Changed_Time
FILE File
GROUP Group
LINKNAME Link_Name
LINKS Links
ORIGINNODE System_Name
OWNER Owner
PATH Path
SIZE Size
TIMESTAMP Timestamp
TYPE Type
Table 17 lists the historical table column heads alphabetically and the
corresponding Network attributes.
Table 17. UNIXNET table column heads and the corresponding Network attributes
Historical table column head Attribute name
FCOLLSNS Collisions
FDNSNAME Interface_DNS_Name
Table 18 lists the historical table column heads alphabetically and the
corresponding NFS and RPC Statistics attributes.
Table 18. UNIXNSF table column heads and the corresponding NFS and RPC Statistics
attributes
Historical table column head Attribute name
ZTITLE Attribute_Title
Table 19 lists the historical table column heads alphabetically and the
corresponding Process attributes.
Table 19. UNIXPS table column heads and the corresponding Process attributes
Historical table column head Attribute name
ADDR Entry_Address
CHILDTIME Total_Child_CPU_Time
CHILDSTIME Child_System_CPU_Time
CHILDUTIME Child_User_CPU_Time
CMD Command
COMMAND Process_Command
CONTSWITCH Context_Switch
CPU CPU_Utilization
CPUID CPU_ID
CPUPERCENT CPU_Pct
CPUTIME CPU_Time
Table 21 lists the historical table column heads alphabetically and the
corresponding User attributes.
Table 21. UNIXUSER table column heads and the corresponding User attributes
Historical table column head Attribute name
ORIGINNODE System_Name
PID Process_ID
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements for the monitoring
agent,” on page 5.
Upload files for review to the following FTP site: ftp.emea.ibm.com. Log in as
anonymous and place your files in the directory that corresponds to the IBM Tivoli
Monitoring component that you use. See “Contacting IBM Software Support” on
page 119 for more information about working with IBM Software Support.
Trace data captures transient information about the current operating environment
when a component or application fails to operate as designed. IBM Software
Problem classification
The following types of problems might occur with the IBM Tivoli Monitoring:
UNIX OS Agent:
v Installation and configuration
v General usage and operation
v Display of monitoring data
v Take Action commands
This appendix provides symptom descriptions and detailed workarounds for these
problems, as well as describing the logging capabilities of the monitoring agent.
See the IBM Tivoli Monitoring Problem Determination Guide for general problem
determination information.
Trace logging
Trace logs capture information about the operating environment when component
software fails to operate as intended. The principal log type is the RAS (Reliability,
Availability, and Serviceability) trace log. These logs are in the English language
only. The RAS trace log mechanism is available for all components of IBM Tivoli
Monitoring. Most logs are located in a logs subdirectory on the host computer. See
the following sections to learn how to configure and use trace logging:
v “Principal trace log files” on page 99
v “Examples: using trace logs” on page 101
v “Setting RAS trace parameters” on page 102
Note: The documentation refers to the RAS facility in IBM Tivoli Monitoring as
″RAS1″.
The default configuration for trace logging, such as whether trace logging is
enabled or disabled and trace level, depends on the source of the trace logging.
Trace logging is always enabled.
where:
v hostname is the host name of the machine on which the monitoring component is
running.
v product is the two-character product code. For Monitoring Agent for UNIX OS,
the product code is ux.
v program is the name of the program being run.
For long-running programs, the nn suffix is used to maintain a short history of log
files for that startup of the program. For example, the kuxagent program might
have a series of log files as follows:
server01_ux_kuxagent_437fc59-01.log
server01_ux_kuxagent_437fc59-02.log
server01_ux_kuxagent_437fc59-03.log
As the program runs, the first log (nn=01) is preserved because it contains program
startup information. The remaining logs ″roll." In other words, when the set of
numbered logs reach a maximum size, the remaining logs are overwritten in
sequence.
server01_ux_kuxagent_537fc59-01.log
server01_ux_kuxagent_537fc59-02.log
server01_ux_kuxagent_537fc59-03.log
Each program that is started has its own log file. For example, the Monitoring
Agent for UNIX OS would have agent logs in this format:
server01_ux_kuxagent_437fc59-01.log
Other logs, such as logs for UNIX collector processes and Take Action commands,
have a similar syntax as in the following example:
server01_ux_ifstat_447fc59-01.log
Note: When you communicate with IBM Software Support, you must capture and
send the RAS1 log that matches any problem occurrence that you report.
See the IBM Tivoli Monitoring Installation and Setup Guide for more information on
the complete set of trace logs that are maintained on the monitoring server.
Background Information
Monitoring Agent for UNIX OS uses RAS1 tracing and generates the logs
described in Table 23 on page 100. The default RAS1 trace level is ERROR.
RAS1 tracing has control parameters to manage to the size and number of RAS1
logs. Use the procedure described in this section to set the parameters.
Note: The KBB_RAS1_LOG parameter also provides for the specification of the
log file directory, log file name, and the inventory control file directory and
name. Do not modify these values or log information can be lost.
Regularly prune log files other than the RAS1 log files in the logs directory. Unlike
the RAS1 log files which are pruned automatically, other log types can grow
indefinitely, for example, the logs in Table 23 on page 100 that include a process ID
number (PID).
Procedure
Specify RAS1 trace options in the install_dir/config/ux.ini file. You can
manually edit the configuration file to set trace logging:
1. Open the trace options file: /install_dir/config/ux.ini.
2. Edit the line that begins with KBB_RAS1= to set trace logging preferences.
For example, if you want detailed trace logging, set the Maximum Tracing
option:
export KBB_RAS1=’ERROR (UNIT:kux ALL) (UNIT:kra ALL)’
3. Edit the line that begins with KBB_RAS1_LOG= to manage the generation of
log files:
v Edit the following parameters to adjust the number of rolling log files and
their size.
– MAXFILES: the total number of files that are to be kept for all startups of
a given program. Once this value is exceeded, the oldest log files are
discarded. Default value is 9.
– LIMIT: the maximum size, in megabytes (MB) of a RAS1 log file. Default
value is 5.
v IBM Software Support might guide you to modify the following parameters:
– COUNT: the number of log files to keep in the rolling cycle of one
program startup. Default value is 3.
– PRESERVE: the number of files that are not to be reused in the rolling
cycle of one program startup. Default value is 1.
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements for the monitoring
agent,” on page 5.
The following Web site provides details about the required patch for HPUX11:
http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=PHSS_30966&admit=-1335382922+112672773755 \
6+28353475
When you upgrade to IBM Tivoli Fixpacks for Candle, Version 350, are delivered as each monitoring agent is
Monitoring, you might need to upgraded to IBM Tivoli Monitoring.
apply fixpacks to Candle, Version Note: The IBM Tivoli Monitoring download image or CD provides application
350, agents. fixpacks for the monitoring agents that are installed from that CD (for
example, the agents for operating systems such as Windows, Linux, UNIX, and
i5/OS). The upgrade software for other agents is located on the download
image or CDs for that specific monitoring agent, such as the agents for
database applications.
If you do not upgrade the monitoring agent to IBM Tivoli Monitoring, the
agent continues to work. However, you must upgrade to have all the
functionality that IBM Tivoli Monitoring offers.
Presentation files and customized The upgrade from version 350 to IBM Tivoli Monitoring handles export of the
Omegamon DE screens for Candle presentation files and the customized Omegamon DE screens.
monitoring agents need to be
upgraded to a new Linux on
z/Series system.
The product fails to do a The monitoring agent must have the permissions necessary to perform
monitoring activity that requires requested actions. For example, if the user ID you used to log onto the system
read, write, or execute permissions. to install the monitoring agent (locally or remotely) does not have the
For example, the product might fail permission to perform a monitoring operation (such as running a command),
to run a Take Action command or the monitoring agent is not able perform the operation.
read a log.
While installing the agent from a This error is caused by low disk space. Although the install.sh script indicates
CD, the following message is that it is ready to install the agent software, the script considers the size of all
displayed and you are not able to tar files, not the size of all the files that are contained within the tar file.Run
continue the installation: the df -k command to check whether the file systems have enough space to
install.sh warning: unarchive install agents.
of "/cdrom/unix/cienv1.tar" may
have failed
About installing as root: Normally, do not use the root user account to install
or to start the Monitoring Agents for UNIX, for Linux, and for UNIX Logs. If
you use the root user account to install the product, the files do not receive the
correct permissions, and product behavior is unpredictable.
To create a stable installation of the product, use one of the following options:
v Create a user account with all the authority and permissions to install and
run commands. For example, create a tivoli user account.
—OR—
v Use any user account other than root that has the required authority and
permissions.
Cannot locate the Go to install_dir/config and edit the ux.ini file. Set the
KDCB0_HOSTNAME setting. KDCB0_HOSTNAME parameter followed by the IP address. If you use
multiple network interface cards (NICs), give the Primary IP address of the
network interface.
The Monitoring Agent for UNIX You can collect data to analyze this problem as follows:
OS repeatedly restarts. 1. Access the install_dir/config/ux.ini file, which is described in “Setting
RAS trace parameters” on page 102.
2. Add the following line: KBB_SIG1=trace –dumpoff
Agents in the monitoring Configure both the monitoring server and the Warehouse proxy server to
environment use different accept multiple protocols, as described in the IBM Tivoli Monitoring Installation
communication protocols. For and Setup Guide.
example, some agents have
security enabled and others do not.
Creating a firewall partition file: How it works: When the agents start, they search KDCPARTITION.TXT for the
The partition file enables an agent following matches:
to connect to the monitoring server v An entry that matches the partition name OUTSIDE.
through a firewall.
v An entry that also includes a valid external address.
For more information, see the IBM Tivoli Monitoring Installation and Setup Guide.
The Monitoring Agent for UNIX Check the following issues:
OS is started and running but not 1. Check the Monitoring Agent for UNIX OS log files to see whether there are
displaying data in the Tivoli connection problems like those mentioned in “Agent unable to connect” on
Enterprise Portal. page 109.
2. If there are no connection problems, check whether the agent has
terminated. (Search for the word ″terminated″ in the log.)
3. If the agent is not terminated, confirm that you have added application
support for the Monitoring Agent for UNIX in the Tivoli Enterprise
Monitoring Server, as described in IBM Tivoli Monitoring Installation and
Setup Guide.
Note: When you monitor a multinode system, such as a database, IBM Tivoli
Monitoring adds a subsystem name to the concatenated name, typically a
database instance name.
The length of the name that IBM Tivoli Monitoring generates is limited to 32
characters. Truncation can result in multiple components having the same
32-character name. If this problem happens, shorten the hostname portion of the
name as follows:
1. Open the configuration file for the monitoring agent, which is located in the
following path: install_dir/config/ux.ini.
Note: When you modify the ux.ini file, your configuration changes affect only
the instance Monitoring Agent for UNIX OS that is running on the
computer. If you want your configuration changes to affect all agents
that run on the computer, modify the install_dir/config/env.config
file.
2. Find the line the begins with CTIRA_HOSTNAME=.
Note: You must ensure that the resulting name is unique with respect to any
existing monitoring component that was previously registered with the
Tivoli Enterprise Monitoring Server.
4. Save the file.
5. Restart the agent.
6. If you do not find the files mentioned in Step 1, perform the workarounds
listed in the next paragraph.
If you cannot find the CTIRA_HOSTNAME environment variable, you must add
it to the configuration file of the monitoring agent:
v On Windows: Use the Advanced > Edit Variables option.
v On UNIX and Linux: Add the variable to the config/product_code.ini file. For
Monitoring Agent for UNIX OS, add the variable to the ux.ini file.
If you have not executed the SetPerm command, the following permissions are set:
rwx rwx r-x uid(35008) gid(1111) kuxagent
rwx rwx r-x uid(35008) gid(1111) stat_daemon
rwx rwx r-x uid(35008) gid(1111) ifstat
rwx rwx r-x uid(35008) gid(1111) nfs_stat
rwx rwx r-x uid(35008) gid(1111) kuxagent
rw- r-- --- uid(0) gid(3) /dev/kmem
Note: If the log file has SUID, that means that you have executed the SetPerm command.
If the log file has this type of information, see “Support information” on page
117.
You are not able to start the You might see the following information in the log file:
agent. You want to have multiple /usr/candle/sol273/ux/bin/kuxagent: fatal: libkra.so: open failed: No \
instances of the same Monitoring such file or directory.
Agent for UNIX OS running on
the same system, and the agents For the agent to pick up this library it must be available in /opt/candle/lib
must communicate with different directory.
Tivoli Enterprise Monitoring
Servers. The SetPerm script creates a soft link to the SupportInfo directory. After installing
and configuring the agent, execute the SupportInfo script as a root. This script is
available under SupportInfo. In some older releases the SupportInfo is not
creating the links. In these cases, create the following link:
mkdir -p /opt/candle/lib Create /opt/candle/lib directory \
cd /opt/candle/lib
Solaris 8 (32-bit):
ln -s install_dir/sol283/lib/ /opt/candle/lib/sol283
Solaris 8 (64-bit):
ln -s install_dir/sol286/lib/ /opt/candle/lib/sol286
Solaris 9 (32-bit):
ln -s install_dir/sol293/lib/ /opt/candle/lib/sol293
Solaris 9 (64-bit):
ln -s install_dir/sol296/lib/ /opt/candle/lib/sol296
Solaris 10 (32-bit):
ln -s install_dir/sol2103/lib/ /opt/candle/lib/sol2103
Solaris 10 (64-bit):
ln -s install_dir/sol2106/lib/ /opt/candle/lib/sol2106
Since the module kdsvlunx is running with the root user account, the system
does search the current LIBPATH to locate any needed shared libraries. It only
searches the list of libraries compiled in the executable for security reasons.
The agent is installed and This problem can occur when the root user account is used to install and start
running normally. After the agent. Verify whether you have used the root user account to install the
rebooting the computer, where agent.To change the user account from root to some other user account, see
Tivoli Enterprise Monitoring Installing as root.
Server was running, the agent is
not online.
If the Monitoring Agent for UNIX OS log file has this information, see Agent
unable to connect.
To ensure support of historical data collection, do not use the Sort By, Group By, or
First/Last functions in your queries.
See the IBM Tivoli Monitoring Administrator’s Guide the Tivoli Enterprise Portal
online Help for information on the Historical Data Collection function.
When you use a long process Truncation of process names in the portal display is the expected behavior. 64 bytes
name in the situation, the is the maximum name length.
process name is truncated.
This section describes problems and solutions for remote deployment and removal
of agent software Agent Remote Deploy:
Table 28. Remote deployment problems and solutions
Problem Solution
The removal of a monitoring agent fails when you This problem might happen when you attempt the remote
use the remote removal process in the Tivoli removal process immediately after you have restarted the
Enterprise Portal desktop or browser. Tivoli Enterprise Monitoring Server. You must allow time for
the monitoring agent to refresh its connection with the Tivoli
Enterprise Monitoring Server before you begin the remote
removal process.
This section provides information for problem determination for agents. Be sure to
consult the IBM Tivoli Monitoring Problem Determination Guide for more general
problem determination information.
Table 31. Problems with configuring situations that you solve in the Situation Editor
Problem Solution
Note: To get started with the solutions in this section, perform these steps:
1. Launch the Tivoli Enterprise Portal.
2. Click Edit > Situation Editor.
3. In the tree view, choose the agent whose situation you want to modify.
4. Choose the situation in the list. The Situation Editor view is displayed.
The situation for a specific agent is Open the Situation Editor. Access the All managed servers view. If the situation
not visible in the Tivoli Enterprise is absent, confirm that application support for Monitoring Agent for UNIX OS
Portal. has been added to the monitoring server. If not, add application support to the
server, as described in the IBM Tivoli Monitoring Installation and Setup Guide.
Table 32. Problems with configuration of situations that you solve in the Workspace area
Problem Solution
Situation events are not displayed Associate the situation with a workspace.
in the Events Console view of the Note: The situation does not need to be displayed in the workspace. It is
workspace. sufficient that the situation be associated with any workspace.
Table 33. Problems with configuration of situations that you solve in the Manage Tivoli Enterprise Monitoring Services
window
Problem Solution
After an attempt to restart the For UNIX, NetWare, or Windows, log on to the applicable system and perform
agents in the Tivoli Enterprise the appropriate queries.
Portal, the agents are still not
running.
The Tivoli Enterprise Monitoring Check the system status and check the appropriate IBM Tivoli Monitoring logs.
Server is not running.
The managed objects you created Check the managed system distribution on both the situation and the managed
are firing on incorrect managed object settings sheets.
systems.
Support information
If you have a problem with your IBM software, you have the following options for
obtaining support for software products:
v “Searching knowledge bases”
v “Obtaining fixes” on page 118
v “Receiving weekly support updates” on page 118
v “Contacting IBM Software Support” on page 119
The documentation CD contains the publications that are in the product library.
The format of the publications is PDF, HTML, or both.
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
The IBM Software Support Web site provides the latest information about known
product limitations and workarounds in the form of technotes for your product.
You can view this information at the following Web site:
http://www.ibm.com/software/support
To search for information on IBM products through the Internet (for example, on
Google), be sure to consider the following types of documentation:
v IBM technotes
v IBM downloads
v IBM Redbooks
v IBM developerWorks
v Forums and newsgroups
Obtaining fixes
A product fix might be available to resolve your problem. To determine what fixes
are available for your IBM software product, follow these steps:
1. Go to the Software support Web site at
http://www.ibm.com/software/support.
2. Click the Download tab.
3. Select the operating system in the Operating system menu.
4. Type search terms in the Enter search terms field.
5. As appropriate, use other search options to further define your search.
6. Click Search.
7. From the list of downloads returned by your search, click the name of a fix to
read the description of the fix and to optionally download the fix.
For more information about the types of fixes that are available, see the IBM
Software Support Handbook at
http://techsupport.services.ibm.com/guides/handbook.html.
Before contacting IBM Software Support, your company must have an active IBM
software maintenance contract, and you must be authorized to submit problems to
IBM. The type of software maintenance contract that you need depends on the
type of product you have:
v For IBM distributed software products (including, but not limited to, Tivoli,
Lotus, and Rational products, as well as DB2 and WebSphere products that run
on Windows, or UNIX operating systems), enroll in Passport Advantage in one
of the following ways:
Online
Go to the Passport Advantage Web site at
http://www.lotus.com/services/passport.nsf/
WebDocs/Passport_Advantage_Home and click How to Enroll.
By phone
For the phone number to call in your country, go to the IBM Software
Support Web site at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
v For customers with Subscription and Support (S & S) contracts, go to the
Software Service Request Web site at
https://techsupport.services.ibm.com/ssr/login.
v For customers with IBMLink, CATIA, Linux, OS/390, iSeries, pSeries, z/Series,
and other support agreements, go to the IBM Support Line Web site at
http://www.ibm.com/services/us/index.wss/so/its/a1000030/dt006.
v For IBM eServer software products (including, but not limited to, DB2 and
WebSphere products that run in z/Series, pSeries, and iSeries environments),
you can purchase a software maintenance agreement by working directly with
an IBM sales representative or an IBM Business Partner. For more information
about support for eServer software products, go to the IBM Technical Support
Advantage Web site http://www.ibm.com/servers/eserver/techsupport.html.
If you are not sure what type of software maintenance contract you need, call
1-800-IBMSERV (1-800-426-7378) in the United States. From other countries, go to
the contacts page of the IBM Software Support Handbook on the Web at
http://techsupport.services.ibm.com/guides/contacts.html and click the name of
your geographic region for phone numbers of people who provide support for
your location.
Submitting problems
You can submit your problem to IBM Software Support in one of two ways:
Online
Click Submit and track problems on the IBM Software Support site at
http://www.ibm.com/software/support/probsub.html. Type your
information into the appropriate problem submission form.
By phone
For the phone number to call in your country, go to the contacts page of
the IBM Software Support Handbook at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM’s future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
If you are viewing this information in softcopy form, the photographs and color
illustrations might not appear.
Trademarks
IBM, the IBM logo, IBMLink™, AIX, Candle, CandleNet Command Center,
CandleNet Portal, DB2®, developerWorks®, eServer™, Hummingbird™, iSeries,
Lotus®, MVS™, OMEGAMON, OS/390®, Passport Advantage®, pSeries®, Rational®,
Redbooks™, Tivoli, the Tivoli logo, Tivoli Enterprise, Tivoli Enterprise Console,
WebSphere®, and zSeries® are trademarks or registered trademarks of International
Business Machines Corporation in the United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
M
H manuals
historical data feedback viii
calculate disk space 51 online viii
disk capacity planning 51 ordering viii
historical data, collecting and viewing 11 see publications ix
historical reports memory requirements 5
attributes 68 messages
column header 68 built-in features 97
cross reference 68 modifying situation values to detect problems 10
historical tables Monitoring Agent for UNIX OS
UNIXCPU 87 components 2
UNIXDISK 88 features 1
UNIXDPERF 88 tasks 7
UNIXFILE 89 using 7
UNIXNET 89 Monitoring Agent for UNIX OS installation problems 104
UNIXNFS 90 monitoring, viewing the real-time environment 7
UNIXOS 93 multiple-instance attributes
UNIXPS 92 definition 67
UNIXUSER 96
N
I N/A value
IBM Software Support assignment 67
See support Network attribute group
IBM Tivoli Enterprise Console list of attributes 26
event mapping 75 UNIXNET historical table 89
IBM Tivoli Monitoring for UNIX Network workspace 16
benefits of 1 NFS Activity workspace 16
definition of 1 NFS and RPC Statistics attribute group
types of infomation collected by 1 list of attributes 30
information centers for support 117 UNIXNFS historical table 90
information, additional notation
attributes 21 environment variables xi
policies 65 path names xi
procedural 7 typeface xi
situations 56
Take Action commands 63
workspaces 13 O
installation online publications
log file 99 accessing ix
more information 7 for support 117
problems 104 operating systems 5
installation requirements 5 operation of resource, recovering 8
interface, user 2 ordering publications ix
problem determination for Tivoli Enterprise Portal 112 other requirements 5
Internet
for product support 118
Index 131
System Information workspace 19 UNIX_Network_Interface_Busy situation 58
UNIX_Network_Interface_Idle situation 58
UNIX_NFS_RPC_Rejects 71
T UNIX_NFS_RPC_Rejects situation 58
UNIX_Process Memory_Warning 71
Take Action commands 8
UNIX_Process_Memory_Critical 71
more information 63
UNIX_Process_Memory_Critical situation 59
overview 63
UNIX_Process_Memory_Leak situation 59
problem determination 116
UNIX_Process_Memory_Warning situation 59
Sample_kill_Process 64
UNIX_Process_MISSING_inetd situation 59
target application
UNIX_scratch_tmp_Disk_Full situation 57
problems 116
UNIX_System_Busy_Critical situation 60
tasks
UNIX_System_Busy_Warning situation 60
collecting data 11
UNIX_System_Capacity_Critical situation 60
customizing monitoring environment 9
UNIX_System_Paging_Critical 72
investigating events 8
UNIX_System_Paging_Critical situation 60
monitoring with custom situations 10
UNIX_System_Virtual_Memory_Warning 72
recovering resource operation 8
UNIX_System_Virtual_Memory_Warning situation 61
viewing data 11
UNIX_User_CPU_Critical situation 61
viewing real-time monitoring environment 7
UNIX_User_File_Exists situation 58
templates 73
UNIX_Virtual_Memory_High policy 66
UNIX Disk 73
UNIXCPU historical table 87
UNIX LoadLeveler 73
UNIXDISK historical table 88
UNIX Net 73
UNIXDPERF historical table 88
UNIX System (default) 73
UNIXFILE historical table 89
UNIX User 73
UNIXNET historical table 89
Terminal 96
UNIXNFS historical table 90
Tivoli Enterprise Portal
UNIXOS historical table 93
problem determination 112
UNIXPS historical table 92
Tivoli software information center ix
UNIXUSER historical table 96
Tivoli technical training x
User attribute group
trace logs 98
list of attributes 51
directories 98
UNIXUSER historical table 96
trademarks 127
user interfaces options 2
training, Tivoli technical x
Users workspace 19
transport command 116
troubleshooting 97
typeface conventions x
V
values, modifying situations 10
U variables, notation for xi
viewing data 11
uninstallation
viewing real-time monitoring environment 7
log file 99
problems 104
UNIX Details workspace 14
UNIX problems 116 W
UNIX Summary workspace 14 weekly update support option 118
UNIX_Active_Virtual_Memory situation 60 Windows agent installation problems 104
UNIX_CMD_Disk_Inodes_Critical situation 57 workarounds 103
UNIX_CMD_Disk_Space_Warning situation 57 agents 107
UNIX_CMD_Process_Critical situation 59 remote deployment 112
UNIX_CMD_Runaway_Process situation 59 situations 113
UNIX_CPU_Busy policy 65 Take Action commands 116
UNIX_CPU_Busy_Critical 70 Tivoli Enterprise Portal 112
UNIX_CPU_Busy_Critical situation 60 workspaces 112
UNIX_CPU_Busy_Warning 70 workspaces
UNIX_CPU_Busy_Warning situation 60 Disk Usage 15
UNIX_CPU_Critical situation 59 Disk Usage Details 15
UNIX_CPU_Warning situation 59 Disk Utilization for Mount Point 15
UNIX_Disk_Availability situation 57 Enterprise UNIX System Summary 14
UNIX_Disk_Space_Full policy 66 event 8
UNIX_Filemount_Critical situation 57 File Information 15
UNIX_HD_Config_Critical situation 57 list of all 13
UNIX_HD_Excessive_IO_Wait situation 60 more information 13
UNIX_Network_Collsns_Critical situation 58 Network 16
UNIX_Network_Collsns_Warning situation 58 NFS Activity 16
UNIX_Network_Errors situation 58 overview 13
Index 133
134 IBM Tivoli Monitoring: UNIX OS Agent: User’s Guide
Printed in USA
SC32-9446-00