Monitoring Linux OS Agent User's Guide
Monitoring Linux OS Agent User's Guide
Version 6.1.0
User’s Guide
Version 6.1.0
User’s Guide
Note
Before using this information and the product it supports, read the information in Appendix D, “Notices,” on page 97.
Contents
Tables . . . . . . . . . . . . . . . v Attribute groups and attributes for the Monitoring
Agent for Linux OS. . . . . . . . . . . . 24
About this guide . . . . . . . . . . vii CPU attributes . . . . . . . . . . . . 24
CPU Averages attributes . . . . . . . . . 25
Who should read this guide . . . . . . . . . vii
CPU Config attributes . . . . . . . . . . 26
What this guide contains . . . . . . . . . . vii
Disk attributes . . . . . . . . . . . . 27
Publications . . . . . . . . . . . . . . viii
Disk I/O attributes . . . . . . . . . . . 28
Prerequisite publications . . . . . . . . . viii
Disk Usage Trends attributes . . . . . . . 29
Related publications . . . . . . . . . . viii
I/O Ext attributes . . . . . . . . . . . 30
Accessing terminology online . . . . . . . viii
Network attributes . . . . . . . . . . . 31
Accessing publications online . . . . . . . ix
NFS Statistics attributes . . . . . . . . . 33
Ordering publications . . . . . . . . . . ix
OS Config attributes . . . . . . . . . . 36
Accessibility . . . . . . . . . . . . . . ix
Process attributes . . . . . . . . . . . 37
Tivoli technical training . . . . . . . . . . ix
Process User Info attributes . . . . . . . . 39
Support information . . . . . . . . . . . . x
RPC Statistics attributes . . . . . . . . . 41
Conventions used in this guide . . . . . . . . x
Sockets Detail attributes . . . . . . . . . 42
Typeface conventions . . . . . . . . . . x
Sockets Status attributes . . . . . . . . . 43
Operating system-dependent variables and paths x
Swap Rate attributes . . . . . . . . . . 44
System Statistics attributes . . . . . . . . 45
Chapter 1. Overview of the Monitoring User Login attributes . . . . . . . . . . 46
Agent for Linux OS . . . . . . . . . . 1 VM Stats attributes . . . . . . . . . . . 47
IBM Tivoli Monitoring overview . . . . . . . . 1 Disk capacity planning for historical data . . . . 47
Features of the Monitoring Agent for Linux OS . . . 1
Monitoring Agent for Linux OS components . . . . 2 Chapter 6. Situations reference . . . . 51
User interface options . . . . . . . . . . . 2 About situations . . . . . . . . . . . . . 51
More information about situations . . . . . . . 51
Chapter 2. Requirements for the Predefined situations . . . . . . . . . . . 52
monitoring agent . . . . . . . . . . . 5 Linux_Fragmented_File_System situation . . . 52
Linux_High_CPU_Overload situation . . . . . 52
Chapter 3. How to use the Monitoring Linux_High_CPU_System situation . . . . . 52
Linux_High_Packet_Collisions situation . . . . 53
Agent for Linux OS . . . . . . . . . . 7
Linux_High_RPC_Retransmit situation . . . . 53
View real-time data about Linux . . . . . . . . 7
Linux_High_Zombies situation . . . . . . . 53
Investigate an event . . . . . . . . . . . . 8
Linux_Low_Pct_Inodes situation . . . . . . 53
Recover the operation of a resource . . . . . . . 8
Linux_Low_percent_space situation . . . . . 53
Customize your monitoring environment . . . . . 9
Linux_Low_Space_Available situation . . . . 53
Monitor with custom situations that meet your
Linux_Network_Status situation . . . . . . 53
requirements . . . . . . . . . . . . . . 10
Linux_NFS_Buffer_High situation . . . . . . 54
Collect and view historical data. . . . . . . . 11
Linux_NFS_Getattr_High situation . . . . . 54
Linux_NFS_rdlink_high situation . . . . . . 54
Chapter 4. Workspaces reference . . . 13 Linux_NFS_Read_High situation . . . . . . 54
About workspaces . . . . . . . . . . . . 13 Linux_NFS_Writes_High situation . . . . . . 54
More information about workspaces . . . . . . 13 Linux_Packets_Error situation . . . . . . . 54
Predefined workspaces . . . . . . . . . . 13 Linux_Process_High_Cpu situation . . . . . 54
Capacity Usage Information group . . . . . 14 Linux_Process_stopped situation . . . . . . 55
Disk Usage workspace. . . . . . . . . . 15 Linux_RPC_Bad_Calls situation. . . . . . . 55
Network group . . . . . . . . . . . . 16 Linux_System_Thrashing situation . . . . . . 55
Process group . . . . . . . . . . . . 17
System Information group . . . . . . . . 18 Chapter 7. Take Action commands
Users workspace . . . . . . . . . . . 21
reference . . . . . . . . . . . . . . 57
About Take Action commands . . . . . . . . 57
Chapter 5. Attributes reference . . . . 23 More information about Take Action commands . . 57
About attributes . . . . . . . . . . . . . 23 Predefined Take Action commands . . . . . . 57
More information about attributes . . . . . . . 23 Sample_kill_Process action . . . . . . . . 58
Tables
1. Requirements for the Monitoring Agent for 13. Problems and solutions for installation and
Linux OS . . . . . . . . . . . . . . 5 configuration . . . . . . . . . . . . 80
2. Viewing real-time data about Linux . . . . . 7 14. General problems and solutions for
3. Investigating an event . . . . . . . . . 8 uninstallation . . . . . . . . . . . . 83
4. Recovering the operation of a resource . . . . 9 15. Agent problems and solutions . . . . . . 84
5. Customizing your monitoring environment 9 16. Tivoli Enterprise Portal problems and solutions 86
6. Monitoring with custom situations . . . . . 11 17. Remote deployment problems and solutions 87
7. Collecting and viewing historical data . . . 12 18. Specific situation problems and solutions 87
8. Capacity planning for historical data . . . . 48 19. Problems with configuring situations that you
9. Overview of Distributed Monitoring migrated solve in the Situation Editor . . . . . . . 88
situations . . . . . . . . . . . . . 61 20. Problems with configuration of situations that
10. Overview of event slots to event classes 62 you solve in the Workspace area . . . . . 89
11. Information to gather before contacting IBM 21. Problems with configuration of situations that
Software Support . . . . . . . . . . 73 you solve in the Manage Tivoli Enterprise
12. Trace log files for troubleshooting agents 76 Monitoring Services window . . . . . . . 90
Use the requirements chapter in this guide along with the IBM Tivoli Monitoring
Installation and Setup Guide to install and set up the software.
Use the information in this guide along with the IBM Tivoli Monitoring User’s Guide
to monitor Linux.
Publications
This section lists publications relevant to the use of the Monitoring Agent for Linux
OS. It also describes how to access these publications online and how to order
these publications.
Prerequisite publications
To use the information in this guide effectively, you must have some knowledge of
IBM Tivoli Monitoring products, which you can obtain from the following
documentation:
v IBM Tivoli Monitoring Administrator’s Guide
v IBM Tivoli Monitoring Installation and Setup Guide
v IBM Tivoli Monitoring Problem Determination Guide
v IBM Tivoli Monitoring: Upgrading from Tivoli Distributed Monitoring
v IBM Tivoli Monitoring User’s Guide
v Introducing IBM Tivoli Monitoring Version 6.1
Related publications
The following documents also provide useful information:
v IBM Tivoli Enterprise Console Adapters Guide
v IBM Tivoli Enterprise Console Event Integration Facility User’s Guide
v IBM Tivoli Enterprise Console Reference Manual
v IBM Tivoli Enterprise Console Rule Developer’s Guide
http://publib.boulder.ibm.com/tividd/glossary/tivoliglossarymst.htm
The IBM Terminology Web site consolidates the terminology from IBM product
libraries in one convenient location. You can access the Terminology Web site at the
following Web address:
http://www.ibm.com/ibm/terminology
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
Note: If you print PDF documents on other than letter-sized paper, set the option
in the File → Print window that allows Adobe Reader to print letter-sized
pages on your local paper.
Ordering publications
You can order many Tivoli publications online at the following Web site:
http://www.elink.ibmlink.ibm.com/public/applications/
publications/cgibin/pbi.cgi
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate most features of the graphical
user interface.
http://www.ibm.com/software/tivoli/education/
Support information
“Support information” on page 90 describes the following options for obtaining
support for IBM products:
v “Searching knowledge bases” on page 90
v “Obtaining fixes” on page 91
v “Contacting IBM Software Support” on page 92
Typeface conventions
This guide uses the following typeface conventions:
Bold
v Lowercase commands and mixed case commands that are otherwise
difficult to distinguish from surrounding text
v Interface controls (check boxes, push buttons, radio buttons, spin
buttons, fields, folders, icons, list boxes, items inside list boxes,
multicolumn lists, containers, menu choices, menu names, tabs, property
sheets), labels (such as Tip:, and Operating system considerations:)
v Keywords and parameters in text
Italic
v Words defined in text
v Emphasis of words
v New terms in text (except in a definition list)
v Variables and values you must provide
Monospace
v Examples and code examples
v File names, programming keywords, and other elements that are difficult
to distinguish from surrounding text
v Message text and prompts addressed to the user
v Text that the user must type
v Values for arguments or command options
The names of environment variables are not always the same in Windows and
UNIX. For example, %TEMP% in Windows is equivalent to $TMPDIR in UNIX.
Note: If you are using the bash shell on a Windows system, you can use the UNIX
conventions.
The Tivoli Enterprise Portal is the interface for IBM Tivoli Monitoring products. By
providing a consolidated view of your environment, the Tivoli Enterprise Portal
permits you to monitor and resolve performance issues throughout the enterprise.
The Monitoring Agent for Linux OS is an intelligent, remote monitoring agent that
resides on managed resources. It assists you in anticipating trouble and warns
systems administrators when critical events take place on their systems. With the
Monitoring Agent for Linux OS, systems administrators can set threshold levels
and flags as desired to alert them when the system reaches these thresholds.
For both of the IBM Tivoli Monitoring environments (IBM Tivoli Monitoring 5.x
and IBM Tivoli Monitoring 6.1), IBM Tivoli Enterprise Console is an optional
component, which acts as a central collection point for events from a variety of
sources, including those from other Tivoli software applications, Tivoli partner
applications, custom applications, network management platforms, and relational
database systems. You can view these events through the Tivoli Enterprise Portal
(using the event viewer), and you can forward events from IBM Tivoli Monitoring
situations to the IBM Tivoli Enterprise Console component.
The Linux version must support the Korn shell (ksh) and
Motif Window Manager (libmotif) for installation of the
monitoring agent.
Memory v 256 MB RAM at a minimum although 512 MB or
higher for better performance
Disk space v 100 MB of disk space for the base monitoring agent
v Historical data disk space: see “Disk capacity planning
for historical data” on page 47
Other requirements v TCP/IP
v The monitoring agent must have the permissions
necessary to perform requested actions. For example, if
the user ID you used to log onto the system to install
the monitoring agent (locally or remotely) does not
have the permission to perform a particular action
being monitored by the monitoring agent (such as
running a particular command), the monitoring agent
will be unable to perform the requested action.
This chapter provides information about how to use the Monitoring Agent for
Linux OS to perform the following tasks:
v “View real-time data about Linux”
v “Investigate an event” on page 8
v “Recover the operation of a resource” on page 8
v “Customize your monitoring environment” on page 9
v “Monitor with custom situations that meet your requirements” on page 10
v “Collect and view historical data” on page 11
For each of these tasks, there is a list of procedures that you perform to complete
the task. For the procedures, there is a cross-reference to where you can find
information about performing that procedure. Information about the procedures is
located in subsequent chapters and appendixes of this user’s guide and in the IBM
Tivoli Monitoring documentation.
Table 2 contains a list of the procedures for viewing the real-time data about Linux
that the monitoring agent collects. The table also contains a cross-reference to
where you can find information about each procedure.
Table 2. Viewing real-time data about Linux
Procedure Where to find information
View the hierarchy of your monitored IBM Tivoli Monitoring User’s Guide:
resources from a system point of view ″Navigating through workspaces″ (in
(Navigator view organized by operating ″Monitoring: real-time and event-based″
platform, system type, monitoring agents, chapter)
and attribute groups).
View the indicators of real or potential
problems with the monitored resources
(Navigator view).
View changes in the status of the resources IBM Tivoli Monitoring User’s Guide: ″Using
that are being monitored (Enterprise workspaces″ (in ″Monitoring: real-time and
Message Log view). event-based″ chapter)
View the status of the agents in the Chapter 4, “Workspaces reference,” on page
managed enterprise that you are monitoring 13 in this guide
(Monitoring Agent Status view).
Investigate an event
When the conditions of a situation have been met, an event indicator is displayed
in the Navigator. When an event occurs, you want to obtain information about that
event so you can correct the conditions and keep your enterprise running
smoothly. The situation must be associated with a Navigator Item in order to
appear.
Table 4 on page 9 contains a list of the procedures for recovering the operation of a
resource and a cross-reference to where you can find information about each
procedure.
Note: When you create and run a situation, an IBM Tivoli Enterprise Console
event is created. For information on how to define event severities from
forwarded IBM Tivoli Monitoring situations and other event information,
see the IBM Tivoli Monitoring Administrator’s Guide.
v Expert Advice
v When a true situation closes
v Available Managed Systems
Table 6 contains a list of the procedures for monitoring your resources with custom
situations that meet your requirements and a cross-reference to where you can find
information about each procedure.
Table 6. Monitoring with custom situations
Procedure Where to find information
Create an entirely new situation. IBM Tivoli Monitoring User’s Guide: ″Creating
a new situation″ (in ″Situations for
event-based monitoring″ chapter, ″Creating a
situation″ section)
Table 7 on page 12 contains a list of the procedures for collecting and viewing
historical data and a cross-reference to where you can find information about each
procedure.
About workspaces
A workspace is the working area of the Tivoli Enterprise Portal application
window. At the left of the workspace is a Navigator that you use to select the
workspace you want to see.
As you select items in the Navigator, the workspace presents views pertinent to
your selection. Each workspace has at least one view. Some views have links to
workspaces. Every workspace has a set of properties associated with it.
For a list of the predefined workspaces for this monitoring agent and a description
of each workspace, refer to the Predefined workspaces section below and the
information in that section for each individual workspace.
Predefined workspaces
The Monitoring Agent for Linux OS provides the following predefined workspaces:
v Capacity Usage Information
– Capacity Usage Information
– Virtual Memory Usage Trends
– CPU Averages
v Disk Usage
– Disk Usage
v Network
– Network
– Sockets Information
– NFS Statistics
– RPC Statistics
v Process
– Process
– Process User Information
v System Information
– System Information
The Disk Space Usage view displays the current percentage of space used on the
disk, and the percentage of space available. The Disk Usage Averages view
displays the rate of disk usage (in bytes per hour) and amount of time until that
disk is full, based on current rate (or moving average or low water mark). The
CPU Usage Trends displays the system’s trends in disk usage, such as the space
used and available, high water mark information, moving average, and other
information in table form. Dramatic changes in the disk usage rate ″near capacity″
readings in the Days Until Full Disk column might require administrative
intervention. Based on the information that this workspace provides, you can make
changes, set up situations, and verify that the changes are improving performance.
Use the Capacity Usage Information workspace to determine how soon the
monitored system will reach its storage capacity. To determine disk usage, review
the Days until Full Disk at Current Rate and Days Until Full Disk columns. These
columns indicated the number of days until the disk is full. To determine swap
space usage, review the information in the Swap Space Usage Trends in the Virtual
Memory Usage Trends workspace. The information in that Swap Space Usage
Trends view indicate the predicted number of days until the swap space is
completely used.
The Current Overall CPU Usage chart shows the current CPU usage as percentages
by category: user CPU, user nice, system CPU, idle CPU, and I/O wait. The CPU
Averages chart shows the CPU moving averages over the past hour. The CPU
Usage Trends table displays details about the CPU usage categories, such as the
current and moving usage averages of user nice CPU, user CPU, system CPU, idle
CPU, and wait CPU. Based on the information that this workspace provides, you
can make changes, set up situations, and verify that the changes are improving
performance.
The Current Virtual Memory Usage chart shows the current swap space used and
available, and memory used and available. The Virutal Memory Usage chart shows
hourly updates on memory averages. The Swap Space Usage Trends table shows
the moving averages of both the total swap space and swap space used, the swap
space used per hour, and provides an indication as to when the swap space will be
full. It also displays the low water mark for free real memory. Based on the
information that this workspace provides, you can make changes, set up situations,
and verify that the changes are improving performance.
Use the Virtual Memory Usage Trends workspace to determine how soon the
monitored system will reach swap space capacity. The columns in the Swap Space
Usage Trends column indicated the predicted number of days until the swap space
is completely used.
The three charts that comprise this workspace provide “at a glance” percentages of
the space used, percentages of the inodes used, and amounts of disk space used
and available for each monitored disk. The Disk Usage table captures this
information, as well as mount point and file system data, in tabular form. Based on
the information that this workspace provides, you can make changes, set up
situations, and verify that the changes are improving performance.
The most vital part of a file is the inode – a data structure containing all of the
information that describes the file, including file size, permissions, location on disk,
owners, groups, filetype, and checksum. The Inodes Used Percent chart reflects the
percent of inode space currently allocated to files for each monitored disk. If the
Inodes Used Percent measure of a disk reaches a critical condition, use the Disk
Usage workspace to determine the number of inodes free, the number of inodes
used, and the number of total inodes allocated. The Total Inodes measure helps
you determine the number of inodes you need to add or subtract to optimize
system performance.
Network group
The Network group has the following associated workspaces:
v Network (default workspace)
v Sockets Information
v NFS Statistics
v RPC Statistics
Network workspace
The Network workspace reflects the health of the network components within your
monitored systems. This workspace is comprised of three views:
v Network Errors (bar chart)
v Network Activity (bar chart)
v Network Devices (table view)
The Network Errors chart shows the number of input errors, output errors, and
collisions for the sampling period. The Network Activity chart shows the number
of packets received and transmitted per second. The Network Devices table reflects
your network’s performance based on its transmission, reception, and collision
data. Based on the information that this workspace provides, you can make
changes, set up situations, and verify that the changes are improving performance.
Use the Network Activity chart to gain a sense of throughput, that is, the rate of
packets received and transmitted by the monitored interface. Use the Network
Errors chart to measure the health of this throughput. This chart provides counts of
input and output errors, as well as collision counts for each interface.
The Network Errors chart provides information about the input errors, output
errors, and collisions. The RPC Network Activity chart displays information about
RPC calls, including the number of total server calls received, calls rejected, call
authorization failures, invalid client requests, and packets with malformed headers.
It also shows the number of calls retransmitted and the number of times
authentication is refreshed. The NFS Statistics table provides information about
calls, including the number of null calls, setattr calls, root calls, write cache calls,
and much more. Based on the information that this workspace provides, you can
make changes, set up situations, and verify that the changes are improving
performance.
The Network Errors chart provides information about the input errors, output
errors, and collisions. The RPC Network Activity chart displays information about
RPC calls, including the number of total server calls received, calls rejected, call
authorization failures, invalid client requests, and packets with malformed headers.
It also shows the number of calls retransmitted and the number of times
authentication is refreshed. The RPC Statistics table provides information about
RPC calls, including the number of server calls rejected, invalid client requests,
packets with malformed headers, and calls retransmitted. Based on the information
that this workspace provides, you can make changes, set up situations, and verify
that the changes are improving performance.
The Sockets Used by Protocol chart shows a count of the sockets currently in use
and the high water mark for each protocol during the sampling period. The
Network Activity chart shows the number of packets received and transmitted per
second. The Socket Services Information table provides a detailed perspective of
each socket that you are monitoring. Based on the information that this workspace
provides, you can make changes, set up situations, and verify that the changes are
improving performance.
Process group
The Process group has the following associated workspaces:
v Process (default workspace)
Process workspace
The Process workspace reflects the health of specific processes within your
monitored systems. This workspace includes three views:
v Process CPU Percent Usage (bar chart)
v Process + Child CPU Percent Usage (bar chart)
v Process Information Detail (table view)
The Process CPU Percent Usage chart displays the percentage of CPU time spent
in kernel mode and spent in user mode by process. The Process + Child CPU
Percent Usage chart displays the cumulative percentage of CPU time spent in
kernel mode and spent in user mode. The Process Information Detail table lists in
tabular form a wide range of process characteristics such as data set size, kernel
scheduling priority, the number of pages of memory, and the number of page
faults. Based on the information that this workspace provides, you can make
changes, set up situations, and verify that the changes are improving performance.
You might encounter a runaway process that steals so many CPU cycles that the
monitored system slows down. Use the Process Information Detail table view to
identify (by Process ID) and quantify (by page count) the specific process. If the
process is out of control, you might want to kill it.
The Process CPU Percent Usage chart displays the percent of CPU time spent in
kernel mode and spent in user mode by process. The Process + Child CPU Percent
Usage chart displays the cumulative percent of CPU time spent in kernel mode
and spent in user mode. The Process User Information table provides in tablular
form the names of effective groups, file system groups, real groups, and saved
groups for your monitored systems. Based on the information that this workspace
provides, you can make changes, set up situations, and verify that the changes are
improving performance.
The Process User Information workspace complements the Process workspace. You
can link from a specific process in order to view the Process User Information table
view. This table view identifies, in detail, the owner of the process.
v System Configuration
The Disk Service Time chart shows the average disk service time in milliseconds.
The Disk Activity chart shows the read sectors and write sectors per second. The
Disk IO Extended Rate table details the I/O data and calculated values associated
with disk activity. Based on the information that this workspace provides, you can
make changes, set up situations, and verify that the changes are improving
performance.
Note: The attributes associated with this workspace are only available for systems
with a 2.4 (or higher) kernel.
The Disk IO Extended Rate workspace complements the Disk IO Rate workspace.
Use this workspace to explore the calculated rates associated with disk
input/output activity.
The Disk IO Rate chart provides “at a glance” rate details associated with disk
reads, writes, and transfers. The Disk IO Rate table includes transfer rates, block
read rates, and block write rates for your monitored systems. The Disk Space
Usage displays the available and used space in megabytes. Based on the
information that this workspace provides, you can make changes, set up situations,
and verify that the changes are improving performance.
Note: The attributes associated with this workspace are only available for systems
with a 2.4 (or higher) kernel.
Use the Disk IO Rate workspace to determine the transfers (input/output requests)
per second that are issued to a device. For additional information about
input/output characteristics, see the Disk IO Extended Rate workspace.
The CPU Usage chart shows the percentages of CPU usage, by user CPU, user
nice, system, and idle categories. The Processor Configuration Information table
lists the processor ID, its cache size, clock speed, and manufacturing information
such as the model name and number. The OS Version Information table shows the
operating system name, OS vendor information, and version information.
The System Load chart depicts the load on your monitored system’s processor
during the previous one, five, and fifteen minutes. The Paging Rates chart shows
the rate at which paging is occurring. The CPU Usage bar chart shows the
aggregate or average CPU usage for a multiprocessor system. An additional
column is displayed for a dual processor system (CPU 0 and CPU1). The System
Statistics table lists in tabular form the source data of these charts and gauge. The
Virtual Memory Statistics chart depicts the current usage and availability of a
variety of memory categories (buffered, cached, shared, and swapped). Based on
the information that this workspace provides, you can make changes, set up
situations, and verify that the changes are improving performance.
A load average is a simple measure of how much work a computer is doing. The
higher the number of processes over a given period of time, the higher the load
average. A load average of one, on most systems, indicates the capacity of one
processor. (On a two-processor system, a load average of two indicates capacity.) In
reality, however, CPU power is not typically the limiting factor for most
applications. A load of two to four times the number of processors is reasonable.
Use the System Load chart to review system load measured during the last one,
five, and fifteen minute intervals.
The Context Switches Percent Change gauge reflects the percent change in the
number of context switches per second. The Context Switches Per Sec gauge shows
the number of context switches per second. The Virtual Memory Information table
presents the Virtual Memory Statistics chart information in tabular form. The
Virtual Memory Statistics chart depicts the current usage and availability of a
variety of memory categories (buffered, cached, shared, and swapped). Based on
the information that this workspace provides, you can make changes, set up
situations, and verify that the changes are improving performance.
The Virtual Memory Statistics chart displays the current usage and availability of
system memory. Of particular interest is the availability of unused swap space
(swap space free) and memory space (memory free). When these measures
approach critical conditions, review the processes to identify those that are
“hogging” memory.
Users workspace
The Users workspace identifies logged in users. This workspace is comprised of
three views:
v Process User Information (table view)
v User Login Information (table view)
v Total User Logins (needle gauge)
The Process User Information table provides in tabular form the names of effective
groups, file system groups, real groups, and saved groups for your monitored
systems. The User Login Information table lists users, their login time, and their
idle time. The Total User Logins gauge displays the number of users logged into
the monitored system during the monitoring period. Based on the information that
this workspace provides, you can make changes, set up situations, and verify that
the changes are improving performance.
The Users workspace provides login information on the current users, including
the elapsed amount of time since they issued commands. In addition, this
workspace provides links to the Process workspace and the Process User
Information workspace. This linking allows you to monitor/troubleshoot the
processes of specific users.
About attributes
Attributes are the application properties being measured and reported by the
Monitoring Agent for Linux OS, such as the amount of memory usage or the
message ID. Some agents have fewer than 100 attributes, while others have over
1000.
Attributes are organized into groups according to their purpose. The attributes in a
group can be used in the following two ways:
v Chart or table views
Attributes are displayed in chart and table views. The chart and table views use
queries to specify which attribute values to request from a monitoring agent.
You use the Query editor to create a new query, modify an existing query, or
apply filters and set styles to define the content and appearance of a view based
on an existing query.
v Situations
You use attributes to create situations that monitor the state of your operating
system, database, or application. A situation describes a condition you want to
test. When you start a situation, the Tivoli Enterprise Portal compares the values
you have assigned to the situation attributes with the values collected by the
Monitoring Agent for Linux OS and registers an event if the condition is met.
You are alerted to events by indicator icons that appear in the Navigator.
Some of the attributes in this chapter are listed twice, with the second attribute
having a ″(Unicode)″ designation after the attribute name. These Unicode attributes
were created to provide access to globalized data. Use the globalized attribute
names because this is where the monitoring agent is putting the data. If you were
using a previous Candle® OMEGAMON® release of this monitoring agent, you
must run the Application Migration Tool to create globalized attributes for your
customized queries, situations, and policies. See the IBM Tivoli Monitoring
Installation and Setup Guide for more information.
For a list of the attributes groups, a list of the attributes in each attribute group,
and descriptions of the attributes for this monitoring agent, refer to the Attribute
groups and attributes section in this chapter.
Attribute groups and attributes for the Monitoring Agent for Linux OS
This monitoring agent contains the following attribute groups:
v CPU
v CPU Averages
v CPU Config
v Disk
v Disk I/O
v Disk Usage Trends
v I/O Ext
v Network
v NFS Statistics
v OS Config
v Process
v Process User Info
v RPC Statistics
v Sockets Detail
v Sockets Status
v Swap Rate
v System Statistics
v User Login
v VM Stats (Memory)
The following sections contain descriptions of these attribute groups, which are
listed alphabetically. Each description contains a list of attributes in the attribute
group.
CPU attributes
Use the CPU attributes to monitor processor characteristics such as idle time,
system CPU time, and user CPU time.
Busy CPU The percentage of time the CPU was busy. Valid entry is an integer.
CPU ID The processor ID. Valid entry is an integer in the range 0 to 999. Use this
attribute to determine the processor ID. In a symmetrical multiprocessor system
(SMP) with more than one processor, the CPU report shows CPU ID as ″aggregate″
on the first row. This means the data row return aggregated CPU statistics.
Idle CPU Percentage of idle CPU time during the sampling period. Valid entry is
an integer in the range 0 to 100. Use this attribute to determine how efficiently the
entire system or each processor of the SMP system is operating. The Idle CPU
value should be low if the system load is heavy, and high if the system load is
light. If the system load is heavy and the Idle CPU value is high, an I/O problem
might exist. If the Idle CPU value is small, or zero, and the User percentage is
larger (greater than 30%), the system might be compute-bound or in a loop.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM® workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
System CPU Percentage of system CPU time during the sampling period. Valid
entry is an integer in the range 0 to 100. Use this attribute to determine the
percentage of system or per processor CPU time devoted to executing Linux
system kernel code. System CPU time includes time spent executing system calls
and performing administrative functions.
System Name Name of the host system. Valid entry is an alphanumeric text string
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
User CPU Percentage of user CPU time during the sampling period. Valid entry is
an integer in the range 0 to 100. Use this attribute to determine the percentage of
system or per processor CPU time devoted to user processes. User CPU time
includes time spent executing both user program and library functions. It does not
include CPU time spent executing system calls. The ratio between user and system
CPU time varies, depending on the kinds of programs executing. If user CPU is
extremely high and adversely affecting system performance, you might want to
determine which user programs are preventing the CPU from functioning at its
normal speed.
User Nice CPU Percentage of user nice CPU time during the sampling period.
Valid entry is an integer in the range 0 to 100.
User Sys Pct Of the total CPU time, the percentage consumed by users. Valid entry
is an integer in the range of 0 to 100.
Wait IO The percentage of time the CPU was in a wait input/output state. Valid
entry is an integer in the range of 0 to 100.
CPU Usage Current Average The current average of CPU usage, expressed as a
percentage. Valid entry is an integer between 0 and 100, such as 85 for 85%.
CPU Usage Moving Average The moving average of CPU usage, expressed as a
percentage. Valid entry is an integer between 0 and 100.
Days to CPU Upgrade The number of days until CPU Usage Moving average hits
100% rate. Valid entry is an integer.
Idle CPU Current Average The current average of the system’s idle CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
Idle CPU Moving Average The moving average of the system’s idle CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
System CPU Current Average The current average of the system CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
System CPU Moving Average The moving average of the system CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
User CPU Current Average The current average of the user CPU time, expressed
as a percentage. Valid enty is an integer between 0 and 100.
User CPU Moving Average The moving average of the user CPU time, expressed
as a percentage. Valid entry is an integer between 0 and 100.
User Nice CPU Current Average The current average of the user nice CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
User Nice CPU Moving Average The moving average of the user nice CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
Wait CPU Current Average The current average of the wait CPU time, expressed
as a percentage. Valid entry is an integer between 0 and 100.
Wait CPU Moving Average The moving current average of the wait CPU time,
expressed as a percentage. Valid entry is an integer between 0 and 100.
Cache Size The size of the processor cache in kilobytes. Valid entry is an integer.
Clock Speed The speed of the processor clock in megahertz. Valid entry is an
integer.
CPU Family The family number of the processor. Valid entry is an integer.
CPU Model The model number of the processor. Valid entry is an integer.
Model Name The model name of the processor. Valid entry is an alphanumeric
text string with a maximum length of 128 characters.
System name The name of the host system. Valid entry is an alphanumeric text
string with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Disk attributes
Use Disk attributes to monitor disk characteristics such as inode size, inodes used,
mount point, and space available.
Disk Name The name of the physical disk partition where the file system is
mounted. This is the physical location of the disk. Valid entry is an alphanumeric
text string, with a maximum length of 32 characters.
FS Type The file system type, such as hsfs, nfs, tmpfs, and ufs. Valid entries are up
to eight letters or numbers.
Inodes Free The number of inodes currently available on your file system. Use this
attribute to avoid a pending crisis. Corrective action can include freeing up
unneeded space or deleting temporary files. If the value for Inodes Free is less than
100, this is a critical condition. Notify your system administrator immediately.
Inodes Used The number of inodes currently allocated to files on the file system.
This value equals the Total Inodes value minus the Inodes Free value.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Mount Point The path name of the directory to which a file system is mounted.
This is the virtual name for the directory. Valid entry is a string up to 256
characters representing a directory path.
Mount Point (Unicode) The path name of the directory to which a file system is
mounted. This is the virtual name for the directory. Valid entry is a string up to
256 bytes representing a directory path. This attribute is globalized.
Size The total size of a file system, expressed in megabytes. For example, 1000
represents one gigabyte. Valid entry is an integer of up to 99999999.
Space Used The amount of disk space currently in use on a file system, expressed
in megabytes. Valid entries For example, 5000 represents 5 gigabytes. Valid entry is
an integer of up to 99999999.
Space Used Percent The space currently used on the file system, expressed as a
percentage of the sum of used and available space. The Space Used Percent reflects
the percent of disk space which is available to non-superusers. A high value in this
column alerts you to critical disk space conditions. Valid entries: integers between
0 and 100, such as 80 for 80%.
Timestamp The date and time the agent collects information as set on the
monitored system.
Total Inodes The number of inodes allocated on a file system. Valid entry is an
integer. For example, a value of 163817 indicates that the number of inodes
allocated is 163,817.
Use this attribute when a file system needs additional or fewer inodes assigned to
it. Viewing the current number of inodes assigned helps you determine the
number of inodes you need to add or subtract to optimize performance in your
system.
Note: These attributes are only available for systems with a 2.4 (or higher) kernel.
Blk Rds per sec Indicates the amount of data read from the drive expressed in a
number of blocks per second. A block is of indeterminate size. Valid entry is an
integer.
Blk wrtn per sec Indicates the amount of data written to the drive expressed in a
number of blocks per second. A block is of indeterminate size. Valid entry is an
integer.
Blks read The total number of blocks read. Valid entry is an integer.
Blks wrtn The total number of blocks written. Valid entry is an integer.
Dev Major The major number of the device. Valid entry is an integer.
Dev Minor The distinctive minor number for device. Valid entry is an integer.
Dev Name The name of the device as it appears under the dev subdirectory.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Transfers per sec Indicates the number of transfers per second that were issued to
the device. A transfer is an I/O request to the device. Multiple logical requests can
be combined into a single I/O request to the device. A transfer is of indeterminate
size. Valid entry is an integer.
Days Full Disk Curr The number of days until the disk is full based on the
current rate of disk usage. Valid entry is an integer. Note: -1 indicates N/A.
Days Full Disk Peak The number of days until the disk is full based on the peak
rate of disk usage. Valid entry is an integer. Note: -1 indicates N/A.
Days Until Full Disk The number of days until the disk is full based on the
moving average rate of disk usage. Valid entry is an integer. Note: -1 indicates
N/A.
Disk Name The name of the physical disk partition where the file system is
mounted. This is the physical location of the disk. Valid entry is an alphanumeric
text string, with a maximum length of 32 characters.
Disk Usage Moving Average The bytes per hour of disk usage averaged over all
previous samples. Valid entry is an integer.
Disk Usage Rate The bytes per hour of disk usage over the last sample period.
Valid entry is an integer.
Highwater DU Rate The bytes per hour rate that represents the high water mark
of disk usage. Valid entry is an integer.
Highwater Time The date and time that the disk usage reaches a high water mark.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Low Water Full Disk Curr The number of days until the disk is full based on the
disk usage rate that represents the low water mark. Valid entry is an integer.
This disk space does not include any space which is reserved for superuser. A low
value in this column, relative to the disk size, alerts you to critical disk space
conditions.
If this value is low for one or more file systems, relative to the disk size, you might
need to evaluate reconfiguring the file system to distribute the files more evenly
across disks.
Space Used The amount of disk space currently in use on a file system, expressed
in megabytes. For example, 5000 represents five megabytes. Valid entry is an
integer.
Timestamp The date and time the agent collects information as set on the
monitored system.
Note: These attributes are only available for systems with a 2.4 (or higher) kernel.
Avg req queue length The average queue length of the requests that were issued
to the device. Valid entry is an integer.
Avg req size The average size (in sectors) of the requests that were issued to the
device. Valid entry is an integer.
Avg svc time The average service time (in milliseconds) for I/O requests that were
issued to the device. Valid entry is an integer.
Avg wait time The average time (in milliseconds) for I/O requests issued to the
device to be served. Valid entry is an integer.
Cpu Util Percentage of CPU time during which I/O requests were issued to the
device. Valid entry is an integer.
Device Name Name of the device as appears under the dev subdirectory. Valid
entry is an alphanumeric text string, with a maximum length of 64 characters.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Read req per sec The number of read requests that were issued, per second, to the
device. Valid entry is an integer.
Read reqm per sec The number of read requests merged, per second, that were
issued to the device. Valid entry is an integer.
Read sect per sec The number of sectors read, per second, from the device. Valid
entry is an integer.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Write req per sec The number of write requests that were issued, per second, to
the device. Valid entry is an integer.
Write reqm per sec The number of write requests merged that were issued, per
second, to the device. Valid entry is an integer.
Write sect per sec The number of sectors written to the device, per second. Valid
entry is an integer.
Network attributes
Use Network attributes to monitor information about what is happening in the
network, such as the frequency of collisions, I/O errors, buffer overruns, and
carrier losses. Many of these attributes can be used to identify the completeness of
network transmissions.
Bytes Received Per Second The number of bytes received per second by the
interface. Valid entry is an integer in the range 0 to 2147483647.
Bytes Transmitted Per Second The number of bytes received per second by the
interface. Valid entry is an integer in the range 0 to 2147483647.
Carrier Losses The number of carrier losses that occurred in the interface. Valid
entry is an integer.
Collision Percent Of the total number of packets transmitted in this sample period,
the percentage involved in a collision. Valid entry is an integer.
Collision rate The number of times a packet collided with another packet per
minute. Valid entry is an integer.
Collisions The number of times during the sampling period that a packet
transmitted by the network interface collided with another packet. This occurs
when another interface on the same local network transmits a packet at nearly the
same time. Valid entry is an integer in the range 0 to 100. Use this attribute to
determine if a network interface has an unacceptable number of packet collisions.
Packet collisions cause the interface to retransmit the packet. With this increased
traffic, the likelihood of future collisions increases. This can result in a steady
increase of network traffic to critical levels.
Input Errors The number of packets received with errors in the interface. Valid
entry is an integer.
Input Error rate The number of packets with errors received per minute by the
interface. Valid entry is an integer.
Input FIFO Buffer Overruns The number of input FIFO buffer overruns that
occurred during the sampling period. Valid entry is an integer.
Input Packets Dropped The number of input packets dropped by the device
driver. Valid entry is an integer.
Interface DNS Name The Dynamic Name Server (DNS) entry associated with the
IP address of the network interface. Valid entry is an alphanumeric text string,
Interface IP Address The Internet Protocol (IP) address of the network interface. A
gateway component will have more than one interface, each with a separate
address. Valid entries: Internet protocol addresses in the form a.b.c.d. where a, b, c,
and d are integers in the range 0 to 255. Example: 197.128.55.55 indicates the
network interface uses the IP address 197.128.55.55.
KBytes Received Count The number of kilobytes received since the network
interface was configured. Valid entry is an integer in the range 0 to 2147483647.
Example: If a low number of packets are being received, data traffic might need to
be rerouted.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Network Interface Name Identifies the network interface adapter. Valid entries are
alphanumeric text strings comprised of ″Interface Name, Unit Number″ where:
v The name is a two-character representation of the adapter, based on the
hardware, operating system, and installation procedure.
v The unit represents the physical adapter number installed in the system with a
typical range 0 to 7.
Output Error rate The number of packet transmission errors per minute during the
monitoring interval. Valid entry is an integer.
Output FIFO Buffer Overruns The number of output FIFO buffer overruns that
occurred during the sampling period. Valid entry is an integer.
Output Packets Dropped The number of output packets dropped by the device
driver. Valid entry is an integer.
Packet Framing Errors The number of packet framing errors that occurred in the
interface. Valid entry is an integer.
Packets Received Count The number of packets received by the interface during
the sampling period. Valid entry is an integer in the range 0 to 99999999.
Packets Received per sec The number of packets received per second by the
interface. Valid entry is an integer in the range 0 to 2147483647.
Packets Transmitted per sec The number of packets transmitted per second by the
interface. Valid entry is an integer in the range 0 to 2147483647.
Timestamp The date and time the agent collects information as set on the
monitored system.
Total Error Percent Of the total number of packets received and transmitted, the
percentage that were in error during this sample period. Valid entry is an integer.
Transmission Unit Maximum The maximum packet size (in bytes) for the
specified network interface. This is a fixed value. Valid entry is an integer in the
range 0 to 99999999. Use this attribute to determine the minimum, maximum or
average packet size used by a network interface. This information can help you
determine the size used by a network interface.
This information can help you determine the data transfer capabilities of various
network interfaces, and alleviate bottlenecks by rerouting traffic from devices that
appear to be overloaded, to other network interfaces that can handle additional
data traffic.
Access Pct Of the total number of calls made to the NFS server, the percentage that
were access calls. Valid entry is an integer.
File System Info Pct Of the total number of calls made to the NFS server, the
percentage that were calls to obtain information about the file system. Valid entry
is an integer.
File System Statistics Calls Pct Of the total number of calls made to the NFS
server, the percentage that involved a request for file system statistics. Valid entry
is an integer.
Link Calls Pct Of the total number of calls made to the NFS server, the percentage
that were link calls. Valid entry is an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Location The location of the origin of the call in the Network File System. Valid
entry is an integer. A value of 1 represents the server, a value of 2 represents the
client.
Make Node Calls Pct Of the total number of calls made to the NFS server, the
percentage that were make node (mknod) calls. Valid entry is an integer.
NFS Access The number of access calls made to the NFS server. Valid entry is an
integer.
NFS Commit The number of file commit calls made to the NFS server. Valid entry
is an integer.
NFS Commit Pct Of the total number of calls made to the NFS server, the
percentage that were file commit calls. Valid entry is an integer.
NFS File Creates The number of file create calls made to the NFS server. Valid
entry is an integer.
NFS File Creates Pct Of the total number of calls made to the NFS server, the
percentage that contained file creation operations. Valid entry is an integer in the
range of 0 to 100.
NFS File System Info The number of file system information calls made to the
NFS server. Valid entry is an integer.
NFS File System Statistics Calls The number of calls made to the NFS server
which requested statistics of the file system. Valid entry is an integer.
NFS Get Attribute Calls The number of calls made to the NFS server which
contained a get attribute (getattr) operation. Valid entry is an integer.
NFS Get Attribute Calls Pct Of the total number of calls made to the NFS server,
the percentage that contained get attribute (getattr) operations. Valid entry is an
integer in the range of 0 to 100.
NFS Link Calls The total number of link calls made to the NFS server. Valid entry
is an integer.
NFS lookups The number of lookups made on the NFS server. Valid entry is an
integer.
NFS lookups Pct Of the total number of calls made to the NFS server, the
percentage that were lookups. Valid entry is an integer.
NFS Make Directory Calls The number of make directory calls made to the NFS
server. Valid entry is an integer.
NFS Make Directory Calls Pct Of the total number of calls made to the NFS
server, the percentage that were make directory calls. Valid entry is an integer.
NFS Make Node Calls The number of make node (mknod) calls made to the NFS
server. Valid entry is an integer.
NFS Null Calls The number of calls made to the NFS server from NFS clients
which contained no data. Valid entry is an integer in the range of 0 to 100.
NFS Null Call Percentage Of the total number of calls made to the NFS server, the
percentage that contained no data. Valid entry is an integer.
NFS Path Conf Calls The number of calls made to the NFS server that involved
path configuration (pathconf) calls to obtain configuration values for files. Valid
entry is an integer.
NFS Read Calls The number of read calls made to the NFS server. Valid entry is
an integer.
NFS Read Calls Pct Of the total number of calls made to the NFS server, the
percentage that were read calls. Valid entry is an integer.
NFS Read Dir Calls Plus The number of read directory plus (readdirplus) calls
made to the NFS server to return the name, the file ID, attributes, and file handle.
Valid entry is an integer.
NFS Read Directory Calls The number of read directory calls made to the NFS
server. Valid entry is an integer.
NFS Read Link Calls The number of read link (readlink) calls made to the NFS
server. Valid entry is an integer.
NFS Read Link Pct Of the total number of calls made to the NFS server, the
percentage that were read link calls. Valid entry is an integer.
NFS Remove Directory Calls The number of remove directory calls made to the
NFS server. Valid entry is an integer.
NFS Remove File Calls The number of file removal calls made to the NFS server.
Valid entry is an integer.
NFS Remove File Calls Pct Of the total number of calls made to the NFS server,
the percentage that were file removal calls. Valid entry is an integer.
NFS Rename File Calls The number of file rename calls made to the NFS server.
Valid entry is an integer.
NFS root Calls The number of calls made to the NFS server which contained root
calls. Valid entry is an integer.
NFS root Calls Pct Of the total number of calls made to the NFS server, the
percentage that were root calls. Valid entry is an integer.
NFS Set Attribute Calls The number of calls made to the NFS server which
contained a set attribute (setattr) operation. Valid entry is an integer.
NFS Set Attribute Calls Pct Of the total number of calls made to the NFS server,
the percentage that contained a set attribute (setattr) operation. Valid entry is an
integer.
NFS Symbol Link Calls The total number of symbol link calls made to the NFS
server. Symbolic links are files that act as a pointer to another file or directory.
Valid entry is an integer.
NFS Version The software version associated with the NFS server. Valid entry is
an integer. A value of 2 represents version 2, 3 represents version 3, 4 represents
version 4.
NFS Write Cache Calls The number of write cache calls made to the NFS server.
Valid entry is an integer.
NFS Write Cache Calls Pct Of the total number of calls made to the NFS server,
the percentage that were write cache calls. Valid entry is an integer.
NFS Writes The number of write calls made to the NFS server. Valid entry is an
integer.
NFS Writes Pct Of the total number of calls made to the NFS server, the
percentage that were write calls. Valid entry is an integer.
Path Conf Calls Pct Of the total number of calls made to the NFS server, the
percentage that involved use of the pathconf command to obtain configuration
values for files. Valid entry is an integer.
Read Dir Calls Plus Pct Of the total number of calls made to the NFS server, the
percentage that were read directory plus (readdirplus) calls.
Read Directory Calls Pct Of the total number of calls made to the NFS server, the
percentage that were read directory calls. Valid entry is an integer.
Remove Directory Calls Pct Of the total number of calls made to the NFS server,
the percentage that were remove directory calls. Valid entry is an integer.
Rename File Calls Pct Of the total number of calls made to the NFS server, the
percentage that were file rename calls. Valid entry is an integer.
Symbol Link Calls Pct Of the total number of calls made to the NFS server, the
percentage that were symbol link calls. Valid entry is an integer.
Timestamp The date and time the agent collects information as set on the
monitored system.
OS Config attributes
Use OS Config attributes to obtain information about the Linux operating system
configuration, such as the version of Linux in use and the vendor.
gcc version The version of the GNU Compiler Collection (GCC) used to compile
the kernel. Valid entry is an alphanumeric text string with a maximum of 32
characters.
OS Name The name of the operating system. Valid entry is an alphanumeric text
string with a maximum of 64 characters.
System Name The host name of the system. Valid entry is an alphanumeric text
string, with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Process attributes
Use Process attributes to monitor process characteristics such as data set size,
kernel scheduling priority, the number of pages of memory, and the number of
page faults.
Data Set Size The size of the data set based on the number of pages. Valid entry is
an integer.
Dirty Pages Pages that have been modified (dirty) in buffer (main memory), but
not yet copied to the cache. Valid entry is an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Nice The standard Linux nice level (-20 represents the highest level). Valid entry is
an integer in the range -20 to 19.
Parent Process ID The identifier for the parent process. Valid entry is an integer.
Priority The kernel scheduling priority (0 represents the highest priority). Valid
entry is an integer between 100 and 0.
Proc CMD Line The process command line string. Valid entry is an alphanumeric
text string, with a maximum length of 256 characters.
Proc CMD Line (Unicode) The process command line string. Valid entry is an
alphanumeric text string, with a maximum length of 512 bytes. This attribute is
globalized.
Proc System CPU The percentage of CPU time spent in kernel mode by process.
Valid entry is an integer between 0 and 100.
Proc User CPU The percentage of CPU time spent in user mode by process. Valid
entry is an integer between 0 and 100.
Process Command Name The name of the process command. Valid entry is an
alphanumeric text string, with a maximum length of 32 characters.
Process Command Name (Unicode) The name of the process command. Valid
entry is an alphanumeric text string, with a maximum length of 64 bytes. This
attribute is globalized.
Resident Set Size The number of pages the process has in real memory. Valid
entry is an integer.
Shared Lib Set Size The number of pages of shared library set (mmap’d) memory.
mmap is a system API that lets you map a file or device into memory. The mapped
pages can be shared so that other processes can access them. Valid entry is an
integer.
State The state of the process (Sleeping, Disk, Running, Zombie, Trace, Dead, or
N/A). Valid entry is an integer between -1 and 5:
0 Sleeping
1 Disk
2 Running
3 Zombie
4 Trace
5 Dead
-1 N/A
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Text Resident Size The number of pages of text resident (mmap’d) memory. mmap
is a system API that lets you map a file or device into memory. The mapped pages
can be shared so that other processes can access them. Valid entry is an integer.
Threads The number of threads started for this process (valid only on the 2.6
kernel or higher). Valid entry is an integer.
Timestamp The date and time the agent collects information as set on the
monitored system.
Total Busy CPU Pct The percentage of time the CPU is busy, as a summation of
user CPU and system CPU utilization for this process and for children of this
process. Valid entry is an integer between 1 and 100.
Tot Major faults The total number of major page faults (including child processes)
since the start of the process. Valid entry is an integer.
Tot Minor faults The total number of minor page faults (including child processes)
since the start of the process. Valid entry is an integer.
Tot Proc System CPU The percentage of cumulative CPU time spent in kernel
mode by process. Valid entry is an integer between 0 and 100.
Tot Proc User CPU The percentage of cumulative CPU time spent in user mode by
process. Valid entry is an integer between 0 and 100.
Total Size Memory The number of pages that the process has in real memory.
Valid entry is an integer.
User Sys CPU Pct Of the total system CPU usage, the percentage that was user
CPU usage. Valid entry is an integer between 0 and 100.
VM Data The data size (in kilobytes) of the virtual memory. Valid entry is an
integer.
VM Data MB The data size (in megabytes) of the virtual memory. Valid entry is an
integer.
VM Exe Size The executable size (in kilobytes) of the virtual memory. Valid entry
is an integer.
VM Exe Size MB The executable size (in megabytes) of the virtual memory. Valid
entry is an integer.
VM Lib Size The library size (in kilobytes) of the virtual memory. This
measurement represents all pages, including unused. Valid entry is an integer.
VM Lib Size MB The library size (in megabytes) of the virtual memory. This
measurement represents all pages, including unused. Valid entry is an integer.
VM Lock The size (in kilobytes) of locked pages of the virtual memory. Valid entry
is an integer.
VM Lock MB The size (in megabytes) of locked pages of the virtual memory. Valid
entry is an integer.
VM Size The size (in kilobytes) of the virtual memory. Valid entry is an integer.
VM Size MB The size (in megabytes) of the virtual memory. Valid entry is an
integer.
VM Stack The stack size (in kilobytes) of the virtual memory. Valid entry is an
integer.
VM Stack MB The stack size (in megabytes) of the virtual memory. Valid entry is
an integer.
Eff group The effective group name. Valid entry is an alphanumeric text string,
with a maximum length of 16 characters.
Eff group (Unicode) The effective group name. Valid entry is an alphanumeric text
string, with a maximum length of 64 bytes. This attribute is globalized.
Eff group ID The identifier of the effective group. Valid entry is an integer.
Eff User ID The identifier of the effective user. Valid entry is an integer.
Eff User name The name of the effective user. Valid entry is an alphanumeric text
string, with a maximum length of 16 characters.
Eff User name (Unicode) The name of the effective user. Valid entry is an
alphanumeric text string, with a maximum length of 64 bytes. This attribute is
globalized.
File Sys Group The name of the file system group. Valid entry is an alphanumeric
text string, with a maximum length of 16 characters.
File Sys Group (Unicode) The name of the file system group. Valid entry is an
alphanumeric text string, with a maximum length of 64 bytes. This attribute is
globalized.
File Sys Group ID The identifier of the file system group. Valid entry is an integer.
FS User ID The identifier of the file system user. Valid entry is an integer.
FS User name The name of the file system user. Valid entry is an alphanumeric
text string, with a maximum length of 16 characters.
FS User name (Unicode) The name of the file system user. Valid entry is an
alphanumeric text string, with a maximum length of 64 bytes. This attribute is
globalized.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Process ID The identifier associated with the process. Valid entry is an integer.
Real Group The name of the real group. Valid entry is an integer.
Real Group (Unicode) The name of the real group. Valid entry is an alphanumeric
text string with a maximum of 64 bytes. This attribute is globalized.
Real Group ID The identifier of the real group. Valid entry is an integer.
Real User ID The identifier of the real user. Valid entry is an integer.
Real User Name The name of the real user. Valid entry is an alphanumeric text
string, with a maximum of 16 characters.
Real User Name (Unicode) The name of the real user. Valid entry is an
alphanumeric text string, with a maximum length of 64 bytes. This attribute is
globalized.
Saved Group The name of the saved group. Valid entry is an alphanumeric text
string, with a maximum length of 16 characters.
Saved Group U The name of the saved group. Valid entry is an alphanumeric text
string, with a maximum length of 64 characters.
Saved Group ID The identifier of the saved group. Valid entry is an integer.
Saved User ID The identifier of the saved user. Valid entry is an integer.
Saved User Name The name of the saved user. Valid entry is an alphanumeric text
string, with a maximum length of 16 characters.
Saved User Name (Unicode) The name of the saved user. Valid entry is an
alphanumeric text string, with a maximum length of 64 bytes. This attribute is
globalized.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
RPC Client Calls The number of calls to the server made by the server’s clients.
Valid entry is an integer.
RPC Client Calls Retransmitted The number of client calls that needed to be
transmitted again. Valid entry is an integer.
RPC Server Total Calls The total number of calls made to the server (both valid
and not valid). Valid entry is an integer.
RPC Server Calls Rejected The number of calls made to the server, which were
rejected. Valid entry is an integer.
RPC Server Packets Bad Clt The number of packets that were received at the
server, which had client requests that were not valid. Valid entry is an integer.
RPC Server Packets Bad Auth The number of packets that were received at the
server with authorizations that were not valid. Valid entry is an integer.
RPC Server Packets with Malformed Header The number of packets that were
received at the server with header records that were not properly formatted. Valid
entry is an integer.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Foreign Address The address of the remote end of the socket. Like ″netstat″ *
indicates that the address is unassigned/unavailable. Valid entry is an
alphanumeric text string, with a maximum length of 16 characters.
Foreign Port The number of the foreign port. Valid entry is an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Local Address The address of the local end of the socket, presented as a dotted IP
address. Valid entry is an alphanumeric text string, with a maximum length of 16
characters.
Local Port The local port number. Valid entry is an integer. Note: -1 = N/A.
Local Service The local port number translated to a service name from the
etc/services subdirectory. Valid entry is an alphanumeric text string, with a
maximum length of 64 characters.
Receive Queue The count of bytes not copied by the user program connected to
this socket. Valid entry is an integer. Note: -1 = N/A.
Send Queue The count of bytes not acknowledged by the remote host. Valid entry
is an integer.
Socket Inode The inode used by the socket. Valid entry is an integer.
Socket Owner Name (Unicode) The user name associated with the user ID that
owns or started the socket connection. Valid entry is an alphanumeric text string,
with a maximum length of 64 bytes. This attribute is globalized.
Socket Protocol Indicates the sockets using this protocol. ″Total″ includes UNIX
domain sockets not displayed here. Valid entry is an integer:
0 TCP
1 UDP
2 RAW
3 UNIX
-1 TOTAL
-2 N/A
Socket UID The user ID of the owner of the socket. Valid entry is an integer.
System Name The host name of the monitored system. Valid entry is an
alphanumeric text string, with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Highest Sockets Used The high water mark of sockets used by this protocol. Valid
entry is an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Socket Protocol Indicates the sockets using this protocol. ″Total″ includes UNIX
domain sockets not displayed here. Valid entry is an integer:
0 TCP
1 UDP
2 RAW
3 UNIX
4 FRAG
-1 TOTAL
-1 N/A
System Name The host name of the monitored system. Valid entry is an
alphanumeric text string, with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Days to Peak Space Full The minimum number of days until swap space is
completely used (peak rate based). Valid entry is an integer.
Days to Swap Space Full The predicted number of days until swap space is
completely used (moving average). Valid entry is an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Low Free Memory The lowest level that free real memory has reached, expressed
in kilobytes. Valid entry is an integer.
Moving Total Swap Space The moving average of total swap space, expressed in
megabytes. Valid entry is an integer.
Peak Swap Space Used The peak swap space used based on snap shots, expressed
in megabytes. Valid entry is an integer.
Swap Space Used The moving average of swap space used, expressed in
megabytes. Valid entry is an integer.
Swap Usage Rate The swap space usage rate, expressed in bytes per hour. Valid
entry is an integer.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Ctxt Switches per sec The number of context switches per second. Valid entry is
an integer.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Major Faults per sec The total number of major faults per second. These are page
faults that required loading of pages from the disk. Valid entry is an integer. This
attribute is valid only for systems with a 2.4 (or higher) kernel.
Number of Users The current number of users logged in. Valid entry is an integer.
Pages Faults per sec The total number of pages faults per second (both major and
minor). Valid entry is an integer. This attribute is valid only for systems with a 2.4 (or
higher) kernel.
Pages paged in The total number of pages paged in. Valid entry is an integer.
Pages paged in per sec The total number of pages paged in per second. Valid
entry is an integer.
Pages paged out The total number of pages paged out. Valid entry is an integer.
Pages paged out per sec The total number of pages paged out per second. Valid
entry is an integer.
Pages Swap in per sec The total number of pages swapped in per second. Valid
entry is an integer.
Pages Swapped in The total number of pages swapped in. Valid entry is an
integer.
Pages Swapped out The total number of pages swapped out. Valid entry is an
integer.
Pages Swap out per sec The total number of pages swapped out per second. Valid
entry is an integer.
Pct Change Ctxt Switches The percentage change in the number of context
switches per second. Valid entry is an integer in the range -100 to 100.
Pct Change Processes The percentage change in the number of processes per
second. Valid entry is an integer in the range -100 to 100.
Processes per sec The number of processes created per second. Valid entry is an
integer.
System Load 1 min The load on the system for the last minute. Valid entry is an
integer in the range 0 to 100.
System Load 5 min The load on the system for the last five minutes. Valid entry is
an integer in the range 0 to 100.
System Load 15 min The load on the system for the last fifteen minutes. Valid
entry is an integer in the range 0 to 100.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
System Uptime The system uptime in number of seconds. Valid entry is an integer.
Timestamp The date and time the agent collects information as set on the
monitored system.
From Hostname The host name associated with the user’s login. Valid entry is an
alphanumeric text string, with a maximum length of 256 characters.
Idle Time The number of minutes that have passed since a user last entered a
command. Valid entry is a numeric value expressed as minutes in the range 0 to
20160. Use this attribute to check idle time.
Line The terminal device type or line to which the user is connected. Valid entry is
an alphanumeric text string, with a maximum length of 16 characters.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Login Time The date and time the user logged in.
System Name The host name of the monitored system. Valid entry is an
alphanumeric text string, with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
User Name The full name of a user. Valid entry is an alphanumeric text string,
with a maximum length of 32 characters.
User Name (Unicode) The name of the user logging in to access the system. Valid
entry is a text string up to 64 bytes. This attribute is globalized.
VM Stats attributes
Use the VM Stats attributes to monitor characteristics such as the size of cached,
free, and shared memory.
Linux VM ID The virtual machine user ID used internally to link the monitoring
agent workspace to a z/VM workspace. Valid entry is an alphanumeric text string
with a maximum length of 32 characters. The contents of this attribute might be
empty depending on the platform the Monitoring Agent for Linux OS is running
on and the availability of dependent products.
Memory Cached The size (in megabytes) of physical memory cached. Valid entry
is an integer.
Memory Free The size (in megabytes) of physical memory free. Valid entry is an
integer.
Memory in Buffers The size (in megabytes) of physical memory in buffers. Valid
entry is an integer.
Memory Used The size (in megabytes) of physical memory used. Valid entry is an
integer.
Shared Memory The size (in megabytes) of physical memory shared. Valid entry is
an integer.
Swap Space Free The size (in megabytes) of swap space free. Valid entry is an
integer.
Swap Space Used The size (in megabytes) of swap space used. Valid entry is an
integer.
System Name Name of the host system. Valid entry is an alphanumeric text string,
with a maximum length of 64 characters.
Timestamp The date and time the agent collects information as set on the
monitored system.
Total Memory The total size (in megabytes) of physical memory. Valid entry is an
integer.
Total Swap Space The total size (in megabytes) of swap space. Valid entry is an
integer.
v DB table name is the table name as it would appear in the warehouse database, if
the attribute group is configured to be written to the warehouse.
v Bytes per instance (agent) is an estimate of the record length for each row or
instance written to the agent disk for historical data collection. This estimate can
be used for agent disk space planning purposes.
v Bytes per instance (warehouse) is an estimate of the record length for detailed
records written to the warehouse database, if the attribute group is configured to
be written to the warehouse. Detailed records are those that have been uploaded
from the agent for long-term historical data collection. This estimate can be used
for warehouse disk space planning purposes.
v Bytes per summarized instance (warehouse) is an estimate of the record length for
aggregate records written to the warehouse database, if the attribute group is
configured to be written to the warehouse. Aggregate records are created by the
Summarization agent for attribute groups that have been configured for
summarization. This estimate can be used for warehouse disk space planning
purposes.
v Expected number of instances is a guideline that can be different for each attribute
group, because it is the number of instances of data that the agent will return for
a given attribute group, and depends upon the application environment that is
being monitored. For example, if your attribute group is monitoring each
processor on your machine and you have a dual processor machine, the number
of instances is 2.
The IBM Tivoli Monitoring Installation and Setup Guide contains formulas that can
be used to estimate the amount of disk space used at the agent and in the
warehouse database for historical data collection of an attribute group.
Table 8. Capacity planning for historical data
Bytes per
Bytes per summarized
Attribute Bytes per instance instance Expected number of
Group DB table name instance (agent) (warehouse) (warehouse) instances
CPU LNXCPU 228 249 665 Multiple, typically 1-4
CPU Averages LNXCPUAVG 324 346 1102 Multiple, typically 1-4
CPU LNXCPUCON 312 335 372 Multiple, typically 1-4
Configuration
Disk LNXDISK 484 514 863 Multiple, typically 2
Disk I/O LNXDSKIO 248 273 493 Multiple, typically 2
Disk Usage LNXDU 204 232 581 Multiple, typically 2
Trends
I/O Ext LNXIOEXT 360 389 987 Multiple, typically 2
Network LNXNET 264 307 890 Multiple, typically 3
NFS Statistics LNXNFS 320 387 1720 Multiple, typically 1-4
OS Config LNXOSCON 440 460 497 Multiple, typically 1
Processes LNXPROC 1268 1324 2588 Multiple, typically 100-1000
Process User LNXPUSR 796 838 875 Multiple, typically about 5
Info
RPC Statistics LNXRPC 152 177 319 Single
Sockets Detail LNXSOCKD 312 341 456 Multiple, typically 10-100
Sockets Status LNXSOCKS 132 152 228 Multiple, typically 10-100
For more information about historical data collection, see the IBM Tivoli Monitoring
Administrator’s Guide.
About situations
A situation is a logical expression involving one or more system conditions.
Situations are used to monitor the condition of systems in your network. You can
manage situations from the Tivoli Enterprise Portal by using the Situation editor.
The IBM Tivoli Monitoring agents that you use to monitor your system
environment are shipped with a set of predefined situations that you can use as-is
or you can create new situations to meet your requirements. Predefined situations
contain attributes that check for system conditions common to many enterprises.
Using predefined situations can improve the speed with which you can begin
using the Monitoring Agent for Linux OS. You can examine and, if necessary,
change the conditions or values being monitored by a predefined situation to those
best suited to your enterprise.
Note: The predefined situations provided with this monitoring agent are not
read-only. Do not edit these situations and save over them. Software updates
will write over any of the changes that you make to these situations.
Instead, clone the situations that you want to change to suit your enterprise.
You can display predefined situations and create your own situations using the
Situation editor. The left frame of the Situation editor initially lists the situations
associated with the Navigator item that you selected. When you click a situation
name or create a new situation, the right frame opens with the following tabs:
Formula
Condition being tested
Distribution
List of managed systems (operating systems, subsystems, or applications)
to which the situation can be distributed.
Expert Advice
Comments and instructions to be read in the event workspace
Action
Command to be sent to the system
Until Duration of the situation
For a list of the predefined situations for this monitoring agent and a description
of each situation, refer to the Predefined situations section below and the
information in that section for each individual situation.
Predefined situations
This monitoring agent contains the following predefined situations:
Linux_Fragmented_File_System situation
Monitors the percentage of i-nodes to disk space. An exception condition occurs
when the percentage of i-nodes to disk space used is high, which could indicate
high disk fragmentation on the disk.
Linux_High_CPU_Overload situation
Monitors the percentage of time the processor is busy. An exception condition
occurs when the percentage is extremely high.
Linux_High_CPU_System situation
Monitors the percentage of processor time that is used for system calls to check for
runaway processes. An exception condition occurs when the percentage is high.
Linux_High_Packet_Collisions situation
Monitors the percentage of packet collisions during data transmission. An
exception condition occurs when the percentage is high.
Linux_High_RPC_Retransmit situation
Monitors the percentage of retransmits because of RPC Server calls. An exception
condition occurs when the percentage is extremely high.
Linux_High_Zombies situation
Monitors the number of processes in zombie state. An exception condition occurs
when the number is high.
Linux_Low_Pct_Inodes situation
Monitors the percentage of available i-nodes. An exception condition occurs when
the number is low.
Linux_Low_percent_space situation
Monitors the percentage of space available on a file system. An exception condition
occurs when the percentage is low.
Linux_Low_Space_Available situation
Monitors the available space on a file system. An exception condition occurs when
the amount of space is low.
Linux_Network_Status situation
Monitors whether the Network Interface Card is up or not. An exception condition
occurs when the network interface card is not up.
Linux_NFS_Buffer_High situation
Monitors the number of RPC retransmissions with no duplicate
acknowledgements. An exception condition occurs when the number of
retransmissions is high.
Linux_NFS_Getattr_High situation
Monitors the percentage of NFS server calls to read client attributes. An exception
condition occurs when the percentage is high.
Linux_NFS_rdlink_high situation
Monitors the percentage of NFS server calls for read link operations. An exception
condition occurs when the percentage is high.
Linux_NFS_Read_High situation
Monitors the percentage of NFS server calls for read operations. An exception
condition occurs when the percentage is high.
Linux_NFS_Writes_High situation
Monitors the percentage of NFS server calls for write operations. An exception
condition occurs when the percentage is high.
Linux_Packets_Error situation
Monitors the percentage of network packets in error. An exception condition occurs
when the percentage is high.
Linux_Process_High_Cpu situation
Monitors the percentage of processor time used by a process. An exception
condition occurs when the percentage is high.
Linux_Process_stopped situation
Monitors the number of stopped processes on the system. An exception condition
occurs when the number is high.
Linux_RPC_Bad_Calls situation
Monitors the percentage of rejected RPC server or client calls. An exception
condition occurs when the percentage is high.
Linux_System_Thrashing situation
Monitors the swap space paging activity on the system. An exception condition
occurs when the activity is extremely high.
When included in a situation, the command executes when the situation becomes
true. A Take Action command in a situation is also referred to as reflex automation.
When you enable a Take Action command in a situation, you automate a response
to system conditions. For example, you can use a Take Action command to send a
command to restart a process on the managed system or to send a text message to
a cell phone.
Sample_kill_Process
The remaining section of this chapter contains a description of this Take Action
command. The following information is provided about the Take Action command:
Description
Which actions the command performs on the system to which it is sent
Arguments
List of arguments, if any, for the Take Action with a short description and
default value for each one
Destination systems
Where the command is to be executed: on the Managed System
(monitoring agent) where the agent resides or on the Managing System
(Tivoli Enterprise Monitoring Server) to which it is connected
Usage notes
Additional relevant notes for using the Take Actions
Sample_kill_Process action
Description
Kills the process named in the parameter supplied and enables you to issue ad-hoc
commands from the Tivoli Enterprise Portal that the Monitoring Agent for Linux
OS will execute on your behalf.
Arguments
Process ID
The Process ID (PID) of the process you would like to kill.
Destination systems
Managed system
Usage notes
The kill command is executed directly by the remote Monitoring Agent for Linux
OS. Because it is easy to kill processes unintentionally, you need to exercise caution
if the monitoring agent is run as superuser (root).
About policies
Policies are an advanced automation technique for implementing more complex
workflow strategies than you can create through simple automation.
A policy is a set of automated system processes that can perform actions, schedule
work for users, or automate manual tasks. You use the Workflow Editor to design
policies. You control the order in which the policy executes a series of automated
steps, which are also called activities. Policies are connected to create a workflow.
After an activity is completed, Tivoli Enterprise Portal receives return code
feedback and advanced automation logic responds with subsequent activities
prescribed by the feedback.
Note: For monitoring agents that provide predefined policies, predefined policies
are not read-only. Do not edit these policies and save over them. Software
updates will write over any of the changes that you make to these policies.
Instead, clone the policies that you want to change to suit your enterprise.
For information about using the Workflow Editor, see the IBM Tivoli Monitoring
Administrator’s Guide or the Tivoli Enterprise Portal online help.
For a list of the policies for this monitoring agent and a description of each policy,
refer to the “Predefined policies” section below and the information in that section
for each individual policy.
Predefined policies
There are no predefined policies for this monitoring agent.
Generic event mapping provides useful event class and attribute information for
situations that do not have specific event mapping defined. Each event class
corresponds to an attribute group in the monitoring agent. For a description of the
event slots for each event class, see Table 10 on page 62. For more information
about mapping attribute groups to event classes, see the IBM Tivoli Monitoring
Administrator’s Guide.
BAROC files are found on the Tivoli Enterprise Monitoring Server in the
installation directory in TECLIB (that is, install_dir/cms/TECLIB for Windows
systems and install_dir/tables/TEMS_hostname/TECLIB for UNIX systems). IBM
Tivoli Enterprise Console event synchronization provides a collection of
ready-to-use rule sets that you can deploy with minimal configuration. Be sure to
install IBM Tivoli Enterprise Console event synchronization to access the correct
Sentry.baroc, which is automatically included during base configuration of IBM
Tivoli Enterprise Console rules if you indicate that you want to use an existing
rulebase. See the IBM Tivoli Monitoring Installation and Setup Guide for details.
Table 9. Overview of Distributed Monitoring migrated situations
Situation IBM Tivoli Enterprise Console event class
LZ_USInodes* Sentry2_0_inodes
Sentry2_0_inodesused
LZ_USIUsPct* Sentry2_0_inodesusedpct
LZ_USDkUPct* Sentry2_0_diskusedpct
LZ_USDskAva* Sentry2_0_diskavail
LZ_USDskUsd* Sentry2_0_diskused
LZ_USTvDBSp* Sentry2_0_tivdbspace
LZ_USDIORtK* Sentry2_0_diskioratek
LZ_USRCPTmo* Sentry2_0_rpctmout
LZ_USNtInEr* Sentry2_0_netinerr
LZ_USNtInEX* Sentry2_0_netinerrx
LZ_USNetIn* Sentry2_0_netinerr
LZ_USNetInX* Sentry2_0_netinx
LZ_USBadNFS* Sentry2_0_badnfs
LZ_USBadNFS* Sentry2_0_badnfs
LZ_USNetCol* Sentry2_0_netcoll
LZ_USNCPct* Sentry2_0_netcollpct
LZ_USNCPctX* Sentry2_0_netcollpctx
LZ_USNetOEr* Sentry2_0_netouterr
LZ_USNetOEX* Sentry2_0_netouterrx
Each of the event classes is a child of KLZ_Base. The KLZ_Base event class can be
used for generic rules processing for any event from the Monitoring Agent for
Linux OS.
Table 10. Overview of event slots to event classes
IBM Tivoli Enterprise Console event class event slots
ITM_Linux_User_Login Linux_User_Login attribute group
v system_name: STRING
v timestamp: STRING
v user_name: STRING
v login_pid: INTEGER
v line: STRING
v login_time: STRING
v idle_time: STRING
v from_hostname: STRING
v user_name_u: STRING
v linux_vm_id: STRING
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements for the monitoring
agent,” on page 5.
Upload files for review to the following FTP site: ftp.emea.ibm.com. Log in as
anonymous and place your files in the directory that corresponds to the IBM Tivoli
Monitoring component that you use. See “Contacting IBM Software Support” on
page 92 for more information about working with IBM Software Support.
Trace data captures transient information about the current operating environment
when a component or application fails to operate as designed. IBM Software
Support personnel use the captured trace information to determine the source of
an error or unexpected condition. See “Trace logging” for more information.
Problem classification
The following types of problems might occur with the IBM Tivoli Monitoring:
Linux OS Agent:
v Installation and configuration
v General usage and operation
v Display of monitoring data
v Take Action commands
This appendix provides symptom descriptions and detailed workarounds for these
problems, as well as describing the logging capabilities of the monitoring agent.
See the IBM Tivoli Monitoring Problem Determination Guide for general problem
determination information.
Trace logging
Trace logs capture information about the operating environment when component
software fails to operate as intended. The principal log type is the RAS (Reliability,
Availability, and Serviceability) trace log. These logs are in the English language
only. The RAS trace log mechanism is available for all components of IBM Tivoli
Monitoring. Most logs are located in a logs subdirectory on the host computer. See
the following sections to learn how to configure and use trace logging:
v “Principal trace log files” on page 75
v “Examples: using trace logs” on page 77
v “Setting RAS trace parameters” on page 78
Note: The documentation refers to the RAS facility in IBM Tivoli Monitoring as
″RAS1″.
IBM Software Support uses the information captured by trace logging to trace a
problem to its source or to determine why an error occurred. The default
configuration for trace logging, such as whether trace logging is enabled or
disabled and trace level, depends on the source of the trace logging. Trace logging
is always enabled.
Note: When you communicate with IBM Software Support, you must capture and
send the RAS1 log that matches any problem occurrence that you report.
Table 12 on page 76 can help you identify files that are relevant to your
problem determination efforts.
where:
v hostname is the host name of the machine on which the monitoring component is
running.
v product is the two-character product code. For Monitoring Agent for Linux OS,
the product code is lz.
v program is the name of the program being run.
v timestamp is an 8-character hexadecimal timestamp representing the time at
which the program started.
v nn is a rolling log suffix. See “Examples of trace logging” for details of log
rolling.
For long-running programs, the nn suffix is used to maintain a short history of log
files for that startup of the program. For example, the klzagent program might
have a series of log files as follows:
server01_lz_klzagent_437fc59-01.log
server01_lz_klzagent_437fc59-02.log
server01_lz_klzagent_437fc59-03.log
As the program runs, the first log (nn=01) is preserved because it contains program
startup information. The remaining logs ″roll." In other words, when the set of
numbered logs reach a maximum size, the remaining logs are overwritten in
sequence.
server01_lz_klzagent_537fc59-01.log
server01_lz_klzagent_537fc59-02.log
server01_lz_klzagent_537fc59-03.log
Each program that is started has its own log file. For example, the Monitoring
Agent for Linux OS would have agent logs in this format:
server01_lz_klzagent_437fc59-01.log
Other logs, such as logs for collector processes and Take Action commands, have a
similar syntax as in the following example:
server01_lz_ifstat_447fc59-01.log
Note: When you communicate with IBM Software Support, you must capture and
send the RAS1 log that matches any problem occurrence that you report.
See the IBM Tivoli Monitoring Installation and Setup Guide for more information on
the complete set of trace logs that are maintained on the monitoring server.
v The monitoring server appends the LZ product code to the server name
to form a unique name (SERVER5B:KLZ) for this instance of Monitoring
Agent for Linux OS. This unique name enables you to distinguish
multiple monitoring products that might be running on SERVER5B.
v The log shows when the agent started (ON-LINE) and later stopped
(OFF-LINE) in the environment.
v For the sake of brevity an ellipsis (...) represents the series of trace log
entries that were generated while the agent was running.
v Between the ON-LINE and OFF-LINE log entries, the agent was
communicating with the monitoring server.
v The ON-LINE and OFF-LINE log entries are always available in the
trace log. All trace levels that are described in “Setting RAS trace
parameters” provide these entries.
Background Information
Monitoring Agent for Linux OS uses RAS1 tracing and generates the logs
described in Table 12 on page 76. The default RAS1 trace level is ERROR.
RAS1 tracing has control parameters to manage to the size and number of RAS1
logs. Use the procedure described in this section to set the parameters.
Note: The KBB_RAS1_LOG parameter also provides for the specification of the
log file directory, log file name, and the inventory control file directory and
name. Do not modify these values or log information can be lost.
Regularly prune log files other than the RAS1 log files in the logs directory. Unlike
the RAS1 log files which are pruned automatically, other log types can grow
indefinitely, for example, the logs in Table 12 on page 76 that include a process ID
number (PID).
Note: The KDC_DEBUG setting and the Maximum error tracing setting can
generate a large amount of trace logging. Use them only temporarily, while
you are troubleshooting problems. Otherwise, the logs can occupy excessive
amounts of hard disk space.
Procedure
Specify RAS1 trace options in the install_dir/config/lz.ini file. You can
manually edit the configuration file to set trace logging:
1. Open the trace options file: /install_dir/config/lz.ini.
2. Edit the line that begins with KBB_RAS1= to set trace logging preferences.
For example, if you want detailed trace logging, set the Maximum Tracing
option:
export KBB_RAS1=’ERROR (UNIT:klz ALL) (UNIT:kra ALL)’
3. Edit the line that begins with KBB_RAS1_LOG= to manage the generation of
log files:
v Edit the following parameters to adjust the number of rolling log files and
their size.
– MAXFILES: the total number of files that are to be kept for all startups of
a given program. Once this value is exceeded, the oldest log files are
discarded. Default value is 9.
– LIMIT: the maximum size, in megabytes (MB) of a RAS1 log file. Default
value is 5.
v IBM Software Support might guide you to modify the following parameters:
– COUNT: the number of log files to keep in the rolling cycle of one
program startup. Default value is 3.
– PRESERVE: the number of files that are not to be reused in the rolling
cycle of one program startup. Default value is 1.
Note: You can resolve some problems by ensuring that your system matches the
system requirements listed in Chapter 2, “Requirements for the monitoring
agent,” on page 5.
This appendix provides agent-specific problem determination information. See the
IBM Tivoli Monitoring Problem Determination Guide for general problem
determination information.
Table 13. Problems and solutions for installation and configuration (continued)
Problem Solution
Installing as root: The product has been installed When you install the product as root the files in the
as root, which is not recommended. Without install_dir directory are owned by root. You must change the
re-installing the product, how can you change status of the files as follows:
from root to a different user account? 1. While logged on as root, run the
install_dir/bin/UnSetRoot script, as in this example:
UnSetRoot [ -h CANDLEHOME ] userID
The script resets all the files under the install_dir
directory.
2. Run the install_dir/bin/SetPerm command. SetPerm sets
root permission for specific IBM Tivoli Monitoring agent
files.
Table 13. Problems and solutions for installation and configuration (continued)
Problem Solution
The Monitoring Agent for Linux OS is started and Perform the following steps:
running but not displaying data in the Tivoli 1. Open the Manage Tivoli Enterprise Monitoring Services
Enterprise Portal. window.
2. Right-click the name of the monitoring server.
3. Select Advanced > Add TEMS Application Support in the
pop-up menu. Add application support if any for any agent
that is missing from the list. See in IBM Tivoli Monitoring
Installation and Setup Guide for more information on
adding application support.
4. Check the log files to see whether there are connection
problems like those mentioned in “Agent unable to
connect” on page 85.
5. If there are no connection problems, check whether the
agent has terminated.
6. If the agent is not terminated, confirm that you have added
application support for the Monitoring Agent for Linux OS
in the Tivoli Enterprise Monitoring Server as follows:
v Verify that the following entries are available in the
install_dir\candle_installation.log
file:install_dir\Install\IBM Tivoli Monitoring timestamp.log
... Browser Client support for ITM Agent for Linux
... Desktop Client support for ITM Agent for Linux
You successfully migrate a Candle monitoring Copy the attribute files for the upgraded Candle monitoring
agent to IBM Tivoli Monitoring, Version 6.1.0. agent to install_dir\tmaitm6\attrlib on the computer where
However, when you configure historical data you have installed the Warehouse Proxy. The Warehouse Proxy
collection, you see an error message that includes, must be able to access the short attribute names for tables and
Attribute name may be invalid, or attribute columns. That way, if the longer versions of these names
file not installed for warehouse agent. exceed the limits of the Warehouse database, the shorter names
can be substituted.
Note: When you monitor a multinode system, such as a database, IBM Tivoli
Monitoring adds a subsystem name to the concatenated name, typically a
database instance name.
The length of the name that IBM Tivoli Monitoring generates is limited to 32
characters. Truncation can result in multiple components having the same
32-character name. If this problem happens, shorten the hostname portion of the
name as follows:
1. Open the configuration file for the monitoring agent, which is located in the
following path: install_dir/config/lz.ini.
Note: When you modify the lz.ini file, your configuration changes affect only
the instance Monitoring Agent for Linux OS that is running on the
computer. If you want your configuration changes to affect all agents
that run on the computer, modify the install_dir/config/env.config
file.
2. Find the line the begins with CTIRA_HOSTNAME=.
3. Type a new name for host name that is a unique, shorter name for the host
computer. The final concatenated name including the subsystem name, new
host name, and LZ, cannot be longer than 32 characters.
Note: You must ensure that the resulting name is unique with respect to any
existing monitoring component that was previously registered with the
Tivoli Enterprise Monitoring Server.
4. Save the file.
5. Restart the agent.
6. If you do not find the files mentioned in Step 1, perform the workarounds
listed in the next paragraph.
If you cannot find the CTIRA_HOSTNAME environment variable, you must add
it to the configuration file of the monitoring agent:
v On Windows: Use the Advanced > Edit Variables option.
v On UNIX and Linux: Add the variable to the config/product_code.ini file.
If the Monitoring Agent for Linux OS log file has this information, see Agent
unable to connect.
To ensure support of historical data collection, do not use the Sort By, Group By, or
First/Last functions in your queries.
See the IBM Tivoli Monitoring Administrator’s Guide the Tivoli Enterprise Portal
online Help for information on the Historical Data Collection function.
This section describes problems and solutions for remote deployment and removal
of agent software Agent Remote Deploy:
Table 17. Remote deployment problems and solutions
Problem Solution
The removal of a monitoring agent fails when you This problem might happen when you attempt the remote
use the remote removal process in the Tivoli removal process immediately after you have restarted the
Enterprise Portal desktop or browser. Tivoli Enterprise Monitoring Server. You must allow time for
the monitoring agent to refresh its connection with the Tivoli
Enterprise Monitoring Server before you begin the remote
removal process.
This section provides information for problem determination for agents. Be sure to
consult the IBM Tivoli Monitoring Problem Determination Guide for more general
problem determination information.
Table 19. Problems with configuring situations that you solve in the Situation Editor
Problem Solution
Note: To get started with the solutions in this section, perform these steps:
1. Launch the Tivoli Enterprise Portal.
2. Click Edit > Situation Editor.
3. In the tree view, choose the agent whose situation you want to modify.
4. Choose the situation in the list. The Situation Editor view is displayed.
The situation for a specific agent is Open the Situation Editor. Access the All managed servers view. If the situation
not visible in the Tivoli Enterprise is absent, confirm that application support for Monitoring Agent for Linux OS
Portal. has been added to the monitoring server. If not, add application support to the
server, as described in the IBM Tivoli Monitoring Installation and Setup Guide.
The monitoring interval is too Access the Situation Editor view for the situation that you want to modify.
long. Check the Sampling interval area in the Formula tab. Adjust the time interval
as needed.
Table 19. Problems with configuring situations that you solve in the Situation Editor (continued)
Problem Solution
The situation did not activate at Manually recycle the situation as follows:
startup. 1. Right-click the situation and choose Stop Situation.
2. Right-click the situation and choose Start Situation.
Note: You can permanently avoid this problem by placing a check mark in the
Run at Startup option of the Situation Editor view for a specific situation.
The situation is not displayed. Click the Action tab and check whether the situation has an automated
corrective action. This action can occur directly or through a policy. The
situation might be resolving so quickly that you do not see the event or the
update in the graphical user interface.
An Alert event has not occurred Check the logs, reports, and workspaces.
even though the predicate has been
properly specified.
A situation fires on an unexpected Confirm that you have distributed and started the situation on the correct
managed object. managed system.
The product did not distribute the Click the Distribution tab and check the distribution settings for the situation.
situation to a managed system.
The situation does not fire. In the Formula tab, analyze predicates as follows:
1. Click the fx icon in the upper-right corner of the Formula area. The Show
Incorrect predicates are present in
formula window is displayed.
the formula that defines the
situation. For example, the a. Confirm the following details in the Formula area at the top of the
managed object shows a state that window:
normally triggers a monitoring v The attributes that you intend to monitor are specified in the formula.
event, but the situation is not true v The situations that you intend to monitor are specified in the formula.
because the wrong attribute is v The logical operators in the formula match your monitoring goal.
specified in the formula. v The numerical values in the formula match your monitoring goal.
b. (Optional) Click the Show detailed formula check box in the lower left
of the window to see the original names of attributes in the application
or operating system that you are monitoring.
c. Click OK to dismiss the Show formula window.
2. (Optional) In the Formula area of the Formula tab, temporarily assign
numerical values that will immediately trigger a monitoring event. The
triggering of the event confirms that other predicates in the formula are
valid.
Note: After you complete this test, you must restore the numerical values
to valid levels so that you do not generate excessive monitoring data based
on your temporary settings.
Table 20. Problems with configuration of situations that you solve in the Workspace area
Problem Solution
Situation events are not displayed Associate the situation with a workspace.
in the Events Console view of the Note: The situation does not need to be displayed in the workspace. It is
workspace. sufficient that the situation be associated with any workspace.
You do not have access to a Note: You must have administrator privileges to perform these steps.
situation. 1. Select Edit > Administer Users to access the Administer Users window.
2. In the Users area, select the user whose privileges you want to modify.
3. In the Permissions tab, Applications tab, and Navigator Views tab, select
the permissions or privileges that correspond to the user’s role.
4. Click OK.
Table 20. Problems with configuration of situations that you solve in the Workspace area (continued)
Problem Solution
A managed system seems to be 1. Select Physical View and highlight the Enterprise Level of the navigator
offline. tree.
2. Select View > Workspace > Managed System Status to see a list of
managed systems and their status.
3. If a system is offline, check network connectivity and status of the specific
system or application.
Table 21. Problems with configuration of situations that you solve in the Manage Tivoli Enterprise Monitoring Services
window
Problem Solution
After an attempt to restart the Check the system status and check the appropriate IBM Tivoli Monitoring logs.
agents in the Tivoli Enterprise
Portal, the agents are still not
running.
The Tivoli Enterprise Monitoring Check the system status and check the appropriate IBM Tivoli Monitoring logs.
Server is not running.
The managed objects you created Check the managed system distribution on both the situation and the managed
are firing on incorrect managed object settings sheets.
systems.
Support information
If you have a problem with your IBM software, you have the following options for
obtaining support for software products:
v “Searching knowledge bases”
v “Obtaining fixes” on page 91
v “Receiving weekly support updates” on page 91
v “Contacting IBM Software Support” on page 92
The documentation CD contains the publications that are in the product library.
The format of the publications is PDF, HTML, or both.
IBM posts publications for this and all other Tivoli products, as they become
available and whenever they are updated, to the Tivoli software information center
Web site. Access the Tivoli software information center by first going to the Tivoli
software library at the following Web address:
http://www.ibm.com/software/tivoli/library
Scroll down and click the Product manuals link. In the Tivoli Technical Product
Documents Alphabetical Listing window, click M to access all of the IBM Tivoli
Monitoring product manuals.
The IBM Software Support Web site provides the latest information about known
product limitations and workarounds in the form of technotes for your product.
You can view this information at the following Web site:
http://www.ibm.com/software/support
To search for information on IBM products through the Internet (for example, on
Google), be sure to consider the following types of documentation:
v IBM technotes
v IBM downloads
v IBM Redbooks
v IBM developerWorks
v Forums and newsgroups
Obtaining fixes
A product fix might be available to resolve your problem. To determine what fixes
are available for your IBM software product, follow these steps:
1. Go to the Software support Web site at
http://www.ibm.com/software/support.
2. Click the Download tab.
3. Select the operating system in the Operating system menu.
4. Type search terms in the Enter search terms field.
5. As appropriate, use other search options to further define your search.
6. Click Search.
7. From the list of downloads returned by your search, click the name of a fix to
read the description of the fix and to optionally download the fix.
For more information about the types of fixes that are available, see the IBM
Software Support Handbook at
http://techsupport.services.ibm.com/guides/handbook.html.
Before contacting IBM Software Support, your company must have an active IBM
software maintenance contract, and you must be authorized to submit problems to
IBM. The type of software maintenance contract that you need depends on the
type of product you have:
v For IBM distributed software products (including, but not limited to, Tivoli,
Lotus, and Rational products, as well as DB2 and WebSphere products that run
on Windows, or UNIX operating systems), enroll in Passport Advantage in one
of the following ways:
Online
Go to the Passport Advantage Web site at
http://www.lotus.com/services/passport.nsf/
WebDocs/Passport_Advantage_Home and click How to Enroll.
By phone
For the phone number to call in your country, go to the IBM Software
Support Web site at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
v For customers with Subscription and Support (S & S) contracts, go to the
Software Service Request Web site at
https://techsupport.services.ibm.com/ssr/login.
v For customers with IBMLink, CATIA, Linux, OS/390, iSeries, pSeries, z/Series,
and other support agreements, go to the IBM Support Line Web site at
http://www.ibm.com/services/us/index.wss/so/its/a1000030/dt006.
v For IBM eServer software products (including, but not limited to, DB2 and
WebSphere products that run in z/Series, pSeries, and iSeries environments),
you can purchase a software maintenance agreement by working directly with
an IBM sales representative or an IBM Business Partner. For more information
about support for eServer software products, go to the IBM Technical Support
Advantage Web site http://www.ibm.com/servers/eserver/techsupport.html.
If you are not sure what type of software maintenance contract you need, call
1-800-IBMSERV (1-800-426-7378) in the United States. From other countries, go to
the contacts page of the IBM Software Support Handbook on the Web at
http://techsupport.services.ibm.com/guides/contacts.html and click the name of
your geographic region for phone numbers of people who provide support for
your location.
Submitting problems
You can submit your problem to IBM Software Support in one of two ways:
Online
Click Submit and track problems on the IBM Software Support site at
http://www.ibm.com/software/support/probsub.html. Type your
information into the appropriate problem submission form.
By phone
For the phone number to call in your country, go to the contacts page of
the IBM Software Support Handbook at
http://techsupport.services.ibm.com/guides/contacts.html and click the
name of your geographic region.
If the problem you submit is for a software defect or for missing or inaccurate
documentation, IBM Software Support creates an Authorized Program Analysis
Report (APAR). The APAR describes the problem in detail. Whenever possible,
IBM Software Support provides a workaround that you can implement until the
APAR is resolved and a fix is delivered. IBM publishes resolved APARs on the
Software Support Web site daily, so that other users who experience the same
problem can benefit from the same resolution.
Appendix C. Accessibility
Accessibility features help users with physical disabilities, such as restricted
mobility or limited vision, to use software products successfully. The major
accessibility features in this product enable users to do the following:
v Use assistive technologies, such as screen-reader software and digital speech
synthesizer, to hear what is displayed on the screen. Consult the product
documentation of the assistive technology for details on using those technologies
with this product.
v Operate specific or equivalent features using only the keyboard.
v Magnify what is displayed on the screen.
Appendix D. Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user’s responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM’s future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information is for planning purposes only. The information herein is subject to
change before the products described become available.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply
reliability, serviceability, or function of these programs. You may copy, modify, and
distribute these sample programs in any form without payment to IBM for the
purposes of developing, using, marketing, or distributing application programs
conforming to IBM’s application programming interfaces.
If you are viewing this information in softcopy form, the photographs and color
illustrations might not appear.
Trademarks
IBM, the IBM logo, Candle, DB2®, developerWorks, eServer™, i5/OS™, iSeries,
Lotus®, OMEGAMON, OS/390®, OS/400, Passport Advantage®, pSeries®,
Rational®, Redbooks™, Tivoli, the Tivoli logo, Tivoli Enterprise, Tivoli Enterprise
Console, VTAM®, WebSphere®, z/VM, and zSeries® are trademarks or registered
trademarks of International Business Machines Corporation in the United States,
other countries, or both.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium® are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Java™ and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Appendix D. Notices 99
IBM Confidential
Index
A CPU Averages workspace 14
CPU Config attribute group 26
accessibility ix, 95 customer support
actions See support
See Take Action commands customizing
agent monitoring environment 9
problem determination 84 situations 10
trace logs 75
agents, remote monitoring 1
alerts 1
attribute groups D
CPU 24 data
CPU Averages 25 collecting 11
CPU Config 26 trace logs 74
Disk 27 viewing 11
Disk I/O 28 data provider
Disk Usage Trends 29 See agent
I/O Ext 30 database agent installation problems 79
list of all 24 detecting problems, modifying situation values 10
more information 23 directory names, notation x
Network 31 Disk attribute group 27
NFS Statistics 33 disk capacity planning for historical data 47
OS Config 36 Disk I/O attribute group 28
overview 23 Disk IO Extended Rate workspace 19
Process 37 Disk IO Rate workspace 19
Process User Info 39 disk space requirements 5
RPC Statistics 41 Disk Usage Trends attribute group 29
Sockets Detail 42 Disk Usage workspace 15
Sockets Status 43
Swap Rate 44
System Statistics 45 E
User Login 46 education
VM Stats 47 see Tivoli technical training ix
attributes environment
more information 23 customizing 9
overview 23 features 1
monitoring real-time 7
real-time monitoring 7
B environment variables, notation x
books event
feedback viii mapping 61
online viii events
ordering viii investigating 8
see publications ix workspaces 8
built-in problem determination features 73
F
C features, Monitoring Agent for Linux OS 1
calculate historical data disk space 47 files
capacity planning for historical data 47 agent trace 75
Capacity Usage Information workspace 14 installation trace 75
collecting data 11 other trace log 76
commands, Take Action 57 trace logs 74
components 2 fixes, obtaining 91
configuration 5
contacting support 92
conventions G
operating system x gathering support information 73
typeface x
CPU attribute group 24
CPU Averages attribute group 25
H logging (continued)
trace log files 74
historical data
calculate disk space 47
disk capacity planning 47
historical data, collecting and viewing 11 M
manuals
feedback viii
I online viii
ordering viii
I/O Ext attribute group 30 see publications ix
IBM Software Support memory requirements 5
See support messages
IBM Tivoli Enterprise Console built-in features 73
event mapping 61 modifying situation values to detect problems 10
IBM Tivoli Monitoring: Linux OS Agent Monitoring Agent for Linux OS
performance considerations 87 components 2
information centers for support 90 features 1
information, additional purposes 7
attributes 23 using 7
policies 59 Monitoring Agent for Linux OS installation problems 79
procedural 7 monitoring agents, remote 1
situations 51 monitoring servers 1
Take Action commands 57 monitoring, viewing the real-time environment 7
workspaces 13
installation 5
log file 75
problems 79 N
interface, user 2 Network attribute group 31
problem determination for Tivoli Enterprise Portal 86 Network workspace 16
Internet NFS Statistics attribute group 33
for product support 91 NFS Statistics workspace 16
investigating an event 8 notation
environment variables x
path names x
K typeface x
O
L online publications
accessing ix
legal notices 97 for support 90
Linux agent installation problems 79 operating systems 5
Linux_Fragmented_File_System situation 52 operation of resource, recovering 8
Linux_High_CPU_Overload situation 52 ordering publications ix
Linux_High_CPU_System situation 52 OS Config attribute group 36
Linux_High_Packet_Collisions situation 53 other requirements 5
Linux_High_RPC_Retransmit situation 53
Linux_High_Zombies situation 53
Linux_Low_Pct_Inodes situation 53
Linux_Low_percent_space situation 53 P
Linux_Low_Space_Available situation 53 path names, for trace logs 74
Linux_Network_Status situation 53 path names, notation x
Linux_NFS_Buffer_High situation 54 performance considerations 87
Linux_NFS_Getattr_High situation 54 policies
Linux_NFS_rdlink_high situation 54 list of all 59
Linux_NFS_Read_High situation 54 more information 59
Linux_NFS_Writes_High situation 54 overview 59
Linux_Packets_Error situation 54 predefined 59
Linux_Process_High_Cpu situation 54 problem determination 73, 79
Linux_Process_stopped situation 55 agents 84
Linux_RPC_Bad_Calls situation 55 built-in features 73
Linux_System_Thrashing situation 55 describing problems 93
logging determining business impact 93
agent trace logs 75, 76 information centers for 90
built-in features 73 installation 79
installation log files 75 installation logs 75
location and configuration of logs 74 knowledge bases for 90
Index 103
IBM Confidential
Users workspace 21
V
values, modifying situations 10
variables, notation for x
viewing data 11
viewing real-time monitoring environment 7
views
Capacity Usage Information workspace 14
CPU Averages workspace 14
Disk IO Extended Rate workspace 19
Disk IO Rate workspace 19
Disk Usage workspace 15
Network workspace 16
NFS Statistics workspace 16
Process User Information workspace 18
Process workspace 18
RPC Statistics workspace 17
Sockets Information workspace 17
System Configuration workspace 19
System Information workspace 20
Users workspace 21
Virtual Memory Statistics workspace 20
Virtual Memory Usage Trends workspace 15
Virtual Memory Statistics workspace 20
Virtual Memory Usage Trends workspace 15
VM Stats attribute group 47
W
weekly update support option 91
Windows agent installation problems 79
workarounds 79
agents 84
remote deployment 87
situations 87
Tivoli Enterprise Portal 86
workspaces
Capacity Usage Information 14
CPU Averages 14
Disk IO Extended Rate 19
Disk IO Rate 19
Disk Usage 15
event 8
list of all 13
more information 13
Network 16
NFS Statistics 16
overview 13
predefined 13
Process 18
Process User Information 18
RPC Statistics 17
Sockets Information 17
System Configuration 19
System Information 20
Users 21
Virtual Memory Statistics 20
Virtual Memory Usage Trends 15
IBM Confidential
Printed in USA
SC32-9447-00