Monitoring: Linux OS Agent Version 6.2.2 Fix Pack 2 (Revised May 2010) User s Guide SC32-9447-03



Similar documents
Linux OS Agent User s Guide

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Windows OS Agent Reference

Tivoli Monitoring for Databases: Microsoft SQL Server Agent

User s Guide: Beta 1 draft

User's Guide - Beta 1 Draft

UNIX Logs Agent User s Guide

Tivoli Log File Agent Version Fix Pack 2. User's Guide SC

Tivoli Storage Manager for Windows

Tivoli Integrated Portal Administration and configuration guide. Version 1.0 Tivoli Integrated Portal 2.2

User's Guide - Beta 1 Draft

Readme File for IBM Tivoli Service Automation Manager Extension for Workload Automation. Version 8.6

ERserver. Single signon. iseries. Version 5 Release 3

IBM InfoSphere Master Data Management Standard and Advanced Editions Version 11 Release 3. Installation Guide GI

IBM SmartCloud Monitoring - Application Insight. User Interface Help SC

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

IBM Tivoli Netcool Performance Manager Wireline Component January 2012 Document Revision R2E1. Pack Upgrade Guide

Tivoli Identity Manager Server

Configuring the Tivoli Enterprise Monitoring Server on z/os

User s Guide: Beta 1 Draft

ERserver. iseries. Service tools

IBM Unica Marketing Platform Version 8 Release 5 June 1, Administrator's Guide

Planning an Installation

IBM License Metric Tool Version 9.0 (includes version 9.0.1, and ) Managing the Software Inventory Guide

Tivoli Security Compliance Manager

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Infrastructure Management Dashboards for Servers Reference

IBM Tivoli Storage Manager for Linux. Quick Start. Version 5 Release 1 GC

WebSphere Message Broker. Installation Guide. Version7Release0

IBM Unica Campaign Version 8 Release 6 May 25, Data Migration Guide

IBM Sterling Gentran Server for Windows. Quick Start Guide. Version 5.3.1

IBM Rapid Restore Ultra Version 4.0. User s Guide

Business Intelligence Guide

Reverse Proxy Scenarios for Single Sign-On

IBM Unica Leads Version 8 Release 5 December 2, Installation Guide

Product Overview Guide

Installation and Configuration Guide

Password Synchronization for Active Directory Plug-in Installation and Configuration Guide

IBM Maximo for Aviation MRO Version 7 Release 6. Guide

Lightweight Directory Access Protocol. BladeCenter Management Module and IBM Remote Supervisor Adapters

IBM Storage Management Pack for Microsoft System Center Operations Manager (SCOM) Version User Guide GC

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version Fix Pack 2.

IBM Universal Behavior Exchange Toolkit Release April 8, User's Guide IBM

Chapter 3. Hardware and software requirements

Version 9 Release 1.2 September 23, IBM Campaign Installation Guide IBM

IBM Spectrum Control Base Edition Version Release Notes

ERserver. iseries. Backup, Recovery and Media Services (BRMS)

IBM Tealeaf CX Version 9 Release 0.2 June 18, Tealeaf Databases Guide

Rocket Servergraph Professional Proactive Data Protection Management

Active Directory Adapter with 64-bit Support User Guide

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Exchange Server Agent Version Fix Pack 2.

Remote Supervisor Adapter II. Installation Instructions for Linux Users

User's Guide - Beta 1 Draft

IBM EMM Reports Version 9 Release 1.1 November 26, Installation and Configuration Guide

IBM Unica Marketing Operations and Campaign Version 8 Release 6 May 25, Integration Guide

Installation and Configuration Guide

Tivoli Business Systems Manager

Software Installation

ERserver. iseries. Journal management

Planning and Installation Guide

IBM Directory Server Version 4.1 Installation and Configuration Guide for Multiplatforms

Adapter for Clarify CRM User Guide

IBM Tivoli Monitoring for Virtual Environments: Dashboard, Reporting, and Capacity Planning Version 7.2 Fix Pack 2. User s Guide SC

Data Protection for Microsoft Exchange Server Installation and User's Guide

Lotus. Notes Version Lotus Notes Traveler

Remote Control Tivoli Endpoint Manager - TRC User's Guide

Troubleshooting Guide

Tivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide

IBM Tivoli Enterprise Console. Rule Set Reference SC

Data Protection for SAP Installation and User's Guide for Oracle

How To Set Up An Ops Console On A Pc Or Mac Or Macbook

AS/400e. Networking PPP connections

IBM Informix Dynamic Server Installation Guide for UNIX, Linux, and Mac OS X

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

High Availability Guide for Distributed Systems

IBM Tivoli Storage Manager for Databases Version 7.1. Data Protection for Microsoft SQL Server Installation and User's Guide

Operations Console Setup

IBM Marketing Operations Version 9 Release 1 October 25, User's Guide

User's Guide: Beta 1 Draft

IBM WebSphere Application Server Version 7.0

IBM DB2 9.7 for Linux, UNIX, and Windows

Troubleshooting Reference

Enterprise Manager. Version 6.2. Installation Guide

Tivoli Endpoint Manager for Patch Management - Windows - User's Guide

IBM Tivoli Monitoring Version 6.3 Fix Pack 2. Linux OS Agent Troubleshooting Guide

IBM Director Systems Management Guide

IBM Campaign Version 9 Release 1.1 February 18, User's Guide

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Tivoli Endpoint Manager for Patch Management - Windows - User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

ERserver. iseries. Digital certificate management

Networking Connecting to the Internet

Transaction Monitoring Version for AIX, Linux, and Windows. Reference IBM

DiskPulse DISK CHANGE MONITOR

IBM Marketing Operations OnDemand November 17, Project Manager's Guide

Renewing default certificates for Tivoli Workload Scheduler

Tivoli Identity Manager

Sterling Call Center. Implementation Guide. Release 9.2

AS/400e. Digital Certificate Management

ERserver. Backup, Recovery, and Media Services for iseries. iseries. Version 5 SC

Tivoli Version 6 Release 2. Reporting and Monitoring installation and configuration updates February, 2011

Charter Business Desktop Security Administrator's Guide

Transcription:

Tioli Monitoring: Linux OS Agent Version 6.2.2 Fix Pack 2 (Reised May 2010) User s Guide SC32-9447-03

Tioli Monitoring: Linux OS Agent Version 6.2.2 Fix Pack 2 (Reised May 2010) User s Guide SC32-9447-03

Note Before using this information and the product it supports, read the information in Notices on page 269. This edition applies to ersion 6.2.2 Fix pack 2 of the IBM Tioli Monitoring: Linux OS Agent (5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 2005, 2010. US Goernment Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents Tables............... ii Chapter 1. Oeriew of the Monitoring Agent for Linux OS.......... 1 IBM Tioli Monitoring oeriew........ 1 Features of the Monitoring Agent for Linux OS... 1 New in this release............ 2 Monitoring Agent for Linux OS components.... 2 User interface options........... 3 Chapter 2. Requirements for the monitoring agent........... 5 Naming instances............. 8 Running as a non-administrator user...... 9 Using Agent Management Serices...... 10 Chapter 3. Workspaces reference... 13 About workspaces............ 13 More information about workspaces...... 13 Predefined workspaces.......... 13 Agent Management Serices workspace.... 14 Agents' Management Log workspace..... 14 All Files workspace........... 15 Capacity Usage Information workspace.... 15 CPU Aerages workspace......... 16 Disk I/O Extended Rate workspace..... 16 Disk I/O Rate workspace......... 16 Disk Usage workspace.......... 17 File Information workspace........ 17 Historical Summarized Aailability workspace.. 17 Historical Summarized Aailability Daily workspace.............. 17 Historical Summarized Aailability Hourly workspace.............. 18 Historical Summarized Aailability Weekly workspace.............. 18 Historical Summarized Capacity workspace.. 18 Historical Summarized Capacity Daily workspace 18 Historical Summarized Capacity Hourly workspace.............. 19 Historical Summarized Capacity Weekly workspace.............. 19 Historical Summarized Performance workspace 19 Historical Summarized Performance Daily workspace.............. 20 Historical Summarized Performance Hourly workspace.............. 20 Historical Summarized Performance Weekly workspace.............. 20 Linux workspace........... 21 Network workspace.......... 21 NFS Statistics workspace......... 21 Process workspace........... 22 Process User Information workspace..... 22 RPC Statistics workspace......... 22 Sockets Information workspace....... 23 Specific File Information workspace..... 23 System Configuration workspace...... 23 System Information workspace....... 24 Users Workspace........... 24 Virtual Memory Statistics workspace..... 25 Virtual Memory Usage Trends workspace... 25 Chapter 4. Attributes reference.... 27 About attributes............. 27 More information about attributes....... 27 Attribute groups and attributes for the Monitoring Agent for Linux OS............ 29 Agent Aailability Management Status Attributes 29 Agent Actie Runtime Status Attributes.... 30 Alerts Table Attributes.......... 31 All Users Attributes.......... 33 Configuration Information Attributes..... 33 CPU Attributes............ 35 CPU Attributes (superseded)....... 36 CPU Aerages Attributes......... 38 CPU Aerages Attributes (superseded).... 39 CPU Configuration Attributes....... 41 Disk Attributes............ 42 Disk Attributes (superseded)....... 44 Disk IO Attributes........... 46 Disk IO Attributes (superseded)...... 47 Disk Usage Trends Attributes....... 48 Disk Usage Trends Attributes (superseded)... 50 File Comparison Group Attributes...... 52 File Information Attributes........ 53 File Pattern Group Attributes....... 55 Linux Group Attributes......... 56 I/O Ext Attributes........... 57 I/O Ext Attributes (superseded)...... 59 IP Address Attributes.......... 60 Linux Host Aailability Attributes...... 61 Machine Information attributes....... 62 Network Attributes........... 64 Network Attributes (superseded)...... 67 NFS Statistics Attributes......... 71 NFS Statistics Attributes (superseded).... 76 OS Configuration Attributes........ 81 Process Attributes........... 82 Process Attributes (superseded)....... 86 Process User Info Attributes........ 91 Process User Info Attributes (superseded)... 93 RPC Statistics Attributes......... 96 RPC Statistics Attributes (superseded).... 98 Sockets Detail Attributes......... 99 Sockets Detail Attributes (superseded).... 101 Sockets Status Attributes........ 103 Sockets Status Attributes (superseded).... 105 Swap Rate Attributes.......... 106 Copyright IBM Corp. 2005, 2010 iii

Swap Rate Attributes (superseded)..... 107 System Statistics Attributes........ 108 System Statistics Attributes (superseded)... 110 User Login Attributes.......... 113 User Login Attributes (superseded)..... 114 VM Stats Attributes.......... 116 VM Stats Attributes (superseded)...... 118 Disk capacity planning for historical data.... 120 Chapter 5. Situations reference.... 123 About situations............ 123 More information about situations...... 123 Predefined situations........... 124 Linux_AMS_Alert_Critical situation..... 125 Linux_Fragmented_File_System situation... 125 Linux_Fragmented_File_System_2 situation.. 125 Linux_High_CPU_Oerload situation.... 125 Linux_High_CPU_Oerload_2 situation... 126 Linux_High_CPU_System situation..... 126 Linux_High_CPU_System_2 situation.... 126 Linux_High_Packet_Collisions situation... 126 Linux_High_Packet_Collisions_2 situation... 126 Linux_High_RPC_Retransmit situation.... 126 Linux_High_RPC_Retransmit_2 situation... 126 Linux_High_Zombies situation...... 127 Linux_High_Zombies_2 situation...... 127 Linux_Low_Pct_Inodes situation...... 127 Linux_Low_Pct_Inodes_2 situation..... 127 Linux_Low_percent_space situation..... 127 Linux_Low_percent_space_2 situation.... 127 Linux_Low_Space_Aailable situation.... 128 Linux_Low_Space_Aailable_2 situation... 128 Linux_Network_Status situation...... 128 Linux_Network_Status_2 situation..... 128 Linux_NFS_Buffer_High situation..... 128 Linux_NFS_Buffer_High_2 situation..... 128 Linux_NFS_Getattr_High situation..... 129 Linux_NFS_Getattr_High_2 situation.... 129 Linux_NFS_rdlink_high situation...... 129 Linux_NFS_rdlink_high_2 situation..... 129 Linux_NFS_Read_High situation...... 129 Linux_NFS_Read_High_2 situation..... 129 Linux_NFS_Writes_High situation..... 129 Linux_NFS_Writes_High_2 situation..... 130 Linux_Packets_Error situation....... 130 Linux_Packets_Error_2 situation...... 130 Linux_Process_High_Cpu situation..... 130 Linux_Process_High_Cpu_2 situation.... 130 Linux_Process_stopped situation...... 130 Linux_Process_stopped_2 situation..... 130 Linux_RPC_Bad_Calls situation...... 131 Linux_RPC_Bad_Calls_2 situation..... 131 Linux_System_Thrashing situation..... 131 Linux_System_Thrashing_2 situation.... 131 Chapter 6. Take Action commands reference............. 133 About Take Action commands........ 133 More information about Take Action commands 133 Predefined Take Action commands...... 133 AMS Recycle Agent Instance....... 134 AMS Reset Agent Daily Restart Count.... 134 AMS Start Agent action......... 135 AMS Start Agent Instance action...... 135 AMS Stop Agent action......... 136 AMS Start Management action...... 136 AMS Stop Management action...... 137 Sample_kill_Process action........ 137 Chapter 7. Policies reference..... 139 About policies............. 139 More information about policies....... 139 Predefined policies........... 139 Appendix A. Upgrading for warehouse summarization........... 141 Tables in the warehouse.......... 141 Effects on summarized attributes....... 141 Upgrading your warehouse with limited user permissions.............. 142 Types of table changes.......... 143 Table summary............. 144 Upgrading your warehouse for primary key and tablespace changes........... 145 Affected attribute groups and supporting scripts 146 Procedures............. 146 Appendix B. IBM Tioli Enterprise Console eent mapping....... 151 Appendix C. Monitoring Agent for Linux OS data collection...... 175 Appendix D. Troubleshooting.... 223 Gathering product information for IBM Software Support............... 223 Built-in troubleshooting features....... 223 Problem classification........... 224 Trace logging............. 224 Principal trace log files......... 225 Setting RAS trace parameters....... 227 Problems and workarounds........ 228 Installation and configuration troubleshooting 228 Agent troubleshooting......... 234 Tioli Enterprise Portal troubleshooting... 236 Troubleshooting for remote deployment... 237 Situation troubleshooting........ 237 Support information........... 241 Accessing terminology online........ 241 Accessing publications online........ 241 Ordering publications.......... 242 Tioli technical training.......... 242 Tioli user groups............ 242 Appendix E. Discoery Library Adapter for the monitoring agent... 243 About the DLA............. 243 More information about DLAs........ 243 Linux data model class types represented in CDM 243 i IBM Tioli Monitoring: Linux OS Agent: User s Guide

Linux class............. 243 ComputerSystem class......... 244 IpInterface class........... 245 IpV4Address class........... 245 IpV6Address class........... 245 Fqdn class............. 245 TMSAgent class........... 246 Appendix F. Tioli Common Reporting for the monitoring agent...... 247 Utilization Details for Single Resource report... 249 Utilization Details for Multiple Resources report 253 Utilization Heat Chart for Single Resource report 256 Top Resources Utilization report....... 259 Enterprise Resource List report....... 262 Appendix G. Documentation library 263 IBM Tioli Monitoring library........ 263 Documentation for the base agents..... 264 Related publications........... 265 Other sources of documentation....... 265 Appendix H. Accessibility...... 267 Naigating the interface using the keyboard... 267 Magnifying what is displayed on the screen... 267 Notices.............. 269 Trademarks.............. 271 Index............... 273 Contents

i IBM Tioli Monitoring: Linux OS Agent: User s Guide

Tables 1. System requirements for the Monitoring Agent for Linux OS............ 6 2. Required Linux libraries......... 7 3. Capacity planning for historical data logged by component........... 120 4. Time periods and suffixes for summary tables and iews............. 141 5. Additional columns to report summarization information............ 142 6. Primary key and warehouse changes for the Monitoring Agent for Linux OS..... 144 7. Scripts for affected attribute groups and summary tables for the Monitoring Agent for Linux OS............. 146 8. Oeriew of Distributed Monitoring migrated situations............. 151 9. Oeriew of attribute groups to eent classes and slots............. 153 10. Mechanisms used to gather attributes 175 11. Information to gather before contacting IBM Software Support.......... 223 12. Log file management on UNIX compared to log file management on Windows..... 224 13. Trace log files for troubleshooting agents 225 14. Problems and solutions for installation and configuration........... 230 15. General problems and solutions for uninstallation........... 233 16. Agent problems and solutions...... 235 17. Tioli Enterprise Portal problems and solutions............. 236 18. Remote deployment problems and solutions 237 19. Specific situation problems and solutions 237 20. Problems with configuring situations that you sole in the Situation Editor...... 239 21. Problems with configuration of situations that you sole in the Workspace area..... 240 22. Problems with configuration of situations that you sole in the Manage Tioli Enterprise Monitoring Serices window...... 241 Copyright IBM Corp. 2005, 2010 ii

iii IBM Tioli Monitoring: Linux OS Agent: User s Guide

Chapter 1. Oeriew of the Monitoring Agent for Linux OS The Monitoring Agent for Linux OS proides you with the capability to monitor Linux, and to perform basic actions with Linux. This chapter proides a description of the features, components, and interface options for the Monitoring Agent for Linux OS. IBM Tioli Monitoring oeriew IBM Tioli Monitoring is the base software for the Monitoring Agent for Linux OS. IBM Tioli Monitoring proides a way to monitor the aailability and performance of all the systems in your enterprise from one or seeral designated workstations. It also proides useful historical data that you can use to track trends and to troubleshoot system problems. You can use IBM Tioli Monitoring to do the following: Monitor for alerts on the systems that you are managing by using predefined situations or custom situations. Establish your own performance thresholds. Trace the causes leading to an alert. Gather comprehensie data about system conditions. Use policies to perform actions, schedule work, and automate manual tasks. The Tioli Enterprise Portal is the interface for IBM Tioli Monitoring products. By proiding a consolidated iew of your enironment, the Tioli Enterprise Portal permits you to monitor and resole performance issues throughout the enterprise. See the IBM Tioli Monitoring publications listed in Appendix G, Documentation library, on page 263 for complete information about IBM Tioli Monitoring and the Tioli Enterprise Portal. Features of the Monitoring Agent for Linux OS As part of the Tioli Enterprise Portal for Distributed Systems, the Monitoring Agent for Linux OS offers a central point of management of Linux-based enironments. It proides a comprehensie means for gathering exactly the information you need to detect problems early and to preent them. Information is standardized across all systems, and you can monitor serers from a single workstation. The Tioli Enterprise Portal lets you easily collect and analyze specific information. The Monitoring Agent for Linux OS is an intelligent, remote monitoring agent that resides on managed resources. It assists you in anticipating trouble and warns systems administrators when critical eents take place on their systems. With the Monitoring Agent for Linux OS, systems administrators can set threshold leels and flags as desired to alert them when the system reaches these thresholds. For Tioli Enterprise Portal, information is displayed in named workspaces. Tioli Enterprise Portal refers to this tabular format for information as a table iew. Information can also be displayed in the workspace as charts, graphs, or other formats that you can specify. Copyright IBM Corp. 2005, 2010 1

New in this release The Monitoring Agent for Linux OS proides the following benefits: Simplifies application and system management by managing applications, platforms, and resources across your enironment. Helps to increase profits by proiding you with real-time access to reliable, up-to-the-minute data that you can use to make faster, better-informed operating decisions. Scales and ports to new platforms by supporting a wide ariety of platforms. Improes system performance by letting you integrate, monitor, and manage your system, network, console, and mission-critical applications. A monitoring agent alerts the Tioli Enterprise Monitoring Serer when conditions on the system network meet threshold-based conditions. These alerts notify your systems administrator to limit and control database usage. You can iew data gathered by the Tioli Enterprise Monitoring Serer in tables and charts for the status of your distributed database systems. Enhances efficiency by monitoring dierse platforms and networks from a single PC screen. Depending on your Tioli Enterprise Portal configuration, you can collect and monitor data across platforms. Management agents gather and filter status information at the managed resource rather than at the hub, eliminating unnecessary data transmission and sending only data that is releant to changes in status conditions. The Monitoring Agent for Linux OS helps you monitor and gather the consistent, accurate, and timely information you require to effectiely perform your job. For ersion 6.2.2 Fix Pack 2 of the Monitoring Agent for Linux OS, the following enhancements hae been made: OS agent aailability is now isible from the Agents' Management Log workspace. New Take Actions: AMS Recycle Agent Instance AMS Reset Agent Daily Restart Count Monitoring Agent for Linux OS components After you install the Monitoring Agent for Linux OS (product code "klz" or "lz") as directed in the IBM Tioli Monitoring Installation and Setup Guide, you hae an enironment with a client, serer, and monitoring agent implementation for IBM Tioli Monitoring that contains the following components: Tioli Enterprise Portal client with a Jaa-based user interface for iewing and monitoring your enterprise. Tioli Enterprise Portal Serer that is placed between the client and the Tioli Enterprise Monitoring Serer and enables retrieal, manipulation, and analysis of data from the monitoring agents. Tioli Enterprise Monitoring Serer, which acts as a collection and control point for alerts receied from the monitoring agents, and collects their performance and aailability data. Monitoring Agent for Linux OS, which collects and distributes data to a Tioli Enterprise Monitoring Serer. This component also embeds the Agent Management Serices function. 2 IBM Tioli Monitoring: Linux OS Agent: User s Guide

User interface options Operating system agents and application agents installed on the systems or subsystems you want to monitor. These agents collect and distribute data to the Tioli Enterprise Monitoring Serer. Tioli Data Warehouse for storing historical data collected from agents in your enironment. The data warehouse is located on a DB2, Oracle, or Microsoft SQL database. To collect information to store in this database, you must install the Warehouse Proxy agent. To perform aggregation and pruning functions on the data, install the Warehouse Summarization and Pruning agent. Tioli Enterprise Console eent synchronization component for synchronizing the status of situation eents that are forwarded to the eent serer. When the status of an eent is updated because of IBM Tioli Enterprise Console rules or operator actions, the update is sent to the monitoring serer, and the updated status is reflected in both the Situation Eent Console and the Tioli Enterprise Console eent iewer. For more information, see IBM Tioli Monitoring Installation and Setup Guide. Installation of the base software and other integrated applications proides the following interfaces that you can use to work with your resources and data: Tioli Enterprise Portal browser client interface The browser interface is automatically installed with Tioli Enterprise Portal. To start Tioli Enterprise Portal in your Internet browser, enter the URL for a specific Tioli Enterprise Portal browser client installed on your Web serer. Tioli Enterprise Portal desktop client interface The desktop interface is a Jaa-based graphical user interface (GUI) on a Windows workstation. IBM Tioli Enterprise Console Eent management application Manage Tioli Enterprise Monitoring Serices window The window for the Manage Tioli Enterprise Monitoring Serices utility is used for configuring the agent and starting Tioli serices not already designated to start automatically. Chapter 1. Oeriew of the Monitoring Agent for Linux OS 3

4 IBM Tioli Monitoring: Linux OS Agent: User s Guide

Chapter 2. Requirements for the monitoring agent This chapter contains information about the following topics and procedures releant to the installation and configuration of the Monitoring Agent for Linux OS. In addition to the requirements described in the IBM Tioli Monitoring Installation and Setup Guide, the Monitoring Agent for Linux OS has the requirements listed in Table 1 on page 6. Copyright IBM Corp. 2005, 2010 5

Table 1. System requirements for the Monitoring Agent for Linux OS Operating system Linux Operating system ersions Linux: Linux on zseries RedHat Enterprise Linux AS 3 (31-bit or 64-bit) RedHat Enterprise Linux AS 4 (31-bit or 64-bit) RedHat Enterprise Linux AS 5 (31-bit or 64-bit) SUSE Linux Enterprise Serer 8 (31-bit or 64-bit) SUSE Linux Enterprise Serer 9 (31-bit or 64-bit) SUSE Linux Enterprise Serer 10 (31-bit or 64-bit) Linux on Intel (32-bit) RedHat Enterprise Linux AS/ES 3 RedHat Enterprise Linux AS/ES 4 RedHat Enterprise Linux AS/ES 5 SUSE Linux Enterprise Serer 8 SUSE Linux Enterprise Serer 9 SUSE Linux Enterprise Serer 10 RedFlag 4.1 Asian Linux 2.0 Linux on pseries RedHat Enterprise Linux AS 4 RedHat Enterprise Linux AS 5 SUSE Linux Enterprise Serer 9 SUSE Linux Enterprise Serer 10 Linux on IA64 (Itanium ) RedHat Enterprise Linux AS 4 1 RedHat Enterprise Linux AS 5 1 SUSE Linux Enterprise Serer 9 1 SUSE Linux Enterprise Serer 10 1 Asian Linux 2 Linux on x86-64 RedHat Enterprise Linux AS 4 1 RedHat Enterprise Linux AS 5 1 SUSE Linux Enterprise Serer 9 1 SUSE Linux Enterprise Serer 10 1 Asian Linux 2 Natiely on VMWare ESX Serer 3.0.1 x86-32 ESX Serer 3.0.1 x86-64 ESX Serer 3.5 x86-32 ESX Serer 3.5 x86-64 ESX Serer 4.0 x86-32 ESX Serer 4.0 x86-64 The Linux ersion must support the Korn shell (ksh) and Motif Window Manager (libmotif) for installation of the monitoring agent. Memory 30 MB RAM for the Monitoring Agent for Linux OS 6 IBM Tioli Monitoring: Linux OS Agent: User s Guide

Table 1. System requirements for the Monitoring Agent for Linux OS (continued) Operating system Linux Disk space The Monitoring Agent for LINUX OS needs 180 MB of disk space in the file system where it is to be installed through the local install method. It needs 135 MB of disk space in the /tmp file system and 185 MB of disk space in the file system where the agent is to be installed through the tacmd createnode command. It needs 268 MB of disk space when it is updated by using the command tacmd updateagent. For historical data disk space information, see Disk capacity planning for historical data on page 120. Other requirements IBM Tioli Monitoring 6.2.2 agents require at least a 6.2.2 hub monitoring serer and portal serer. IBM Tioli Monitoring 6.2.1 hub monitoring serers and portal serers do not support 6.2.2 monitoring agents. IBM Tioli Monitoring 6.2.1 monitoring agents work with both 6.2.1 and 6.2.2 enironments. The monitoring agent must hae the permissions necessary to perform requested actions. For example, if the user ID you used to log onto the system to install the monitoring agent (locally or remotely) does not hae the permission to perform a particular action being monitored by the monitoring agent (such as running a particular command), the monitoring agent will be unable to perform the requested action. Linux ersions require some compatibility libraries to be installed for the agent to work correctly. The latest ersions of libstdc++, libgcc, and compat-libstdc++, are required for the agent to work correctly. 2 Notes: 1. In natie 64-bit mode, not tolerance mode. 2. See Table 2 for the minimum ersion required for these libraries. Table 2. Required Linux libraries Architecture libstdc++ libgcc compat-libstdc++ li6243/li6246 32bit agent for Linux Intel kernel 2.4 (RHEL3,SLES8) li6263/li6266 32bit agent for Linux Intel kernel 2.6 (RHEL4, RHEL5, SLES9,SLES10) lx8266 64bit agent for Linux x64 kernel 2.6 lia266 64bit agent for Linux IA64 kernel 2.6 lpp266 64bit agent for Linux PPC kernel 2.6 libstdc++-2.96-98 N/A compat-libstdc++-6.2-2.9.0.16 libstdc++-3.3.3-43.41 libgcc-4.1-4.1.2_20070115-0.2 N/A libstdc++-3.4.4-2 libgcc-3.4.4-2 compat-libstdc++-33-3.2.3-47.3 libstdc++-3.2.2-23 libgcc-3.2.2-23 N/A libstdc++-3.3.3-43.41 libgcc-3.3.3-43.41 N/A Chapter 2. Requirements for the monitoring agent 7

Table 2. Required Linux libraries (continued) Architecture libstdc++ libgcc compat-libstdc++ ls3243 31bit agent for zlinux kernel 2.4 (RHEL3,SLES8) ls3246 64bit agent for zlinux kernel 2.4 (RHEL3,SLES8) ls3263 31bit agent for zlinux kernel 2.6 (RHEL4, RHEL5, SLES9,SLES10) ls3266 64bit agent for zlinux kernel 2.6 (RHEL4, RHEL5, SLES9,SLES10) libstdc++-3.2.2-54 libgcc-3.2.2-54 N/A libstdc++-3.2.2-54 libgcc-3.2.2-54 N/A libstdc++-3.3.3-43.34 libgcc-3.3.3-43.34 N/A libstdc++-3.3.3-43.34 libgcc-3.3.3-43.34 N/A Naming instances Note: For the most current information about the operating systems that are supported, see the following URL: http://www-306.ibm.com/software/sysmgmt/products/support/tioli_ Supported_Platforms.html When you get to that site, click Tioli platform and database support matrix link at the bottom of the window. Silent installation: If you are performing a silent installation by using a response file, see the IBM Tioli Monitoring Installation and Setup Guide, "Performing a silent installation of IBM Tioli Monitoring." If you hae multiple instances of a monitoring agent, you must decide how to name the monitoring agents. This name is intended to uniquely identify that monitoring agent. The agent's default name is composed of three qualifiers: Optional instance name Machine network host name Agent product node type An agent name truncation problem can occur when the network domain name is included in the network host name portion of the agent name. For example, instead of just the host name myhost1 being used, the resulting host name might be myhost1.acme.north.prod.com. Inclusion of the network domain name causes the agent name in the example aboe to expand to SERVER1:myhost1.acme.north.prod.com:KXX. This resulting name is 39 characters long. It is truncated to 32 characters resulting in the name SERVER1:myhost1.acme.north.prod. The agent name truncation is only a problem if there is more than one monitoring agent on the same system. In this case, the agent name truncation can result in collisions between agent products attempting to register by using the same truncated name alue. When truncated agent names collide on the same system, this can lead to Tioli Enterprise Monitoring Serer problems with corrupted EIB 8 IBM Tioli Monitoring: Linux OS Agent: User s Guide

tables. The agent name collision in the Tioli Enterprise Monitoring Serer might cause a registered name to be associated with the wrong product. In general, create names that are short but meaningful within your enironment. Use the following guidelines: Each name must be unique. One name cannot match another monitoring agent name exactly. Each name must begin with an alpha character. Do not use blanks or special characters, including $, #, and @. Each name must be between 2 and 32 characters in length. Monitoring agent naming is case-sensitie on all operating systems. See Unique names for monitoring components on page 233 for more information about creating unique names. Running as a non-administrator user The Monitoring Agent for Linux OS can be run by a non-administrator user (a non-root user), howeer some functionality becomes unaailable. The Machine BIOS information uses the dmidecode executable to extract the releant information. This Linux proided executable must be run by the Administrator user to extract BIOS information. This attribute group does not report data if the agent is not run by the Administrator user. This information is also used by Tioli Application Dependency Discoery Manager. A non-administrator user can only access the directories that it has permissions to read. Therefore, functionality of the File Information attribute group might be reduced. For Agent Management Serices, data reported in the Agent Actie Runtime Status attribute group, for example the PID, the command line, the CPU, and the memory, might also be affected when the non-administrator user is monitoring agents running as a different non-administrator user. Also for Agent Management Serices, the watchdog cannot stop or start any agent that it does not hae priileges to stop or start. If the OS agent is running as a user other than Administrator but you would still like to use it to stop and start other agents, the sudo facility on UNIX and Linux proides one way of supporting this capability. In the example that follows, the OS agent user is a member of a group called 'itm'. Also, it is assumed that Agent Management Serices will not be prompted for a password to perform these operations and that the target agents' user IDs are 'user1' and 'user2': # sudoers file. # # This file MUST be edited with the 'isudo' command as root. # Failure to use 'isudo' may result in syntax or file permission errors # that preent sudo from running. # # See the sudoers man page for the details on how to write a sudoers file. # # Host alias specification # User alias specification # Cmnd alias specification Chapter 2. Requirements for the monitoring agent 9

Cmnd_Alias AMSAGENTSTART = /opt/pas/itmtest/bin/itmcmd agent -[po] [[\:alnum\:]_]* start [[\:alnum\:]][[\:alnum\:]],/opt/pas/itmtest/bin/itmcmd agent start [[\:alnum\:]][[\:alnum\:]] Cmnd_Alias AMSAGENTSTOP = /opt/pas/itmtest/bin/itmcmd agent -[po] [[\:alnum\:]_]* stop [[\:alnum\:]][[\:alnum\:]],/opt/pas/itmtest/bin/itmcmd agent stop [[\:alnum\:]][[\:alnum\:]] Cmnd_Alias ITMAMSCMD = AMSAGENTSTART,AMSAGENTSTOP # Defaults specification # Runas alias specification Runas_Alias ITMAGENTIDS = user1,user2 # Same thing without a password %itmusers ALL=( ITMAGENTIDS ) NOPASSWD: ITMAMSCMD This is just one possible example. The sudo facility has many adanced capabilities including the ability to audit and to alert administrators of usage of the sudo command by unauthorized users. See your operating system's sudo man pages for more information. In the agentinstancecommand.sh script, replace calls to 'su' with calls to 'sudo'. For example: if [ -z "$USR" ]; then $START_CMD else # su - $USR -c "$START_CMD" sudo -u $USR $START_CMD fi... if [ -z "$USR" ]; then $STOP_CMD else # su - $USR -c "$STOP_CMD" sudo -u $USR $STOP_CMD fi Ensure that the user1 and user2 users also hae write permission to any files to which an application agent needs to write. Using Agent Management Serices There are two watchdog monitors that run as part of the Monitoring Agent for Linux. One monitor runs as part of the OS Monitoring Agent process, which is referred to as the Agent Watchdog. The other watchdog monitor runs as a separate process named 'kcawd'. The kcawd process is also called the Agent Management Serices Watchdog. This watchdog watches the OS Agent, so as long as its Aailability Status is showing 'Running' in the Agents' Runtime Status iew of the Agent Management Serices workspace. No setup or configuration is required. The Agent Watchdog monitors agent processes other than the OS Agent. Using the communication facility of the OS Agent, it is able to respond to Tioli Enterprise Portal Desktop queries and Take Actions performed against these other agent processes. This is the data that is seen in the Agent Management Serices workspace. In the Tioli Enterprise Portal Desktop, the Agent Management Serices workspace lists the agents that can be monitored by this watchdog running as part of the OS Agent. One of the agents listed in the workspace is the Agent Management Serices Watchdog. Its purpose is to monitor the OS Agent's aailability. 10 IBM Tioli Monitoring: Linux OS Agent: User s Guide

The Agent Management Serices Watchdog monitor is responsible for watching just the OS Monitoring Agent and restarting it if it goes down. It is enabled by default and does not need to be configured. It is started automatically when the Monitoring Agent for Linux is started. This watchdog does not hae a communication facility, so it cannot report information to the Tioli Enterprise Portal or respond to Take Actions. It is not an agent per se, but a separate process that always monitors the OS Monitoring Agent. You can temporarily disable the Agent Management Serices Watchdog by using the InstallDir/bin/itmcmd execute lz disarmwatchdog.sh command. This disables the Watchdog process for the OS Monitoring Agent and all Agent Management Serices managed agents. If there is local administratie work to be performed, and you do not want the auto-restart of the agents to interfere with it, run the InstallDir/bin/itmcmd execute lz disarmwatchdog.sh command before proceeding. When the work is complete, recycle the OS Monitoring Agent to reenable Agent Management Serices, or use the InstallDir/bin/itmcmd execute lz rearmwatchdog.sh command. If you use the itmcmd interface to stop or start an Agent Management Serices managed agent, its watchdog will be disabled if stopping the agent and enabled if starting the agent. Chapter 2. Requirements for the monitoring agent 11

12 IBM Tioli Monitoring: Linux OS Agent: User s Guide

Chapter 3. Workspaces reference About workspaces This chapter contains an oeriew of workspaces, references for detailed information about workspaces, and descriptions of the predefined workspaces included in this monitoring agent. A workspace is the working area of the Tioli Enterprise Portal application window. At the left of the workspace is a Naigator that you use to select the workspace you want to see. As you select items in the Naigator, the workspace presents iews pertinent to your selection. Each workspace has at least one iew. Some iews hae links to workspaces. Eery workspace has a set of properties associated with it. This monitoring agent proides predefined workspaces. You cannot modify or delete the predefined workspaces, but you can create new workspaces by editing them and saing the changes with a different name. More information about workspaces Predefined workspaces For more information about creating, customizing, and working with workspaces, see the IBM Tioli Monitoring User's Guide. For a list of the predefined workspaces for this monitoring agent and a description of each workspace, refer to thepredefined workspaces section below and the information in that section for each indiidual workspace. The following list shows the organization of the predefined workspaces proided with IBM Tioli Monitoring: Linux OS Agent. Capacity Usage Information workspace on page 15 CPU Aerages workspace on page 16 Virtual Memory Usage Trends workspace on page 25 Disk Usage workspace on page 17 File Information workspace on page 17 All Files workspace on page 15 Network workspace on page 21 Sockets Information workspace on page 23 NFS Statistics workspace on page 21 RPC Statistics workspace on page 22 Process workspace on page 22 Process User Information workspace on page 22 System Information workspace on page 24 System Configuration workspace on page 23 Disk I/O Rate workspace on page 16 Disk I/O Extended Rate workspace on page 16 Copyright IBM Corp. 2005, 2010 13

Virtual Memory Statistics workspace on page 25 Users Workspace on page 24 Agent Management Serices workspace Agents' Management Log workspace This agent also includes the following linked workspaces: Historical Summarized Aailability Historical Summarized Aailability Daily Historical Summarized Aailability Hourly Historical Summarized Aailability Weekly Historical Summarized Capacity Historical Summarized Capacity Daily Historical Summarized Capacity Hourly Historical Summarized Capacity Weekly Historical Summarized Performance Historical Summarized Performance Daily Historical Summarized Performance Hourly Historical Summarized Performance Weekly Some predefined workspaces are not aailable from the Naigator tree item, but are accessed by selecting the link indicator next to a row of data in a iew. Left-clicking a link indicator selects the default workspace associated with that link. Right-clicking a link indicator displays all linked workspaces that can be selected. The remaining sections of this chapter contain descriptions of each of these predefined workspaces, which are organized alphabetically within the group. Agent Management Serices workspace The Agent Management Serices workspace contains iews of data collected by the Agent Management Serices component of the Monitoring Agent for Linux. This workspace includes an Agents' Management Status iew, an Agents' Runtime Status iew, an Agents' Alerts iew, and an Agents' Management Definitions iew. Alerts that are seen in the Alerts iew in the default workspace are cached for 24 hours, by default. The time can be oerridden by changing the enironment ariable KCA_CACHE_LIMIT found in the lz.ini file. The ariable is specified in hours. This functionality is not aailable to preious ersions of the agents. Agents' Management Log workspace The Agents' Management Log workspace contains a list of monitoring agent log entries filtered on the Agent Management Serices component. Use this workspace to see the operations being executed by Agent Management Serices. Log messages generated by the physical watchdog are displayed in the Agents' Management Log workspace iew. By using these log messages, you can you can use to track OS Agent restarts and aailability. The limitations of this function are that the physical watchdog must be running. The workspace includes the following operation messages: 14 IBM Tioli Monitoring: Linux OS Agent: User s Guide

Agent added to system - CAP file found. Agent CAP file initialization completed. Agent daily restart count reset. Agent exceeded policy defined CPU threshold. Agent exceeded policy defined memory threshold. Agent exceeded restart tries. Agent initial start. Agent Management Serices watchdog not reliable. Agent manual start failed. Agent manual stop failed. Agent not configured. Agent not found. Agent now managed. Agent now unmanaged. Agent recycle command receied. Agent remoed from system - CAP file remoed. Agent restart disabled - disarm mode actie Agent restart failed. Agent start command receied. Agent started successfully. Agent stop command receied. Agent stopped abnormally. Agent stopped successfully. Disarm completed successfully. Rearm completed successfully. This workspace includes an Agents' Management Log iew. All Files workspace The All Files workspace is reached by right-clicking the File Information naigator item in the Tioli Enterprise Portal. The iews are: File Size - Top Ten (bar chart) All Files (table iew) The File Size - Top Ten bar chart displays the sizes of the largest files. The All Files table proides file information. Capacity Usage Information workspace The Capacity Usage Information workspace reflects the health of your system by proiding CPU, disk, and swap space usage statistics. This workspace has a superseded ersion that displays queries with signed 32-bit maximum alue (2,147,483,647) and a ersion with the same name (minus superseded ) with queries that support alues up to signed 64-bit max (9,223,372,036,854,775,807). This workspace is comprised of three iews. The iews are: Disk Usage Aerages (table iew) Disk Space Usage (bar chart) Disk Usage Aerages (bar chart) Chapter 3. Workspaces reference 15

The Disk Usage Aerages table proides information on the system's current disk usage. The Disk Space Usage bar chart displays the system's current disk usage. The Disk Usage Aerages bar chart displays aerage disk usage information. With the information that this workspace proides, you can recommend changes, set up situations, and erify that your recommended changes improe performance. CPU Aerages workspace The CPU Aerages workspace is reached by right-clicking the Capacity Usage Information naigator item in the Tioli Enterprise Portal. This workspace has a superseded ersion that displays queries with signed 32-bit maximum alue (2,147,483,647) and a ersion with the same name (minus superseded ) with queries that support alues up to signed 64-bit max (9,223,372,036,854,775,807). The workspace is comprised of 3 iews. The iews are Current Oerall CPU Usage bar chart, CPU Aerages (Hourly Updates) chart, and CPU Usage Trends table. Disk I/O Extended Rate workspace The Disk I/O Extended Rate workspace is reached by right-clicking the System Information naigator item in the Tioli Enterprise Portal. The Disk I/O Extended Rate workspace proides detailed input/output statistics and "calculations", including the queue length and size in sectors of read and write requests, the rate of those requests, and wait times associated with requests. This workspace has a superseded ersion that displays queries with signed 32-bit maximum alue (2,147,483,647) and a ersion with the same name (minus superseded ) with queries that support alues up to signed 64-bit max (9,223,372,036,854,775,807). This workspace is comprised of two iews. The iews are: Disk I/O Extended Rate (table iew) Disk Serice Time (bar chart) Disk Actiity (bar chart) The Disk I/O Extended Rate table details the input/out data and calculated alues associated with disk actiity. The Disk Serice Time chart displays aerage serices time in minutes. The Disk Actiity chart displays read and write sectors in seconds. Based on the information that this workspace proides, you can recommend changes, set up situations, and erify that your recommended changes improe performance. Note: The attributes associated with this workspace are only aailable for systems with a 2.4 (or higher) kernel. Disk I/O Rate workspace The Disk I/O Rate workspace is reached by right-clicking the System Information naigator item in the Tioli Enterprise Portal. The Disk I/O Rate workspace proides input/output statistics, including the transfer rates, block read rates, and block write rates of your monitored systems. This workspace has a superseded ersion that displays queries with signed 32-bit maximum alue (2,147,483,647) and a ersion with the same name (minus superseded ) with queries that support alues up to signed 64-bit max (9,223,372,036,854,775,807). This workspace is comprised of two iews. The iews are: Disk I/O Rate (table iew) Disk I/O Rate (bar chart) The Disk I/O Rate table includes transfer rates, block read rates, and block write rates for your monitored systems. The Disk I/O Rate chart proides at a glance 16 IBM Tioli Monitoring: Linux OS Agent: User s Guide

rate details associated with disk reads, writes, and transfers. Based on the information that this workspace proides, you can recommend changes, set up situations, and erify that your recommended changes improe performance. Note: The attributes associated with this workspace are only aailable for systems with a 2.4 (or higher) kernel. Disk Usage workspace The Disk Usage workspace reflects the health of storage space within your monitored systems. This workspace has a superseded ersion that displays queries with signed 32-bit maximum alue (2,147,483,647) and a ersion with the same name (minus superseded ) with queries that support alues up to signed 64-bit max (9,223,372,036,854,775,807). This workspace is comprised of four iews. The iews are: Space Used Percent (bar chart) Inodes Used Percent (bar chart) Disk Space (bar chart) Disk Usage (table iew) The three charts that comprise this workspace proide at a glance percentages of the space used, percentages of the inodes used, and amounts of disk space used/aailable for each monitored disk. The Disk Usage table captures this information, as well as mount point and file system data, in tabular form. Based on the information that this workspace proides, you can recommend changes, set up situations, and erify that your recommended changes improe performance. File Information workspace The File Information workspace displays file information statistics. The iews are: File Size - Top Ten (bar chart) File Size - Top Ten (table iew) Historical Summarized Aailability workspace The Historical Summarized Aailability workspace shows the percentage of time that a managed resource was aailable during the number of months that you specify in the Time Span dialog. This workspace consists of the following two graphical iews: Aailability (aerage oer months), which shows the percentage of time that managed resources were aailable, grouped by serer Process Summary (aerage oer months), which shows the percentage of time per system that each process was used by the serer Historical Summarized Aailability Daily workspace The Historical Summarized Aailability Daily workspace shows aailability information, a process summary, and a system summary for a managed serer by day. This workspace consists of the following three graphical iews: Aailability (daily), which shows the percentage of the day that the serer was aailable, summarized by day Process Summary (daily), which shows details such as memory and processor usage for processes that were running on the serer, summarized by day Chapter 3. Workspaces reference 17

System Summary (daily), which shows system information for the serer, such as the operating system type, name, ersion, and manufacturer, summarized by day Historical Summarized Aailability Hourly workspace The Historical Summarized Aailability Hourly workspace shows aailability information, a process summary, and a system summary for a managed serer by hour. This workspace consists of the following three graphical iews: Aailability (hourly), which shows the percentage of the hour that the serer was aailable, summarized by hour Process Summary (hourly), which shows details such as memory and processor usage for processes that were running on the serer, summarized by hour System Summary (hourly), which shows system information for the serer, such as the operating system type, name, ersion, and manufacturer, summarized by hour Historical Summarized Aailability Weekly workspace The Historical Summarized Aailability Weekly workspace shows aailability information, a process summary, and a system summary for a managed serer by week. This workspace consists of the following three graphical iews: Aailability (weekly), which shows the percentage of system time that the serer was aailable, summarized by week Process Summary (weekly), which shows processes that kept the serer busy, summarized by week System Summary (weekly), which shows system information such as the operating system type, name, ersion, and manufacturer, summarized by week Historical Summarized Capacity workspace The Historical Summarized Capacity workspace shows usage of system resources during the time span that you specify in the Time Span dialog. This workspace consists of the following 5 graphical iews: Network Interface Actiity (aerage oer months), which shows network traffic for the serer for all network interfaces on the system during the time span that you specify in the Time Span dialog Processor Utilization (aerage oer months), which shows CPU usage, including idle CPU time, for all processors that are associated with the serer during the specified time period Memory Utilization (aerage oer months), which shows memory used, free memory, and swapped memory use during the specified time period Disk Utilization (maximum oer months), which shows the maximum percentage of space used on the system's logical disks during the specified time period Disk Capacity (minimum oer months), which shows information about the remaining number of days until the disk is full based on the current rate of disk usage, and the remaining number of days until the disk is full based on peak rate of disk usage, for all disks that are associated with the serer Historical Summarized Capacity Daily workspace The Historical Summarized Capacity Daily workspace shows system usage summarized by day. This workspace consists of the following four graphical iews: 18 IBM Tioli Monitoring: Linux OS Agent: User s Guide

Network Interface Actiity, which shows network traffic for the serer, including packet collision rates, during the specified time period, summarized by day Processor Utilization, which shows CPU usage (including an idle, busy, or waiting CPU), for all processors that are associated with the serer during the specified time period, summarized by day Memory Utilization, which shows memory used, free memory, and swapped memory use during the specified time period, summarized by day Disk Utilization, which shows percentage of space used or aailable on the system's logical disks during the specified time period, summarized by day Historical Summarized Capacity Hourly workspace The Historical Summarized Capacity Hourly workspace shows system resources used, summarized by hour. This workspace consists of the following four graphical iews: Network Interface Actiity, which shows network traffic, including collisions, packet transmittal and count transmittal for the serer during the specified time period, summarized by hour Processor Utilization, which shows aerage CPU usage (idle, busy, and waiting), for all processors that are associated with the serer during the specified time period, summarized by hour Memory Utilization, which shows memory used, free memory, and swapped memory use during the specified time period, summarized by hour Disk Utilization, which shows percentages of space used and aailable on all the system's logical disks during the specified time period, summarized by hour Historical Summarized Capacity Weekly workspace The Historical Summarized Capacity Weekly workspace shows system resources used, summarized by week. This workspace consists of the following 5 graphical iews: Network Interface Actiity, which shows network traffic for the serer during the specified time period, summarized by week Processor Utilization, which shows CPU usage, especially idle CPU time, for all processors that are associated with the serer during the specified time period, summarized by week Maximum Memory Utilization, which shows maximum memory used, free memory, and swapped memory during the specified time period, summarized by week Aerage Memory Utilization, which shows aerage memory that the serer used during the specified time period, summarized by week Disk Utilization, which shows the maximum percentage of space used on all the system's logical disks during the specified time period, summarized by week Historical Summarized Performance workspace The Historical Summarized Performance workspace shows the aerage performance of system resources for the time span that you specify in the Time Span dialog. This workspace consists of the following 5 graphical iews: Network Actiity (maximum oer months), which shows (in the sample period) percentages of errors and collisions in network traffic for all networks that are associated with the system during the time span that you specify in the Time Span dialog Chapter 3. Workspaces reference 19